10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.012 Low
EPSS
Percentile
83.9%
Recommended action
You can eliminate this vulnerability by running a version listed in the Versions known to be not vulnerable column in the previous table. If theVersions known to be not vulnerable column does not list a version that is higher than the version you are running, then no upgrade candidate currently exists.
Mitigating this vulnerability
To mitigate this vulnerability, you should consider the following recommendations:
Consider denying access to the Configuration utility and using only the command line and tmshutility until the BIG-IP system is updated. If that is not possible, F5 recommends that you access the Configuration utility over only a secure network.
If SSL profiles are configured to use COMPAT ciphers, consider reconfiguring the profiles to use ciphers from the NATIVE SSL stack. For information about the NATIVE and COMPAT ciphers, refer to the following articles:
Supplemental Information
support.f5.com/kb/en-us/solutions/public/0000/100/sol167.html
support.f5.com/kb/en-us/solutions/public/13000/100/sol13123
support.f5.com/kb/en-us/solutions/public/4000/600/sol4602.html
support.f5.com/kb/en-us/solutions/public/4000/900/sol4918.html
support.f5.com/kb/en-us/solutions/public/9000/900/sol9957.html
support.f5.com/kb/en-us/solutions/public/9000/900/sol9970.html