Lucene search

K
f5F5SOL15568
HistorySep 05, 2014 - 12:00 a.m.

SOL15568 - OpenSSL vulnerability CVE-2014-3510

2014-09-0500:00:00
support.f5.com
25

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.02 Low

EPSS

Percentile

87.6%

Recommended Action

You can eliminate this vulnerability by running a version listed in the Versions known to be not vulnerable column in the previous table. If theVersions known to be not vulnerable column does not list a version that is later than the version you are running, then no upgrade candidate currently exists.

For BIG-IP Edge Clients, there is no workaround. To mitigate this vulnerability for all other affected products, perform the following task:

  • Verify that Datagram Transport Layer Security (DTLS) virtual servers referencing Secure Socket Layer (SSL) profiles do not permit COMPAT SSL ciphers.

Supplemental Information

  • SOL9970: Subscribing to email notifications regarding F5 products
  • SOL9957: Creating a custom RSS feed to view new and updated documents.
  • SOL4602: Overview of the F5 security vulnerability response policy
  • SOL4918: Overview of the F5 critical issue hotfix policy
  • SOL167: Downloading software and firmware from F5

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.02 Low

EPSS

Percentile

87.6%