Lucene search

K
f5F5SOL16136
HistoryFeb 12, 2015 - 12:00 a.m.

SOL16136 - OpenSSL vulnerability CVE-2014-8275

2015-02-1200:00:00
support.f5.com
154

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.16 Low

EPSS

Percentile

95.4%

Recommended Action

If the previous table lists a version in the Versions known to be not vulnerable column, you can eliminate this vulnerability by upgrading to the listed version. If the listed version is older than the version you are currently running, or if the table does not list any version in the column, then no upgrade candidate currently exists.

F5 is responding to this vulnerability as determined by the parameters defined in SOL4602: Overview of the F5 security vulnerability response policy.

To mitigate this vulnerability, navigate to the respective product:

  • BIG-IP products

  • Traffix

  • LineRate

BIG-IP products

To mitigate this vulnerability, you can discontinue the use of X509::hash and use another mechanism for blacklisting.

**Traffix products **

To mitigate this vulnerability, you can upgrade with the Traffix package for January 2015 which contains openssl-1.0.1e-30. For more information, refer to the F5 Traffix representative for your region.

LineRate

None

Supplemental Information

  • SOL9970: Subscribing to email notifications regarding F5 products
  • SOL9957: Creating a custom RSS feed to view new and updated documents
  • SOL4918: Overview of the F5 critical issue hotfix policy

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.16 Low

EPSS

Percentile

95.4%