Lucene search

K
f5F5SOL46514822
HistoryAug 26, 2016 - 12:00 a.m.

SOL46514822 - Linux TCP stack vulnerability CVE-2016-5696

2016-08-2600:00:00
support.f5.com
82

EPSS

0.004

Percentile

75.1%

Vulnerability Recommended Actions

If you are running a version listed in the Versions known to be vulnerable column, you can eliminate this vulnerability by upgrading to a version listed in theVersions known to be not vulnerable column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.

To mitigate this vulnerability, you should permit management access to F5 products only over a secure network and limit shell access to only trusted users. For more information for the BIG-IP system, refer to SOL13309: Restricting access to the Configuration utility by source IP address (11.x - 12.x) and SOL13092: Overview of securing access to the BIG-IP system.

Supplemental Information

  • SOL9970: Subscribing to email notifications regarding F5 products
  • SOL9957: Creating a custom RSS feed to view new and updated documents
  • SOL4602: Overview of the F5 security vulnerability response policy
  • SOL4918: Overview of the F5 critical issue hotfix policy