In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, WebAccelerator software version 12.0.0 - 12.1.2, 11.6.0 - 11.6.1, 11.4.0 - 11.5.4, 11.2.1, when ConfigSync is configured, attackers on adjacent networks may be able to bypass the TLS protections usually used to encrypted and authenticate connections to mcpd. This vulnerability may allow remote attackers to cause a denial-of-service (DoS) attack via resource exhaustion.
No CVSS v3.1
Attack Vector Adjacent Network
Attack Complexity High
Privileges Required None
Scope Unchanged
Confidentiality Impact None
Integrity Impact None
Availability Impact High
User Interaction None
Access Vector Adjacent Network
Access Complexity Medium
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial
AV:A/AC:M/Au:N/C:N/I:N/A:P
Vendors | Products |
---|---|
F5 |
|
Configuration 1 [-]
|
Configuration 2 [-]
|
Configuration 3 [-]
|
Configuration 4 [-]
|
Configuration 5 [-]
|
Configuration 6 [-]
|
Configuration 7 [-]
|
Configuration 8 [-]
|
Configuration 9 [-]
|
Configuration 10 [-]
|
Configuration 11 [-]
|
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/101636 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1039675 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1039676 | Third Party Advisory VDB Entry |
https://support.f5.com/csp/article/K62279530 | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: f5
Published: 2017-10-26T00:00:00
Updated: 2017-11-02T09:57:01
Reserved: 2017-02-21T00:00:00
Link: CVE-2017-6161
JSON object: View
NVD Information
Status : Analyzed
Published: 2017-10-27T14:29:00.390
Modified: 2017-11-16T19:31:19.363
Link: CVE-2017-6161
JSON object: View
Redhat Information
No data.
CWE