In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, WebAccelerator software version 12.0.0 - 12.1.2, 11.6.0 - 11.6.1, 11.4.0 - 11.5.4, 11.2.1, when ConfigSync is configured, attackers on adjacent networks may be able to bypass the TLS protections usually used to encrypted and authenticate connections to mcpd. This vulnerability may allow remote attackers to cause a denial-of-service (DoS) attack via resource exhaustion.
References
Link Resource
http://www.securityfocus.com/bid/101636 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1039675 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1039676 Third Party Advisory VDB Entry
https://support.f5.com/csp/article/K62279530 Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: f5

Published: 2017-10-26T00:00:00

Updated: 2017-11-02T09:57:01

Reserved: 2017-02-21T00:00:00


Link: CVE-2017-6161

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2017-10-27T14:29:00.390

Modified: 2017-11-16T19:31:19.363


Link: CVE-2017-6161

JSON object: View

cve-icon Redhat Information

No data.

CWE