CVE-2017-6161

Published Oct 27, 2017

Last updated 7 years ago

Overview

Description
In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, WebAccelerator software version 12.0.0 - 12.1.2, 11.6.0 - 11.6.1, 11.4.0 - 11.5.4, 11.2.1, when ConfigSync is configured, attackers on adjacent networks may be able to bypass the TLS protections usually used to encrypted and authenticate connections to mcpd. This vulnerability may allow remote attackers to cause a denial-of-service (DoS) attack via resource exhaustion.
Source
f5sirt@f5.com
NVD status
Analyzed

Risk scores

CVSS 3.0

Type
Primary
Base score
5.3
Impact score
3.6
Exploitability score
1.6
Vector string
CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Severity
MEDIUM

CVSS 2.0

Type
Primary
Base score
2.9
Impact score
2.9
Exploitability score
5.5
Vector string
AV:A/AC:M/Au:N/C:N/I:N/A:P

Weaknesses

nvd@nist.gov
CWE-400

Social media

Hype score
Not currently trending

Configurations