First published: Tue Jan 12 2016(Updated: )
BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, Link Controller, and PEM 12.0.0 before HF1, when the TCP profile for a virtual server is configured with Congestion Metrics Cache enabled, allow remote attackers to cause a denial of service (Traffic Management Microkernel (TMM) restart) via crafted ICMP packets, related to Path MTU (PMTU) discovery.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Analytics | =12.0.0 | |
f5 big-ip application acceleration manager | =12.0.0 | |
f5 big-ip link controller | =12.0.0 | |
F5 BIG-IP Advanced Firewall Manager | =12.0.0 | |
F5 BIG-IP Policy Enforcement Manager | =12.0.0 | |
F5 BIG-IP Local Traffic Manager | =12.0.0 | |
F5 BIG-IP Access Policy Manager | =12.0.0 | |
F5 BIG-IP Application Security Manager | =12.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7759 has a high severity rating due to its potential to cause a denial of service by restarting the Traffic Management Microkernel.
To fix CVE-2015-7759, apply the latest hotfix for BIG-IP software version 12.0.0.
CVE-2015-7759 affects various F5 BIG-IP products including LTM, AAM, AFM, Analytics, APM, ASM, Link Controller, and PEM version 12.0.0 before HF1.
CVE-2015-7759 allows remote attackers to disrupt services by causing the TMM to restart, leading to possible downtime.
To mitigate risks from CVE-2015-7759, users should ensure they are running updated versions of affected software and implement network security measures to monitor ICMP traffic.