First published: Tue Jun 07 2016(Updated: )
Virtual servers in F5 BIG-IP 11.5.4, when SSL profiles are enabled, allow remote attackers to cause a denial of service (resource consumption and Traffic Management Microkernel restart) via an SSL alert during the handshake.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
f5 big-ip application acceleration manager | =11.5.4 | |
F5 BIG-IP Advanced Firewall Manager | =11.5.4 | |
F5 BIG-IP Local Traffic Manager | =11.5.4 | |
F5 BIG-IP Analytics | =11.5.4 | |
F5 BIG-IP Global Traffic Manager | =11.5.4 | |
F5 BIG-IP Policy Enforcement Manager | =11.5.4 | |
f5 big-ip link controller | =11.5.4 | |
F5 BIG-IP Access Policy Manager | =11.5.4 | |
F5 BIG-IP Application Security Manager | =11.5.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4545 is classified as a high-severity vulnerability due to its potential to cause denial of service.
To fix CVE-2016-4545, it is recommended to upgrade F5 BIG-IP to a version that is not affected, specifically a version later than 11.5.4.
CVE-2016-4545 affects F5 BIG-IP models including Application Acceleration Manager, Advanced Firewall Manager, and several others, all specifically at version 11.5.4.
The risks associated with CVE-2016-4545 include resource consumption and traffic management microkernel restarts leading to service disruptions.
Yes, CVE-2016-4545 can be exploited remotely by attackers through SSL alerts during the handshake process.