First published: Fri Aug 26 2016(Updated: )
Virtual servers in F5 BIG-IP systems 11.2.1 HF11 through HF15, 11.4.1 HF4 through HF10, 11.5.3 through 11.5.4, 11.6.0 HF5 through HF7, and 12.0.0, when configured with a TCP profile, allow remote attackers to cause a denial of service (Traffic Management Microkernel restart) via crafted network traffic.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Edge Gateway | =11.2.1 | |
F5 BIG-IP Protocol Security Manager | =11.2.1 | |
F5 BIG-IP Protocol Security Manager | =11.4.1 | |
F5 BIG-IP Analytics | =11.2.1 | |
F5 BIG-IP Analytics | =11.4.1 | |
F5 BIG-IP Analytics | =11.5.3 | |
F5 BIG-IP Analytics | =11.5.4 | |
F5 BIG-IP Analytics | =11.6.0 | |
F5 BIG-IP Analytics | =12.0.0 | |
F5 Application Security Manager | =11.2.1 | |
F5 Application Security Manager | =11.4.1 | |
F5 Application Security Manager | =11.5.3 | |
F5 Application Security Manager | =11.5.4 | |
F5 Application Security Manager | =11.6.0 | |
F5 Application Security Manager | =12.0.0 | |
F5 BIG-IP Advanced Firewall Manager | =11.4.1 | |
F5 BIG-IP Advanced Firewall Manager | =11.5.3 | |
F5 BIG-IP Advanced Firewall Manager | =11.5.4 | |
F5 BIG-IP Advanced Firewall Manager | =11.6.0 | |
F5 BIG-IP Advanced Firewall Manager | =12.0.0 | |
F5 BIG-IP | =12.0.0 | |
F5 BIG-IP Policy Enforcement Manager | =11.4.1 | |
F5 BIG-IP Policy Enforcement Manager | =11.5.3 | |
F5 BIG-IP Policy Enforcement Manager | =11.5.4 | |
F5 BIG-IP Policy Enforcement Manager | =11.6.0 | |
F5 BIG-IP Policy Enforcement Manager | =12.0.0 | |
Exinda WAN Optimization Suite | =11.2.1 | |
F5 Access Policy Manager | =11.2.1 | |
F5 Access Policy Manager | =11.4.1 | |
F5 Access Policy Manager | =11.5.3 | |
F5 Access Policy Manager | =11.5.4 | |
F5 Access Policy Manager | =11.6.0 | |
F5 Access Policy Manager | =12.0.0 | |
F5 BIG-IP Application Acceleration Manager | =11.4.1 | |
F5 BIG-IP Application Acceleration Manager | =11.5.3 | |
F5 BIG-IP Application Acceleration Manager | =11.5.4 | |
F5 BIG-IP Application Acceleration Manager | =11.6.0 | |
F5 BIG-IP Application Acceleration Manager | =12.0.0 | |
F5 BIG-IP Link Controller | =11.2.1 | |
F5 BIG-IP Link Controller | =11.4.1 | |
F5 BIG-IP Link Controller | =11.5.3 | |
F5 BIG-IP Link Controller | =11.5.4 | |
F5 BIG-IP Link Controller | =11.6.0 | |
F5 BIG-IP Link Controller | =12.0.0 | |
Riverbed SteelApp Traffic Manager | =11.2.1 | |
Riverbed SteelApp Traffic Manager | =11.4.1 | |
Riverbed SteelApp Traffic Manager | =11.5.3 | |
Riverbed SteelApp Traffic Manager | =11.5.4 | |
Riverbed SteelApp Traffic Manager | =11.6.0 | |
F5 BIG-IP WebAccelerator | =11.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5023 has a critical severity level due to its potential to cause remote denial of service attacks.
To mitigate CVE-2016-5023, upgrade your F5 BIG-IP systems to the patched versions recommended by F5.
CVE-2016-5023 affects F5 BIG-IP versions 11.2.1 HF11 through HF15, 11.4.1 HF4 through HF10, 11.5.3 through 11.5.4, 11.6.0 HF5 through HF7, and 12.0.0.
CVE-2016-5023 is related to denial of service attacks that can restart the Traffic Management Microkernel.
Yes, CVE-2016-5023 can be exploited remotely by attackers sending crafted network traffic.