7.5
CWE
284
Advisory Published
Updated

CVE-2016-5736

First published: Fri Aug 19 2016(Updated: )

The default configuration of the IPsec IKE peer listener in F5 BIG-IP LTM, Analytics, APM, ASM, and Link Controller 11.2.1 before HF16, 11.4.x, 11.5.x before 11.5.4 HF2, 11.6.x before 11.6.1, and 12.x before 12.0.0 HF2; BIG-IP AAM, AFM, and PEM 11.4.x, 11.5.x before 11.5.4 HF2, 11.6.x before 11.6.1, and 12.x before 12.0.0 HF2; BIG-IP DNS 12.x before 12.0.0 HF2; BIG-IP Edge Gateway, WebAccelerator, and WOM 11.2.1 before HF16; BIG-IP GTM 11.2.1 before HF16, 11.4.x, 11.5.x before 11.5.4 HF2, and 11.6.x before 11.6.1; and BIG-IP PSM 11.4.0 through 11.4.1 improperly enables the anonymous IPsec IKE peer configuration object, which allows remote attackers to establish an IKE Phase 1 negotiation and possibly conduct brute-force attacks against Phase 2 negotiations via unspecified vectors.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
F5 BIG-IP Application Acceleration Manager=11.4.0
F5 BIG-IP Application Acceleration Manager=11.4.1
F5 BIG-IP Application Acceleration Manager=11.5.0
F5 BIG-IP Application Acceleration Manager=11.5.1
F5 BIG-IP Application Acceleration Manager=11.5.2
F5 BIG-IP Application Acceleration Manager=11.5.3
F5 BIG-IP Application Acceleration Manager=11.5.4
F5 BIG-IP Application Acceleration Manager=11.6.0
F5 BIG-IP Application Acceleration Manager=12.0.0
F5 BIG-IP WebAccelerator=11.2.1
F5 BIG-IP Analytics=11.2.1
F5 BIG-IP Analytics=11.4.0
F5 BIG-IP Analytics=11.4.1
F5 BIG-IP Analytics=11.5.0
F5 BIG-IP Analytics=11.5.1
F5 BIG-IP Analytics=11.5.2
F5 BIG-IP Analytics=11.5.3
F5 BIG-IP Analytics=11.5.4
F5 BIG-IP Analytics=11.6.0
F5 BIG-IP Analytics=12.0.0
F5 BIG-IP=12.0.0
F5 BIG-IP Edge Gateway=11.2.1
F5 Access Policy Manager=11.2.1
F5 Access Policy Manager=11.4.0
F5 Access Policy Manager=11.4.1
F5 Access Policy Manager=11.5.0
F5 Access Policy Manager=11.5.1
F5 Access Policy Manager=11.5.2
F5 Access Policy Manager=11.5.3
F5 Access Policy Manager=11.5.4
F5 Access Policy Manager=11.6.0
F5 Access Policy Manager=12.0.0
Riverbed SteelApp Traffic Manager=11.2.1
Riverbed SteelApp Traffic Manager=11.4.0
Riverbed SteelApp Traffic Manager=11.4.1
Riverbed SteelApp Traffic Manager=11.5.0
Riverbed SteelApp Traffic Manager=11.5.1
Riverbed SteelApp Traffic Manager=11.5.2
Riverbed SteelApp Traffic Manager=11.5.3
Riverbed SteelApp Traffic Manager=11.5.4
Riverbed SteelApp Traffic Manager=11.6.0
Riverbed SteelApp Traffic Manager=12.0.0
F5 BIG-IP Advanced Firewall Manager=11.4.0
F5 BIG-IP Advanced Firewall Manager=11.4.1
F5 BIG-IP Advanced Firewall Manager=11.5.0
F5 BIG-IP Advanced Firewall Manager=11.5.1
F5 BIG-IP Advanced Firewall Manager=11.5.2
F5 BIG-IP Advanced Firewall Manager=11.5.3
F5 BIG-IP Advanced Firewall Manager=11.5.4
F5 BIG-IP Advanced Firewall Manager=11.6.0
F5 BIG-IP Advanced Firewall Manager=12.0.0
F5 WebSafe=11.6.0
F5 WebSafe=12.0.0
F5 BIG-IP Policy Enforcement Manager=11.4.0
F5 BIG-IP Policy Enforcement Manager=11.4.1
F5 BIG-IP Policy Enforcement Manager=11.5.0
F5 BIG-IP Policy Enforcement Manager=11.5.1
F5 BIG-IP Policy Enforcement Manager=11.5.2
F5 BIG-IP Policy Enforcement Manager=11.5.3
F5 BIG-IP Policy Enforcement Manager=11.5.4
F5 BIG-IP Policy Enforcement Manager=11.6.0
F5 BIG-IP Policy Enforcement Manager=12.0.0
Riverbed SteelApp Traffic Manager=11.2.1
Riverbed SteelApp Traffic Manager=11.4.0
Riverbed SteelApp Traffic Manager=11.4.1
Riverbed SteelApp Traffic Manager=11.5.0
Riverbed SteelApp Traffic Manager=11.5.1
Riverbed SteelApp Traffic Manager=11.5.2
Riverbed SteelApp Traffic Manager=11.5.3
Riverbed SteelApp Traffic Manager=11.5.4
Riverbed SteelApp Traffic Manager=11.6.0
F5 BIG-IP Link Controller=11.2.1
F5 BIG-IP Link Controller=11.4.0
F5 BIG-IP Link Controller=11.4.1
F5 BIG-IP Link Controller=11.5.0
F5 BIG-IP Link Controller=11.5.1
F5 BIG-IP Link Controller=11.5.2
F5 BIG-IP Link Controller=11.5.3
F5 BIG-IP Link Controller=11.5.4
F5 BIG-IP Link Controller=11.6.0
F5 BIG-IP Link Controller=12.0.0
F5 BIG-IP Protocol Security Manager=11.4.0
F5 BIG-IP Protocol Security Manager=11.4.1
Exinda WAN Optimization Suite=11.2.1
F5 Application Security Manager=11.2.1
F5 Application Security Manager=11.4.0
F5 Application Security Manager=11.4.1
F5 Application Security Manager=11.5.0
F5 Application Security Manager=11.5.1
F5 Application Security Manager=11.5.2
F5 Application Security Manager=11.5.3
F5 Application Security Manager=11.5.4
F5 Application Security Manager=11.6.0
F5 Application Security Manager=12.0.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2016-5736?

    The severity of CVE-2016-5736 is classified as critical due to potential exposure of sensitive information.

  • How do I fix CVE-2016-5736?

    To fix CVE-2016-5736, update your F5 BIG-IP products to the latest versions as recommended by the vendor.

  • Which versions are affected by CVE-2016-5736?

    CVE-2016-5736 affects F5 BIG-IP versions 11.2.1 through 12.0.0 before specific hotfixes.

  • Is CVE-2016-5736 related to IPsec IKE peer listener?

    Yes, CVE-2016-5736 is specifically related to the IPsec IKE peer listener default configuration in affected F5 BIG-IP products.

  • What are the impacts of CVE-2016-5736 vulnerability?

    The impacts of CVE-2016-5736 can include unauthorized access and potential exposure of sensitive data transmitted over IPsec.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203