First published: Tue Jan 10 2017(Updated: )
Under certain conditions for BIG-IP systems using a virtual server with an associated FastL4 profile and TCP analytics profile, a specific sequence of packets may cause the Traffic Management Microkernel (TMM) to restart.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
Riverbed SteelApp Traffic Manager | =12.1.0 | |
Riverbed SteelApp Traffic Manager | =12.1.1 | |
F5 BIG-IP Application Acceleration Manager | =12.1.0 | |
F5 BIG-IP Application Acceleration Manager | =12.1.1 | |
F5 BIG-IP Advanced Firewall Manager | =12.1.0 | |
F5 BIG-IP Advanced Firewall Manager | =12.1.1 | |
F5 BIG-IP Analytics | =12.1.0 | |
F5 BIG-IP Analytics | =12.1.1 | |
F5 Access Policy Manager | =12.1.0 | |
F5 Access Policy Manager | =12.1.1 | |
F5 Application Security Manager | =12.1.0 | |
F5 Application Security Manager | =12.1.1 | |
F5 BIG-IP | =12.1.0 | |
F5 BIG-IP | =12.1.1 | |
F5 BIG-IP Link Controller | =12.1.0 | |
F5 BIG-IP Link Controller | =12.1.1 | |
F5 BIG-IP Policy Enforcement Manager | =12.1.0 | |
F5 BIG-IP Policy Enforcement Manager | =12.1.1 | |
F5 WebSafe | =12.1.0 | |
F5 WebSafe | =12.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9247 has been assigned a medium severity rating due to the potential for service interruption.
To mitigate CVE-2016-9247, upgrade to a patched version of the affected F5 BIG-IP software.
CVE-2016-9247 affects specific versions of F5 BIG-IP Local Traffic Manager, Application Acceleration Manager, Advanced Firewall Manager, Analytics, and other associated products.
Yes, CVE-2016-9247 can be exploited by sending a specific sequence of packets to an affected F5 BIG-IP virtual server.
The impact of CVE-2016-9247 is that it may cause the Traffic Management Microkernel (TMM) to restart, leading to service disruptions.