First published: Tue May 09 2017(Updated: )
In F5 BIG-IP APM 12.0.0 through 12.1.2 and 13.0.0, an authenticated user with an established access session to the BIG-IP APM system may be able to cause a traffic disruption if the length of the requested URL is less than 16 characters.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 Big-ip Access Policy Manager | =12.0.0 | |
F5 Big-ip Access Policy Manager | =12.1.0 | |
F5 Big-ip Access Policy Manager | =12.1.1 | |
F5 Big-ip Access Policy Manager | =12.1.2 | |
F5 Big-ip Access Policy Manager | =13.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-0302 has a medium severity level, which indicates a moderate impact on affected systems.
To mitigate CVE-2017-0302, upgrade to a fixed version of F5 BIG-IP APM beyond 12.1.2 or 13.0.0.
F5 BIG-IP APM versions 12.0.0 through 12.1.2 and 13.0.0 are affected by CVE-2017-0302.
CVE-2017-0302 represents a traffic disruption vulnerability that can be exploited by authenticated users.
CVE-2017-0302 requires an authenticated user with an established session, making it not exploitable remotely without access.