First published: Thu Dec 21 2017(Updated: )
In F5 BIG-IP APM software version 13.0.0 and 12.1.2, in some circumstances, APM tunneled VPN flows can cause a VPN/PPP connflow to be prematurely freed or cause TMM to stop responding with a "flow not in use" assertion. An attacker may be able to disrupt traffic or cause the BIG-IP system to fail over to another device in the device group.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 Access Policy Manager | =12.1.2 | |
F5 Access Policy Manager | =13.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6129 has a high severity rating due to its potential to disrupt VPN traffic and cause system failures.
To fix CVE-2017-6129, upgrade your F5 BIG-IP APM software to the latest version that addresses this vulnerability.
CVE-2017-6129 affects F5 BIG-IP APM software versions 12.1.2 and 13.0.0.
CVE-2017-6129 can allow attackers to disrupt VPN traffic, potentially leading to denial of service.
There are no known workarounds for CVE-2017-6129; the best protection is to apply the relevant software updates.