First published: Fri Oct 27 2017(Updated: )
In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, Websafe software version 12.0.0 to 12.1.2, 11.6.0 to 11.6.1, 11.4.0 to 11.5.4, 11.2.1, in some cases TMM may crash when processing TCP traffic. This vulnerability affects TMM via a virtual server configured with TCP profile. Traffic processing is disrupted while Traffic Management Microkernel (TMM) restarts. If the affected BIG-IP system is configured to be part of a device group, it will trigger a failover to the peer device.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
Riverbed SteelApp Traffic Manager | >=11.5.0<=11.5.4 | |
Riverbed SteelApp Traffic Manager | =11.2.1 | |
Riverbed SteelApp Traffic Manager | =11.6.0 | |
Riverbed SteelApp Traffic Manager | =11.6.1 | |
Riverbed SteelApp Traffic Manager | =12.0.0 | |
Riverbed SteelApp Traffic Manager | =12.1.0 | |
Riverbed SteelApp Traffic Manager | =12.1.1 | |
F5 BIG-IP Application Acceleration Manager | >=11.5.0<=11.5.4 | |
F5 BIG-IP Application Acceleration Manager | =11.2.1 | |
F5 BIG-IP Application Acceleration Manager | =11.6.0 | |
F5 BIG-IP Application Acceleration Manager | =11.6.1 | |
F5 BIG-IP Application Acceleration Manager | =12.0.0 | |
F5 BIG-IP Application Acceleration Manager | =12.1.0 | |
F5 BIG-IP Application Acceleration Manager | =12.1.1 | |
F5 BIG-IP Advanced Firewall Manager | >=11.5.0<=11.5.4 | |
F5 BIG-IP Advanced Firewall Manager | =11.2.1 | |
F5 BIG-IP Advanced Firewall Manager | =11.6.0 | |
F5 BIG-IP Advanced Firewall Manager | =11.6.1 | |
F5 BIG-IP Advanced Firewall Manager | =12.0.0 | |
F5 BIG-IP Advanced Firewall Manager | =12.1.0 | |
F5 BIG-IP Advanced Firewall Manager | =12.1.1 | |
F5 Access Policy Manager | >=11.5.0<=11.5.4 | |
F5 Access Policy Manager | =11.2.1 | |
F5 Access Policy Manager | =11.6.0 | |
F5 Access Policy Manager | =11.6.1 | |
F5 Access Policy Manager | =12.0.0 | |
F5 Access Policy Manager | =12.1.0 | |
F5 Access Policy Manager | =12.1.1 | |
F5 Application Security Manager | >=11.5.0<=11.5.4 | |
F5 Application Security Manager | =11.2.1 | |
F5 Application Security Manager | =11.6.0 | |
F5 Application Security Manager | =11.6.1 | |
F5 Application Security Manager | =12.0.0 | |
F5 Application Security Manager | =12.1.0 | |
F5 Application Security Manager | =12.1.1 | |
F5 BIG-IP Link Controller | >=11.5.0<=11.5.4 | |
F5 BIG-IP Link Controller | =11.2.1 | |
F5 BIG-IP Link Controller | =11.6.0 | |
F5 BIG-IP Link Controller | =11.6.1 | |
F5 BIG-IP Link Controller | =12.0.0 | |
F5 BIG-IP Link Controller | =12.1.0 | |
F5 BIG-IP Link Controller | =12.1.1 | |
F5 BIG-IP Policy Enforcement Manager | >=11.5.0<=11.5.4 | |
F5 BIG-IP Policy Enforcement Manager | =11.2.1 | |
F5 BIG-IP Policy Enforcement Manager | =11.6.0 | |
F5 BIG-IP Policy Enforcement Manager | =11.6.1 | |
F5 BIG-IP Policy Enforcement Manager | =12.0.0 | |
F5 BIG-IP Policy Enforcement Manager | =12.1.0 | |
F5 BIG-IP Policy Enforcement Manager | =12.1.1 | |
F5 WebSafe | =1.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6162 is considered a high severity vulnerability due to the potential for TMM crashes when processing TCP traffic.
To fix CVE-2017-6162, upgrade F5 BIG-IP software to a version that is not affected by the vulnerability.
CVE-2017-6162 affects F5 BIG-IP versions 12.0.0 to 12.1.2, 11.6.0 to 11.6.1, and 11.4.0 to 11.5.4, among others.
CVE-2017-6162 can lead to system crashes which could disrupt services relying on affected F5 BIG-IP products.
Yes, if you are using any vulnerable versions of F5 BIG-IP products as specified in CVE-2017-6162, your application may be exposed to this vulnerability.