First published: Wed Oct 31 2018(Updated: )
On BIG-IP 14.0.0-14.0.0.2 or 13.0.0-13.1.1.1, undisclosed traffic patterns may lead to denial of service conditions for the BIG-IP system. The configuration which exposes this condition is the BIG-IP self IP address which is part of a VLAN group and has the Port Lockdown setting configured with anything other than "allow-all".
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 Big-ip Local Traffic Manager | >=13.0.0<=13.1.1.1 | |
F5 Big-ip Local Traffic Manager | >=14.0.0<=14.0.0.2 | |
F5 BIG-IP Advanced Firewall Manager | >=13.0.0<=13.1.1.1 | |
F5 BIG-IP Advanced Firewall Manager | >=14.0.0<=14.0.0.2 | |
F5 Big-ip Application Acceleration Manager | >=13.0.0<=13.1.1.1 | |
F5 Big-ip Application Acceleration Manager | >=14.0.0<=14.0.0.2 | |
F5 BIG-IP Analytics | >=13.0.0<=13.1.1.1 | |
F5 BIG-IP Analytics | >=14.0.0<=14.0.0.2 | |
F5 BIG-IP Access Policy Manager | >=13.0.0<=13.1.1.1 | |
F5 BIG-IP Access Policy Manager | >=14.0.0<=14.0.0.2 | |
F5 Big-ip Protocol Security Module | >=13.0.0<=13.1.1.1 | |
F5 Big-ip Protocol Security Module | >=14.0.0<=14.0.0.2 | |
F5 Big-ip Domain Name System | >=13.0.0<=13.1.1.1 | |
F5 Big-ip Domain Name System | >=14.0.0<=14.0.0.2 | |
F5 Big-ip Edge Gateway | >=13.0.0<=13.1.1.1 | |
F5 Big-ip Edge Gateway | >=14.0.0<=14.0.0.2 | |
F5 Big-ip Fraud Protection Service | >=13.0.0<=13.1.1.1 | |
F5 Big-ip Fraud Protection Service | >=14.0.0<=14.0.0.2 | |
F5 Big-ip Global Traffic Manager | >=13.0.0<=13.1.1.1 | |
F5 Big-ip Global Traffic Manager | >=14.0.0<=14.0.0.2 | |
F5 Big-ip Link Controller | >=13.0.0<=13.1.1.1 | |
F5 Big-ip Link Controller | >=14.0.0<=14.0.0.2 | |
F5 Big-ip Policy Enforcement Manager | >=13.0.0<=13.1.1.1 | |
F5 Big-ip Policy Enforcement Manager | >=14.0.0<=14.0.0.2 | |
F5 Big-ip Webaccelerator | >=13.0.0<=13.1.1.1 | |
F5 Big-ip Webaccelerator | >=14.0.0<=14.0.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-15320 is a vulnerability on the BIG-IP system that can lead to denial of service conditions.
CVE-2018-15320 has a severity rating of 7.5, which is considered high.
CVE-2018-15320 affects BIG-IP Local Traffic Manager, BIG-IP Advanced Firewall Manager, BIG-IP Application Acceleration Manager, BIG-IP Analytics, BIG-IP Access Policy Manager, BIG-IP Protocol Security Module, BIG-IP Domain Name System, BIG-IP Edge Gateway, BIG-IP Fraud Protection Service, BIG-IP Global Traffic Manager, BIG-IP Link Controller, BIG-IP Policy Enforcement Manager, and BIG-IP Webaccelerator.
To fix CVE-2018-15320, you should update your BIG-IP software to version 14.0.0.3 or 13.1.1.2 depending on your current version.
More information about CVE-2018-15320 can be found on the F5 support website: [https://support.f5.com/csp/article/K72442354](https://support.f5.com/csp/article/K72442354).