First published: Fri Apr 13 2018(Updated: )
On F5 BIG-IP versions 13.0.0, 12.1.0-12.1.3.1, 11.6.1-11.6.2, or 11.5.1-11.5.5, vCMP guests running on VIPRION 2100, 4200 and 4300 series blades cannot correctly decrypt ciphertext from established SSL sessions with small MTU.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Local Traffic Manager | >=11.5.1<=11.5.5 | |
F5 BIG-IP Local Traffic Manager | >=11.6.1<=11.6.2 | |
F5 BIG-IP Local Traffic Manager | >=12.1.0<=12.1.3 | |
F5 BIG-IP Local Traffic Manager | =13.0.0 | |
F5 VIPRION Application Delivery Controller | ||
F5 VIPRION Application Delivery Controller | ||
F5 VIPRION B4300 | ||
f5 big-ip application acceleration manager | >=11.5.1<=11.5.5 | |
f5 big-ip application acceleration manager | >=11.6.1<=11.6.2 | |
f5 big-ip application acceleration manager | >=12.1.0<=12.1.3 | |
f5 big-ip application acceleration manager | =13.0.0 | |
F5 BIG-IP Advanced Firewall Manager | >=11.5.1<=11.5.5 | |
F5 BIG-IP Advanced Firewall Manager | >=11.6.1<=11.6.2 | |
F5 BIG-IP Advanced Firewall Manager | >=12.1.0<=12.1.3 | |
F5 BIG-IP Advanced Firewall Manager | =13.0.0 | |
F5 BIG-IP Analytics | >=11.5.1<=11.5.5 | |
F5 BIG-IP Analytics | >=11.6.1<=11.6.2 | |
F5 BIG-IP Analytics | >=12.1.0<=12.1.3 | |
F5 BIG-IP Analytics | =13.0.0 | |
F5 BIG-IP Access Policy Manager | >=11.5.1<=11.5.5 | |
F5 BIG-IP Access Policy Manager | >=11.6.1<=11.6.2 | |
F5 BIG-IP Access Policy Manager | >=12.1.0<=12.1.3 | |
F5 BIG-IP Access Policy Manager | =13.0.0 | |
F5 BIG-IP Application Security Manager | >=11.5.1<=11.5.5 | |
F5 BIG-IP Application Security Manager | >=11.6.1<=11.6.2 | |
F5 BIG-IP Application Security Manager | >=12.1.0<=12.1.3 | |
F5 BIG-IP Application Security Manager | =13.0.0 | |
F5 BIG-IP Edge Gateway | >=11.5.1<=11.5.5 | |
F5 BIG-IP Edge Gateway | >=11.6.1<=11.6.2 | |
F5 BIG-IP Edge Gateway | >=12.1.0<=12.1.3 | |
F5 BIG-IP Edge Gateway | =13.0.0 | |
F5 BIG-IP Global Traffic Manager | >=11.5.1<=11.5.5 | |
F5 BIG-IP Global Traffic Manager | >=11.6.1<=11.6.2 | |
F5 BIG-IP Global Traffic Manager | >=12.1.0<=12.1.3 | |
F5 BIG-IP Global Traffic Manager | =13.0.0 | |
f5 big-ip link controller | >=11.5.1<=11.5.5 | |
f5 big-ip link controller | >=11.6.1<=11.6.2 | |
f5 big-ip link controller | >=12.1.0<=12.1.3 | |
f5 big-ip link controller | =13.0.0 | |
F5 BIG-IP Policy Enforcement Manager | >=11.5.1<=11.5.5 | |
F5 BIG-IP Policy Enforcement Manager | >=11.6.1<=11.6.2 | |
F5 BIG-IP Policy Enforcement Manager | >=12.1.0<=12.1.3 | |
F5 BIG-IP Policy Enforcement Manager | =13.0.0 | |
F5 BIG-IP WebAccelerator | >=11.5.1<=11.5.5 | |
F5 BIG-IP WebAccelerator | >=11.6.1<=11.6.2 | |
F5 BIG-IP WebAccelerator | >=12.1.0<=12.1.3 | |
F5 BIG-IP WebAccelerator | =13.0.0 | |
F5 WebSafe | >=11.5.1<=11.5.5 | |
F5 WebSafe | >=11.6.1<=11.6.2 | |
F5 WebSafe | >=12.1.0<=12.1.3 | |
F5 WebSafe | =13.0.0 | |
f5 big-ip domain name system | >=11.5.1<=11.5.5 | |
f5 big-ip domain name system | >=11.6.1<=11.6.2 | |
f5 big-ip domain name system | >=12.1.0<=12.1.3 | |
f5 big-ip domain name system | =13.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-5507 is categorized as high due to its potential impact on SSL session decryption.
To fix CVE-2018-5507, upgrade F5 BIG-IP software to versions that are not vulnerable, such as those beyond 13.0.0, 12.1.3.1, 11.6.2, and 11.5.5.
CVE-2018-5507 affects F5 BIG-IP versions 13.0.0, 12.1.0 through 12.1.3.1, 11.6.1 through 11.6.2, and 11.5.1 through 11.5.5.
Systems running F5 BIG-IP Local Traffic Manager, Application Acceleration Manager, Advanced Firewall Manager, and several other modules are vulnerable to CVE-2018-5507.
The implications of CVE-2018-5507 include the inability to properly decrypt SSL session data, potentially compromising secure communications.