First published: Thu Dec 24 2020(Updated: )
In versions 14.1.0-14.1.3 and 13.1.0-13.1.3.4, a BIG-IP APM virtual server processing PingAccess requests may lead to a restart of the Traffic Management Microkernel (TMM) process.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 Big-ip Access Policy Manager | >=13.1.0<13.1.3.5 | |
F5 Big-ip Access Policy Manager | >=14.1.0<14.1.3.1 | |
F5 Big-ip Access Policy Manager | >=15.0.0<15.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-27723 is a vulnerability that affects F5 Big-IP Access Policy Manager (APM) versions 14.1.0-14.1.3 and 13.1.0-13.1.3.4.
CVE-2020-27723 has a severity score of 7.5 (high).
CVE-2020-27723 affects F5 Big-IP Access Policy Manager (APM) versions 14.1.0-14.1.3 and 13.1.0-13.1.3.4.
CVE-2020-27723 may lead to a restart of the Traffic Management Microkernel (TMM) process in F5 Big-IP APM virtual servers processing PingAccess requests.
To fix CVE-2020-27723, update F5 Big-IP APM to a version higher than 14.1.3.4 or 13.1.3.4 depending on the affected version.