First published: Thu Dec 24 2020(Updated: )
In BIG-IP APM versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.4, 15.0.0-15.0.1.3, 14.1.0-14.1.3, 13.1.0-13.1.3.4, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2, on systems running more than one TMM instance, authenticated VPN users may consume excessive resources by sending specially-crafted malicious traffic over the tunnel.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 Access Policy Manager | >=11.6.1<=11.6.5 | |
F5 Access Policy Manager | >=12.1.0<=12.1.5 | |
F5 Access Policy Manager | >=13.1.0<13.1.3.5 | |
F5 Access Policy Manager | >=14.1.0<14.1.3.1 | |
F5 Access Policy Manager | >=15.0.0<15.0.1.4 | |
F5 Access Policy Manager | >=15.1.0<15.1.0.5 | |
F5 Access Policy Manager | >=16.0.0<16.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-27724 is rated as a high severity vulnerability due to the potential for authenticated VPN users to consume excessive system resources.
To fix CVE-2020-27724, upgrade your F5 BIG-IP Access Policy Manager to the versions that address the vulnerability, specifically versions after those listed in the affected software section.
CVE-2020-27724 affects F5 BIG-IP APM versions ranging from 11.6.1 to 16.0.0, specifically noted versions up to 16.0.0.1.
CVE-2020-27724 primarily impacts organizations using F5 BIG-IP APM with multiple TMM instances, allowing authenticated users to exploit the vulnerability.
CVE-2020-27724 is associated with a resource consumption attack, where specially-crafted malicious traffic can lead to denial of service conditions.