First published: Wed Aug 26 2020(Updated: )
in BIG-IP versions 15.1.0-15.1.0.4, 15.0.0-15.0.1.3, 14.1.0-14.1.2.6, 13.1.0-13.1.3.4, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.2, Syn flood causes large number of MCPD context messages destined to secondary blades consuming memory leading to MCPD failure. This issue affects only VIPRION hosts with two or more blades installed. Single-blade VIPRION hosts are not affected.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Access Policy Manager | >=12.1.0<12.1.5.2 | |
F5 BIG-IP Access Policy Manager | >=14.1.0<14.1.2.7 | |
F5 BIG-IP Access Policy Manager | >=15.0.0<15.0.1.4 | |
F5 BIG-IP Access Policy Manager | >=15.1.0<15.1.0.5 | |
F5 BIG-IP Advanced Firewall Manager | >=12.1.0<12.1.5.2 | |
F5 BIG-IP Advanced Firewall Manager | >=14.1.0<14.1.2.7 | |
F5 BIG-IP Advanced Firewall Manager | >=15.0.0<15.0.1.4 | |
F5 BIG-IP Advanced Firewall Manager | >=15.1.0<15.1.0.5 | |
F5 BIG-IP Analytics | >=12.1.0<12.1.5.2 | |
F5 BIG-IP Analytics | >=14.1.0<14.1.2.7 | |
F5 BIG-IP Analytics | >=15.0.0<15.0.1.4 | |
F5 BIG-IP Analytics | >=15.1.0<15.1.0.5 | |
f5 big-ip application acceleration manager | >=12.1.0<12.1.5.2 | |
f5 big-ip application acceleration manager | >=14.1.0<14.1.2.7 | |
f5 big-ip application acceleration manager | >=15.0.0<15.0.1.4 | |
f5 big-ip application acceleration manager | >=15.1.0<15.1.0.5 | |
F5 BIG-IP Application Security Manager | >=12.1.0<12.1.5.2 | |
F5 BIG-IP Application Security Manager | >=14.1.0<14.1.2.7 | |
F5 BIG-IP Application Security Manager | >=15.0.0<15.0.1.4 | |
F5 BIG-IP Application Security Manager | >=15.1.0<15.1.0.5 | |
f5 big-ip domain name system | >=12.1.0<12.1.5.2 | |
f5 big-ip domain name system | >=14.1.0<14.1.2.7 | |
f5 big-ip domain name system | >=15.0.0<15.0.1.4 | |
f5 big-ip domain name system | >=15.1.0<15.1.0.5 | |
f5 big-ip fraud protection service | >=12.1.0<12.1.5.2 | |
f5 big-ip fraud protection service | >=14.1.0<14.1.2.7 | |
f5 big-ip fraud protection service | >=15.0.0<15.0.1.4 | |
f5 big-ip fraud protection service | >=15.1.0<15.1.0.5 | |
F5 BIG-IP Global Traffic Manager | >=12.1.0<12.1.5.2 | |
F5 BIG-IP Global Traffic Manager | >=14.1.0<14.1.2.7 | |
F5 BIG-IP Global Traffic Manager | >=15.0.0<15.0.1.4 | |
F5 BIG-IP Global Traffic Manager | >=15.1.0<15.1.0.5 | |
f5 big-ip link controller | >=12.1.0<12.1.5.2 | |
f5 big-ip link controller | >=14.1.0<14.1.2.7 | |
f5 big-ip link controller | >=15.0.0<15.0.1.4 | |
f5 big-ip link controller | >=15.1.0<15.1.0.5 | |
F5 BIG-IP Local Traffic Manager | >=12.1.0<12.1.5.2 | |
F5 BIG-IP Local Traffic Manager | >=14.1.0<14.1.2.7 | |
F5 BIG-IP Local Traffic Manager | >=15.0.0<15.0.1.4 | |
F5 BIG-IP Local Traffic Manager | >=15.1.0<15.1.0.5 | |
F5 BIG-IP Policy Enforcement Manager | >=12.1.0<12.1.5.2 | |
F5 BIG-IP Policy Enforcement Manager | >=14.1.0<14.1.2.7 | |
F5 BIG-IP Policy Enforcement Manager | >=15.0.0<15.0.1.4 | |
F5 BIG-IP Policy Enforcement Manager | >=15.1.0<15.1.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-5921 is rated as a high severity vulnerability due to its potential to consume significant memory resources on affected systems.
To mitigate CVE-2020-5921, upgrade to the latest patched version of the F5 BIG-IP software that is not affected by this vulnerability.
CVE-2020-5921 affects F5 BIG-IP versions 15.1.0-15.1.0.4, 15.0.0-15.0.1.3, 14.1.0-14.1.2.6, 13.1.0-13.1.3.4, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.2.
The impact of CVE-2020-5921 includes a potential Denial of Service due to memory consumption from excessive MCPD context messages.
Only users operating VIPRION hosts with two or more blades are affected by CVE-2020-5921.