First published: Thu Oct 29 2020(Updated: )
On BIG-IP APM 15.1.0-15.1.0.5, 14.1.0-14.1.2.3, and 13.1.0-13.1.3.3, when multiple HTTP requests from the same client to configured SAML Single Logout (SLO) URL are passing through a TCP Keep-Alive connection, traffic to TMM can be disrupted.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 Access Policy Manager | >=13.1.0<13.1.3.4 | |
F5 Access Policy Manager | >=14.1.0<14.1.2.4 | |
F5 Access Policy Manager | >=15.1.0<15.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-5934 is identified as a medium-severity vulnerability that can disrupt traffic to TMM under specific conditions.
To address CVE-2020-5934, upgrade your BIG-IP APM to a non-affected version beyond the specified 13.1.3.4, 14.1.2.4, or 15.1.1.
F5 BIG-IP APM versions 15.1.0 through 15.1.0.5, 14.1.0 through 14.1.2.3, and 13.1.0 through 13.1.3.3 are affected by CVE-2020-5934.
CVE-2020-5934 may cause disruptions in traffic to TMM when simultaneous HTTP requests are made via a TCP Keep-Alive connection.
While upgrading to a patched version is the recommended solution, limiting concurrent requests to the SLO URL may help mitigate the impact of CVE-2020-5934.