First published: Thu Oct 29 2020(Updated: )
On BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, FPS, GTM, Link Controller, PEM) versions 15.1.0-15.1.0.5, 14.1.0-14.1.2.3, and 13.1.0-13.1.3.3, when handling MQTT traffic through a BIG-IP virtual server associated with an MQTT profile and an iRule performing manipulations on that traffic, TMM may produce a core file.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 Access Policy Manager | >=13.1.0<13.1.3.4 | |
F5 Access Policy Manager | >=14.1.0<14.1.2.4 | |
F5 Access Policy Manager | >=15.0.0<15.1.1 | |
F5 BIG-IP Advanced Firewall Manager | >=13.1.0<13.1.3.4 | |
F5 BIG-IP Advanced Firewall Manager | >=14.1.0<14.1.2.4 | |
F5 BIG-IP Advanced Firewall Manager | >=15.0.0<15.1.1 | |
F5 BIG-IP Analytics | >=13.1.0<13.1.3.4 | |
F5 BIG-IP Analytics | >=14.1.0<14.1.2.4 | |
F5 BIG-IP Analytics | >=15.0.0<15.1.1 | |
F5 BIG-IP Application Acceleration Manager | >=13.1.0<13.1.3.4 | |
F5 BIG-IP Application Acceleration Manager | >=14.1.0<14.1.2.4 | |
F5 BIG-IP Application Acceleration Manager | >=15.0.0<15.1.1 | |
F5 Application Security Manager | >=13.1.0<13.1.3.4 | |
F5 Application Security Manager | >=14.1.0<14.1.2.4 | |
F5 Application Security Manager | >=15.0.0<15.1.1 | |
F5 BIG-IP | >=13.1.0<13.1.3.4 | |
F5 BIG-IP | >=14.1.0<14.1.2.4 | |
F5 BIG-IP | >=15.0.0<15.1.1 | |
F5 BIG-IP Fraud Protection Service | >=13.1.0<13.1.3.4 | |
F5 BIG-IP Fraud Protection Service | >=14.1.0<14.1.2.4 | |
F5 BIG-IP Fraud Protection Service | >=15.0.0<15.1.1 | |
Riverbed SteelApp Traffic Manager | >=13.1.0<13.1.3.4 | |
Riverbed SteelApp Traffic Manager | >=14.1.0<14.1.2.4 | |
Riverbed SteelApp Traffic Manager | >=15.0.0<15.1.1 | |
F5 BIG-IP Link Controller | >=13.1.0<13.1.3.4 | |
F5 BIG-IP Link Controller | >=14.1.0<14.1.2.4 | |
F5 BIG-IP Link Controller | >=15.0.0<15.1.1 | |
Riverbed SteelApp Traffic Manager | >=13.1.0<13.1.3.4 | |
Riverbed SteelApp Traffic Manager | >=14.1.0<14.1.2.4 | |
Riverbed SteelApp Traffic Manager | >=15.0.0<15.1.1 | |
F5 BIG-IP Policy Enforcement Manager | >=13.1.0<13.1.3.4 | |
F5 BIG-IP Policy Enforcement Manager | >=14.1.0<14.1.2.4 | |
F5 BIG-IP Policy Enforcement Manager | >=15.0.0<15.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-5935 is rated as a critical vulnerability affecting specific versions of F5 BIG-IP products.
To fix CVE-2020-5935, upgrade to version 15.1.1, 14.1.2.4, or 13.1.3.4 of the affected F5 BIG-IP products.
CVE-2020-5935 affects F5 BIG-IP versions 15.1.0-15.1.0.5, 14.1.0-14.1.2.3, and 13.1.0-13.1.3.3.
CVE-2020-5935 is a vulnerability that occurs when handling MQTT traffic through specific configurations in F5 BIG-IP.
While upgrading is the best solution, temporarily disabling MQTT traffic could serve as a workaround for CVE-2020-5935.