First published: Thu Oct 29 2020(Updated: )
On BIG-IP LTM 15.1.0-15.1.0.5, 14.1.0-14.1.2.7, 13.1.0-13.1.3.4, and 12.1.0-12.1.5.1, the Traffic Management Microkernel (TMM) process may consume excessive resources when processing SSL traffic and client authentication are enabled on the client SSL profile.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
Riverbed SteelApp Traffic Manager | >=12.1.0<12.1.5.2 | |
Riverbed SteelApp Traffic Manager | >=13.1.0<=13.1.3.4 | |
Riverbed SteelApp Traffic Manager | >=14.1.0<14.1.2.8 | |
Riverbed SteelApp Traffic Manager | >=15.0.0<15.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-5936 is rated as a high severity vulnerability due to its potential to consume excessive resources on the affected BIG-IP devices.
To remediate CVE-2020-5936, upgrade to a fixed version of BIG-IP LTM that is not affected by this vulnerability.
CVE-2020-5936 affects BIG-IP LTM versions 15.1.0-15.1.0.5, 14.1.0-14.1.2.7, 13.1.0-13.1.3.4, and 12.1.0-12.1.5.1.
The impact of CVE-2020-5936 can lead to degraded system performance due to high resource consumption when processing SSL traffic.
There is no specific workaround mentioned for CVE-2020-5936, so it is recommended to apply the appropriate patch as soon as possible.