First published: Tue Oct 24 2023(Updated: )
The BGP daemon (bgpd) in ZebOS through 7.10.6 allows remote attackers to cause a denial-of-service (DoS) by sending crafted BGP update messages containing a malformed attribute.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Next (LTM) | >=20.0.1<=20.1.0 | |
F5 BIG-IP Next | >=1.5.0<=1.9.1 | |
F5 BIG-IP Next | >=1.1.0<=1.2.1 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=17.1.0<=17.1.1 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=16.1.0<=16.1.4 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=15.1.0<=15.1.10 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=14.1.0<=14.1.5 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=13.1.0<=13.1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
F5-K000137315 has a critical severity level due to its potential to cause a denial-of-service (DoS) vulnerability.
To fix F5-K000137315, you should apply the latest patches or updates provided by F5 Systems for the affected BIG-IP versions.
F5-K000137315 impacts various F5 BIG-IP products and versions including BIG-IP Next, BIG-IP Next SPK, and standard BIG-IP from versions 13.1.0 to 20.1.0.
F5-K000137315 allows remote attackers to send crafted BGP update messages that may lead to a denial-of-service condition.
F5 has not specified any workarounds for F5-K000137315, making immediate patching essential to mitigate the risk.