TLS Handshake Vulnerability in F5 BIG-IP by F5 Networks
CVE-2018-5513

7.5HIGH

Summary

A vulnerability in the F5 BIG-IP product allows a malformed TLS handshake to crash the Traffic Management Microkernel (TMM), leading to potential service disruption. This issue specifically arises when Proxy SSL configuration is activated, impacting the data plane while leaving the control plane unaffected. It is essential for users and administrators of the affected versions to apply appropriate security updates and configurations to mitigate this risk.

Affected Version(s)

BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, WebAccelerator, WebSafe) 13.1.0-13.1.0.3

BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, WebAccelerator, WebSafe) 13.0.0

BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, WebAccelerator, WebSafe) 12.1.0-12.1.3.3

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.