Severity
5.9MEDIUM
EPSS
0.9%
top 24.08%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 23
Latest updateMay 14

Description

An unauthenticated remote attacker may be able to disrupt services on F5 BIG-IP 11.4.1 - 11.5.4 devices with maliciously crafted network traffic. This vulnerability affects virtual servers associated with TCP profiles when the BIG-IP system's tm.tcpprogressive db variable value is set to non-default setting "enabled". The default value for the tm.tcpprogressive db variable is "negotiate". An attacker may be able to disrupt traffic or cause the BIG-IP system to fail over to another device in the

CVSS vector

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 2.2 | Impact: 3.6

Affected Packages10 packages

🔴Vulnerability Details

2
GHSA
GHSA-85r2-ph89-w946: An unauthenticated remote attacker may be able to disrupt services on F5 BIG-IP 112022-05-14
CVEList
CVE-2016-7468: An unauthenticated remote attacker may be able to disrupt services on F5 BIG-IP 112017-03-23

📋Vendor Advisories

2
Red Hat
curl: TLS session resumption client cert bypass2017-04-19
F5
CVE-2016-7468: An unauthenticated remote attacker may be able to disrupt services on F5 BIG-IP 112017-03-23

💬Community

1
Bugzilla
CVE-2017-7468 curl: TLS session resumption client cert bypass2017-04-19
CVE-2016-7468 (MEDIUM CVSS 5.9) | An unauthenticated remote attacker | cvebase.io