CVE-2016-9245Improper Access Control in F5 Big-ip Domain Name System

Severity
5.9MEDIUMNVD
EPSS
0.7%
top 29.01%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 7
Latest updateMay 17

Description

In F5 BIG-IP systems 12.1.0 - 12.1.2, malicious requests made to virtual servers with an HTTP profile can cause the TMM to restart. The issue is exposed with BIG-IP APM profiles, regardless of settings. The issue is also exposed with the non-default "Normalize URI" configuration options used in iRules and/or BIG-IP LTM policies. An attacker may be able to disrupt traffic or cause the BIG-IP system to fail over to another device in the device group.

CVSS vector

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 2.2 | Impact: 3.6

Affected Packages10 packages

NVDf5/big-ip_domain_name_system12.1.0, 12.1.1, 12.1.2+2
NVDf5/big-ip_local_traffic_manager12.1.0, 12.1.1, 12.1.2+2
NVDf5/big-ip_websafe12.1.0, 12.1.1, 12.1.2+2
NVDf5/big-ip_analytics12.1.0, 12.1.1, 12.1.2+2
NVDf5/big-ip_link_controller12.1.0, 12.1.1, 12.1.2+2

🔴Vulnerability Details

2
GHSA
GHSA-p23v-8398-ww6c: In F5 BIG-IP systems 122022-05-17
CVEList
CVE-2016-9245: In F5 BIG-IP systems 122017-03-07

📋Vendor Advisories

1
F5
CVE-2016-9245: In F5 BIG-IP systems 122017-03-07
CVE-2016-9245 — Improper Access Control in F5 | cvebase