CVE-2017-6148Improper Input Validation in F5 Big-ip Access Policy Manager

Severity
7.5HIGHNVD
EPSS
0.6%
top 29.22%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 13
Latest updateMay 14

Description

Responses to SOCKS proxy requests made through F5 BIG-IP version 13.0.0, 12.0.0-12.1.3.1, 11.6.1-11.6.2, or 11.5.1-11.5.5 may cause a disruption of services provided by TMM. The data plane is impacted and exposed only when a SOCKS proxy profile is attached to a Virtual Server. The control plane is not impacted by this vulnerability.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages8 packages

NVDf5/big-ip_link_controller11.5.111.5.5+3
NVDf5/big-ip_websafe11.5.111.5.5+3
NVDf5/big-ip_access_policy_manager11.5.111.5.5+3
NVDf5/big-ip_local_traffic_manager11.5.111.5.5+3
NVDf5/big-ip_advanced_firewall_manager11.5.111.5.5+3

🔴Vulnerability Details

2
GHSA
GHSA-gm7q-2q9v-fr9f: Responses to SOCKS proxy requests made through F5 BIG-IP version 132022-05-14
CVEList
CVE-2017-6148: Responses to SOCKS proxy requests made through F5 BIG-IP version 132018-04-13

📋Vendor Advisories

1
F5
CVE-2017-6148: Responses to SOCKS proxy requests made through F5 BIG-IP version 132018-04-13
CVE-2017-6148 — Improper Input Validation in F5 | cvebase