CVE-2017-6166

CWE-4154 documents4 sources
Severity
5.9MEDIUM
EPSS
1.2%
top 21.07%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 22
Latest updateMay 13

Description

In BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Link Controller, PEM, and WebSafe software 12.0.0 to 12.1.1, in some cases the Traffic Management Microkernel (TMM) may crash when processing fragmented packets. This vulnerability affects TMM through a virtual server configured with a FastL4 profile. Traffic processing is disrupted while TMM restarts. If the affected BIG-IP system is configured as part of a device group, it will trigger a failover to the peer device.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 2.2 | Impact: 3.6

Affected Packages11 packages

NVDf5/big-ip_link_controller12.0.012.1.1
NVDf5/f5_websafe12.0.012.1.1
NVDf5/big-ip_analytics12.0.012.1.1
NVDf5/linerate2.5.02.6.2
NVDf5/big-ip_afm12.0.012.1.1

🔴Vulnerability Details

2
GHSA
GHSA-j35v-h5m8-p59m: In BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Link Controller, PEM, and WebSafe software 122022-05-13
CVEList
CVE-2017-6166: In BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Link Controller, PEM, and WebSafe software 122017-11-22

📋Vendor Advisories

1
F5
CVE-2017-6166: In BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Link Controller, PEM, and WebSafe software 122017-11-22
CVE-2017-6166 (MEDIUM CVSS 5.9) | In BIG-IP LTM | cvebase.io