Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2020-5852

Опубликовано: 14 янв. 2020
Источник: nvd
CVSS3: 7.5
CVSS2: 5
EPSS Низкий

Описание

Undisclosed traffic patterns received may cause a disruption of service to the Traffic Management Microkernel (TMM). This vulnerability affects TMM through a virtual server configured with a FastL4 profile. Traffic processing is disrupted while TMM restarts. This issue only impacts specific engineering hotfixes. NOTE: This vulnerability does not affect any of the BIG-IP major, minor or maintenance releases you obtained from downloads.f5.com. The affected Engineering Hotfix builds are as follows: Hotfix-BIGIP-14.1.2.1.0.83.4-ENG Hotfix-BIGIP-12.1.4.1.0.97.6-ENG Hotfix-BIGIP-11.5.4.2.74.291-HF2

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.4.2.74.291:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_local_traffic_manager:12.1.4.1.0.97.6:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_local_traffic_manager:14.1.2.1.0.83.4:*:*:*:*:*:*:*
Конфигурация 2

Одно из

cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.4.2.74.291:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.1.4.1.0.97.6:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.1.2.1.0.83.4:*:*:*:*:*:*:*
Конфигурация 3

Одно из

cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.4.2.74.291:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.1.4.1.0.97.6:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.1.2.1.0.83.4:*:*:*:*:*:*:*
Конфигурация 4

Одно из

cpe:2.3:a:f5:big-ip_analytics:11.5.4.2.74.291:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_analytics:12.1.4.1.0.97.6:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_analytics:14.1.2.1.0.83.4:*:*:*:*:*:*:*
Конфигурация 5

Одно из

cpe:2.3:a:f5:big-ip_access_policy_manager:11.5.4.2.74.291:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_access_policy_manager:12.1.4.1.0.97.6:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.2.1.0.83.4:*:*:*:*:*:*:*
Конфигурация 6

Одно из

cpe:2.3:a:f5:big-ip_application_security_manager:11.5.4.2.74.291:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_application_security_manager:12.1.4.1.0.97.6:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_application_security_manager:14.1.2.1.0.83.4:*:*:*:*:*:*:*
Конфигурация 7

Одно из

cpe:2.3:a:f5:big-ip_edge_gateway:11.5.4.2.74.291:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_edge_gateway:12.1.4.1.0.97.6:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_edge_gateway:14.1.2.1.0.83.4:*:*:*:*:*:*:*
Конфигурация 8

Одно из

cpe:2.3:a:f5:big-ip_fraud_protection_service:11.5.4.2.74.291:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_fraud_protection_service:12.1.4.1.0.97.6:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_fraud_protection_service:14.1.2.1.0.83.4:*:*:*:*:*:*:*
Конфигурация 9

Одно из

cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.4.2.74.291:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_global_traffic_manager:12.1.4.1.0.97.6:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_global_traffic_manager:14.1.2.1.0.83.4:*:*:*:*:*:*:*
Конфигурация 10

Одно из

cpe:2.3:a:f5:big-ip_link_controller:11.5.4.2.74.291:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_link_controller:12.1.4.1.0.97.6:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_link_controller:14.1.2.1.0.83.4:*:*:*:*:*:*:*
Конфигурация 11

Одно из

cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.4.2.74.291:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.1.4.1.0.97.6:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.1.2.1.0.83.4:*:*:*:*:*:*:*
Конфигурация 12

Одно из

cpe:2.3:a:f5:big-ip_webaccelerator:11.5.4.2.74.291:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_webaccelerator:12.1.4.1.0.97.6:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_webaccelerator:14.1.2.1.0.83.4:*:*:*:*:*:*:*
Конфигурация 13

Одно из

cpe:2.3:a:f5:big-ip_domain_name_system:11.5.4.2.74.291:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_domain_name_system:12.1.4.1.0.97.6:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_domain_name_system:14.1.2.1.0.83.4:*:*:*:*:*:*:*

EPSS

Процентиль: 75%
0.00896
Низкий

7.5 High

CVSS3

5 Medium

CVSS2

Дефекты

NVD-CWE-noinfo

Связанные уязвимости

github
больше 3 лет назад

Undisclosed traffic patterns received may cause a disruption of service to the Traffic Management Microkernel (TMM). This vulnerability affects TMM through a virtual server configured with a FastL4 profile. Traffic processing is disrupted while TMM restarts. This issue only impacts specific engineering hotfixes. NOTE: This vulnerability does not affect any of the BIG-IP major, minor or maintenance releases you obtained from downloads.f5.com. The affected Engineering Hotfix builds are as follows: Hotfix-BIGIP-14.1.2.1.0.83.4-ENG Hotfix-BIGIP-12.1.4.1.0.97.6-ENG Hotfix-BIGIP-11.5.4.2.74.291-HF2

EPSS

Процентиль: 75%
0.00896
Низкий

7.5 High

CVSS3

5 Medium

CVSS2

Дефекты

NVD-CWE-noinfo