Rapid7 Vulnerability & Exploit Database

F5 Networks: K62279530 (CVE-2017-6161): ConfigSync mcpd vulnerability CVE-2017-6161

Back to Search

F5 Networks: K62279530 (CVE-2017-6161): ConfigSync mcpd vulnerability CVE-2017-6161

Severity
3
CVSS
(AV:A/AC:M/Au:N/C:N/I:N/A:P)
Published
10/26/2017
Created
07/25/2018
Added
10/26/2017
Modified
02/01/2018

Description

In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, WebAccelerator software version 12.0.0 - 12.1.2, 11.6.0 - 11.6.1, 11.4.0 - 11.5.4, 11.2.1, when ConfigSync is configured, attackers on adjacent networks may be able to bypass the TLS protections usually used to encrypted and authenticate connections to mcpd. This vulnerability may allow remote attackers to cause a denial-of-service (DoS) attack via resource exhaustion.

Solution(s)

  • f5-big-ip-upgrade-latest

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;