vulnerability

F5 Networks: K62279530 (CVE-2017-6161): ConfigSync mcpd vulnerability CVE-2017-6161

Severity
3
CVSS
(AV:A/AC:M/Au:N/C:N/I:N/A:P)
Published
Oct 26, 2017
Added
Oct 26, 2017
Modified
Feb 1, 2018

Description

In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, WebAccelerator software version 12.0.0 - 12.1.2, 11.6.0 - 11.6.1, 11.4.0 - 11.5.4, 11.2.1, when ConfigSync is configured, attackers on adjacent networks may be able to bypass the TLS protections usually used to encrypted and authenticate connections to mcpd. This vulnerability may allow remote attackers to cause a denial-of-service (DoS) attack via resource exhaustion.

Solution

f5-big-ip-upgrade-latest
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.