vulnerability
F5 Networks: K62279530 (CVE-2017-6161): ConfigSync mcpd vulnerability CVE-2017-6161
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 3 | (AV:A/AC:M/Au:N/C:N/I:N/A:P) | Oct 26, 2017 | Oct 26, 2017 | Feb 1, 2018 |
Severity
3
CVSS
(AV:A/AC:M/Au:N/C:N/I:N/A:P)
Published
Oct 26, 2017
Added
Oct 26, 2017
Modified
Feb 1, 2018
Description
In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, WebAccelerator software version 12.0.0 - 12.1.2, 11.6.0 - 11.6.1, 11.4.0 - 11.5.4, 11.2.1, when ConfigSync is configured, attackers on adjacent networks may be able to bypass the TLS protections usually used to encrypted and authenticate connections to mcpd. This vulnerability may allow remote attackers to cause a denial-of-service (DoS) attack via resource exhaustion.
Solution
f5-big-ip-upgrade-latest
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.