5.9

CVE-2015-8099

F5 BIG-IP LTM, AFM, Analytics, APM, ASM, Link Controller, and PEM 11.3.x, 11.4.x before 11.4.1 HF10, 11.5.x before 11.5.4, 11.6.x before 11.6.1, and 12.x before 12.0.0 HF1; BIG-IP AAM 11.4.x before 11.4.1 HF10, 11.5.x before 11.5.4, 11.6.x before 11.6.1, and 12.x before 12.0.0 HF1; BIG-IP DNS 12.x before 12.0.0 HF1; BIG-IP Edge Gateway, WebAccelerator, and WOM 11.3.0; BIG-IP GTM 11.3.x, 11.4.x before 11.4.1 HF10, 11.5.x before 11.5.4, and 11.6.x before 11.6.1; BIG-IP PSM 11.3.x and 11.4.x before 11.4.1 HF10; Enterprise Manager 3.0.0 through 3.1.1; BIG-IQ Cloud and BIG-IQ Security 4.0.0 through 4.5.0; BIG-IQ Device 4.2.0 through 4.5.0; BIG-IQ ADC 4.5.0; BIG-IQ Centralized Management 4.6.0; and BIG-IQ Cloud and Orchestration 1.0.0 on the 3900, 6900, 8900, 8950, 11000, 11050, PB100 and PB200 platforms, when software SYN cookies are configured on virtual servers, allow remote attackers to cause a denial of service (High-Speed Bridge hang) via an invalid TCP segment.

Data is provided by the National Vulnerability Database (NVD)
F5Big-ip Access Policy Manager Version11.3.0
F5Big-ip Access Policy Manager Version11.4.0
F5Big-ip Access Policy Manager Version11.4.1
F5Big-ip Access Policy Manager Version11.5.0
F5Big-ip Access Policy Manager Version11.5.1
F5Big-ip Access Policy Manager Version11.5.2
F5Big-ip Access Policy Manager Version11.5.3
F5Big-ip Access Policy Manager Version11.6.0
F5Big-ip Access Policy Manager Version12.0.0
F5Big-ip Link Controller Version11.3.0
F5Big-ip Link Controller Version11.4.0
F5Big-ip Link Controller Version11.4.1
F5Big-ip Link Controller Version11.5.0
F5Big-ip Link Controller Version11.5.1
F5Big-ip Link Controller Version11.5.2
F5Big-ip Link Controller Version11.5.3
F5Big-ip Link Controller Version11.6.0
F5Big-ip Link Controller Version12.0.0
F5Big-ip Analytics Version11.3.0
F5Big-ip Analytics Version11.4.0
F5Big-ip Analytics Version11.4.1
F5Big-ip Analytics Version11.5.0
F5Big-ip Analytics Version11.5.1
F5Big-ip Analytics Version11.5.2
F5Big-ip Analytics Version11.5.3
F5Big-ip Analytics Version11.6.0
F5Big-ip Analytics Version12.0.0
F5Big-iq Device Version4.2.0
F5Big-iq Security Version4.0.0
F5Big-iq Security Version4.1.0
F5Big-iq Security Version4.2.0
F5Big-iq Security Version4.3.0
F5Big-iq Security Version4.4.0
F5Big-iq Security Version4.5.0
F5Big-ip Edge Gateway Version11.3.0
F5Big-ip Global Traffic Manager Version11.3.0
F5Big-ip Global Traffic Manager Version11.4.0
F5Big-ip Global Traffic Manager Version11.4.1
F5Big-ip Global Traffic Manager Version11.5.0
F5Big-ip Global Traffic Manager Version11.5.1
F5Big-ip Global Traffic Manager Version11.5.2
F5Big-ip Global Traffic Manager Version11.5.3
F5Big-ip Global Traffic Manager Version11.6.0
F5Big-ip Local Traffic Manager Version10.2.0
F5Big-ip Local Traffic Manager Version11.3.0
F5Big-ip Local Traffic Manager Version11.4.0
F5Big-ip Local Traffic Manager Version11.4.1
F5Big-ip Local Traffic Manager Version11.5.0
F5Big-ip Local Traffic Manager Version11.5.1
F5Big-ip Local Traffic Manager Version11.5.2
F5Big-ip Local Traffic Manager Version11.5.3
F5Big-ip Local Traffic Manager Version11.6.0
F5Big-ip Local Traffic Manager Version12.0.0
F5Big-iq Cloud Version4.0.0
F5Big-iq Cloud Version4.1.0
F5Big-iq Cloud Version4.2.0
F5Big-iq Cloud Version4.3.0
F5Big-iq Cloud Version4.4.0
F5Big-iq Cloud Version4.5.0
F5Big-iq Device Version4.2.0
F5Big-iq Device Version4.3.0
F5Big-iq Device Version4.4.0
F5Big-iq Device Version4.5.0
F5Big-ip Domain Name System Version12.0.0
F5Big-ip Enterprise Manager Version3.0.0
F5Big-ip Enterprise Manager Version3.1.0
F5Big-ip Enterprise Manager Version3.1.1
F5Big-ip Edge Gateway Version11.3.0
F5Big-ip Webaccelerator Version11.3.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 1.05% 0.766
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 5.9 2.2 3.6
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 4.3 8.6 2.9
AV:N/AC:M/Au:N/C:N/I:N/A:P
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.