5.3

CVE-2017-6161

In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, WebAccelerator software version 12.0.0 - 12.1.2, 11.6.0 - 11.6.1, 11.4.0 - 11.5.4, 11.2.1, when ConfigSync is configured, attackers on adjacent networks may be able to bypass the TLS protections usually used to encrypted and authenticate connections to mcpd. This vulnerability may allow remote attackers to cause a denial-of-service (DoS) attack via resource exhaustion.

Data is provided by the National Vulnerability Database (NVD)
F5Big-ip Local Traffic Manager Version >= 11.5.0 <= 11.5.4
F5Big-ip Local Traffic Manager Version11.2.1
F5Big-ip Local Traffic Manager Version11.6.0
F5Big-ip Local Traffic Manager Version11.6.1
F5Big-ip Local Traffic Manager Version12.0.0
F5Big-ip Local Traffic Manager Version12.1.0
F5Big-ip Local Traffic Manager Version12.1.1
F5Big-ip Local Traffic Manager Version12.1.2
F5Big-ip Application Acceleration Manager Version >= 11.5.0 <= 11.5.4
F5Big-ip Advanced Firewall Manager Version >= 11.5.0 <= 11.5.4
F5Big-ip Access Policy Manager Version >= 11.5.0 <= 11.5.4
F5Big-ip Access Policy Manager Version11.2.1
F5Big-ip Access Policy Manager Version11.6.0
F5Big-ip Access Policy Manager Version11.6.1
F5Big-ip Access Policy Manager Version12.0.0
F5Big-ip Access Policy Manager Version12.1.0
F5Big-ip Access Policy Manager Version12.1.1
F5Big-ip Access Policy Manager Version12.1.2
F5Big-ip Application Security Manager Version >= 11.5.0 <= 11.5.4
F5Big-ip Link Controller Version >= 11.5.0 <= 11.5.4
F5Big-ip Link Controller Version11.2.1
F5Big-ip Link Controller Version11.6.0
F5Big-ip Link Controller Version11.6.1
F5Big-ip Link Controller Version12.0.0
F5Big-ip Link Controller Version12.1.0
F5Big-ip Link Controller Version12.1.1
F5Big-ip Link Controller Version12.1.2
F5Big-ip Policy Enforcement Manager Version >= 11.5.0 <= 11.5.4
F5Big-ip Domain Name System Version >= 11.4.0 <= 11.5.4
F5Big-ip Domain Name System Version11.2.1
F5Big-ip Domain Name System Version11.6.0
F5Big-ip Domain Name System Version11.6.1
F5Big-ip Domain Name System Version12.0.0
F5Big-ip Domain Name System Version12.1.0
F5Big-ip Domain Name System Version12.1.1
F5Big-ip Domain Name System Version12.1.2
F5Big-ip Edge Gateway Version11.2.1
F5Big-ip Edge Gateway Version11.4.0
F5Big-ip Edge Gateway Version11.4.1
F5Big-ip Edge Gateway Version11.5.0
F5Big-ip Edge Gateway Version11.5.1
F5Big-ip Edge Gateway Version11.5.2
F5Big-ip Edge Gateway Version11.5.3
F5Big-ip Edge Gateway Version11.5.4
F5Big-ip Edge Gateway Version11.5.5
F5Big-ip Edge Gateway Version11.6.0
F5Big-ip Edge Gateway Version11.6.1
F5Big-ip Edge Gateway Version12.0.0
F5Big-ip Edge Gateway Version12.1.0
F5Big-ip Edge Gateway Version12.1.1
F5Big-ip Edge Gateway Version12.1.2
F5Big-ip Global Traffic Manager Version11.2.1
F5Big-ip Global Traffic Manager Version11.4.0
F5Big-ip Global Traffic Manager Version11.4.1
F5Big-ip Global Traffic Manager Version11.5.0
F5Big-ip Global Traffic Manager Version11.5.1
F5Big-ip Global Traffic Manager Version11.5.2
F5Big-ip Global Traffic Manager Version11.5.3
F5Big-ip Global Traffic Manager Version11.5.4
F5Big-ip Global Traffic Manager Version11.6.0
F5Big-ip Global Traffic Manager Version11.6.1
F5Big-ip Global Traffic Manager Version12.0.0
F5Big-ip Global Traffic Manager Version12.1.0
F5Big-ip Global Traffic Manager Version12.1.1
F5Big-ip Global Traffic Manager Version12.1.2
F5Big-ip Webaccelerator Version11.2.1
F5Big-ip Webaccelerator Version11.4.0
F5Big-ip Webaccelerator Version11.4.1
F5Big-ip Webaccelerator Version11.5.0
F5Big-ip Webaccelerator Version11.5.1
F5Big-ip Webaccelerator Version11.5.2
F5Big-ip Webaccelerator Version11.5.3
F5Big-ip Webaccelerator Version11.5.4
F5Big-ip Webaccelerator Version11.5.5
F5Big-ip Webaccelerator Version11.6.0
F5Big-ip Webaccelerator Version11.6.1
F5Big-ip Webaccelerator Version11.6.2
F5Big-ip Webaccelerator Version12.0.0
F5Big-ip Webaccelerator Version12.1.0
F5Big-ip Webaccelerator Version12.1.1
F5Big-ip Webaccelerator Version12.1.2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 2.59% 0.842
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 5.3 1.6 3.6
CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 2.9 5.5 2.9
AV:A/AC:M/Au:N/C:N/I:N/A:P
CWE-400 Uncontrolled Resource Consumption

The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.