7.8
CVE-2018-15319
- EPSS 0.59%
- Published 31.10.2018 14:29:00
- Last modified 21.11.2024 03:50:33
- Source f5sirt@f5.com
- Teams watchlist Login
- Open Login
On BIG-IP 14.0.0-14.0.0.2, 13.0.0-13.1.1.1, or 12.1.0-12.1.3.6, malicious requests made to virtual servers with an HTTP profile can cause the TMM to restart. The issue is exposed with the non-default "normalize URI" configuration options used in iRules and/or BIG-IP LTM policies.
Data is provided by the National Vulnerability Database (NVD)
F5 ≫ Big-ip Local Traffic Manager Version >= 12.1.0 <= 12.1.3.6
F5 ≫ Big-ip Local Traffic Manager Version >= 13.0.0 <= 13.1.1.1
F5 ≫ Big-ip Local Traffic Manager Version >= 14.0.0 <= 14.0.0.2
F5 ≫ Big-ip Advanced Firewall Manager Version >= 12.1.0 <= 12.1.3.6
F5 ≫ Big-ip Advanced Firewall Manager Version >= 13.0.0 <= 13.1.1.1
F5 ≫ Big-ip Advanced Firewall Manager Version >= 14.0.0 <= 14.0.0.2
F5 ≫ Big-ip Application Acceleration Manager Version >= 12.1.0 <= 12.1.3.6
F5 ≫ Big-ip Application Acceleration Manager Version >= 13.0.0 <= 13.1.1.1
F5 ≫ Big-ip Application Acceleration Manager Version >= 14.0.0 <= 14.0.0.2
F5 ≫ Big-ip Analytics Version >= 12.1.0 <= 12.1.3.6
F5 ≫ Big-ip Analytics Version >= 13.0.0 <= 13.1.1.1
F5 ≫ Big-ip Analytics Version >= 14.0.0 <= 14.0.0.2
F5 ≫ Big-ip Access Policy Manager Version >= 12.1.0 <= 12.1.3.6
F5 ≫ Big-ip Access Policy Manager Version >= 13.0.0 <= 13.1.1.1
F5 ≫ Big-ip Access Policy Manager Version >= 14.0.0 <= 14.0.0.2
F5 ≫ Big-ip Protocol Security Module Version >= 12.1.0 <= 12.1.3.6
F5 ≫ Big-ip Protocol Security Module Version >= 13.0.0 <= 13.1.1.1
F5 ≫ Big-ip Protocol Security Module Version >= 14.0.0 <= 14.0.0.2
F5 ≫ Big-ip Domain Name System Version >= 12.1.0 <= 12.1.3.6
F5 ≫ Big-ip Domain Name System Version >= 13.0.0 <= 13.1.1.1
F5 ≫ Big-ip Domain Name System Version >= 14.0.0 <= 14.0.0.2
F5 ≫ Big-ip Edge Gateway Version >= 12.1.0 <= 12.1.3.6
F5 ≫ Big-ip Edge Gateway Version >= 13.0.0 <= 13.1.1.1
F5 ≫ Big-ip Edge Gateway Version >= 14.0.0 <= 14.0.0.2
F5 ≫ Big-ip Fraud Protection Service Version >= 12.1.0 <= 12.1.3.6
F5 ≫ Big-ip Fraud Protection Service Version >= 13.0.0 <= 13.1.1.1
F5 ≫ Big-ip Fraud Protection Service Version >= 14.0.0 <= 14.0.0.2
F5 ≫ Big-ip Global Traffic Manager Version >= 12.1.0 <= 12.1.3.6
F5 ≫ Big-ip Global Traffic Manager Version >= 13.0.0 <= 13.1.1.1
F5 ≫ Big-ip Global Traffic Manager Version >= 14.0.0 <= 14.0.0.2
F5 ≫ Big-ip Link Controller Version >= 12.1.0 <= 12.1.3.6
F5 ≫ Big-ip Link Controller Version >= 13.0.0 <= 13.1.1.1
F5 ≫ Big-ip Link Controller Version >= 14.0.0 <= 14.0.0.2
F5 ≫ Big-ip Policy Enforcement Manager Version >= 12.1.0 <= 12.1.3.6
F5 ≫ Big-ip Policy Enforcement Manager Version >= 13.0.0 <= 13.1.1.1
F5 ≫ Big-ip Policy Enforcement Manager Version >= 14.0.0 <= 14.0.0.2
F5 ≫ Big-ip Webaccelerator Version >= 12.1.0 <= 12.1.3.6
F5 ≫ Big-ip Webaccelerator Version >= 13.0.0 <= 13.1.1.1
F5 ≫ Big-ip Webaccelerator Version >= 14.0.0 <= 14.0.0.2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.59% | 0.665 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 3.9 | 3.6 |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
nvd@nist.gov | 7.8 | 10 | 6.9 |
AV:N/AC:L/Au:N/C:N/I:N/A:C
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.