8.1

CVE-2020-5876

On BIG-IP 15.0.0-15.0.1.3, 14.1.0-14.1.2.3, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, a race condition exists where mcpd and other processes may make unencrypted connection attempts to a new configuration sync peer. The race condition can occur when changing the ConfigSync IP address of a peer, adding a new peer, or when the Traffic Management Microkernel (TMM) first starts up.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
F5Big-ip Access Policy Manager Version >= 11.6.1 <= 11.6.5.1
F5Big-ip Access Policy Manager Version >= 12.1.0 <= 12.1.5.1
F5Big-ip Access Policy Manager Version >= 13.1.0 <= 13.1.3.3
F5Big-ip Access Policy Manager Version >= 14.1.0 <= 14.1.2.3
F5Big-ip Access Policy Manager Version >= 15.0.0 <= 15.1.0.3
F5Big-ip Advanced Firewall Manager Version >= 11.6.1 <= 11.6.5.1
F5Big-ip Advanced Firewall Manager Version >= 12.1.0 <= 12.1.5.1
F5Big-ip Advanced Firewall Manager Version >= 13.1.0 <= 13.1.3.3
F5Big-ip Advanced Firewall Manager Version >= 14.1.0 <= 14.1.2.3
F5Big-ip Advanced Firewall Manager Version >= 15.0.0 <= 15.1.0.3
F5Big-ip Analytics Version >= 11.6.1 <= 11.6.5.1
F5Big-ip Analytics Version >= 12.1.0 <= 12.1.5.1
F5Big-ip Analytics Version >= 13.1.0 <= 13.1.3.3
F5Big-ip Analytics Version >= 14.1.0 <= 14.1.2.3
F5Big-ip Analytics Version >= 15.0.0 <= 15.1.0.3
F5Big-ip Application Acceleration Manager Version >= 11.6.1 <= 11.6.5.1
F5Big-ip Application Acceleration Manager Version >= 12.1.0 <= 12.1.5.1
F5Big-ip Application Acceleration Manager Version >= 13.1.0 <= 13.1.3.3
F5Big-ip Application Acceleration Manager Version >= 14.1.0 <= 14.1.2.3
F5Big-ip Application Acceleration Manager Version >= 15.0.0 <= 15.1.0.3
F5Big-ip Application Security Manager Version >= 11.6.1 <= 11.6.5.1
F5Big-ip Application Security Manager Version >= 12.1.0 <= 12.1.5.1
F5Big-ip Application Security Manager Version >= 13.1.0 <= 13.1.3.3
F5Big-ip Application Security Manager Version >= 14.1.0 <= 14.1.2.3
F5Big-ip Application Security Manager Version >= 15.0.0 <= 15.1.0.3
F5Big-ip Domain Name System Version >= 11.6.1 <= 11.6.5.1
F5Big-ip Domain Name System Version >= 12.1.0 <= 12.1.5.1
F5Big-ip Domain Name System Version >= 13.1.0 <= 13.1.3.3
F5Big-ip Domain Name System Version >= 14.1.0 <= 14.1.2.3
F5Big-ip Domain Name System Version >= 15.0.0 <= 15.1.0.3
F5Big-ip Fraud Protection Service Version >= 11.6.1 <= 11.6.5.1
F5Big-ip Fraud Protection Service Version >= 12.1.0 <= 12.1.5.1
F5Big-ip Fraud Protection Service Version >= 13.1.0 <= 13.1.3.3
F5Big-ip Fraud Protection Service Version >= 14.1.0 <= 14.1.2.3
F5Big-ip Fraud Protection Service Version >= 15.0.0 <= 15.1.0.3
F5Big-ip Global Traffic Manager Version >= 11.6.1 <= 11.6.5.1
F5Big-ip Global Traffic Manager Version >= 12.1.0 <= 12.1.5.1
F5Big-ip Global Traffic Manager Version >= 13.1.0 <= 13.1.3.3
F5Big-ip Global Traffic Manager Version >= 14.1.0 <= 14.1.2.3
F5Big-ip Global Traffic Manager Version >= 15.0.0 <= 15.1.0.3
F5Big-ip Link Controller Version >= 11.6.1 <= 11.6.5.1
F5Big-ip Link Controller Version >= 12.1.0 <= 12.1.5.1
F5Big-ip Link Controller Version >= 13.1.0 <= 13.1.3.3
F5Big-ip Link Controller Version >= 14.1.0 <= 14.1.2.3
F5Big-ip Link Controller Version >= 15.0.0 <= 15.1.0.3
F5Big-ip Local Traffic Manager Version >= 11.6.1 <= 11.6.5.1
F5Big-ip Local Traffic Manager Version >= 12.1.0 <= 12.1.5.1
F5Big-ip Local Traffic Manager Version >= 13.1.0 <= 13.1.3.3
F5Big-ip Local Traffic Manager Version >= 14.1.0 <= 14.1.2.3
F5Big-ip Local Traffic Manager Version >= 15.0.0 <= 15.1.0.3
F5Big-ip Policy Enforcement Manager Version >= 11.6.1 <= 11.6.5.1
F5Big-ip Policy Enforcement Manager Version >= 12.1.0 <= 12.1.5.1
F5Big-ip Policy Enforcement Manager Version >= 13.1.0 <= 13.1.3.3
F5Big-ip Policy Enforcement Manager Version >= 14.1.0 <= 14.1.2.3
F5Big-ip Policy Enforcement Manager Version >= 15.0.0 <= 15.1.0.3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.3% 0.506
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 8.1 2.2 5.9
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 6.8 8.6 6.4
AV:N/AC:M/Au:N/C:P/I:P/A:P
CWE-319 Cleartext Transmission of Sensitive Information

The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.

CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.