CVE-2017-6160
moderate-risk
Published 2017-10-27
In F5 BIG-IP AAM and PEM software version 12.0.0 to 12.1.1, 11.6.0 to 11.6.1, 11.4.1 to 11.5.4, a remote attacker may create maliciously crafted HTTP request to cause Traffic Management Microkernel (TMM) to restart and temporarily fail to process traffic. This issue is exposed on virtual servers using a Policy Enforcement profile or a Web Acceleration profile. Systems that do not have BIG-IP AAM module provisioned are not vulnerable. The Traffic Management Microkernel (TMM) may restart and temporarily fail to process traffic. Systems that do not have BIG-IP AAM or PEM module provisioned are not vulnerable.
Do I need to act?
~
4.6% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.9/10
Medium
NETWORK
/ HIGH complexity
Affected Products (20)
Affected Vendors
References (6)
Third Party Advisory
http://www.securityfocus.com/bid/101632
Third Party Advisory
http://www.securitytracker.com/id/1039670
Vendor Advisory
https://support.f5.com/csp/article/K19430431
Third Party Advisory
http://www.securityfocus.com/bid/101632
Third Party Advisory
http://www.securitytracker.com/id/1039670
Vendor Advisory
https://support.f5.com/csp/article/K19430431
47
/ 100
moderate-risk
Severity
18/34 · Moderate
Exploitability
8/34 · Low
Exposure
21/34 · High