CVE-2017-6166
moderate-risk
Published 2017-11-22
In BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Link Controller, PEM, and WebSafe software 12.0.0 to 12.1.1, in some cases the Traffic Management Microkernel (TMM) may crash when processing fragmented packets. This vulnerability affects TMM through a virtual server configured with a FastL4 profile. Traffic processing is disrupted while TMM restarts. If the affected BIG-IP system is configured as part of a device group, it will trigger a failover to the peer device.
Do I need to act?
~
1.2% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.9/10
Medium
NETWORK
/ HIGH complexity
Affected Products (11)
Big-Ip Dns
Linerate
F5 Websafe
Affected Vendors
References (6)
Third Party Advisory
http://www.securityfocus.com/bid/102264
Third Party Advisory
http://www.securitytracker.com/id/1039949
Issue Tracking
https://support.f5.com/csp/article/K65615624
Third Party Advisory
http://www.securityfocus.com/bid/102264
Third Party Advisory
http://www.securitytracker.com/id/1039949
Issue Tracking
https://support.f5.com/csp/article/K65615624
38
/ 100
moderate-risk
Severity
18/34 · Moderate
Exploitability
4/34 · Minimal
Exposure
16/34 · Moderate