CVE-2018-5527
moderate-risk
Published 2018-06-27
On BIG-IP 13.1.0-13.1.0.7, a remote attacker using undisclosed methods against virtual servers configured with a Client SSL or Server SSL profile that has the SSL Forward Proxy feature enabled can force the Traffic Management Microkernel (tmm) to leak memory. As a result, system memory usage increases over time, which may eventually cause a decrease in performance or a system reboot due to memory exhaustion.
Do I need to act?
-
0.97% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (13)
Affected Vendors
References (4)
Third Party Advisory
http://www.securitytracker.com/id/1041196
Vendor Advisory
https://support.f5.com/csp/article/K20134942
Third Party Advisory
http://www.securitytracker.com/id/1041196
Vendor Advisory
https://support.f5.com/csp/article/K20134942
46
/ 100
moderate-risk
Severity
26/34 · High
Exploitability
3/34 · Minimal
Exposure
17/34 · Moderate