cve-2018-15311
Vulnerability from cvelistv5
Published
2018-10-10 14:00
Modified
2024-09-16 23:05
Severity ?
EPSS score ?
Summary
When F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.5, 11.6.0-11.6.3.2, or 11.5.1-11.5.6 is processing specially crafted TCP traffic with the Large Receive Offload (LRO) feature enabled, TMM may crash, leading to a failover event. This vulnerability is not exposed unless LRO is enabled, so most affected customers will be on 13.1.x. LRO has been available since 11.4.0 but is not enabled by default until 13.1.0.
References
▼ | URL | Tags | |
---|---|---|---|
f5sirt@f5.com | https://support.f5.com/csp/article/K07550539 | Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.f5.com/csp/article/K07550539 | Mitigation, Vendor Advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
F5 Networks, Inc. | BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, FPS, GTM, Link Controller, PEM, WebAccelerator) |
Version: 13.0.0-13.1.0.5 Version: 12.1.0-12.1.3.5 Version: 11.6.0-11.6.3.2 Version: 11.5.1-11.5.6 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T09:46:25.456Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K07550539" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, FPS, GTM, Link Controller, PEM, WebAccelerator)", "vendor": "F5 Networks, Inc.", "versions": [ { "status": "affected", "version": "13.0.0-13.1.0.5" }, { "status": "affected", "version": "12.1.0-12.1.3.5" }, { "status": "affected", "version": "11.6.0-11.6.3.2" }, { "status": "affected", "version": "11.5.1-11.5.6" } ] } ], "datePublic": "2018-10-09T00:00:00", "descriptions": [ { "lang": "en", "value": "When F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.5, 11.6.0-11.6.3.2, or 11.5.1-11.5.6 is processing specially crafted TCP traffic with the Large Receive Offload (LRO) feature enabled, TMM may crash, leading to a failover event. This vulnerability is not exposed unless LRO is enabled, so most affected customers will be on 13.1.x. LRO has been available since 11.4.0 but is not enabled by default until 13.1.0." } ], "problemTypes": [ { "descriptions": [ { "description": "DoS", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T13:57:01", "orgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "shortName": "f5" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K07550539" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "f5sirt@f5.com", "DATE_PUBLIC": "2018-10-09T00:00:00", "ID": "CVE-2018-15311", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, FPS, GTM, Link Controller, PEM, WebAccelerator)", "version": { "version_data": [ { "version_value": "13.0.0-13.1.0.5" }, { "version_value": "12.1.0-12.1.3.5" }, { "version_value": "11.6.0-11.6.3.2" }, { "version_value": "11.5.1-11.5.6" } ] } } ] }, "vendor_name": "F5 Networks, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "When F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.5, 11.6.0-11.6.3.2, or 11.5.1-11.5.6 is processing specially crafted TCP traffic with the Large Receive Offload (LRO) feature enabled, TMM may crash, leading to a failover event. This vulnerability is not exposed unless LRO is enabled, so most affected customers will be on 13.1.x. LRO has been available since 11.4.0 but is not enabled by default until 13.1.0." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "DoS" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.f5.com/csp/article/K07550539", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K07550539" } ] } } } }, "cveMetadata": { "assignerOrgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "assignerShortName": "f5", "cveId": "CVE-2018-15311", "datePublished": "2018-10-10T14:00:00Z", "dateReserved": "2018-08-14T00:00:00", "dateUpdated": "2024-09-16T23:05:47.499Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-15311\",\"sourceIdentifier\":\"f5sirt@f5.com\",\"published\":\"2018-10-10T14:29:00.387\",\"lastModified\":\"2024-11-21T03:50:31.993\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"When F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.5, 11.6.0-11.6.3.2, or 11.5.1-11.5.6 is processing specially crafted TCP traffic with the Large Receive Offload (LRO) feature enabled, TMM may crash, leading to a failover event. This vulnerability is not exposed unless LRO is enabled, so most affected customers will be on 13.1.x. LRO has been available since 11.4.0 but is not enabled by default until 13.1.0.\"},{\"lang\":\"es\",\"value\":\"Cuando F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.5, 11.6.0-11.6.3.2 o 11.5.1-11.5.6 est\u00e1 procesando tr\u00e1fico TCP especialmente manipulado con la caracter\u00edstica Large Receive Offload (LRO) habilitada, TMM podr\u00eda cerrarse inesperadamente, conduciendo a un evento \\\"failover\\\". Esta vulnerabilidad no est\u00e1 expuesta a menos que LRO est\u00e9 habilitado, por lo que la mayor parte de clientes afectados estar\u00e1n en las versiones 13.1.x. LRO ha estado disponible desde la versi\u00f3n 11.4.0, pero no est\u00e1 habilitada por defecto hasta la versi\u00f3n 13.1.0.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.5.6\",\"matchCriteriaId\":\"964FF00B-F992-4FE1-BEAD-BC072BC60BFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.6.0.0\",\"versionEndIncluding\":\"11.6.3.2\",\"matchCriteriaId\":\"F7ECF570-49EC-4F48-9CE7-6E3710DDC516\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0.0\",\"versionEndIncluding\":\"12.1.3.5\",\"matchCriteriaId\":\"187CB06B-9BE0-4E3A-9182-69546BBB8826\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.0.0\",\"versionEndIncluding\":\"13.1.0.5\",\"matchCriteriaId\":\"B3BD36AA-CC4A-4082-BF64-28521DDECCDA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.5.6\",\"matchCriteriaId\":\"CD6A2E89-7115-4EB1-88B9-7DEF5F2FBEB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.6.0.0\",\"versionEndIncluding\":\"11.6.3.2\",\"matchCriteriaId\":\"E5DCBDE3-F238-44B3-AB63-1299922FAFDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0.0\",\"versionEndIncluding\":\"12.1.3.5\",\"matchCriteriaId\":\"C1D5EEA1-FC7F-460D-96ED-FD9763613B45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.0.0\",\"versionEndIncluding\":\"13.1.0.5\",\"matchCriteriaId\":\"D9B21E2C-4CAB-43D8-A462-FFB0B72483D7\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.5.6\",\"matchCriteriaId\":\"568E18F9-1A18-4BAD-9C20-60CB70B5D0C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.6.0.0\",\"versionEndIncluding\":\"11.6.3.2\",\"matchCriteriaId\":\"34651AA8-FC50-4B94-B5E7-1727D282BAAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0.0\",\"versionEndIncluding\":\"12.1.3.5\",\"matchCriteriaId\":\"5CD5ED95-8082-460D-85B4-3D3937BE97A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.0.0\",\"versionEndIncluding\":\"13.1.0.5\",\"matchCriteriaId\":\"85368A20-7168-4C1A-BE6F-F80BA96A4159\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.5.6\",\"matchCriteriaId\":\"077633A7-B626-4C22-B492-ABD50B7F78B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.6.0.0\",\"versionEndIncluding\":\"11.6.3.2\",\"matchCriteriaId\":\"165087E0-EA37-478D-821E-70AB0528CF9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0.0\",\"versionEndIncluding\":\"12.1.3.5\",\"matchCriteriaId\":\"7F6FFF4D-C952-4F56-A626-E82AF93B30C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.0.0\",\"versionEndIncluding\":\"13.1.0.5\",\"matchCriteriaId\":\"6AF8D490-E6FB-41BD-BA2D-B71BED1E7FED\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.5.6\",\"matchCriteriaId\":\"4DE7E7F2-2026-4407-8F0E-168DE0D4F935\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.6.0.0\",\"versionEndIncluding\":\"11.6.3.2\",\"matchCriteriaId\":\"A259A682-12B2-4BEA-A367-C71EAC3F887B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0.0\",\"versionEndIncluding\":\"12.1.3.5\",\"matchCriteriaId\":\"6F0A5D75-40BB-4D45-8B02-B29C1563D996\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.0.0\",\"versionEndIncluding\":\"13.1.0.5\",\"matchCriteriaId\":\"96E0DD20-1AC3-41CF-9057-489019A439E0\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.5.6\",\"matchCriteriaId\":\"90EC6DF6-A7DF-4A1C-9D2F-C02EDB5FFCF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.6.0.0\",\"versionEndIncluding\":\"11.6.3.2\",\"matchCriteriaId\":\"77AD6CB0-EF75-4A8A-95B7-988B6B041D49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0.0\",\"versionEndIncluding\":\"12.1.3.5\",\"matchCriteriaId\":\"DA9400A8-7B8E-477B-AF65-E22790B742A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.0.0\",\"versionEndIncluding\":\"13.1.0.5\",\"matchCriteriaId\":\"C1D049B4-0304-403A-8EE1-3311044EFF7B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.5.6\",\"matchCriteriaId\":\"B719583F-D2FE-4F29-9FC2-613F979737E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.6.0.0\",\"versionEndIncluding\":\"11.6.3.2\",\"matchCriteriaId\":\"032274E7-5DB3-4531-B72C-95A024C191B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0.0\",\"versionEndIncluding\":\"12.1.3.5\",\"matchCriteriaId\":\"22A865A3-489B-4FBA-BD1E-4DD4FD34DB47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.0.0\",\"versionEndIncluding\":\"13.1.0.5\",\"matchCriteriaId\":\"3D4649CB-EE59-4926-BAE9-F6B8ADE110C5\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.5.6\",\"matchCriteriaId\":\"7C8C72E9-69FA-472D-B73F-BB681D0FA108\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.6.0.0\",\"versionEndIncluding\":\"11.6.3.2\",\"matchCriteriaId\":\"7D1F7BB6-3BF1-4C9A-9F43-9FBD0879B32E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0.0\",\"versionEndIncluding\":\"12.1.3.5\",\"matchCriteriaId\":\"541E39AA-D46E-49B5-9D6B-3CF4EC0347AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.0.0\",\"versionEndIncluding\":\"13.1.0.5\",\"matchCriteriaId\":\"006E2FB7-4BFB-4CF8-A880-A4E00FA1DEA5\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.5.6\",\"matchCriteriaId\":\"01164131-51C1-4BAA-BE0C-331E6F604953\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.6.0.0\",\"versionEndIncluding\":\"11.6.3.2\",\"matchCriteriaId\":\"55476ABD-8CC9-49A4-8F20-67D214B7D239\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0.0\",\"versionEndIncluding\":\"12.1.3.5\",\"matchCriteriaId\":\"A4FBA271-A0EA-4393-A10A-04402B9B4A71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.0.0\",\"versionEndIncluding\":\"13.1.0.5\",\"matchCriteriaId\":\"1BF721DE-B2C3-4195-B456-D269B909C284\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.5.6\",\"matchCriteriaId\":\"B9F34B4F-BA2F-45D9-B2EB-B9196BD6CDF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.6.0.0\",\"versionEndIncluding\":\"11.6.3.2\",\"matchCriteriaId\":\"42B81482-D866-45DB-8210-F90F9B11FFD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0.0\",\"versionEndIncluding\":\"12.1.3.5\",\"matchCriteriaId\":\"3600BB17-98D0-4B81-A148-1864B1F229E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.0.0\",\"versionEndIncluding\":\"13.1.0.5\",\"matchCriteriaId\":\"087D3C0E-886A-4C4D-A6B5-A5EDEBDEF457\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.5.6\",\"matchCriteriaId\":\"2DEDF1CC-3C5A-4F4C-A910-11DD6C0C1739\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.6.0.0\",\"versionEndIncluding\":\"11.6.3.2\",\"matchCriteriaId\":\"D8257FEF-CF33-4459-B6F6-ECC390852987\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0.0\",\"versionEndIncluding\":\"12.1.3.5\",\"matchCriteriaId\":\"71FC8582-ED48-4C8F-A3AB-0744FFA319E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.0.0\",\"versionEndIncluding\":\"13.1.0.5\",\"matchCriteriaId\":\"0D45AB00-2C55-41F5-BAB3-6DA23C86F5BB\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.5.6\",\"matchCriteriaId\":\"53427258-7EE1-4827-9D51-C72026D5942F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.6.0.0\",\"versionEndIncluding\":\"11.6.3.2\",\"matchCriteriaId\":\"D3464E75-D419-4D3E-89EE-3BE571A388F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0.0\",\"versionEndIncluding\":\"12.1.3.5\",\"matchCriteriaId\":\"AEF7AC47-D128-4282-846B-4408B12AAC09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.0.0\",\"versionEndIncluding\":\"13.1.0.5\",\"matchCriteriaId\":\"A97847E9-D6BB-4EA9-9CED-1FA868B35B94\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.5.6\",\"matchCriteriaId\":\"25E4F494-73FC-4755-9946-1C631F7C3640\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.6.0.0\",\"versionEndIncluding\":\"11.6.3.2\",\"matchCriteriaId\":\"15044BE6-FEC9-4325-9EA1-0665FF5F7C36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0.0\",\"versionEndIncluding\":\"12.1.3.5\",\"matchCriteriaId\":\"1869E130-99D1-4E15-8BF7-275EF9A20D7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.0.0\",\"versionEndIncluding\":\"13.1.0.5\",\"matchCriteriaId\":\"0E88E927-3C8E-481A-9447-00082BD73601\"}]}]}],\"references\":[{\"url\":\"https://support.f5.com/csp/article/K07550539\",\"source\":\"f5sirt@f5.com\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K07550539\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.