Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2017-6166


In BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Link Controller, PEM, and WebSafe software 12.0.0 to 12.1.1, in some cases the Traffic Management Microkernel (TMM) may crash when processing fragmented packets. This vulnerability affects TMM through a virtual server configured with a FastL4 profile. Traffic processing is disrupted while TMM restarts. If the affected BIG-IP system is configured as part of a device group, it will trigger a failover to the peer device.


Published

2017-11-22T16:29:00.337

Last Modified

2025-04-20T01:37:25.860

Status

Deferred

Source

[email protected]

Severity

CVSSv3.1: 5.9 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:N/I:N/A:P

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: PARTIAL
Exploitability Score

8.6

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-415

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application f5 big-ip_afm ≤ 12.1.1 Yes
Application f5 big-ip_analytics ≤ 12.1.1 Yes
Application f5 big-ip_apm ≤ 12.1.1 Yes
Application f5 big-ip_application_acceleration_manager ≤ 12.1.1 Yes
Application f5 big-ip_asm ≤ 12.1.1 Yes
Application f5 big-ip_dns ≤ 12.1.1 Yes
Application f5 big-ip_link_controller ≤ 12.1.1 Yes
Application f5 big-ip_ltm ≤ 12.1.1 Yes
Application f5 big-ip_pem ≤ 12.1.1 Yes
Application f5 f5_websafe ≤ 12.1.1 Yes
Application f5 linerate ≤ 2.6.2 Yes

References