Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2018-5527


On BIG-IP 13.1.0-13.1.0.7, a remote attacker using undisclosed methods against virtual servers configured with a Client SSL or Server SSL profile that has the SSL Forward Proxy feature enabled can force the Traffic Management Microkernel (tmm) to leak memory. As a result, system memory usage increases over time, which may eventually cause a decrease in performance or a system reboot due to memory exhaustion.


Published

2018-06-27T20:29:05.963

Last Modified

2024-11-21T04:09:00.030

Status

Modified

Source

[email protected]

Severity

CVSSv3.0: 7.5 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:N/A:C

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: COMPLETE
Exploitability Score

10.0

Impact Score

6.9

Weaknesses
  • Type: Primary
    CWE-772

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application f5 big-ip_access_policy_manager ≤ 13.1.0.7 Yes
Application f5 big-ip_advanced_firewall_manager ≤ 13.1.0.7 Yes
Application f5 big-ip_analytics ≤ 13.1.0.7 Yes
Application f5 big-ip_application_acceleration_manager ≤ 13.1.0.7 Yes
Application f5 big-ip_application_security_manager ≤ 13.1.0.7 Yes
Application f5 big-ip_domain_name_system ≤ 13.1.0.7 Yes
Application f5 big-ip_edge_gateway ≤ 13.1.0.7 Yes
Application f5 big-ip_global_traffic_manager ≤ 13.1.0.7 Yes
Application f5 big-ip_link_controller ≤ 13.1.0.7 Yes
Application f5 big-ip_local_traffic_manager ≤ 13.1.0.7 Yes
Application f5 big-ip_policy_enforcement_manager ≤ 13.1.0.7 Yes
Application f5 big-ip_webaccelerator ≤ 13.1.0.7 Yes
Application f5 big-ip_websafe ≤ 13.1.0.7 Yes

References