4.3
CVSSv2

CVE-2016-9245

Published: 07/03/2017 Updated: 17/07/2017
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

In F5 BIG-IP systems 12.1.0 - 12.1.2, malicious requests made to virtual servers with an HTTP profile can cause the TMM to restart. The issue is exposed with BIG-IP APM profiles, regardless of settings. The issue is also exposed with the non-default "Normalize URI" configuration options used in iRules and/or BIG-IP LTM policies. An attacker may be able to disrupt traffic or cause the BIG-IP system to fail over to another device in the device group.

Vulnerable Product Search on Vulmon Subscribe to Product

f5 big-ip local traffic manager 12.1.0

f5 big-ip local traffic manager 12.1.1

f5 big-ip local traffic manager 12.1.2

f5 big-ip application acceleration manager 12.1.2

f5 big-ip application acceleration manager 12.1.0

f5 big-ip application acceleration manager 12.1.1

f5 big-ip advanced firewall manager 12.1.0

f5 big-ip advanced firewall manager 12.1.1

f5 big-ip advanced firewall manager 12.1.2

f5 big-ip analytics 12.1.2

f5 big-ip analytics 12.1.0

f5 big-ip analytics 12.1.1

f5 big-ip access policy manager 12.1.1

f5 big-ip access policy manager 12.1.2

f5 big-ip access policy manager 12.1.0

f5 big-ip application security manager 12.1.2

f5 big-ip application security manager 12.1.0

f5 big-ip application security manager 12.1.1

f5 big-ip domain name system 12.1.1

f5 big-ip domain name system 12.1.2

f5 big-ip domain name system 12.1.0

f5 big-ip link controller 12.1.2

f5 big-ip link controller 12.1.0

f5 big-ip link controller 12.1.1

f5 big-ip policy enforcement manager 12.1.1

f5 big-ip policy enforcement manager 12.1.2

f5 big-ip policy enforcement manager 12.1.0

f5 big-ip websafe 12.1.2

f5 big-ip websafe 12.1.0

f5 big-ip websafe 12.1.1