383
VMScore

CVE-2017-6141

Published: 20/10/2017 Updated: 15/11/2017
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

In F5 BIG-IP LTM, AAM, AFM, APM, ASM, Link Controller, PEM, and WebSafe 12.1.0 up to and including 12.1.2, certain values in a TLS abbreviated handshake when using a client SSL profile with the Session Ticket option enabled may cause disruption of service to the Traffic Management Microkernel (TMM). The Session Ticket option is disabled by default.

Vulnerable Product Search on Vulmon Subscribe to Product

f5 big-ip link controller 12.1.0

f5 big-ip link controller 12.1.1

f5 big-ip application security manager 12.1.2

f5 big-ip application acceleration manager 12.1.0

f5 big-ip application acceleration manager 12.1.1

f5 big-ip application acceleration manager 12.1.2

f5 big-ip websafe 12.1.0

f5 big-ip websafe 12.1.2

f5 big-ip local traffic manager 12.1.1

f5 big-ip application security manager 12.1.0

f5 big-ip advanced firewall manager 12.1.1

f5 big-ip access policy manager 12.1.2

f5 big-ip policy enforcement manager 12.1.0

f5 big-ip policy enforcement manager 12.1.1

f5 big-ip policy enforcement manager 12.1.2

f5 big-ip local traffic manager 12.1.0

f5 big-ip access policy manager 12.1.0

f5 big-ip link controller 12.1.2

f5 big-ip websafe 12.1.1

f5 big-ip local traffic manager 12.1.2

f5 big-ip application security manager 12.1.1

f5 big-ip advanced firewall manager 12.1.0

f5 big-ip advanced firewall manager 12.1.2

f5 big-ip access policy manager 12.1.1