5
CVSSv2

CVE-2018-5507

Published: 13/04/2018 Updated: 03/10/2019
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

On F5 BIG-IP versions 13.0.0, 12.1.0-12.1.3.1, 11.6.1-11.6.2, or 11.5.1-11.5.5, vCMP guests running on VIPRION 2100, 4200 and 4300 series blades cannot correctly decrypt ciphertext from established SSL sessions with small MTU.

Vulnerable Product Search on Vulmon Subscribe to Product

f5 big-ip_local_traffic_manager

f5 big-ip_local_traffic_manager 13.0.0

f5 big-ip_application_acceleration_manager

f5 big-ip_application_acceleration_manager 13.0.0

f5 big-ip_advanced_firewall_manager

f5 big-ip_advanced_firewall_manager 13.0.0

f5 big-ip_analytics

f5 big-ip_analytics 13.0.0

f5 big-ip_access_policy_manager

f5 big-ip_access_policy_manager 13.0.0

f5 big-ip_application_security_manager

f5 big-ip_application_security_manager 13.0.0

f5 big-ip_edge_gateway

f5 big-ip_edge_gateway 13.0.0

f5 big-ip_global_traffic_manager

f5 big-ip_global_traffic_manager 13.0.0

f5 big-ip_link_controller

f5 big-ip_link_controller 13.0.0

f5 big-ip_policy_enforcement_manager

f5 big-ip_policy_enforcement_manager 13.0.0

f5 big-ip_webaccelerator

f5 big-ip_webaccelerator 13.0.0

f5 big-ip_websafe

f5 big-ip_websafe 13.0.0

f5 big-ip_domain_name_system

f5 big-ip_domain_name_system 13.0.0