5
CVSSv2

CVE-2018-5513

Published: 01/06/2018 Updated: 01/08/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

On F5 BIG-IP 13.1.0-13.1.0.3, 13.0.0, 12.1.0-12.1.3.3, 11.6.1-11.6.3.1, 11.5.1-11.5.5, or 11.2.1, a malformed TLS handshake causes TMM to crash leading to a disruption of service. This issue is only exposed on the data plane when Proxy SSL configuration is enabled. The control plane is not impacted by this issue.

Vulnerable Product Search on Vulmon Subscribe to Product

f5 big-ip application acceleration manager

f5 big-ip application acceleration manager 13.0.0

f5 big-ip local traffic manager

f5 big-ip local traffic manager 13.0.0

f5 big-ip advanced firewall manager

f5 big-ip advanced firewall manager 13.0.0

f5 big-ip analytics

f5 big-ip analytics 13.0.0

f5 big-ip access policy manager 13.0.0

f5 big-ip access policy manager

f5 big-ip application security manager

f5 big-ip application security manager 13.0.0

f5 big-ip domain name system

f5 big-ip domain name system 13.0.0

f5 big-ip edge gateway 13.0.0

f5 big-ip edge gateway

f5 big-ip global traffic manager

f5 big-ip global traffic manager 13.0.0

f5 big-ip link controller

f5 big-ip link controller 13.0.0

f5 big-ip policy enforcement manager 13.0.0

f5 big-ip policy enforcement manager

f5 big-ip webaccelerator

f5 big-ip webaccelerator 13.0.0

f5 big-ip websafe

f5 big-ip websafe 13.0.0