Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2018-5509 | First vendor Publication | 2018-03-22 |
Vendor | Cve | Last vendor Modification | 2018-04-20 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H | |||
---|---|---|---|
Overall CVSS Score | 7.5 | ||
Base Score | 7.5 | Environmental Score | 7.5 |
impact SubScore | 3.6 | Temporal Score | 7.5 |
Exploitabality Sub Score | 3.9 | ||
Attack Vector | Network | Attack Complexity | Low |
Privileges Required | None | User Interaction | None |
Scope | Unchanged | Confidentiality Impact | None |
Integrity Impact | None | Availability Impact | High |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.8 | Attack Range | Network |
Cvss Impact Score | 6.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
On F5 BIG-IP versions 13.0.0 or 12.1.0 - 12.1.3.1, when a specifically configured virtual server receives traffic of an undisclosed nature, TMM will crash and take the configured failover action, potentially causing a denial of service. The configuration which exposes this issue is not common and in general does not work when enabled in previous versions of BIG-IP. Starting in 12.1.0, BIG-IP will crash if the configuration which exposes this issue is enabled and the virtual server receives non TCP traffic. With the fix of this issue, additional configuration validation logic has been added to prevent this configuration from being applied to a virtual server. There is only data plane exposure to this issue with a non-standard configuration. There is no control plane exposure. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5509 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-20 | Improper Input Validation |
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2018-11-02 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL49440608.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Source | Url |
---|---|
BID | http://www.securityfocus.com/bid/103504 |
CONFIRM | https://support.f5.com/csp/article/K49440608 |
SECTRACK | http://www.securitytracker.com/id/1040562 |
Alert History
Date | Informations |
---|---|
2023-03-04 01:45:04 |
|
2023-02-10 01:43:02 |
|
2022-05-13 01:37:44 |
|
2021-05-04 13:15:39 |
|
2021-04-22 02:31:03 |
|
2021-04-06 01:26:03 |
|
2020-10-09 01:22:57 |
|
2020-05-24 01:26:06 |
|
2020-05-23 02:16:59 |
|
2020-05-23 01:15:00 |
|
2018-10-03 12:08:10 |
|
2018-05-02 12:04:39 |
|
2018-04-20 21:19:52 |
|
2018-03-28 12:09:07 |
|
2018-03-24 09:18:25 |
|
2018-03-22 21:20:15 |
|