cve-2018-15311
Vulnerability from cvelistv5
Published
2018-10-10 14:00
Modified
2024-09-16 23:05
Severity ?
EPSS score ?
Summary
When F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.5, 11.6.0-11.6.3.2, or 11.5.1-11.5.6 is processing specially crafted TCP traffic with the Large Receive Offload (LRO) feature enabled, TMM may crash, leading to a failover event. This vulnerability is not exposed unless LRO is enabled, so most affected customers will be on 13.1.x. LRO has been available since 11.4.0 but is not enabled by default until 13.1.0.
References
▼ | URL | Tags | |
---|---|---|---|
f5sirt@f5.com | https://support.f5.com/csp/article/K07550539 | Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.f5.com/csp/article/K07550539 | Mitigation, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | F5 Networks, Inc. | BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, FPS, GTM, Link Controller, PEM, WebAccelerator) |
Version: 13.0.0-13.1.0.5 Version: 12.1.0-12.1.3.5 Version: 11.6.0-11.6.3.2 Version: 11.5.1-11.5.6 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T09:46:25.456Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K07550539" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, FPS, GTM, Link Controller, PEM, WebAccelerator)", "vendor": "F5 Networks, Inc.", "versions": [ { "status": "affected", "version": "13.0.0-13.1.0.5" }, { "status": "affected", "version": "12.1.0-12.1.3.5" }, { "status": "affected", "version": "11.6.0-11.6.3.2" }, { "status": "affected", "version": "11.5.1-11.5.6" } ] } ], "datePublic": "2018-10-09T00:00:00", "descriptions": [ { "lang": "en", "value": "When F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.5, 11.6.0-11.6.3.2, or 11.5.1-11.5.6 is processing specially crafted TCP traffic with the Large Receive Offload (LRO) feature enabled, TMM may crash, leading to a failover event. This vulnerability is not exposed unless LRO is enabled, so most affected customers will be on 13.1.x. LRO has been available since 11.4.0 but is not enabled by default until 13.1.0." } ], "problemTypes": [ { "descriptions": [ { "description": "DoS", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T13:57:01", "orgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "shortName": "f5" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K07550539" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "f5sirt@f5.com", "DATE_PUBLIC": "2018-10-09T00:00:00", "ID": "CVE-2018-15311", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, FPS, GTM, Link Controller, PEM, WebAccelerator)", "version": { "version_data": [ { "version_value": "13.0.0-13.1.0.5" }, { "version_value": "12.1.0-12.1.3.5" }, { "version_value": "11.6.0-11.6.3.2" }, { "version_value": "11.5.1-11.5.6" } ] } } ] }, "vendor_name": "F5 Networks, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "When F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.5, 11.6.0-11.6.3.2, or 11.5.1-11.5.6 is processing specially crafted TCP traffic with the Large Receive Offload (LRO) feature enabled, TMM may crash, leading to a failover event. This vulnerability is not exposed unless LRO is enabled, so most affected customers will be on 13.1.x. LRO has been available since 11.4.0 but is not enabled by default until 13.1.0." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "DoS" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.f5.com/csp/article/K07550539", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K07550539" } ] } } } }, "cveMetadata": { "assignerOrgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "assignerShortName": "f5", "cveId": "CVE-2018-15311", "datePublished": "2018-10-10T14:00:00Z", "dateReserved": "2018-08-14T00:00:00", "dateUpdated": "2024-09-16T23:05:47.499Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.5.1\", \"versionEndIncluding\": \"11.5.6\", \"matchCriteriaId\": \"964FF00B-F992-4FE1-BEAD-BC072BC60BFF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.6.0.0\", \"versionEndIncluding\": \"11.6.3.2\", \"matchCriteriaId\": \"F7ECF570-49EC-4F48-9CE7-6E3710DDC516\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12.1.0.0\", \"versionEndIncluding\": \"12.1.3.5\", \"matchCriteriaId\": \"187CB06B-9BE0-4E3A-9182-69546BBB8826\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.0.0.0\", \"versionEndIncluding\": \"13.1.0.5\", \"matchCriteriaId\": \"B3BD36AA-CC4A-4082-BF64-28521DDECCDA\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.5.1\", \"versionEndIncluding\": \"11.5.6\", \"matchCriteriaId\": \"CD6A2E89-7115-4EB1-88B9-7DEF5F2FBEB7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.6.0.0\", \"versionEndIncluding\": \"11.6.3.2\", \"matchCriteriaId\": \"E5DCBDE3-F238-44B3-AB63-1299922FAFDD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12.1.0.0\", \"versionEndIncluding\": \"12.1.3.5\", \"matchCriteriaId\": \"C1D5EEA1-FC7F-460D-96ED-FD9763613B45\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.0.0.0\", \"versionEndIncluding\": \"13.1.0.5\", \"matchCriteriaId\": \"D9B21E2C-4CAB-43D8-A462-FFB0B72483D7\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.5.1\", \"versionEndIncluding\": \"11.5.6\", \"matchCriteriaId\": \"568E18F9-1A18-4BAD-9C20-60CB70B5D0C1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.6.0.0\", \"versionEndIncluding\": \"11.6.3.2\", \"matchCriteriaId\": \"34651AA8-FC50-4B94-B5E7-1727D282BAAF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12.1.0.0\", \"versionEndIncluding\": \"12.1.3.5\", \"matchCriteriaId\": \"5CD5ED95-8082-460D-85B4-3D3937BE97A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.0.0.0\", \"versionEndIncluding\": \"13.1.0.5\", \"matchCriteriaId\": \"85368A20-7168-4C1A-BE6F-F80BA96A4159\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.5.1\", \"versionEndIncluding\": \"11.5.6\", \"matchCriteriaId\": \"077633A7-B626-4C22-B492-ABD50B7F78B6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.6.0.0\", \"versionEndIncluding\": \"11.6.3.2\", \"matchCriteriaId\": \"165087E0-EA37-478D-821E-70AB0528CF9F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12.1.0.0\", \"versionEndIncluding\": \"12.1.3.5\", \"matchCriteriaId\": \"7F6FFF4D-C952-4F56-A626-E82AF93B30C3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.0.0.0\", \"versionEndIncluding\": \"13.1.0.5\", \"matchCriteriaId\": \"6AF8D490-E6FB-41BD-BA2D-B71BED1E7FED\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.5.1\", \"versionEndIncluding\": \"11.5.6\", \"matchCriteriaId\": \"4DE7E7F2-2026-4407-8F0E-168DE0D4F935\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.6.0.0\", \"versionEndIncluding\": \"11.6.3.2\", \"matchCriteriaId\": \"A259A682-12B2-4BEA-A367-C71EAC3F887B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12.1.0.0\", \"versionEndIncluding\": \"12.1.3.5\", \"matchCriteriaId\": \"6F0A5D75-40BB-4D45-8B02-B29C1563D996\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.0.0.0\", \"versionEndIncluding\": \"13.1.0.5\", \"matchCriteriaId\": \"96E0DD20-1AC3-41CF-9057-489019A439E0\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.5.1\", \"versionEndIncluding\": \"11.5.6\", \"matchCriteriaId\": \"90EC6DF6-A7DF-4A1C-9D2F-C02EDB5FFCF2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.6.0.0\", \"versionEndIncluding\": \"11.6.3.2\", \"matchCriteriaId\": \"77AD6CB0-EF75-4A8A-95B7-988B6B041D49\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12.1.0.0\", \"versionEndIncluding\": \"12.1.3.5\", \"matchCriteriaId\": \"DA9400A8-7B8E-477B-AF65-E22790B742A9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.0.0.0\", \"versionEndIncluding\": \"13.1.0.5\", \"matchCriteriaId\": \"C1D049B4-0304-403A-8EE1-3311044EFF7B\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.5.1\", \"versionEndIncluding\": \"11.5.6\", \"matchCriteriaId\": \"B719583F-D2FE-4F29-9FC2-613F979737E6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.6.0.0\", \"versionEndIncluding\": \"11.6.3.2\", \"matchCriteriaId\": \"032274E7-5DB3-4531-B72C-95A024C191B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12.1.0.0\", \"versionEndIncluding\": \"12.1.3.5\", \"matchCriteriaId\": \"22A865A3-489B-4FBA-BD1E-4DD4FD34DB47\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.0.0.0\", \"versionEndIncluding\": \"13.1.0.5\", \"matchCriteriaId\": \"3D4649CB-EE59-4926-BAE9-F6B8ADE110C5\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.5.1\", \"versionEndIncluding\": \"11.5.6\", \"matchCriteriaId\": \"7C8C72E9-69FA-472D-B73F-BB681D0FA108\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.6.0.0\", \"versionEndIncluding\": \"11.6.3.2\", \"matchCriteriaId\": \"7D1F7BB6-3BF1-4C9A-9F43-9FBD0879B32E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12.1.0.0\", \"versionEndIncluding\": \"12.1.3.5\", \"matchCriteriaId\": \"541E39AA-D46E-49B5-9D6B-3CF4EC0347AA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.0.0.0\", \"versionEndIncluding\": \"13.1.0.5\", \"matchCriteriaId\": \"006E2FB7-4BFB-4CF8-A880-A4E00FA1DEA5\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.5.1\", \"versionEndIncluding\": \"11.5.6\", \"matchCriteriaId\": \"01164131-51C1-4BAA-BE0C-331E6F604953\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.6.0.0\", \"versionEndIncluding\": \"11.6.3.2\", \"matchCriteriaId\": \"55476ABD-8CC9-49A4-8F20-67D214B7D239\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12.1.0.0\", \"versionEndIncluding\": \"12.1.3.5\", \"matchCriteriaId\": \"A4FBA271-A0EA-4393-A10A-04402B9B4A71\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.0.0.0\", \"versionEndIncluding\": \"13.1.0.5\", \"matchCriteriaId\": \"1BF721DE-B2C3-4195-B456-D269B909C284\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.5.1\", \"versionEndIncluding\": \"11.5.6\", \"matchCriteriaId\": \"B9F34B4F-BA2F-45D9-B2EB-B9196BD6CDF7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.6.0.0\", \"versionEndIncluding\": \"11.6.3.2\", \"matchCriteriaId\": \"42B81482-D866-45DB-8210-F90F9B11FFD1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12.1.0.0\", \"versionEndIncluding\": \"12.1.3.5\", \"matchCriteriaId\": \"3600BB17-98D0-4B81-A148-1864B1F229E3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.0.0.0\", \"versionEndIncluding\": \"13.1.0.5\", \"matchCriteriaId\": \"087D3C0E-886A-4C4D-A6B5-A5EDEBDEF457\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.5.1\", \"versionEndIncluding\": \"11.5.6\", \"matchCriteriaId\": \"2DEDF1CC-3C5A-4F4C-A910-11DD6C0C1739\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.6.0.0\", \"versionEndIncluding\": \"11.6.3.2\", \"matchCriteriaId\": \"D8257FEF-CF33-4459-B6F6-ECC390852987\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12.1.0.0\", \"versionEndIncluding\": \"12.1.3.5\", \"matchCriteriaId\": \"71FC8582-ED48-4C8F-A3AB-0744FFA319E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.0.0.0\", \"versionEndIncluding\": \"13.1.0.5\", \"matchCriteriaId\": \"0D45AB00-2C55-41F5-BAB3-6DA23C86F5BB\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.5.1\", \"versionEndIncluding\": \"11.5.6\", \"matchCriteriaId\": \"53427258-7EE1-4827-9D51-C72026D5942F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.6.0.0\", \"versionEndIncluding\": \"11.6.3.2\", \"matchCriteriaId\": \"D3464E75-D419-4D3E-89EE-3BE571A388F4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12.1.0.0\", \"versionEndIncluding\": \"12.1.3.5\", \"matchCriteriaId\": \"AEF7AC47-D128-4282-846B-4408B12AAC09\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.0.0.0\", \"versionEndIncluding\": \"13.1.0.5\", \"matchCriteriaId\": \"A97847E9-D6BB-4EA9-9CED-1FA868B35B94\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.5.1\", \"versionEndIncluding\": \"11.5.6\", \"matchCriteriaId\": \"25E4F494-73FC-4755-9946-1C631F7C3640\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.6.0.0\", \"versionEndIncluding\": \"11.6.3.2\", \"matchCriteriaId\": \"15044BE6-FEC9-4325-9EA1-0665FF5F7C36\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12.1.0.0\", \"versionEndIncluding\": \"12.1.3.5\", \"matchCriteriaId\": \"1869E130-99D1-4E15-8BF7-275EF9A20D7F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.0.0.0\", \"versionEndIncluding\": \"13.1.0.5\", \"matchCriteriaId\": \"0E88E927-3C8E-481A-9447-00082BD73601\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"When F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.5, 11.6.0-11.6.3.2, or 11.5.1-11.5.6 is processing specially crafted TCP traffic with the Large Receive Offload (LRO) feature enabled, TMM may crash, leading to a failover event. This vulnerability is not exposed unless LRO is enabled, so most affected customers will be on 13.1.x. LRO has been available since 11.4.0 but is not enabled by default until 13.1.0.\"}, {\"lang\": \"es\", \"value\": \"Cuando F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.5, 11.6.0-11.6.3.2 o 11.5.1-11.5.6 est\\u00e1 procesando tr\\u00e1fico TCP especialmente manipulado con la caracter\\u00edstica Large Receive Offload (LRO) habilitada, TMM podr\\u00eda cerrarse inesperadamente, conduciendo a un evento \\\"failover\\\". Esta vulnerabilidad no est\\u00e1 expuesta a menos que LRO est\\u00e9 habilitado, por lo que la mayor parte de clientes afectados estar\\u00e1n en las versiones 13.1.x. LRO ha estado disponible desde la versi\\u00f3n 11.4.0, pero no est\\u00e1 habilitada por defecto hasta la versi\\u00f3n 13.1.0.\"}]", "id": "CVE-2018-15311", "lastModified": "2024-11-21T03:50:31.993", "metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 5.9, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.2, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:N/A:P\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2018-10-10T14:29:00.387", "references": "[{\"url\": \"https://support.f5.com/csp/article/K07550539\", \"source\": \"f5sirt@f5.com\", \"tags\": [\"Mitigation\", \"Vendor Advisory\"]}, {\"url\": \"https://support.f5.com/csp/article/K07550539\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mitigation\", \"Vendor Advisory\"]}]", "sourceIdentifier": "f5sirt@f5.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2018-15311\",\"sourceIdentifier\":\"f5sirt@f5.com\",\"published\":\"2018-10-10T14:29:00.387\",\"lastModified\":\"2024-11-21T03:50:31.993\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"When F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.5, 11.6.0-11.6.3.2, or 11.5.1-11.5.6 is processing specially crafted TCP traffic with the Large Receive Offload (LRO) feature enabled, TMM may crash, leading to a failover event. This vulnerability is not exposed unless LRO is enabled, so most affected customers will be on 13.1.x. LRO has been available since 11.4.0 but is not enabled by default until 13.1.0.\"},{\"lang\":\"es\",\"value\":\"Cuando F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.5, 11.6.0-11.6.3.2 o 11.5.1-11.5.6 est\u00e1 procesando tr\u00e1fico TCP especialmente manipulado con la caracter\u00edstica Large Receive Offload (LRO) habilitada, TMM podr\u00eda cerrarse inesperadamente, conduciendo a un evento \\\"failover\\\". Esta vulnerabilidad no est\u00e1 expuesta a menos que LRO est\u00e9 habilitado, por lo que la mayor parte de clientes afectados estar\u00e1n en las versiones 13.1.x. LRO ha estado disponible desde la versi\u00f3n 11.4.0, pero no est\u00e1 habilitada por defecto hasta la versi\u00f3n 13.1.0.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.5.6\",\"matchCriteriaId\":\"964FF00B-F992-4FE1-BEAD-BC072BC60BFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.6.0.0\",\"versionEndIncluding\":\"11.6.3.2\",\"matchCriteriaId\":\"F7ECF570-49EC-4F48-9CE7-6E3710DDC516\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0.0\",\"versionEndIncluding\":\"12.1.3.5\",\"matchCriteriaId\":\"187CB06B-9BE0-4E3A-9182-69546BBB8826\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.0.0\",\"versionEndIncluding\":\"13.1.0.5\",\"matchCriteriaId\":\"B3BD36AA-CC4A-4082-BF64-28521DDECCDA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.5.6\",\"matchCriteriaId\":\"CD6A2E89-7115-4EB1-88B9-7DEF5F2FBEB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.6.0.0\",\"versionEndIncluding\":\"11.6.3.2\",\"matchCriteriaId\":\"E5DCBDE3-F238-44B3-AB63-1299922FAFDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0.0\",\"versionEndIncluding\":\"12.1.3.5\",\"matchCriteriaId\":\"C1D5EEA1-FC7F-460D-96ED-FD9763613B45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.0.0\",\"versionEndIncluding\":\"13.1.0.5\",\"matchCriteriaId\":\"D9B21E2C-4CAB-43D8-A462-FFB0B72483D7\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.5.6\",\"matchCriteriaId\":\"568E18F9-1A18-4BAD-9C20-60CB70B5D0C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.6.0.0\",\"versionEndIncluding\":\"11.6.3.2\",\"matchCriteriaId\":\"34651AA8-FC50-4B94-B5E7-1727D282BAAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0.0\",\"versionEndIncluding\":\"12.1.3.5\",\"matchCriteriaId\":\"5CD5ED95-8082-460D-85B4-3D3937BE97A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.0.0\",\"versionEndIncluding\":\"13.1.0.5\",\"matchCriteriaId\":\"85368A20-7168-4C1A-BE6F-F80BA96A4159\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.5.6\",\"matchCriteriaId\":\"077633A7-B626-4C22-B492-ABD50B7F78B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.6.0.0\",\"versionEndIncluding\":\"11.6.3.2\",\"matchCriteriaId\":\"165087E0-EA37-478D-821E-70AB0528CF9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0.0\",\"versionEndIncluding\":\"12.1.3.5\",\"matchCriteriaId\":\"7F6FFF4D-C952-4F56-A626-E82AF93B30C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.0.0\",\"versionEndIncluding\":\"13.1.0.5\",\"matchCriteriaId\":\"6AF8D490-E6FB-41BD-BA2D-B71BED1E7FED\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.5.6\",\"matchCriteriaId\":\"4DE7E7F2-2026-4407-8F0E-168DE0D4F935\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.6.0.0\",\"versionEndIncluding\":\"11.6.3.2\",\"matchCriteriaId\":\"A259A682-12B2-4BEA-A367-C71EAC3F887B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0.0\",\"versionEndIncluding\":\"12.1.3.5\",\"matchCriteriaId\":\"6F0A5D75-40BB-4D45-8B02-B29C1563D996\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.0.0\",\"versionEndIncluding\":\"13.1.0.5\",\"matchCriteriaId\":\"96E0DD20-1AC3-41CF-9057-489019A439E0\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.5.6\",\"matchCriteriaId\":\"90EC6DF6-A7DF-4A1C-9D2F-C02EDB5FFCF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.6.0.0\",\"versionEndIncluding\":\"11.6.3.2\",\"matchCriteriaId\":\"77AD6CB0-EF75-4A8A-95B7-988B6B041D49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0.0\",\"versionEndIncluding\":\"12.1.3.5\",\"matchCriteriaId\":\"DA9400A8-7B8E-477B-AF65-E22790B742A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.0.0\",\"versionEndIncluding\":\"13.1.0.5\",\"matchCriteriaId\":\"C1D049B4-0304-403A-8EE1-3311044EFF7B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.5.6\",\"matchCriteriaId\":\"B719583F-D2FE-4F29-9FC2-613F979737E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.6.0.0\",\"versionEndIncluding\":\"11.6.3.2\",\"matchCriteriaId\":\"032274E7-5DB3-4531-B72C-95A024C191B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0.0\",\"versionEndIncluding\":\"12.1.3.5\",\"matchCriteriaId\":\"22A865A3-489B-4FBA-BD1E-4DD4FD34DB47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.0.0\",\"versionEndIncluding\":\"13.1.0.5\",\"matchCriteriaId\":\"3D4649CB-EE59-4926-BAE9-F6B8ADE110C5\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.5.6\",\"matchCriteriaId\":\"7C8C72E9-69FA-472D-B73F-BB681D0FA108\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.6.0.0\",\"versionEndIncluding\":\"11.6.3.2\",\"matchCriteriaId\":\"7D1F7BB6-3BF1-4C9A-9F43-9FBD0879B32E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0.0\",\"versionEndIncluding\":\"12.1.3.5\",\"matchCriteriaId\":\"541E39AA-D46E-49B5-9D6B-3CF4EC0347AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.0.0\",\"versionEndIncluding\":\"13.1.0.5\",\"matchCriteriaId\":\"006E2FB7-4BFB-4CF8-A880-A4E00FA1DEA5\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.5.6\",\"matchCriteriaId\":\"01164131-51C1-4BAA-BE0C-331E6F604953\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.6.0.0\",\"versionEndIncluding\":\"11.6.3.2\",\"matchCriteriaId\":\"55476ABD-8CC9-49A4-8F20-67D214B7D239\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0.0\",\"versionEndIncluding\":\"12.1.3.5\",\"matchCriteriaId\":\"A4FBA271-A0EA-4393-A10A-04402B9B4A71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.0.0\",\"versionEndIncluding\":\"13.1.0.5\",\"matchCriteriaId\":\"1BF721DE-B2C3-4195-B456-D269B909C284\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.5.6\",\"matchCriteriaId\":\"B9F34B4F-BA2F-45D9-B2EB-B9196BD6CDF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.6.0.0\",\"versionEndIncluding\":\"11.6.3.2\",\"matchCriteriaId\":\"42B81482-D866-45DB-8210-F90F9B11FFD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0.0\",\"versionEndIncluding\":\"12.1.3.5\",\"matchCriteriaId\":\"3600BB17-98D0-4B81-A148-1864B1F229E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.0.0\",\"versionEndIncluding\":\"13.1.0.5\",\"matchCriteriaId\":\"087D3C0E-886A-4C4D-A6B5-A5EDEBDEF457\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.5.6\",\"matchCriteriaId\":\"2DEDF1CC-3C5A-4F4C-A910-11DD6C0C1739\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.6.0.0\",\"versionEndIncluding\":\"11.6.3.2\",\"matchCriteriaId\":\"D8257FEF-CF33-4459-B6F6-ECC390852987\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0.0\",\"versionEndIncluding\":\"12.1.3.5\",\"matchCriteriaId\":\"71FC8582-ED48-4C8F-A3AB-0744FFA319E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.0.0\",\"versionEndIncluding\":\"13.1.0.5\",\"matchCriteriaId\":\"0D45AB00-2C55-41F5-BAB3-6DA23C86F5BB\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.5.6\",\"matchCriteriaId\":\"53427258-7EE1-4827-9D51-C72026D5942F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.6.0.0\",\"versionEndIncluding\":\"11.6.3.2\",\"matchCriteriaId\":\"D3464E75-D419-4D3E-89EE-3BE571A388F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0.0\",\"versionEndIncluding\":\"12.1.3.5\",\"matchCriteriaId\":\"AEF7AC47-D128-4282-846B-4408B12AAC09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.0.0\",\"versionEndIncluding\":\"13.1.0.5\",\"matchCriteriaId\":\"A97847E9-D6BB-4EA9-9CED-1FA868B35B94\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.5.6\",\"matchCriteriaId\":\"25E4F494-73FC-4755-9946-1C631F7C3640\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.6.0.0\",\"versionEndIncluding\":\"11.6.3.2\",\"matchCriteriaId\":\"15044BE6-FEC9-4325-9EA1-0665FF5F7C36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0.0\",\"versionEndIncluding\":\"12.1.3.5\",\"matchCriteriaId\":\"1869E130-99D1-4E15-8BF7-275EF9A20D7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.0.0\",\"versionEndIncluding\":\"13.1.0.5\",\"matchCriteriaId\":\"0E88E927-3C8E-481A-9447-00082BD73601\"}]}]}],\"references\":[{\"url\":\"https://support.f5.com/csp/article/K07550539\",\"source\":\"f5sirt@f5.com\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K07550539\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.