Vulnerability Name:

CVE-2017-6166 (CCN-135392)

Assigned:2017-11-06
Published:2017-11-06
Updated:2021-12-14
Summary:In BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Link Controller, PEM, and WebSafe software 12.0.0 to 12.1.1, in some cases the Traffic Management Microkernel (TMM) may crash when processing fragmented packets. This vulnerability affects TMM through a virtual server configured with a FastL4 profile. Traffic processing is disrupted while TMM restarts. If the affected BIG-IP system is configured as part of a device group, it will trigger a failover to the peer device.
CVSS v3 Severity:5.9 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)
5.2 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
7.8 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-415
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2017-6166

Source: BID
Type: Third Party Advisory, VDB Entry
102264

Source: CCN
Type: BID-102264
Multiple F5 BIG-IP Products CVE-2017-6166 Remote Denial of Service Vulnerability

Source: SECTRACK
Type: Third Party Advisory, VDB Entry
1039949

Source: XF
Type: UNKNOWN
f5-cve20176166-dos(135392)

Source: CCN
Type: F5 Security Advisory K65615624
BIG-IP FastL4 TMM vulnerability CVE-2017-6166

Source: CONFIRM
Type: Issue Tracking, Mitigation, Vendor Advisory
https://support.f5.com/csp/article/K65615624

Vulnerable Configuration:Configuration 1:
  • cpe:/a:f5:big-ip_apm:*:*:*:*:*:*:*:* (Version >= 12.0.0 and <= 12.1.1)
  • OR cpe:/a:f5:big-ip_analytics:*:*:*:*:*:*:*:* (Version >= 12.0.0 and <= 12.1.1)
  • OR cpe:/a:f5:big-ip_pem:*:*:*:*:*:*:*:* (Version >= 12.0.0 and <= 12.1.1)
  • OR cpe:/a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* (Version >= 12.0.0 and <= 12.1.1)
  • OR cpe:/a:f5:big-ip_ltm:*:*:*:*:*:*:*:* (Version >= 12.0.0 and <= 12.1.1)
  • OR cpe:/a:f5:linerate:*:*:*:*:*:*:*:* (Version >= 2.5.0 and <= 2.6.2)
  • OR cpe:/a:f5:f5_websafe:*:*:*:*:*:*:*:* (Version >= 12.0.0 and <= 12.1.1)
  • OR cpe:/a:f5:big-ip_afm:*:*:*:*:*:*:*:* (Version >= 12.0.0 and <= 12.1.1)
  • OR cpe:/a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* (Version >= 12.0.0 and <= 12.1.1)
  • OR cpe:/a:f5:big-ip_dns:*:*:*:*:*:*:*:* (Version >= 12.0.0 and <= 12.1.1)
  • OR cpe:/a:f5:big-ip_asm:*:*:*:*:*:*:*:* (Version >= 12.0.0 and <= 12.1.1)

  • Configuration CCN 1:
  • cpe:/a:f5:big-ip_local_traffic_manager:12.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:f5:big-ip_analytics:12.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:f5:big-ip_access_policy_manager:12.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:f5:big-ip_dns:12.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:f5:big-ip_link_controller:12.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:f5:big-ip_websafe:12.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:f5:big-ip_local_traffic_manager:12.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:f5:big-ip_analytics:12.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:f5:big-ip_access_policy_manager:12.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:f5:big-ip_dns:12.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:f5:big-ip_link_controller:12.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:f5:big-ip_pem:12.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:f5:big-ip_websafe:12.0.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    f5 big-ip apm *
    f5 big-ip analytics *
    f5 big-ip pem *
    f5 big-ip link controller *
    f5 big-ip ltm *
    f5 linerate *
    f5 f5 websafe *
    f5 big-ip afm *
    f5 big-ip application acceleration manager *
    f5 big-ip dns *
    f5 big-ip asm *
    f5 big-ip local traffic manager 12.1.1
    f5 big-ip analytics 12.1.1
    f5 big-ip access policy manager 12.1.1
    f5 big-ip dns 12.1.1
    f5 big-ip link controller 12.1.1
    f5 big-ip websafe 12.1.1
    f5 big-ip local traffic manager 12.0.0
    f5 big-ip analytics 12.0.0
    f5 big-ip access policy manager 12.0.0
    f5 big-ip dns 12.0.0
    f5 big-ip link controller 12.0.0
    f5 big-ip pem 12.0.0
    f5 big-ip websafe 12.0.0