Vulnerability Description
The TMM SSO plugin in F5 BIG-IP APM 12.0.0 - 12.1.1, 11.6.0 - 11.6.1 HF1, 11.5.4 - 11.5.4 HF2, when configured as a SAML Identity Provider with a Service Provider (SP) connector, might allow traffic to be disrupted or failover initiated when a malformed, signed SAML authentication request from an authenticated user is sent via the SP connector.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| F5 | Big-Ip Access Policy Manager | 11.5.4 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/97168Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1038131
- https://support.f5.com/csp/article/K95444512Vendor Advisory
- http://www.securityfocus.com/bid/97168Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1038131
- https://support.f5.com/csp/article/K95444512Vendor Advisory
FAQ
What is CVE-2016-7467?
CVE-2016-7467 is a vulnerability with a CVSS score of 5.3 (MEDIUM). The TMM SSO plugin in F5 BIG-IP APM 12.0.0 - 12.1.1, 11.6.0 - 11.6.1 HF1, 11.5.4 - 11.5.4 HF2, when configured as a SAML Identity Provider with a Service Provider (SP) connector, might allow traffic t...
How severe is CVE-2016-7467?
CVE-2016-7467 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-7467?
Check the references section above for vendor advisories and patch information. Affected products include: F5 Big-Ip Access Policy Manager.