MEDIUM · 5.9

CVE-2016-7468

An unauthenticated remote attacker may be able to disrupt services on F5 BIG-IP 11.4.1 - 11.5.4 devices with maliciously crafted network traffic. This vulnerability affects virtual servers associated ...

Vulnerability Description

An unauthenticated remote attacker may be able to disrupt services on F5 BIG-IP 11.4.1 - 11.5.4 devices with maliciously crafted network traffic. This vulnerability affects virtual servers associated with TCP profiles when the BIG-IP system's tm.tcpprogressive db variable value is set to non-default setting "enabled". The default value for the tm.tcpprogressive db variable is "negotiate". An attacker may be able to disrupt traffic or cause the BIG-IP system to fail over to another device in the device group.

CVSS Score

5.9

MEDIUM

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
F5Big-Ip Local Traffic Manager11.4.0
F5Big-Ip Application Acceleration Manager11.4.0
F5Big-Ip Advanced Firewall Manager11.4.0
F5Big-Ip Analytics11.4.0
F5Big-Ip Access Policy Manager11.4.0
F5Big-Ip Application Security Manager11.4.0
F5Big-Ip Global Traffic Manager11.4.0
F5Big-Ip Link Controller11.4.0
F5Big-Ip Policy Enforcement Manager11.4.0
F5Big-Ip Protocol Security Module11.4.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2016-7468?

CVE-2016-7468 is a vulnerability with a CVSS score of 5.9 (MEDIUM). An unauthenticated remote attacker may be able to disrupt services on F5 BIG-IP 11.4.1 - 11.5.4 devices with maliciously crafted network traffic. This vulnerability affects virtual servers associated ...

How severe is CVE-2016-7468?

CVE-2016-7468 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2016-7468?

Check the references section above for vendor advisories and patch information. Affected products include: F5 Big-Ip Local Traffic Manager, F5 Big-Ip Application Acceleration Manager, F5 Big-Ip Advanced Firewall Manager, F5 Big-Ip Analytics, F5 Big-Ip Access Policy Manager.