Vulnerability Description
In F5 BIG-IP LTM, AAM, AFM, APM, ASM, Link Controller, PEM, and WebSafe 12.1.0 through 12.1.2, certain values in a TLS abbreviated handshake when using a client SSL profile with the Session Ticket option enabled may cause disruption of service to the Traffic Management Microkernel (TMM). The Session Ticket option is disabled by default.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| F5 | Big-Ip Access Policy Manager | 12.1.0 |
| F5 | Big-Ip Advanced Firewall Manager | 12.1.0 |
| F5 | Big-Ip Application Acceleration Manager | 12.1.0 |
| F5 | Big-Ip Application Security Manager | 12.1.0 |
| F5 | Big-Ip Link Controller | 12.1.0 |
| F5 | Big-Ip Local Traffic Manager | 12.1.0 |
| F5 | Big-Ip Policy Enforcement Manager | 12.1.0 |
| F5 | Big-Ip Websafe | 12.1.0 |
Related Weaknesses (CWE)
References
- https://support.f5.com/csp/article/K21154730Vendor Advisory
- https://support.f5.com/csp/article/K21154730Vendor Advisory
FAQ
What is CVE-2017-6141?
CVE-2017-6141 is a vulnerability with a CVSS score of 5.9 (MEDIUM). In F5 BIG-IP LTM, AAM, AFM, APM, ASM, Link Controller, PEM, and WebSafe 12.1.0 through 12.1.2, certain values in a TLS abbreviated handshake when using a client SSL profile with the Session Ticket opt...
How severe is CVE-2017-6141?
CVE-2017-6141 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-6141?
Check the references section above for vendor advisories and patch information. Affected products include: F5 Big-Ip Access Policy Manager, F5 Big-Ip Advanced Firewall Manager, F5 Big-Ip Application Acceleration Manager, F5 Big-Ip Application Security Manager, F5 Big-Ip Link Controller.