Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2017-6148 : Security Advisory and Response

Discover the impact of CVE-2017-6148 affecting F5 BIG-IP versions 13.0.0, 12.0.0-12.1.3.1, 11.6.1-11.6.2, and 11.5.1-11.5.5. Learn about the DoS risk and mitigation steps.

F5 Networks, Inc. disclosed a vulnerability affecting multiple versions of BIG-IP that could lead to service disruptions when using SOCKS proxy.

Understanding CVE-2017-6148

This CVE involves a vulnerability in F5 BIG-IP versions 13.0.0, 12.0.0-12.1.3.1, 11.6.1-11.6.2, and 11.5.1-11.5.5 related to SOCKS proxy usage.

What is CVE-2017-6148?

The vulnerability allows for potential service disruptions provided by TMM when utilizing a SOCKS proxy through affected versions of F5 BIG-IP. It impacts the data plane but does not affect the control plane unless a Virtual Server has a SOCKS proxy profile attached.

The Impact of CVE-2017-6148

        The vulnerability could lead to Denial of Service (DoS) attacks on affected systems.

Technical Details of CVE-2017-6148

This section provides more technical insights into the vulnerability.

Vulnerability Description

Responses to SOCKS proxy requests on the specified versions of F5 BIG-IP may disrupt services provided by TMM. The vulnerability is data plane-centric and requires a Virtual Server with a SOCKS proxy profile for exposure.

Affected Systems and Versions

        Product: BIG-IP (LTM, AAM, AFM, APM, ASM, Link Controller, PEM, WebSafe)
        Versions: 13.0.0, 12.0.0-12.1.3.1, 11.6.1-11.6.2, 11.5.1-11.5.5

Exploitation Mechanism

The vulnerability is exploited by sending SOCKS proxy requests through the affected versions of F5 BIG-IP, potentially causing service disruptions.

Mitigation and Prevention

Protecting systems from CVE-2017-6148 requires immediate actions and long-term security practices.

Immediate Steps to Take

        Disable or restrict the usage of SOCKS proxy profiles on Virtual Servers in the affected versions.
        Monitor network traffic for any suspicious activity that could indicate exploitation of the vulnerability.

Long-Term Security Practices

        Regularly update and patch F5 BIG-IP devices to mitigate known vulnerabilities.
        Implement network segmentation and access controls to limit the impact of potential attacks.

Patching and Updates

Apply patches and updates provided by F5 Networks to address the vulnerability and enhance system security.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now