Learn about CVE-2017-6159 affecting F5 Networks BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, GTM, Link Controller, PEM, Websafe versions 12.0.0 - 12.1.2 and 11.6.0 - 11.6.1. Find mitigation steps and preventive measures.
F5 Networks, Inc. BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, GTM, Link Controller, PEM, and Websafe versions 12.0.0 to 12.1.2 and 11.6.0 to 11.6.1 are susceptible to a denial of service vulnerability when the MPTCP option is activated on a virtual server.
Understanding CVE-2017-6159
This CVE involves a denial of service risk affecting specific versions of F5 Networks' software.
What is CVE-2017-6159?
The vulnerability targets the data plane when utilizing the MPTCP option of a TCP profile, potentially leading to service disruption by causing TMM to restart.
The Impact of CVE-2017-6159
The vulnerability could result in a temporary failure to process traffic, affecting the availability of services. However, there is no risk to the control plane.
Technical Details of CVE-2017-6159
This section delves into the technical aspects of the CVE.
Vulnerability Description
The vulnerability in F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, GTM, Link Controller, PEM, and Websafe versions 12.0.0 to 12.1.2 and 11.6.0 to 11.6.1 allows for a denial of service attack when the MPTCP option is enabled on a virtual server.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability is exploited by activating the MPTCP option on a virtual server, targeting the data plane and potentially causing TMM to restart, disrupting service.
Mitigation and Prevention
Protecting systems from CVE-2017-6159 is crucial to maintaining security.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates