Vulnerabilities > CVE-2018-5512 - Unspecified vulnerability in F5 products
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
HIGH Summary
On F5 BIG-IP 13.1.0-13.1.0.5, when Large Receive Offload (LRO) and SYN cookies are enabled (default settings), undisclosed traffic patterns may cause TMM to restart.
Vulnerable Configurations
Nessus
NASL family | F5 Networks Local Security Checks |
NASL id | F5_BIGIP_SOL51754851.NASL |
description | WhenLarge Receive Offload(LRO)and SYN cookies are enabled (default settings), undisclosed traffic patterns may cause TMM to restart. (CVE-2018-5512) Impact An attacker may be able to causea disruption of service. Exposure to this vulnerability is limited to the data plane on hardwareplatforms. There is no exposure to the control plane or BIG-IPVirtual Edition (VE). The BIG-IP system will take the configured high availability (HA) action for the Traffic Management Microkernel (TMM) when experiencing this issue. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 118674 |
published | 2018-11-02 |
reporter | This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/118674 |
title | F5 Networks BIG-IP : BIG-IP system vulnerability (K51754851) |