On F5 BIG-IP versions 13.0.0 - 13.1.0.3, attackers may be able to disrupt services on the BIG-IP system with maliciously crafted client certificate. This vulnerability affects virtual servers associated with Client SSL profile which enables the use of client certificate authentication. Client certificate authentication is not enabled by default in Client SSL profile. There is no control plane exposure.
The product does not validate, or incorrectly validates, a certificate.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Big-ip_access_policy_manager | F5 | 13.0.0 (including) | 13.1.0.4 (excluding) |
Big-ip_advanced_firewall_manager | F5 | 13.0.0 (including) | 13.1.0.4 (excluding) |
Big-ip_analytics | F5 | 13.0.0 (including) | 13.1.0.4 (excluding) |
Big-ip_application_acceleration_manager | F5 | 13.0.0 (including) | 13.1.0.4 (excluding) |
Big-ip_application_security_manager | F5 | 13.0.0 (including) | 13.1.0.4 (excluding) |
Big-ip_domain_name_system | F5 | 13.0.0 (including) | 13.1.0.4 (including) |
Big-ip_edge_gateway | F5 | 13.0.0 (including) | 13.1.0.4 (excluding) |
Big-ip_global_traffic_manager | F5 | 13.0.0 (including) | 13.1.0.4 (excluding) |
Big-ip_link_controller | F5 | 13.0.0 (including) | 13.1.0.4 (excluding) |
Big-ip_local_traffic_manager | F5 | 13.0.0 (including) | 13.1.0.4 (excluding) |
Big-ip_policy_enforcement_manager | F5 | 13.0.0 (including) | 13.1.0.4 (excluding) |
Big-ip_webaccelerator | F5 | 13.0.0 (including) | 13.1.0.4 (excluding) |
Big-ip_websafe | F5 | 1.0.0 (including) | 1.0.0 (including) |