Vulnerability Details CVE-2020-5852
Undisclosed traffic patterns received may cause a disruption of service to the Traffic Management Microkernel (TMM). This vulnerability affects TMM through a virtual server configured with a FastL4 profile. Traffic processing is disrupted while TMM restarts. This issue only impacts specific engineering hotfixes. NOTE: This vulnerability does not affect any of the BIG-IP major, minor or maintenance releases you obtained from downloads.f5.com. The affected Engineering Hotfix builds are as follows: Hotfix-BIGIP-14.1.2.1.0.83.4-ENG Hotfix-BIGIP-12.1.4.1.0.97.6-ENG Hotfix-BIGIP-11.5.4.2.74.291-HF2
Exploit prediction scoring system (EPSS) score
EPSS Score 0.009
EPSS Ranking 74.4%
CVSS Severity
CVSS v3 Score 7.5
CVSS v2 Score 5.0
Products affected by CVE-2020-5852
-
cpe:2.3:a:f5:big-ip_access_policy_manager:11.5.4.2.74.291
-
cpe:2.3:a:f5:big-ip_access_policy_manager:12.1.4.1.0.97.6
-
cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.2.1.0.83.4
-
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.4.2.74.291
-
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.1.4.1.0.97.6
-
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.1.2.1.0.83.4
-
cpe:2.3:a:f5:big-ip_analytics:11.5.4.2.74.291
-
cpe:2.3:a:f5:big-ip_analytics:12.1.4.1.0.97.6
-
cpe:2.3:a:f5:big-ip_analytics:14.1.2.1.0.83.4
-
cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.4.2.74.291
-
cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.1.4.1.0.97.6
-
cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.1.2.1.0.83.4
-
cpe:2.3:a:f5:big-ip_application_security_manager:11.5.4.2.74.291
-
cpe:2.3:a:f5:big-ip_application_security_manager:12.1.4.1.0.97.6
-
cpe:2.3:a:f5:big-ip_application_security_manager:14.1.2.1.0.83.4
-
cpe:2.3:a:f5:big-ip_domain_name_system:11.5.4.2.74.291
-
cpe:2.3:a:f5:big-ip_domain_name_system:12.1.4.1.0.97.6
-
cpe:2.3:a:f5:big-ip_domain_name_system:14.1.2.1.0.83.4
-
cpe:2.3:a:f5:big-ip_edge_gateway:11.5.4.2.74.291
-
cpe:2.3:a:f5:big-ip_edge_gateway:12.1.4.1.0.97.6
-
cpe:2.3:a:f5:big-ip_edge_gateway:14.1.2.1.0.83.4
-
cpe:2.3:a:f5:big-ip_fraud_protection_service:11.5.4.2.74.291
-
cpe:2.3:a:f5:big-ip_fraud_protection_service:12.1.4.1.0.97.6
-
cpe:2.3:a:f5:big-ip_fraud_protection_service:14.1.2.1.0.83.4
-
cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.4.2.74.291
-
cpe:2.3:a:f5:big-ip_global_traffic_manager:12.1.4.1.0.97.6
-
cpe:2.3:a:f5:big-ip_global_traffic_manager:14.1.2.1.0.83.4
-
cpe:2.3:a:f5:big-ip_link_controller:11.5.4.2.74.291
-
cpe:2.3:a:f5:big-ip_link_controller:12.1.4.1.0.97.6
-
cpe:2.3:a:f5:big-ip_link_controller:14.1.2.1.0.83.4
-
cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.4.2.74.291
-
cpe:2.3:a:f5:big-ip_local_traffic_manager:12.1.4.1.0.97.6
-
cpe:2.3:a:f5:big-ip_local_traffic_manager:14.1.2.1.0.83.4
-
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.4.2.74.291
-
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.1.4.1.0.97.6
-
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.1.2.1.0.83.4
-
cpe:2.3:a:f5:big-ip_webaccelerator:11.5.4.2.74.291
-
cpe:2.3:a:f5:big-ip_webaccelerator:12.1.4.1.0.97.6
-
cpe:2.3:a:f5:big-ip_webaccelerator:14.1.2.1.0.83.4