Vulnerability Details CVE-2020-5859
On BIG-IP 15.1.0.1, specially formatted HTTP/3 messages may cause TMM to produce a core file.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.006
EPSS Ranking 69.5%
CVSS Severity
CVSS v3 Score 7.5
CVSS v2 Score 5.0
Products affected by CVE-2020-5859
-
cpe:2.3:a:f5:big-ip_access_policy_manager:15.0.0
-
cpe:2.3:a:f5:big-ip_access_policy_manager:15.0.1
-
cpe:2.3:a:f5:big-ip_access_policy_manager:15.0.1.0.33.11
-
cpe:2.3:a:f5:big-ip_access_policy_manager:15.0.1.0.48.11
-
cpe:2.3:a:f5:big-ip_access_policy_manager:15.0.1.1
-
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.0.0
-
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.0.1
-
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.0.1.0.33.11
-
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.0.1.0.48.11
-
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.0.1.1
-
cpe:2.3:a:f5:big-ip_analytics:15.0.0
-
cpe:2.3:a:f5:big-ip_analytics:15.0.1
-
cpe:2.3:a:f5:big-ip_analytics:15.0.1.0.33.11
-
cpe:2.3:a:f5:big-ip_analytics:15.0.1.0.48.11
-
cpe:2.3:a:f5:big-ip_analytics:15.0.1.1
-
cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.0.0
-
cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.0.1
-
cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.0.1.0.33.11
-
cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.0.1.0.48.11
-
cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.0.1.1
-
cpe:2.3:a:f5:big-ip_application_security_manager:15.0.0
-
cpe:2.3:a:f5:big-ip_application_security_manager:15.0.1
-
cpe:2.3:a:f5:big-ip_application_security_manager:15.0.1.0.33.11
-
cpe:2.3:a:f5:big-ip_application_security_manager:15.0.1.0.48.11
-
cpe:2.3:a:f5:big-ip_application_security_manager:15.0.1.1
-
cpe:2.3:a:f5:big-ip_domain_name_system:15.0.0
-
cpe:2.3:a:f5:big-ip_domain_name_system:15.0.1
-
cpe:2.3:a:f5:big-ip_domain_name_system:15.0.1.0.33.11
-
cpe:2.3:a:f5:big-ip_domain_name_system:15.0.1.0.48.11
-
cpe:2.3:a:f5:big-ip_domain_name_system:15.0.1.1
-
cpe:2.3:a:f5:big-ip_fraud_protection_service:15.0.0
-
cpe:2.3:a:f5:big-ip_fraud_protection_service:15.0.1
-
cpe:2.3:a:f5:big-ip_fraud_protection_service:15.0.1.0.33.11
-
cpe:2.3:a:f5:big-ip_fraud_protection_service:15.0.1.0.48.11
-
cpe:2.3:a:f5:big-ip_fraud_protection_service:15.0.1.1
-
cpe:2.3:a:f5:big-ip_global_traffic_manager:15.0.0
-
cpe:2.3:a:f5:big-ip_global_traffic_manager:15.0.1
-
cpe:2.3:a:f5:big-ip_global_traffic_manager:15.0.1.0.33.11
-
cpe:2.3:a:f5:big-ip_global_traffic_manager:15.0.1.0.48.11
-
cpe:2.3:a:f5:big-ip_global_traffic_manager:15.0.1.1
-
cpe:2.3:a:f5:big-ip_link_controller:15.0.0
-
cpe:2.3:a:f5:big-ip_link_controller:15.0.1
-
cpe:2.3:a:f5:big-ip_link_controller:15.0.1.0.33.11
-
cpe:2.3:a:f5:big-ip_link_controller:15.0.1.0.48.11
-
cpe:2.3:a:f5:big-ip_link_controller:15.0.1.1
-
cpe:2.3:a:f5:big-ip_local_traffic_manager:15.0.0
-
cpe:2.3:a:f5:big-ip_local_traffic_manager:15.0.1
-
cpe:2.3:a:f5:big-ip_local_traffic_manager:15.0.1.0.33.11
-
cpe:2.3:a:f5:big-ip_local_traffic_manager:15.0.1.0.48.11
-
cpe:2.3:a:f5:big-ip_local_traffic_manager:15.0.1.1
-
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.0.0
-
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.0.1
-
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.0.1.0.33.11
-
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.0.1.0.48.11
-
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.0.1.1