Input validation error in F5 Networks products - CVE-2020-5856

 

Input validation error in F5 Networks products - CVE-2020-5856

Published: February 6, 2020


Vulnerability identifier: #VU25004
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2020-5856
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: F5 Networks
Affected software:
BIG-IP
BIG-IP LTM
BIG-IP AFM
BIG-IP Analytics
BIG-IP APM
BIG-IP ASM
BIG-IP FPS
BIG-IP GTM
BIG-IP PEM
BIG-IP AAM
BIG-IP DNS
BIG-IP Link Controller

Detailed vulnerability description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input while processing specifically crafted traffic using the default "xnet" driver. A remote attacker can cause the Traffic Management Microkernel (TMM) process to restart and perform a denial-of-service attack on the BIG-IP Virtual Edition (VE) system hosted in Amazon Web Services (AWS).


How to mitigate CVE-2020-5856

Install updates from vendor's website.

Sources