f5 big-ip-access-policy-manager CVE-2018-15318 vulnerability in F5 Networks Products
Published on October 31, 2018

In BIG-IP 14.0.0-14.0.0.2, 13.1.0.4-13.1.1.1, or 12.1.3.4-12.1.3.6, If an MPTCP connection receives an abort signal while the initial flow is not the primary flow, the initial flow will remain after the closing procedure is complete. TMM may restart and produce a core file as a result of this condition.

NVD


Products Associated with CVE-2018-15318

Want to know whenever a new CVE is published for F5 Networks products? stack.watch will email you.

 
 
 
 
 
 
 
 
 
 
 
 
 

Affected Versions

F5 Networks, Inc. BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, FPS, GTM, Link Controller, PEM, WebAccelerator) Version 14.0.0-14.0.0.2, 13.1.0.4-13.1.1.1, 12.1.3.4-12.1.3.6 is affected by CVE-2018-15318

Exploit Probability

EPSS
0.61%
Percentile
69.42%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.