f5 big-ip-access-policy-manager CVE-2018-15320 vulnerability in F5 Networks Products
Published on October 31, 2018

On BIG-IP 14.0.0-14.0.0.2 or 13.0.0-13.1.1.1, undisclosed traffic patterns may lead to denial of service conditions for the BIG-IP system. The configuration which exposes this condition is the BIG-IP self IP address which is part of a VLAN group and has the Port Lockdown setting configured with anything other than "allow-all".

NVD


Products Associated with CVE-2018-15320

Want to know whenever a new CVE is published for F5 Networks products? stack.watch will email you.

 
 
 
 
 
 
 
 
 
 
 
 
 

Affected Versions

F5 Networks, Inc. BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, FPS, GTM, Link Controller, PEM, WebAccelerator) Version 14.0.0-14.0.0.2, 13.0.0-13.1.1.1 is affected by CVE-2018-15320

Exploit Probability

EPSS
0.68%
Percentile
71.31%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.