f5 big-ip-access-policy-manager CVE-2018-5527 vulnerability in F5 Networks Products
Published on June 27, 2018

On BIG-IP 13.1.0-13.1.0.7, a remote attacker using undisclosed methods against virtual servers configured with a Client SSL or Server SSL profile that has the SSL Forward Proxy feature enabled can force the Traffic Management Microkernel (tmm) to leak memory. As a result, system memory usage increases over time, which may eventually cause a decrease in performance or a system reboot due to memory exhaustion.

NVD


Products Associated with CVE-2018-5527

Want to know whenever a new CVE is published for F5 Networks products? stack.watch will email you.

 
 
 
 
 
 
 
 
 
 
 
 
 

Affected Versions

F5 Networks, Inc. BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, WebAccelerator, WebSafe) Version 13.1.0-13.1.0..7 is affected by CVE-2018-5527

Exploit Probability

EPSS
0.97%
Percentile
76.43%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.