TMM may crash or stop processing new traffic with the DPDK/ENA driver on AWS systems while sending traffic. This issue does not affect any other platforms,

[vc_row][vc_column][vc_column_text] 

http://columbuscameragroup.com//wp-json/wp_live_chat_support/v1/remote_upload Overview :
On BIG-IP 15.1.0-15.1.0.1, 15.0.0-15.0.1.1, and 14.1.0-14.1.2.2, under certain conditions, TMM may crash or stop processing new traffic with the DPDK/ENA driver on AWS systems while sending traffic. This issue does not affect any other platforms, hardware or virtual, or any other cloud provider since the affected driver is specific to AWS.

CVE-2020-5862

 

K01054113: BIG-IP AWS vulnerability CVE-2020-5862

Security Advisory
 

Security Advisory Description

Under certain conditions, while sending traffic, the Traffic Management Microkernel (TMM) may produce a core file or stop processing new traffic with the Data Plane Development Kit (DPDK)/Elastic Network Adapter (ENA) driver on Amazon Web Services (AWS) systems. (CVE-2020-5862)

Impact

A remote attacker may be able to cause TMM to stop processing new traffic and effect a remote denial of service (DoS).

This issue does not affect any other hardware, virtual platforms, or cloud provider, as the affected driver is specific to AWS.

Security Advisory Status

F5 Product Development has assigned ID 846157 (BIG-IP) to this vulnerability.

To determine if your product and version have been evaluated for this vulnerability, refer to the  Dharmapuri Applies to (see versions) box. To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases, point releases, or hotfixes that address the vulnerability, refer to the following table. For more information about security advisory versioning, refer to K51812227: Understanding Security Advisory versioning.

Product Branch Versions known to be vulnerable Fixes introduced in Severity CVSSv3 score1 Vulnerable component or feature
BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, FPS, GTM, Link Controller, PEM) 15.x 15.0.0 – 15.1.0 15.1.0.2
15.0.1.2
Low 3.7 TMM on AWS
14.x 14.1.0 – 14.1.2 14.1.2.3
13.x None Not applicable
12.x None Not applicable
11.x None Not applicable
BIG-IQ Centralized Management 7.x None Not applicable Not vulnerable None None
6.x None Not applicable
5.x None Not applicable
Traffix SDC 5.x None Not applicable Not vulnerable None None

1The CVSSv3 score link takes you to a resource outside of AskF5, and it is possible that the document may be removed without our knowledge.

Security Advisory Recommended Actions

If you are running a version listed in the  Versions known to be vulnerable column, you can eliminate this vulnerability by upgrading to a version listed in the Fixes introduced in column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.

Mitigation

None

[/vc_column_text][/vc_column][/vc_row]

Common Vulnerabilityies and Exposures

Contact us to get started

CVE-2024-24578 : JENS-MAUS RASPBERRYMATIC PRIOR 3.75.6.20240316 PATH TRAVERSAL

CVE-2024-24578 : JENS-MAUS RASPBERRYMATIC PRIOR 3.75.6.20240316 PATH TRAVERSAL

Description RaspberryMatic is an open-source operating system for HomeMatic internet-of-things devices. RaspberryMatic / OCCU prior to version 3.75.6.20240316 contains a

CVE-2024-2558 : TENDA AC18 15.03.05.05 /GOFORM/EXECCOMMAND FORMEXECOMMAND CMDINPUT STACK-BASED OVERFLOW

CVE-2024-2558 : TENDA AC18 15.03.05.05 /GOFORM/EXECCOMMAND FORMEXECOMMAND CMDINPUT STACK-BASED OVERFLOW

Description A vulnerability was found in Tenda AC18 15.03.05.05. It has been rated as critical. This issue affects the function

CVE-2024-28746 : APACHE AIRFLOW 2.8.0/2.8.1/2.8.2 UI IMPROPER AUTHENTICATION

CVE-2024-28746 : APACHE AIRFLOW 2.8.0/2.8.1/2.8.2 UI IMPROPER AUTHENTICATION

Description Apache Airflow, versions 2.8.0 through 2.8.2, has a vulnerability that allows an authenticated user with limited permissions to access