Vulnerability Details : CVE-2020-5852
Undisclosed traffic patterns received may cause a disruption of service to the Traffic Management Microkernel (TMM). This vulnerability affects TMM through a virtual server configured with a FastL4 profile. Traffic processing is disrupted while TMM restarts. This issue only impacts specific engineering hotfixes. NOTE: This vulnerability does not affect any of the BIG-IP major, minor or maintenance releases you obtained from downloads.f5.com. The affected Engineering Hotfix builds are as follows: Hotfix-BIGIP-14.1.2.1.0.83.4-ENG Hotfix-BIGIP-12.1.4.1.0.97.6-ENG Hotfix-BIGIP-11.5.4.2.74.291-HF2
Products affected by CVE-2020-5852
- cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.4.2.74.291:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_local_traffic_manager:12.1.4.1.0.97.6:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_local_traffic_manager:14.1.2.1.0.83.4:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.4.2.74.291:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_global_traffic_manager:12.1.4.1.0.97.6:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_global_traffic_manager:14.1.2.1.0.83.4:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_application_security_manager:12.1.4.1.0.97.6:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_application_security_manager:14.1.2.1.0.83.4:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_application_security_manager:11.5.4.2.74.291:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_access_policy_manager:11.5.4.2.74.291:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_access_policy_manager:12.1.4.1.0.97.6:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.2.1.0.83.4:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_webaccelerator:11.5.4.2.74.291:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_webaccelerator:12.1.4.1.0.97.6:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_webaccelerator:14.1.2.1.0.83.4:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_edge_gateway:11.5.4.2.74.291:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_edge_gateway:12.1.4.1.0.97.6:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_edge_gateway:14.1.2.1.0.83.4:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_link_controller:11.5.4.2.74.291:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_link_controller:12.1.4.1.0.97.6:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_link_controller:14.1.2.1.0.83.4:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_analytics:11.5.4.2.74.291:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_analytics:12.1.4.1.0.97.6:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_analytics:14.1.2.1.0.83.4:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.4.2.74.291:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.1.4.1.0.97.6:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.1.2.1.0.83.4:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.4.2.74.291:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.1.4.1.0.97.6:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.1.2.1.0.83.4:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.4.2.74.291:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.1.4.1.0.97.6:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.1.2.1.0.83.4:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_domain_name_system:11.5.4.2.74.291:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_domain_name_system:12.1.4.1.0.97.6:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_domain_name_system:14.1.2.1.0.83.4:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_fraud_protection_service:11.5.4.2.74.291:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_fraud_protection_service:12.1.4.1.0.97.6:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_fraud_protection_service:14.1.2.1.0.83.4:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-5852
0.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 41 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-5852
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
References for CVE-2020-5852
-
https://support.f5.com/csp/article/K53590702
Vendor Advisory
Jump to