CVE-2017-6168
17.11.2017, 19:29
On BIG-IP versions 11.6.0-11.6.2 (fixed in 11.6.2 HF1), 12.0.0-12.1.2 HF1 (fixed in 12.1.2 HF2), or 13.0.0-13.0.0 HF2 (fixed in 13.0.0 HF3) a virtual server configured with a Client SSL profile may be vulnerable to an Adaptive Chosen Ciphertext attack (AKA Bleichenbacher attack) against RSA, which when exploited, may result in plaintext recovery of encrypted messages and/or a Man-in-the-middle (MiTM) attack, despite the attacker not having gained access to the server's private key itself, aka a ROBOT attack.Enginsight
Vendor | Product | Version |
---|---|---|
f5 | big-ip_ltm | 11.6.0 ≤ 𝑥 ≤ 11.6.2 |
f5 | big-ip_ltm | 12.0.0 ≤ 𝑥 ≤ 12.1.2 |
f5 | big-ip_ltm | 13.0.0 |
f5 | big-ip_application_acceleration_manager | 11.6.0 ≤ 𝑥 ≤ 11.6.2 |
f5 | big-ip_application_acceleration_manager | 12.0.0 ≤ 𝑥 ≤ 12.1.2 |
f5 | big-ip_application_acceleration_manager | 13.0.0 |
f5 | big-ip_afm | 11.6.0 ≤ 𝑥 ≤ 11.6.2 |
f5 | big-ip_afm | 12.0.0 ≤ 𝑥 ≤ 12.1.2 |
f5 | big-ip_afm | 13.0.0 |
f5 | big-ip_analytics | 11.6.0 ≤ 𝑥 ≤ 11.6.2 |
f5 | big-ip_analytics | 12.0.0 ≤ 𝑥 ≤ 12.1.2 |
f5 | big-ip_analytics | 13.0.0 |
f5 | big-ip_apm | 11.6.0 ≤ 𝑥 ≤ 11.6.2 |
f5 | big-ip_apm | 12.0.0 ≤ 𝑥 ≤ 12.1.2 |
f5 | big-ip_apm | 13.0.0 |
f5 | big-ip_asm | 11.6.0 ≤ 𝑥 ≤ 11.6.2 |
f5 | big-ip_asm | 12.0.0 ≤ 𝑥 ≤ 12.1.2 |
f5 | big-ip_asm | 13.0.0 |
f5 | big-ip_link_controller | 11.6.0 ≤ 𝑥 ≤ 11.6.2 |
f5 | big-ip_link_controller | 12.0.0 ≤ 𝑥 ≤ 12.1.2 |
f5 | big-ip_link_controller | 13.0.0 |
f5 | big-ip_pem | 11.6.0 ≤ 𝑥 ≤ 11.6.2 |
f5 | big-ip_pem | 12.0.0 ≤ 𝑥 ≤ 12.1.2 |
f5 | big-ip_pem | 13.0.0 |
f5 | websafe | 12.0.0 ≤ 𝑥 ≤ 12.1.2 |
f5 | websafe | 11.6.2 |
f5 | websafe | 13.0.0 |
𝑥
= Vulnerable software versions
References