CVE-2016-7467
Published on: 04/11/2017 12:00:00 AM UTC
Last Modified on: 03/23/2021 11:27:06 PM UTC
Certain versions of Big-ip Access Policy Manager from F5 contain the following vulnerability:
The TMM SSO plugin in F5 BIG-IP APM 12.0.0 - 12.1.1, 11.6.0 - 11.6.1 HF1, 11.5.4 - 11.5.4 HF2, when configured as a SAML Identity Provider with a Service Provider (SP) connector, might allow traffic to be disrupted or failover initiated when a malformed, signed SAML authentication request from an authenticated user is sent via the SP connector.
- CVE-2016-7467 has been assigned by [email protected] to track the vulnerability - currently rated as MEDIUM severity.
- Affected Vendor/Software: F5 Networks - F5 BIG-IP APM version 12.0.0 - 12.1.1, 11.6.0 - 11.6.1 HF1, 11.5.4 - 11.5.4 HF2
CVSS3 Score: 5.3 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | HIGH | LOW | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | NONE | NONE | HIGH |
CVSS2 Score: 3.5 - LOW
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | MEDIUM | SINGLE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
NONE | NONE | PARTIAL |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
No Description Provided | Vendor Advisory support.f5.com text/html | CONFIRM support.f5.com/csp/article/K95444512 |
F5 BIG-IP APM CVE-2016-7472 Denial of Service Vulnerability | Third Party Advisory VDB Entry cve.report (archive) text/html | BID 97168 |
F5 BIG-IP APM SAML SSO Plugin Flaw Lets Remote Authenticated Users Deny Service - SecurityTracker | www.securitytracker.com text/html | SECTRACK 1038131 |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | F5 | Big-ip Access Policy Manager | 11.5.4 | All | All | All |
Application | F5 | Big-ip Access Policy Manager | 11.6.0 | All | All | All |
Application | F5 | Big-ip Access Policy Manager | 11.6.1 | All | All | All |
Application | F5 | Big-ip Access Policy Manager | 12.0.0 | All | All | All |
Application | F5 | Big-ip Access Policy Manager | 12.1.0 | All | All | All |
Application | F5 | Big-ip Access Policy Manager | 12.1.1 | All | All | All |
Application | F5 | Big-ip Access Policy Manager | 11.5.4 | All | All | All |
Application | F5 | Big-ip Access Policy Manager | 11.6.0 | All | All | All |
Application | F5 | Big-ip Access Policy Manager | 11.6.1 | All | All | All |
Application | F5 | Big-ip Access Policy Manager | 12.0.0 | All | All | All |
Application | F5 | Big-ip Access Policy Manager | 12.1.0 | All | All | All |
Application | F5 | Big-ip Access Policy Manager | 12.1.1 | All | All | All |
- cpe:2.3:a:f5:big-ip_access_policy_manager:11.5.4:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_access_policy_manager:11.6.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_access_policy_manager:11.6.1:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_access_policy_manager:12.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_access_policy_manager:12.1.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_access_policy_manager:12.1.1:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_access_policy_manager:11.5.4:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_access_policy_manager:11.6.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_access_policy_manager:11.6.1:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_access_policy_manager:12.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_access_policy_manager:12.1.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_access_policy_manager:12.1.1:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE