CVE-2017-6168

high F5
CVSS v3 Base Score
7.4
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS Score
76.2%
Exploitation probability in 30 days
Top 1% most likely to be exploited
Attack Characteristics
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Confidentiality
High
Integrity
High
Availability
None
Published: November 17, 2017 (3099 days ago)
Last Modified: May 13, 2026
Vendor: F5
Source: NVD

Description

On BIG-IP versions 11.6.0-11.6.2 (fixed in 11.6.2 HF1), 12.0.0-12.1.2 HF1 (fixed in 12.1.2 HF2), or 13.0.0-13.0.0 HF2 (fixed in 13.0.0 HF3) a virtual server configured with a Client SSL profile may be vulnerable to an Adaptive Chosen Ciphertext attack (AKA Bleichenbacher attack) against RSA, which when exploited, may result in plaintext recovery of encrypted messages and/or a Man-in-the-middle (MiTM) attack, despite the attacker not having gained access to the server's private key itself, aka a ROBOT attack.

CWE

CWE-203

Affected Products

f5 big-ip ltmf5 big-ip application acceleration managerf5 big-ip afmf5 big-ip analyticsf5 big-ip apmf5 big-ip asmf5 big-ip link controllerf5 big-ip pemf5 websafe

References