Your review has been sent successfully

F5 Networks Updates

2483
Classification
These posts contain security alerts, including digital loopholes, electronic attacks, technical updates, and they are classified base on the level of severity.

Critical

High

Medium

Low

Warning Date

Severity Level

Warning Number

Target Sector

19 February, 2020

● Medium

2020-927

All

Description:

F5 Networks has released security updates to address vulnerabilities in the following products:

  • This hardware issue impacts all platforms using the following Intel processor families:
    • Datacenter Microprocessors
    • Client and Xeon E3 Microprocessors
    • Intel® Xeon® Processor E3 v5 & v6 Family
    • Intel® Xeon® E Processor
    • Intel® Xeon® D, W Processor
    • Intel® Core i9 8th & 9th Generation
  • BIG-IP
    • C113 BIG-IP 4000s - 4200v
    • C109 BIG-IP 5000s - 5250v
    • D110 BIG-IP 7000s - 7250v
  • Traffix
    • Only HPE Gen10 servers are vulnerable.

Threats:

Attacker could exploit these vulnerabilities by doing the following:

  • Denial of Service (DoS)
  • information disclosure
  • Privilege elevation

Best practice and Recommendations:

  • BIG-IP:
    • VE systems: contact your cloud provider or hypervisor vendor to ensure their platforms or products are not subject to this vulnerability.
    • vCMP systems: configure vCMP guests to use at least two cores so that physical CPUs are not shared among guests.
  • Traffix:

For more details:

https://support.f5.com/csp/article/K29100014

Last updated at 19 February, 2020

Rate the content

rate-icon
up icon