Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2020-27725 |
CWE-ID | CWE-401 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
BIG-IP DNS Hardware solutions / Routers & switches, VoIP, GSM, etc BIG-IP Link Controller Hardware solutions / Routers & switches, VoIP, GSM, etc BIG-IP GTM Hardware solutions / Security hardware applicances |
Vendor | F5 Networks |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU49068
Risk: Low
CVSSv4.0: 2.1 [CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-27725
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform DoS attack on the target system.
The vulnerability exists due memory leak in zxfrd process when listing DNS zones. A remote user with access to TMSH, iControl or SNMP can force the application to leak memory and perform denial of service attack.
This vulnerability affects only BIG-IP systems that are provisioned with BIG-IP DNS or BIG-IP GTM and at least one DNS zone.
MitigationInstall update from vendor's website.
Vulnerable software versionsBIG-IP DNS: 11.6.1 - 15.1.0.5
BIG-IP GTM: 11.6.1 HF1 - 15.1.0.5
BIG-IP Link Controller: 11.6.1 HF1 - 15.1.0.5
CPE2.3https://support.f5.com/csp/article/K25595031
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.