F5 Networks BIG-IP : TMM with HTTP/2 vulnerability (K45320419)
Medium Nessus Plugin ID 118664
SynopsisThe remote device is missing a vendor-supplied security patch.
DescriptionMaliciously crafted HTTP/2 request frames can lead to denial of service. There is data plane exposure for virtual servers when the HTTP2 profile is enabled. There is no control plane exposure to this issue. (CVE-2018-5514)
The BIG-IP system may temporarily fail to process traffic as it recovers from a Traffic Management Microkernel (TMM) restart, and devices configured as a high availability (HA) pair may fail over.
SolutionUpgrade to one of the non-vulnerable versions listed in the F5 Solution K45320419.