Lucene search

K
f5F5SOL15553
HistorySep 04, 2014 - 12:00 a.m.

SOL15553 - Kerberos vulnerability CVE-2014-4343

2014-09-0400:00:00
support.f5.com
24

EPSS

0.033

Percentile

91.3%

Vulnerability Recommended Actions

If the previous table lists a version in the Versions known to be not vulnerable column, you can eliminate this vulnerability by upgrading to the listed version. If the listed version is older than the version you are currently running, or if the table does not list any version in the column, then no upgrade candidate currently exists.

BIG-IP APM

To mitigate this vulnerability on the BIG-IP APM system, you can configure the Kerberos SSO Send Authorization configuration option to use any value exceptAlways (default). For information about configuring this option, refer to the** Kerberos Single Sign-On Method**chapter of the BIG-IP Access Policy Manager Single Sign-On Configuration Guide.

Supplemental Information

  • SOL9970: Subscribing to email notifications regarding F5 products
  • SOL9957: Creating a custom RSS feed to view new and updated documents.
  • SOL4602: Overview of the F5 security vulnerability response policy
  • SOL4918: Overview of the F5 critical issue hotfix policy