Lucene search

K
f5F5SOL15561
HistorySep 04, 2014 - 12:00 a.m.

SOL15561 - Kerberos vulnerability CVE-2014-4344

2014-09-0400:00:00
support.f5.com
31

EPSS

0.117

Percentile

95.3%

Vulnerability Recommended Actions

You can eliminate this vulnerability by running a version listed in the Versions known to be not vulnerable column in the above tables. If theVersions known to be not vulnerable column does not list a version that is higher than the version you are running, then no upgrade candidate currently exists.

BIG-IP APM

To mitigate this vulnerability on BIG-IP APM system, you can configure the Kerberos SSO Send Authorization configuration option to use any value exceptAlways (default). For information about configuring this option, refer to the** Kerberos Single Sign-On Method**chapter of the BIG-IP Access Policy Manager Single Sign-On Configuration Guide.

Supplemental Information

  • SOL9970: Subscribing to email notifications regarding F5 products
  • SOL9957: Creating a custom RSS feed to view new and updated documents.
  • SOL4602: Overview of the F5 security vulnerability response policy
  • SOL4918: Overview of the F5 critical issue hotfix policy