Vulnerability identifier: #VU9370
Vulnerability risk: Low
CVSSv3.1: 4.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:F/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-200
Exploitation vector: Network
Exploit availability: Yes
Vulnerable software:
BIG-IP LTM
Hardware solutions /
Security hardware applicances
BIG-IP Analytics
Hardware solutions /
Security hardware applicances
BIG-IP APM
Hardware solutions /
Security hardware applicances
BIG-IP ASM
Hardware solutions /
Security hardware applicances
BIG-IP GTM
Hardware solutions /
Security hardware applicances
BIG-IP PEM
Hardware solutions /
Security hardware applicances
BIG-IP AAM
Hardware solutions /
Routers & switches, VoIP, GSM, etc
BIG-IP DNS
Hardware solutions /
Routers & switches, VoIP, GSM, etc
BIG-IP Link Controller
Hardware solutions /
Routers & switches, VoIP, GSM, etc
BIG-IP WebSafe
Server applications /
Server solutions for antivurus protection
Vendor: F5 Networks
Description
The vulnerability allows a remote attacker to gain potentially sensitive information.
The weakness exists due to insufficient security restrictions. A remote attacker can gain access to access trusted internal networks, send specially crafted input, conduct an Adaptive Chosen Ciphertext attack against RSA and view encrypted information in plaintext format.
Mitigation
Install update from vendor's website.
Vulnerable software versions
BIG-IP LTM: 11.6.0 - 13.0.0
BIG-IP AAM: 11.6.0 - 13.0.0
BIG-IP Analytics: 11.6.0 - 13.0.0
BIG-IP APM: 11.6.0 - 13.0.0
BIG-IP ASM: 11.6.0 - 13.0.0
BIG-IP DNS: 12.0.0 - 13.0.0
BIG-IP GTM: 11.6.0 - 11.6.2
BIG-IP Link Controller: 11.6.0 - 13.0.0
BIG-IP PEM: 11.6.0 - 13.0.0
BIG-IP WebSafe: 11.6.2 - 13.0.0
External links
http://support.f5.com/csp/article/K21905460
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.