#VU9370 Information disclosure in F5 Networks Server applications


Published: 2020-03-18

Vulnerability identifier: #VU9370

Vulnerability risk: Low

CVSSv3.1: 4.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:F/RL:O/RC:C]

CVE-ID: CVE-2017-6168

CWE-ID: CWE-200

Exploitation vector: Network

Exploit availability: Yes

Vulnerable software:
BIG-IP LTM
Hardware solutions / Security hardware applicances
BIG-IP Analytics
Hardware solutions / Security hardware applicances
BIG-IP APM
Hardware solutions / Security hardware applicances
BIG-IP ASM
Hardware solutions / Security hardware applicances
BIG-IP GTM
Hardware solutions / Security hardware applicances
BIG-IP PEM
Hardware solutions / Security hardware applicances
BIG-IP AAM
Hardware solutions / Routers & switches, VoIP, GSM, etc
BIG-IP DNS
Hardware solutions / Routers & switches, VoIP, GSM, etc
BIG-IP Link Controller
Hardware solutions / Routers & switches, VoIP, GSM, etc
BIG-IP WebSafe
Server applications / Server solutions for antivurus protection

Vendor: F5 Networks

Description
The vulnerability allows a remote attacker to gain potentially sensitive information.

The weakness exists due to insufficient security restrictions. A remote attacker can gain access to access trusted internal networks, send specially crafted input, conduct an Adaptive Chosen Ciphertext attack against RSA and view encrypted information in plaintext format.

Mitigation
Install update from vendor's website.

Vulnerable software versions

BIG-IP LTM: 11.6.0 - 13.0.0

BIG-IP AAM: 11.6.0 - 13.0.0

BIG-IP Analytics: 11.6.0 - 13.0.0

BIG-IP APM: 11.6.0 - 13.0.0

BIG-IP ASM: 11.6.0 - 13.0.0

BIG-IP DNS: 12.0.0 - 13.0.0

BIG-IP GTM: 11.6.0 - 11.6.2

BIG-IP Link Controller: 11.6.0 - 13.0.0

BIG-IP PEM: 11.6.0 - 13.0.0

BIG-IP WebSafe: 11.6.2 - 13.0.0


External links
http://support.f5.com/csp/article/K21905460


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.


Latest bulletins with this vulnerability