IPsec vulnerability CVE-2015-4047

2016-01-28T01:11:00
ID F5:K05013313
Type f5
Reporter f5
Modified 2020-02-28T02:31:00

Description

F5 Product Development has assigned ID 565787 (BIG-IP), ID 566109 (BIG-IQ), and ID 566111 (Enterprise Manager) to this vulnerability and has evaluated the currently supported releases for potential vulnerability. Additionally, F5 iHealth may list Heuristic H05013313 on the Diagnostics > Identified > Low page.

To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table.

Product | Versions known to be vulnerable | Versions known to be not vulnerable | Severity | Vulnerable component or feature
---|---|---|---|---
BIG-IP LTM | 13.0.0
12.0.0 - 12.1.5
11.0.0 - 11.6.4 | 14.0.0 - 14.1.0
13.1.0 - 13.1.1
10.1.0 - 10.2.4 | Low | IPsec (racoon)
BIG-IP AAM | 13.0.0
12.0.0 - 12.1.5
11.4.0 - 11.6.4 | 14.0.0 - 14.1.0
13.1.0 - 13.1.1 | Low
| IPsec (racoon)
BIG-IP AFM | 13.0.0
12.0.0 - 12.1.5
11.3.0 - 11.6.4 | 14.0.0 - 14.1.0
13.1.0 - 13.1.1 | Low | IPsec (racoon)
BIG-IP Analytics | 13.0.0
12.0.0 - 12.1.5
11.0.0 - 11.6.4 | 14.0.0 - 14.1.0
13.1.0 - 13.1.1 | Low
| IPsec (racoon)
BIG-IP APM | 13.0.0
12.0.0 - 12.1.5
11.0.0 - 11.6.4 | 14.0.0 - 14.1.0
13.1.0 - 13.1.1
10.1.0 - 10.2.4 | Low | IPsec (racoon)
BIG-IP ASM | 13.0.0
12.0.0 - 12.1.5
11.0.0 - 11.6.4 | 14.0.0 - 14.1.0
13.1.0 - 13.1.1
10.1.0 - 10.2.4 | Low
| IPsec (racoon)
BIG-IP DNS | 13.0.0
12.0.0 - 12.1.5 | 14.0.0 - 14.1.0
13.1.0 - 13.1.1 | Low | IPsec (racoon)
BIG-IP Edge Gateway | 11.0.0 - 11.3.0 | 10.1.0 - 10.2.4 | Low
| IPsec (racoon)
BIG-IP GTM | 11.0.0 - 11.6.4 | 10.1.0 - 10.2.4 | Low | IPsec (racoon)
BIG-IP Link Controller | 13.0.0
12.0.0 - 12.1.5
11.0.0 - 11.6.4 | 14.0.0 - 14.1.0
13.1.0 - 13.1.1
10.1.0 - 10.2.4 | Low
| IPsec (racoon)
BIG-IP PEM | 13.0.0
12.0.0 - 12.1.5
11.3.0 - 11.6.4 | 14.0.0 - 14.1.0
13.1.0 - 13.1.1 | Low | IPsec (racoon)
BIG-IP PSM | 11.0.0 - 11.4.1 | 10.1.0 - 10.2.4 | Low
| IPsec (racoon)
BIG-IP WebAccelerator | 11.0.0 - 11.3.0 | 10.1.0 - 10.2.4 | Low | IPsec (racoon)
BIG-IP WOM | 11.0.0 - 11.3.0 | 10.1.0 - 10.2.4 | Low
| IPsec (racoon)
ARX | None | 6.0.0 - 6.4.0 | Not vulnerable | None
Enterprise Manager | 3.0.0 - 3.1.1 | None | Low | IPsec (racoon)
FirePass | None | 7.0.0
6.0.0 - 6.1.0 | Not vulnerable | None
BIG-IQ Cloud | 4.0.0 - 4.5.0 | None | Low
| IPsec (racoon)
BIG-IQ Device | 4.2.0 - 4.5.0 | None | Low | IPsec (racoon)
BIG-IQ Security | 4.0.0 - 4.5.0 | None | Low
| IPsec (racoon)
BIG-IQ ADC | 4.5.0 | None | Low | IPsec (racoon)
BIG-IQ Centralized Management | 4.6.0 | None | Low
| IPsec (racoon)
BIG-IQ Cloud and Orchestration | 1.0.0 | None | Low* | IPsec (racoon)
LineRate | None | 2.5.0 - 2.6.1 | Not vulnerable | None
F5 WebSafe | None | 1.0.0 | Not vulnerable | None
Traffix SDC | None | 4.0.0 - 4.4.0
3.3.2 - 3.5.1 | Not vulnerable | None

*Although the BIG-IP/BIG-IQ/Enterprise Manager software contains the vulnerable code, there is no supported method to configure the functionality in a way that exposes the issue.

If you are running a version listed in the Versions known to be vulnerable column, you can eliminate this vulnerability by upgrading to a version listed in the Versions known to be not vulnerable column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.