BIG-IP IPsec IKE peer listener vulnerability CVE-2016-5736

2016-08-10T22:58:00
ID F5:K10133477
Type f5
Reporter f5
Modified 2017-03-14T19:15:00

Description

F5 Product Development has assigned ID 570716 (BIG-IP) to this vulnerability.

To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table:

Product| Versions known to be vulnerable| Versions known to be not vulnerable| Severity| Vulnerable component or feature
---|---|---|---|---
BIG-IP LTM| 12.0.0 - 12.0.0 HF1
11.6.0
11.4.0 - 11.5.4 HF1
11.2.1 - 11.2.1 HF15| 12.1.0
12.0.0 HF2
11.6.1
11.5.4 HF2
11.2.1 HF16
10.2.1 - 10.2.4| Severe| IPsec IKE peer listener
BIG-IP AAM| 12.0.0 - 12.0.0 HF1
11.6.0
11.4.0 - 11.5.4 HF1| 12.1.0
12.0.0 HF2
11.6.1
11.5.4 HF2| Severe| IPsec IKE peer listener
BIG-IP AFM| 12.0.0 - 12.0.0 HF1
11.6.0
11.4.0 - 11.5.4 HF1| 12.1.0
12.0.0 HF2
11.6.1
11.5.4 HF2| Severe| IPsec IKE peer listener
BIG-IP Analytics| 12.0.0 - 12.0.0 HF1
11.6.0
11.4.0 - 11.5.4 HF1
11.2.1 - 11.2.1 HF15| 12.1.0
12.0.0 HF2
11.6.1
11.5.4 HF2
11.2.1 HF16| Severe| IPsec IKE peer listener
BIG-IP APM| 12.0.0 - 12.0.0 HF1
11.6.0
11.4.0 - 11.5.4 HF1
11.2.1 - 11.2.1 HF15| 12.1.0
12.0.0 HF2
11.6.1
11.5.4 HF2
11.2.1 HF16
10.2.1 - 10.2.4| Severe| IPsec IKE peer listener
BIG-IP ASM| 12.0.0 - 12.0.0 HF1
11.6.0
11.4.0 - 11.5.4 HF1
11.2.1 - 11.2.1 HF15| 12.1.0
12.0.0 HF2
11.6.1
11.5.4 HF2
11.2.1 HF16
10.2.1 - 10.2.4| Severe| IPsec IKE peer listener
BIG-IP DNS| 12.0.0 - 12.0.0 HF1| 12.1.0
12.0.0 HF2| Severe| IPsec IKE peer listener
BIG-IP Edge Gateway| 11.2.1 - 11.2.1 HF15| 11.2.1 HF16
10.2.1 - 10.2.4| Severe| IPsec IKE peer listener
BIG-IP GTM| 11.6.0
11.4.0 - 11.5.4 HF1
11.2.1 - 11.2.1 HF15| 11.6.1
11.5.4 HF2
11.2.1 HF16
10.2.1 - 10.2.4| Severe| IPsec IKE peer listener
BIG-IP Link Controller| 12.0.0 - 12.0.0 HF1
11.6.0
11.4.0 - 11.5.4 HF1
11.2.1 - 11.2.1 HF15| 12.1.0
12.0.0 HF2
11.6.1
11.5.4 HF2
11.2.1 HF16
10.2.1 - 10.2.4| Severe| IPsec IKE peer listener
BIG-IP PEM| 12.0.0 - 12.0.0 HF1
11.6.0
11.4.0 - 11.5.4 HF1| 12.1.0
12.0.0 HF2
11.6.1
11.5.4 HF2| Severe| IPsec IKE peer listener
BIG-IP PSM| 11.4.0 - 11.4.1| 10.2.1 - 10.2.4| Severe| IPsec IKE peer listener
BIG-IP WebAccelerator| 11.2.1 - 11.2.1 HF15| 11.2.1 HF16
10.2.1 - 10.2.4| Severe| IPsec IKE peer listener
BIG-IP WOM| 11.2.1 - 11.2.1 HF15| 11.2.1 HF16
10.2.1 - 10.2.4| Severe| IPsec IKE peer listener
BIG-IP WebSafe| 12.0.0 - 12.0.0 HF1
11.6.0| 12.1.0
12.0.0 HF2
11.6.1| Severe| IPsec IKE peer listener
ARX| None| 6.2.0 - 6.4.0| Not vulnerable| None
Enterprise Manager| None| 3.1.1| Not vulnerable| None
FirePass| None| 7.0.0| Not vulnerable| None
BIG-IQ Cloud| None| 4.0.0 - 4.5.0| Not vulnerable| None
BIG-IQ Device| None| 4.2.0 - 4.5.0| Not vulnerable| None
BIG-IQ Security| None| 4.0.0 - 4.5.0| Not vulnerable| None
BIG-IQ ADC| None| 4.5.0| Not vulnerable| None
BIG-IQ Centralized Management| None| 5.0.0
4.6.0| Not vulnerable| None
BIG-IQ Cloud and Orchestration| None| 1.0.0| Not vulnerable| None
F5 iWorkflow| None| 2.0.0| Not vulnerable| None
LineRate| None| 2.5.0 - 2.6.1| Not vulnerable| None
Traffix SDC| None| 5.0.0
4.0.0 - 4.4.0| Not vulnerable| None

If you are running a version listed in the Versions known to be vulnerable column, you can eliminate this vulnerability by upgrading to a version listed in the Versions known to be not vulnerable column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.

To mitigate this vulnerability, you can disable the anonymous IPsec IKE peer listener (if not in use). However, if you want to use the anonymous listener, you should ensure that the Verify Certificate option is enabled, or configure the Authentication Method option to use the Preshared Key method if certificates are not in use. To do so, perform the following procedures:

Disabling the anonymous IPsec IKE peer listener
Enabling the Verify Certificate option for the anonymous IPsec IKE peer listener
Configuring the Authentication Method option to use the Preshared Key method for the anonymous IPsec IKE peer listener

Disabling the anonymous IPsec IKE peer listener

Impact of action: The BIG-IP system will no longer listen for IPsec IKE peers unless another peer listener has been configured.

  1. Log in to the Configuration utility.
  2. Navigate to Network > IPsec > IKE Peers.
  3. Select the anonymous IKE peer.
  4. For the State option, select Disabled.
  5. Click Update. Enabling the Verify Certificate option for the anonymous IPsec IKE peer listener

Impact of action: IPsec IKE peers will be required to provide a valid certificate or negotiation will fail.

  1. Log in to the Configuration utility.
  2. Navigate to Network > IPsec > IKE Peers.
  3. Select the anonymous IKE peer.
  4. In the IKE Phase 1 Credentials section, select the Verify Peer Certificate check box.

Enabling the Verify Peer Certificate option allows you to configure the following:

* Trusted Certificate Authorities
* Certificate Revocation List (CRL)
* Peer Certificate
  1. Click Update.

Configuring the Authentication Method option to use the Preshared Key method for the anonymous IPsec IKE peer listener

Impact of action: IPsec IKE peers will be required to provide the specified preshared key or negotiation will fail.

  1. Log in to the Configuration utility.
  2. Navigate to Network > IPsec > IKE Peers.
  3. Select the anonymous IKE peer.
  4. In the IKE Phase 1 Credentials section, select Preshared Key for the Authentication Method option.

Selecting the Preshared Key method provides following fields:

* **Preshared Key**
* **Verify Preshared Key**
  1. In the Preshared Key field, enter the string that IKE peers will share for authenticating each other.
  2. In the Verify Preshared Key field, re-enter the string that IKE peers will share for authenticating each other.
  3. Click Update.

  4. K9970: Subscribing to email notifications regarding F5 products

  5. K9957: Creating a custom RSS feed to view new and updated documents
  6. K4602: Overview of the F5 security vulnerability response policy
  7. K4918: Overview of the F5 critical issue hotfix policy
  8. K167: Downloading software and firmware from F5
  9. K13123: Managing BIG-IP product hotfixes (11.x - 12.x)