Lucene search

K
f5F5F5:K12543
HistoryJul 05, 2013 - 12:00 a.m.

K12543 : OpenSSL vulnerability CVE-2010-4180

2013-07-0500:00:00
my.f5.com
31

9.2 High

AI Score

Confidence

High

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.023 Low

EPSS

Percentile

88.5%

Security Advisory Description

Note: For information about signing up to receive security notice updates from F5, refer to K9970: Subscribing to email notifications regarding F5 products.Note: Versions that are not listed in this article have not been evaluated for vulnerability to this security advisory. For information about the F5 security policy regarding evaluating older and unsupported versions of F5 products, refer to K4602: Overview of the F5 security vulnerability response policy.F5 products and versions that have been evaluated for this Security Advisory

Product Affected Not Affected
BIG-IP LTM None *9.0.0 - 9.6.1
*10.0.0 - 10.2.4
11.x
BIG-IP GTM None *9.2.2 - 9.4.8
*10.0.0 - 10.2.4
11.x
BIG-IP ASM None *9.2.0 - 9.4.8
*10.0.0 - 10.2.4
11.x
BIG-IP Link Controller None *9.2.2 - 9.4.8
*10.0.0 - 10.2.4
11.x
BIG-IP WebAccelerator None *9.4.0 - 9.4.8
*10.0.0 - 10.2.4
11.x
BIG-IP PSM None *9.4.5 - 9.4.8
*10.0.0 - 10.2.4
11.x
BIG-IP WAN Optimization None *10.0.0 - 10.2.4
11.x
BIG-IP APM None *10.1.0 - 10.2.4
11.x
BIG-IP Edge Gateway None *10.1.0 - 10.2.4
11.x
BIG-IP Analytics None 11.x
BIG-IP AFM None 11.x
BIG-IP PEM None 11.x
BIG-IP AAM None 11.x
FirePass None *5.0.0 - 5.5.2
*6.0.0 - 6.1.0
*7.0.0
Enterprise Manager None *1.0.0 - 1.8.0
*2.0.0 - 2.3.0
3.x
ARX None *3.2.1 - 3.2.3
*4.0.1 - 4.1.3
*5.0.0 - 5.3.1
*6.0.0 - 6.4.0
  • F5 Product Development has determined that these product versions are not vulnerable to the OpenSSL session cache issue indicated by CVE-2010-4180. While these products may allow a client to change the ciphersuite on a subsequent connection, the client is still only allowed to change to a cipher that has been enabled by the server. F5 Product Development has indicated this is intended behavior and does not introduce a security implication.
    However, these product versions use a version of OpenSSL that is affected by this vulnerability when compiled and configured differently. As a result, Nessus or other vulnerability scanners may incorrectly report these product versions as vulnerable to CVE-2010-4180. Nessus plugin 51892 will look beyond the banner string and actually verify the behavior. While it will show that the cipher can be changed, it will not be able to change to a disallowed cipher.
    Vulnerability description
    OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the downgrade to an unintended cipher via vectors involving sniffing network traffic to discover a session identifier.
    Information about this advisory is available at the following location:
    <https://vulners.com/cve/CVE-2010-4180&gt;

9.2 High

AI Score

Confidence

High

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.023 Low

EPSS

Percentile

88.5%