OpenSSL vulnerability CVE-2015-0292

2015-03-20T20:25:00
ID F5:K16302
Type f5
Reporter f5
Modified 2016-01-09T02:05:00

Description

F5 Product Development has assigned ID 513341 (BIG-IP), ID 516881 (BIG-IQ), ID 516882 (Enterprise Manager), and ID 410742 (ARX) to this vulnerability, and has evaluated the currently supported releases for potential vulnerability. Additionally, BIG-IP iHealth may list Heuristic H513523-2 on the Diagnostics > Identified > Low screen.

To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table:

Product | Versions known to be vulnerable | Versions known to be not vulnerable | Severity | Vulnerable component or feature
---|---|---|---|---
BIG-IP LTM | 11.5.1 (HF2 and earlier)
11.0.0 - 11.5.0 (HF3 and earlier)
10.0.1 - 10.2.4 | 12.0.0
11.6.0
11.5.3
11.5.2
11.5.1 HF3
11.5.0 HF4
11.4.1 HF9
11.2.1 HF15
| Low | OpenSSL
BIG-IP AAM | 11.5.1 (HF2 and earlier)
11.4.0 - 11.5.0 (HF3 and earlier)
| 12.0.0
11.6.0
11.5.2
11.5.3
11.5.1 HF3
11.5.0 HF4
11.4.1 HF9
| Low | OpenSSL
BIG-IP AFM | 11.5.1 (HF2 and earlier)
11.3.0 - 11.5.0 (HF3 and earlier)
| 12.0.0
11.6.0
11.5.3
11.5.2
11.5.1 HF3
11.5.0 HF4
11.4.1 HF9
| Low | OpenSSL
BIG-IP Analytics | 11.5.1 (HF2 and earlier)
11.0.0 - 11.5.0 (HF3 and earlier) | 12.0.0
11.6.0
11.5.3
11.5.2
11.5.1 HF3
11.5.0 HF4
11.4.1 HF9
11.2.1 HF15
| Low | OpenSSL
BIG-IP APM | 11.5.1 (HF2 and earlier)
11.0.0 - 11.5.0 (HF3 and earlier)
10.1.0 - 10.2.4
| 12.0.0
11.6.0
11.5.3
11.5.2
11.5.1 HF3
11.5.0 HF4
11.4.1 HF9
11.2.1 HF15 | Low | OpenSSL
BIG-IP ASM | 11.5.1 (HF2 and earlier)
11.0.0 - 11.5.0 (HF3 and earlier)
10.1.0 - 10.2.4 | 12.0.0
11.6.0
11.5.3
11.5.2
11.5.1 HF3
11.5.0 HF4
11.4.1 HF9
11.2.1 HF15 | Low | OpenSSL
BIG-IP DNS | None | 12.0.0 | Not vulnerable | None
BIG-IP Edge Gateway
| 11.0.0 - 11.3.0
10.1.0 - 10.2.4 | 11.2.1 HF15 | Low | OpenSSL
BIG-IP GTM | 11.5.1 (HF2 and earlier)
11.0.0 - 11.5.0 (HF3 and earlier)
10.1.0 - 10.2.4 | 11.6.0
11.5.3
11.5.2
11.5.1 HF3
11.5.0 HF4
11.4.1 HF9
11.2.1 HF15 | Low | OpenSSL
BIG-IP Link Controller | 11.5.1 (HF2 and earlier)
11.0.0 - 11.5.0 (HF3 and earlier)
10.1.0 - 10.2.4 | 12.0.0
11.6.0
11.5.3
11.5.2
11.5.1 HF3
11.5.0 HF4
11.4.1 HF9
11.2.1 HF15 | Low | OpenSSL
BIG-IP PEM | 11.5.1 (HF2 and earlier)
11.3.0 - 11.5.0 (HF3 and earlier) | 12.0.0
11.6.0
11.5.3
11.5.2
11.5.1 HF3
11.5.0 HF4
11.4.1 HF9 | Low | OpenSSL
BIG-IP PSM | 11.0.0 - 11.4.1
10.1.0 - 10.2.4 | 11.4.1 HF9
11.2.1 HF15
| Low | OpenSSL
BIG-IP WebAccelerator | 11.0.0 - 11.3.0
10.1.0 - 10.2.4 | 11.2.1 HF15 | Low | OpenSSL
BIG-IP WOM | 11.0.0 - 11.3.0
10.1.0 - 10.2.4 | 11.2.1 HF15 | Low | OpenSSL
ARX | 6.0.0 - 6.4.0 | None | Medium | ARX GUI

Enterprise Manager | 3.0.0 - 3.1.1
2.1.0 - 2.3.0 | None | Low | OpenSSL
FirePass | None | 7.0.0
6.0.0 - 6.1.0 | Not vulnerable
| None

BIG-IQ Cloud | 4.0.0 - 4.5.0 | None | Low | OpenSSL
BIG-IQ Device | 4.2.0 - 4.5.0 | None | Low | OpenSSL
BIG-IQ Security | 4.0.0 - 4.5.0 | None | Low | OpenSSL
BIG-IQ ADC | 4.5.0 | None | Low | OpenSSL
LineRate | None | 2.5.0
2.4.0 - 2.4.2 | Medium | OpenSSL
F5 WebSafe | None | 1.0.0 | Not vulnerable
| None
Traffix SDC | None | 4.0.0 - 4.1.0
3.3.2 - 3.5.1 | Not vulnerable | None
BIG-IP Edge Clients for Android
| None | 2.0.0 - 2.0.6 | Not vulnerable | None
BIG-IP Edge Clients for Apple iOS | None | 2.0.0 - 2.0.4
1.0.5 - 1.0.6 | Not vulnerable | None
BIG-IP Edge Clients for Linux
| None | 6035.x - 7110.x | Not vulnerable | None
BIG-IP Edge Clients for MAC OS X | None | 6035.x - 7110.x | Not vulnerable | None
BIG-IP Edge Clients for Windows | None | 6035.x - 7110.x | Not vulnerable | None
BIG-IP Edge Clients Windows Phone 8.1 | None | 1.0.0.x | Not vulnerable | None
BIG-IP Edge Portal for Android | None | 1.0.0 - 1.0.2 | Not vulnerable | None
BIG-IP Edge Portal for Apple iOS | None | 1.0.0 - 1.0.3 | Not vulnerable | None

Note: As of February 17, 2015, AskF5 Security Advisory articles include the Severity value. Security Advisory articles published before this date do not list a Severity value.

If the previous table lists a version in the Versions known to be not vulnerable column, you can eliminate this vulnerability by upgrading to the listed version. If the listed version is older than the version you are currently running, or if the table does not list any version in the column, then no upgrade candidate currently exists.

F5 responds to vulnerabilities in accordance with the Severity values published in the previous table. The Severity values and other security vulnerability parameters are defined in K4602: Overview of the F5 security vulnerability response policy.

To mitigate this vulnerability, you should only permit access to F5 products over a secure network and limit access to trusted users. For more information, refer to K13092: Overview of securing access to the BIG-IP system.

ARX

To mitigate this vulnerability, you should permit access to the ARX GUI only over a secure network.