TMM SSL/TLS profile vulnerability CVE-2017-6141

2017-07-13T06:39:00
ID F5:K21154730
Type f5
Reporter f5
Modified 2017-07-18T22:51:00

Description

F5 Product Development has assigned ID 620400 (BIG-IP) to this vulnerability. Additionally, BIG-IP iHealth may list Heuristic H21154730 on the Diagnostics > Identified > High screen.

To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table:

Product| Versions known to be vulnerable| Versions known to be not vulnerable| Severity| Vulnerable component or feature
---|---|---|---|---
BIG-IP LTM| 12.1.0 - 12.1.2| 13.0.0
12.1.2 HF1
12.0.0
11.4.0 - 11.6.1
11.2.1| High| Client SSL profile with the Session Ticket option enabled
BIG-IP AAM| 12.1.0 - 12.1.2| 13.0.0
12.1.2 HF1
12.0.0
11.4.0 - 11.6.1| High| Client SSL profile with the Session Ticket option enabled
BIG-IP AFM| 12.1.0 - 12.1.2| 13.0.0
12.1.2 HF1
12.0.0
11.4.0 - 11.6.1| High| Client SSL profile with the Session Ticket option enabled
BIG-IP Analytics| None| 13.0.0
12.0.0 - 12.1.2
11.4.0 - 11.6.1
11.2.1| Not vulnerable| None
BIG-IP APM| 12.1.0 - 12.1.2| 13.0.0
12.1.2 HF1
12.0.0
11.4.0 - 11.6.1
11.2.1| High| Client SSL profile with the Session Ticket option enabled
BIG-IP ASM| 12.1.0 - 12.1.2| 13.0.0
12.1.2 HF1
12.0.0
11.4.0 - 11.6.1
11.2.1| High| Client SSL profile with the Session Ticket option enabled
BIG-IP DNS| None| 13.0.0
12.0.0 - 12.1.2| Not vulnerable| None
BIG-IP Edge Gateway| None| 11.2.1| Not vulnerable| None
BIG-IP GTM| None| 11.4.0 - 11.6.1
11.2.1| Not vulnerable| None
BIG-IP Link Controller| 12.1.0 - 12.1.2| 13.0.0
12.1.2 HF1
12.0.0
11.4.0 - 11.6.1
11.2.1| High| Client SSL profile with the Session Ticket option enabled
BIG-IP PEM| 12.1.0 - 12.1.2| 13.0.0
12.1.2 HF1
12.0.0
11.4.0 - 11.6.1| High| Client SSL profile with the Session Ticket option enabled
BIG-IP PSM| None| 11.4.0 - 11.4.1| Not vulnerable| None
BIG-IP WebAccelerator| None| 11.2.1| Not vulnerable| None
BIG-IP WebSafe| 12.1.0 - 12.1.2| 13.0.0
12.1.2 HF1
12.0.0
11.6.0 - 11.6.1| High| Client SSL profile with the Session Ticket option enabled
ARX| None| 6.2.0 - 6.4.0| Not vulnerable| None
Enterprise Manager| None| 3.1.1| Not vulnerable| None
BIG-IQ Cloud| None| 4.4.0 - 4.5.0| Not vulnerable| None
BIG-IQ Device| None| 4.4.0 - 4.5.0| Not vulnerable| None
BIG-IQ Security| None| 4.4.0 - 4.5.0| Not vulnerable| None
BIG-IQ ADC| None| 4.5.0| Not vulnerable| None
BIG-IQ Centralized Management| None| 5.0.0 - 5.2.0
4.6.0| Not vulnerable| None
BIG-IQ Cloud and Orchestration| None| 1.0.0| Not vulnerable| None
F5 iWorkflow| None| 2.0.0 - 2.2.0| Not vulnerable| None
LineRate| None| 2.5.0 - 2.6.2| Not vulnerable| None
Traffix SDC| None| 5.0.0 - 5.1.0
4.0.0 - 4.4.0| Not vulnerable| None

If you are running a version listed in the Versions known to be vulnerable column, you can eliminate this vulnerability by upgrading to a version listed in the Versions known to be not vulnerable column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.

Mitigation

There is no mitigation. To determine if you have the Session Ticket option enabled in a Client SSL profile, perform one of the following procedures:

Using the Configuration utility to determine whether the Session Ticket option is enabled

Impact of action: Performing the following procedure should not have a negative impact on your system.

  1. Log in to the Configuration utility.
  2. Navigate to Local Traffic > Profiles > SSL > Client.
  3. Click the Name of your Client SSL profile.
  4. From the Configuration menu, select Advanced.
  5. In the Configuration section, locate the Session Ticket option.

The option is enabled when the box is checked.

Using tmsh to determine whether the Session Ticket option is enabled

Impact of action: Performing the following procedure should not have a negative impact on your system.

  1. Log in to the TMOS Shell (tmsh) by typing the following command:

tmsh

  1. Determine whether the Session Ticket option is enabled using the following command syntax:

list /ltm profile client-ssl <profile name> session-ticket

For example, determine the Session Ticket option setting for a profile named my_client_ssl, by typing the following command:

list /ltm profile client-ssl my_client_ssl session-ticket

If the option is enabled, the output will appear similar to the following example:

ltm profile client-ssl my_client_ssl {
session-ticket enabled
}