Lucene search

K
f5F5F5:K47662005
HistoryMay 04, 2022 - 12:00 a.m.

K47662005 : BIG-IP Net HSM script vulnerability CVE-2022-28859

2022-05-0400:00:00
my.f5.com
16

6.8 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.6%

When installing Net HSM, the scripts (nethsm-safenet-install.sh and nethsm-thales-install.sh) expose the Net HSM partition password. (CVE-2022-28859)

Impact

This vulnerability may allow an authenticated attacker with network access to the Net HSM to use or delete private keys by accessing a password-protected partition that is normally inaccessible.

F5 Product Development has assigned ID 919249 (BIG-IP) to this vulnerability. This issue has been classified as CWE-532: Insertion of Sensitive Information into Log File.

To determine if your product and version have been evaluated for this vulnerability, refer to the Applies to (see versions) box. To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases, point releases, or hotfixes that address the vulnerability, refer to the following table. For more information about security advisory versioning, refer to K51812227: Understanding security advisory versioning.

Note: After a fix is introduced for a given minor branch, that fix applies to all subsequent maintenance and point releases for that branch, and no additional fixes for that branch will be listed in the table. For example, when a fix is introduced in 14.1.2.3, the fix also applies to 14.1.2.4, and all later 14.1.x releases (14.1.3.x., 14.1.4.x). For more information, refer to K51812227: Understanding security advisory versioning. Additionally, software versions preceding those listed in theApplies to (see versions)box of this article have reached the End of Technical Support (EoTS) phase of their lifecycle and are no longer evaluated for security issues. For more information, refer to theSecurity hotfixes section of K4602: Overview of the F5 security vulnerability response policy.

Product Branch Versions known to be vulnerable Fixes introduced in Severity CVSSv3 score1 Vulnerable component or feature
BIG-IP (all modules) 17.x None 17.0.0 Medium 6.5 nethsm-safenet-install.sh and**nethsm-thales-install.sh** scripts
16.x 16.0.0 - 16.0.1 16.1.0
15.x 15.1.0 - 15.1.5 15.1.5.1
14.x 14.1.0 - 14.1.4 14.1.4.6
13.x None Not applicable
12.x None Not applicable
11.x None Not applicable
BIG-IQ Centralized Management 8.x None Not applicable Not vulnerable None None
7.x None Not applicable
F5OS-A 1.x None Not applicable Not vulnerable None None
F5OS-C 1.x None Not applicable Not vulnerable None None
Traffix SDC 5.x None Not applicable Not vulnerable None None

1F5 evaluates only software versions that have not yet reached the End of Technical Support (EoTS) phase of their lifecycle.

2The CVSSv3 score link takes you to a resource outside of AskF5, and it is possible that the document may be removed without our knowledge.

If you are running a version listed in the Versions known to be vulnerable column, you can eliminate this vulnerability by upgrading to a version listed in theFixes introduced in column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.

Mitigation

To mitigate this vulnerability, you can reset the Net HSM partition password that was exposed by the nethsm-safenet-install.sh or**nethsm-thales-install.sh** scripts. To do so, perform the procedure in K16350062: Changing the SafeNet HSM partition password.

6.8 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.6%