TMM SSO plugin vulnerability CVE-2016-7467

2017-03-23T02:33:00
ID F5:K95444512
Type f5
Reporter f5
Modified 2017-09-29T19:28:00

Description

F5 Product Development has assigned ID 611469 (BIG-IP) to this vulnerability.

To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table:

Product| Versions known to be vulnerable| Versions known to be not vulnerable| Severity| Vulnerable component or feature
---|---|---|---|---
BIG-IP LTM| None| 12.0.0 - 12.1.1
11.4.0 - 11.6.1
11.2.1
10.2.1 - 10.2.4| Not vulnerable| None
BIG-IP AAM| None| 12.0.0 - 12.1.1
11.4.0 - 11.6.1| Not vulnerable| None
BIG-IP AFM| None| 12.0.0 - 12.1.1
11.4.0 - 11.6.1| Not vulnerable| None
BIG-IP Analytics| None| 12.0.0 - 12.1.1
11.4.0 - 11.6.1
11.2.1| Not vulnerable| None
BIG-IP APM| 12.0.0 - 12.1.1
11.6.0 - 11.6.1 HF1
11.5.4 - 11.5.4 HF2| 12.1.2
11.6.1 HF2
11.5.4 HF3
11.4.0 - 11.5.3
11.2.1
10.2.1 - 10.2.4| High| TMM SSO plugin
(BIG-IP APM configured as IdP)
BIG-IP ASM| None| 12.0.0 - 12.1.1
11.4.0 - 11.6.1
11.2.1
10.2.1 - 10.2.4| Not vulnerable| None
BIG-IP DNS| None| 12.0.0 - 12.1.1| Not vulnerable| None
BIG-IP Edge Gateway| None| 11.2.1
10.2.1 - 10.2.4| Not vulnerable| None
BIG-IP GTM| None| 11.4.0 - 11.6.1
11.2.1
10.2.1 - 10.2.4| Not vulnerable| None
BIG-IP Link Controller| None| 12.0.0 - 12.1.1
11.4.0 - 11.6.1
11.2.1
10.2.1 - 10.2.4| Not vulnerable| None
BIG-IP PEM| None| 12.0.0 - 12.1.1
11.4.0 - 11.6.1| Not vulnerable| None
BIG-IP PSM| None| 11.4.0 - 11.4.1
10.2.1 - 10.2.4| Not vulnerable| None
BIG-IP WebAccelerator| None| 11.2.1
10.2.1 - 10.2.4| Not vulnerable| None
BIG-IP WebSafe| None| 12.0.0 - 12.1.1
11.6.0 - 11.6.1| Not vulnerable| None
ARX| None| 6.2.0 - 6.4.0| Not vulnerable| None
Enterprise Manager| None| 3.1.1| Not vulnerable| None
BIG-IQ Cloud| None| 4.0.0 - 4.5.0| Not vulnerable| None
BIG-IQ Device| None| 4.2.0 - 4.5.0| Not vulnerable| None
BIG-IQ Security| None| 4.0.0 - 4.5.0| Not vulnerable| None
BIG-IQ ADC| None| 4.5.0| Not vulnerable| None
BIG-IQ Centralized Management| None| 5.0.0 - 5.1.0
4.6.0| Not vulnerable| None
BIG-IQ Cloud and Orchestration| None| 1.0.0| Not vulnerable| None
F5 iWorkflow| None| 2.0.0 - 2.0.1| Not vulnerable| None
LineRate| None| 2.5.0 - 2.6.1| Not vulnerable| None
Traffix SDC| None| 5.0.0 - 5.1.0
4.0.0 - 4.4.0| Not vulnerable| None

If you are running a version listed in the Versions known to be vulnerable column, you can eliminate this vulnerability by upgrading to a version listed in the Versions known to be not vulnerable column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.

Mitigation

To mitigate this vulnerability, you can reconfigure the SP connector to remove the signed authentication requests requirement as well as the signing certificate. To do so, perform the following procedure.

Impact of action: If you disable the require signed authentication requests setting and the corresponding signing certificate, you remove the additional security that verifies that the request is coming from the said sender, using the sender's public key.

  1. Log in to the Traffic Management Shell (tmsh) by typing the following command:

tmsh

  1. Disable the require signed authentication requests setting and remove the signing certificate from the SP connector by using the following command syntax:

modify apm sso saml-sp-connector <SP connector name> is-authn-request-signed false sp-certificate none

For example, you would type the following command to disable the require signed authentication requests setting and remove the signing certificate from the mytestsp SP connector:

modify apm sso saml-sp-connector mytestsp is-authn-request-signed false sp-certificate none

  1. Save the changes by typing the following command:

save sys config