7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.005 Low
EPSS
Percentile
74.8%
Vulnerability Recommended Actions
If you are running a version listed in the Versions known to be vulnerable column, you can eliminate this vulnerability by upgrading to a version listed in theVersions known to be not vulnerable column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.
To determine the necessary upgrade path for your BIG-IQ system, you should understand the BIG-IQ product offering name changes. For more information, refer to SOL21232150: Considerations for upgrading BIG-IQ or F5 iWorkflow systems.
Mitigation
The following mitigation options are available for the BIG-IP system:
SSL profiles
You can mitigate this issue for the SSL profiles by disabling 3DES (DES-CBC3) ciphers for the affected profile. For information about configuring the cipher strength for the SSL profiles, refer to SOL17370: Configuring the cipher strength for SSL profiles (12.x).
Alternatively, if disabling 3DES ciphers is not possible, you can modify the SSL profile and set the Renegotiation Size setting to 1 GB. To do so, perform the following procedure:
tmsh
modify /ltm profile client-ssl <profile_name> renegotiate-size 1000
For example, the following command changes the renegotiation size to 1 GB for the SSL profile named MyClientSSL:
modify /ltm profile client-ssl MyClientSSL renegotiate-size 1000
save /sys config
Authentication profiles (tamd)
To mitigate this issue, disable 3DES on the server side to prevent negotiation of the vulnerable cipher.
Configuration utility
To mitigate this vulnerability for the BIG-IP Configuration utility, you should permit management access to F5 products only over a secure network. For more information, refer to SOL13092: Overview of securing access to the BIG-IP system.
BIG-IP APM - Oracle Access Manager
To mitigate this vulnerability for the Oracle Access Manager (OAM), you should monitor traffic patterns between BIG-IP system and back-end Oracle Access Manager systems for traffic anomalies, or force rekeying on an appropriate interval on their application server.
Supplemental Information
support.f5.com/kb/en-us/solutions/public/0000/100/sol167.html
support.f5.com/kb/en-us/solutions/public/10000/000/sol10025.html
support.f5.com/kb/en-us/solutions/public/10000/300/sol10322.html
support.f5.com/kb/en-us/solutions/public/12000/700/sol12766.html
support.f5.com/kb/en-us/solutions/public/13000/100/sol13123.html
support.f5.com/kb/en-us/solutions/public/15000/100/sol15106.html
support.f5.com/kb/en-us/solutions/public/15000/100/sol15113.html
support.f5.com/kb/en-us/solutions/public/4000/600/sol4602.html
support.f5.com/kb/en-us/solutions/public/4000/900/sol4918.html
support.f5.com/kb/en-us/solutions/public/9000/500/sol9502.html
support.f5.com/kb/en-us/solutions/public/9000/900/sol9957.html
support.f5.com/kb/en-us/solutions/public/9000/900/sol9970.html
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.005 Low
EPSS
Percentile
74.8%