7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.8 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
0.97 High
EPSS
Percentile
99.7%
Vulnerability Recommended Actions
If you are running a version listed in the Versions known to be vulnerable column, you can eliminate this vulnerability by upgrading to a version listed in theVersions known to be not vulnerable column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.
To determine the necessary upgrade path for your BIG-IQ system, you should understand the BIG-IQ product offering name changes. For more information, refer to SOL21232150: Considerations for upgrading BIG-IQ or F5 iWorkflow systems.
Mitigation
BIG-IP
To mitigate this vulnerability, you can use the DNS Caching and DNS Express features instead of BIND. In addition, to mitigate the issue on the management IP address, restrict access to that IP address to trusted hosts only.
To mitigate the issue on the self IP address, do not allow port 53 on the self IP address. If your self IP address is configured to use the default allow, you can remove that port from the list of the default allowed services.
Ensuring that TCP/UDP port 53 is not allowed as a default service (allow-service default)
tmsh
list net self-allow
The command output appears similar to the following example:
net self-allow {
defaults {
ospf:any
tcp:domain
tcp:f5-iquery
tcp:https
tcp:snmp
tcp:ssh
udp:520
udp:cap
udp:domain
udp:f5-iquery
udp:snmp
}
}
modify net self-allow defaults delete { tcp:domain udp:domain }
save sys config
Disabling the Use BIND Server on BIG-IP option on the DNS profile
To mitigate the issue on the DNS profile, you can disable the Use BIND Server on BIG-IP option by performing the following procedure:
BIG-IP GTM/Link Controller
Verifying whether you have configured any listener addresses to share a self IP (BIG-IP GTM/Link Controller)
Listener addresses that share a self IP address will expose the system to this vulnerability. To verify whether you have configured a listener address to share a self IP, run the following commands:
If you have configured a listener address to share a self IP, you should reconfigure the address to use a unique IP address.
Choosing a load balancing method other than Return to DNS for the GTM pool (BIG-IP GTM)
Important: If DNS Express is not configured, BIG-IP GTM or Link Controller systems will respond toA,AAAA, andCNAMEtype DNS record queries only. Queries for other types of records, such asNSorMX, will fail.
To mitigate the issue on the GTM pool, you can use a load balancing method other than Return to DNS by performing the following procedure:
BIG-IQ, Enterprise Manager or iWorkflow systems
To mitigate this vulnerability for the BIG-IQ system, the Enterprise Manager system, or the F5 iWorkflow system, you should not configure any of these systems to function as a DNS server.
Impact of action: Performing the suggested mitigation should not have a negative impact on your system.
Supplemental Information
support.f5.com/kb/en-us/solutions/public/0000/100/sol167.html
support.f5.com/kb/en-us/solutions/public/17000/300/sol17329.html
support.f5.com/kb/en-us/solutions/public/4000/600/sol4602.html
support.f5.com/kb/en-us/solutions/public/4000/900/sol4918.html
support.f5.com/kb/en-us/solutions/public/9000/900/sol9957.html
support.f5.com/kb/en-us/solutions/public/9000/900/sol9970.html
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.8 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
0.97 High
EPSS
Percentile
99.7%