F5 BIG-IP Multiple Vulnerabilities
RISK: Medium Risk
TYPE: Operating Systems - Networks OS
Multiple vulnerabilities were identified in F5 BIG-IP, a remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, spoofing, remote code execution, sensitive information disclosure, data manipulation, cross-site scripting and security restriction bypass on the targeted system.
Impact
- Cross-Site Scripting
- Denial of Service
- Remote Code Execution
- Security Restriction Bypass
- Information Disclosure
- Spoofing
- Data Manipulation
System / Technologies affected
BIG-IP Advanced WAF and ASM systems
BIG-IP SSL Profile OCSP
BIG-IP (Guided Configuration)
- version 7.0
- version 6.0
- version 5.0
- version 4.1
- version 3
BIG-IP (APM)
- version 11.6.1 - 11.6.5
- version 12.1.0 - 12.1.6
- version 13.1.0 - 13.1.4
- version 14.1.0 - 14.1.4
- version 15.1.0 - 15.1.3
- version 16.0.0 - 16.0.1
BIG-IP (all modules)
- version 11.6.1 - 11.6.5
- version 12.1.0 - 12.1.6
- version 13.1.0 - 13.1.4
- version 14.1.0 - 14.1.4
- version 15.1.0 - 15.1.3
- version 16.0.0 - 16.0.1
BIG-IP (LTM, AAM, Advanced WAF, AFM, Analytics, APM, ASM, DDHD, DNS, FPS, GTM, Link Controller, PEM, SSLO)
- version 12.1.0 - 12.1.6
- version 13.1.0 - 13.1.4
- version 14.1.0 - 14.1.4
- version 15.1.0 - 15.1.3
- version 16.0.0 - 16.0.1
BIG-IP (DNS)
- version 12.1.0 - 12.1.6
- version 13.1.0 - 13.1.4
- version 14.1.0 - 14.1.4
- version 15.1.0 - 15.1.3
- version 16.0.0 - 16.0.1
BIG-IP AFM
- version 12.1.0 - 12.1.6
- version 13.1.0 - 13.1.3
- version 14.1.0 - 14.1.4
- version 15.1.0 - 15.1.2
- version 16.0.0 - 16.0.1
BIG-IP (DataSafe)
- version 16.0.0 - 16.0.1
BIG-IP (Advanced WAF, ASM)
- version 11.6.1 - 11.6.5
- version 12.1.0 - 12.1.6
- version 13.1.0 - 13.1.4
- version 14.1.0 - 14.1.4.1
- version 15.1.0 - 15.1.3
- version 16.0.0 - 16.0.1
Solutions
Before installation of the software, please visit the vendor web-site for more details.
Apply fixes issued by the vendor:
- https://support.f5.com/csp/article/K94255403
- https://support.f5.com/csp/article/K01153535
- https://support.f5.com/csp/article/K45407662
- https://support.f5.com/csp/article/K93231374
- https://support.f5.com/csp/article/K14903688
- https://support.f5.com/csp/article/K35408374
- https://support.f5.com/csp/article/K70652532
- https://support.f5.com/csp/article/K48321015
- https://support.f5.com/csp/article/K79428827
- https://support.f5.com/csp/article/K32734107
- https://support.f5.com/csp/article/K30523121
- https://support.f5.com/csp/article/K19012930
- https://support.f5.com/csp/article/K94941221
- https://support.f5.com/csp/article/K70415522
- https://support.f5.com/csp/article/K05043394
- https://support.f5.com/csp/article/K66782293
- https://support.f5.com/csp/article/K65397301
- https://support.f5.com/csp/article/K53854428
- https://support.f5.com/csp/article/K61643620
- https://support.f5.com/csp/article/K55543151
- https://support.f5.com/csp/article/K42526507
- https://support.f5.com/csp/article/K63163637
- https://support.f5.com/csp/article/K24301698
- https://support.f5.com/csp/article/K21435974
- https://support.f5.com/csp/article/K36942191
- https://support.f5.com/csp/article/K52420610
- https://support.f5.com/csp/article/K30291321
- https://support.f5.com/csp/article/K49549213
- https://support.f5.com/csp/article/K00602225
- https://support.f5.com/csp/article/K44553214
- https://support.f5.com/csp/article/K42051445
- https://support.f5.com/csp/article/K05314769
- https://support.f5.com/csp/article/K41351250
- https://support.f5.com/csp/article/K05391775
- https://support.f5.com/csp/article/K30150004
Vulnerability Identifier
- CVE-2020-5862
- CVE-2021-23025
- CVE-2021-23026
- CVE-2021-23027
- CVE-2021-23028
- CVE-2021-23029
- CVE-2021-23032
- CVE-2021-23034
- CVE-2021-23035
- CVE-2021-23036
- CVE-2021-23037
- CVE-2021-23038
- CVE-2021-23039
- CVE-2021-23040
- CVE-2021-23041
- CVE-2021-23042
- CVE-2021-23043
- CVE-2021-23044
- CVE-2021-23045
- CVE-2021-23046
- CVE-2021-23047
- CVE-2021-23048
- CVE-2021-23049
- CVE-2021-23050
- CVE-2021-23051
- CVE-2021-23052
- CVE-2021-23053
Source
Related Link
- https://www.auscert.org.au/bulletins/ESB-2021.2870
- https://www.auscert.org.au/bulletins/ESB-2021.2869
- https://www.auscert.org.au/bulletins/ESB-2021.2868
- https://www.auscert.org.au/bulletins/ESB-2021.2867
- https://www.auscert.org.au/bulletins/ESB-2021.2866
- https://www.auscert.org.au/bulletins/ESB-2021.2865
- https://www.auscert.org.au/bulletins/ESB-2021.2862
- https://support.f5.com/csp/article/K94255403
- https://support.f5.com/csp/article/K01153535
- https://support.f5.com/csp/article/K45407662
- https://support.f5.com/csp/article/K93231374
- https://support.f5.com/csp/article/K14903688
- https://support.f5.com/csp/article/K35408374
- https://support.f5.com/csp/article/K70652532
- https://support.f5.com/csp/article/K48321015
- https://support.f5.com/csp/article/K79428827
- https://support.f5.com/csp/article/K32734107
- https://support.f5.com/csp/article/K30523121
- https://support.f5.com/csp/article/K19012930
- https://support.f5.com/csp/article/K94941221
- https://support.f5.com/csp/article/K70415522
- https://support.f5.com/csp/article/K05043394
- https://support.f5.com/csp/article/K66782293
- https://support.f5.com/csp/article/K65397301
- https://support.f5.com/csp/article/K53854428
- https://support.f5.com/csp/article/K61643620
- https://support.f5.com/csp/article/K55543151
- https://support.f5.com/csp/article/K42526507
- https://support.f5.com/csp/article/K63163637
- https://support.f5.com/csp/article/K24301698
- https://support.f5.com/csp/article/K21435974
- https://support.f5.com/csp/article/K36942191
- https://support.f5.com/csp/article/K52420610
- https://support.f5.com/csp/article/K30291321
- https://support.f5.com/csp/article/K49549213
- https://support.f5.com/csp/article/K00602225
- https://support.f5.com/csp/article/K44553214
- https://support.f5.com/csp/article/K42051445
- https://support.f5.com/csp/article/K05314769
- https://support.f5.com/csp/article/K41351250
- https://support.f5.com/csp/article/K05391775
- https://support.f5.com/csp/article/K30150004
Related Tags
Share with