F5 BIG-IP 多個漏洞
發佈日期:
2021年08月26日
1695
觀看次數
風險: 中度風險
類型: 操作系統 - Network
於 F5 BIG-IP 發現多個漏洞,遠端攻擊者可利用這些漏洞,於目標系統觸發阻斷服務狀況、彷冒、遠端執行任意程式碼、洩露敏感資料、資料篡改、跨網站指令碼及繞過保安限制。
影響
- 跨網站指令碼
- 阻斷服務
- 遠端執行程式碼
- 繞過保安限制
- 資料洩露
- 仿冒
- 篡改
受影響之系統或技術
BIG-IP Advanced WAF and ASM systems
BIG-IP SSL Profile OCSP
BIG-IP (Guided Configuration)
- 版本 7.0
- 版本 6.0
- 版本 5.0
- 版本 4.1
- 版本 3
BIG-IP (APM)
- 版本 11.6.1 - 11.6.5
- 版本 12.1.0 - 12.1.6
- 版本 13.1.0 - 13.1.4
- 版本 14.1.0 - 14.1.4
- 版本 15.1.0 - 15.1.3
- 版本 16.0.0 - 16.0.1
BIG-IP (all modules)
- 版本 11.6.1 - 11.6.5
- 版本 12.1.0 - 12.1.6
- 版本 13.1.0 - 13.1.4
- 版本 14.1.0 - 14.1.4
- 版本 15.1.0 - 15.1.3
- 版本 16.0.0 - 16.0.1
BIG-IP (LTM, AAM, Advanced WAF, AFM, Analytics, APM, ASM, DDHD, DNS, FPS, GTM, Link Controller, PEM, SSLO)
- 版本 12.1.0 - 12.1.6
- 版本 13.1.0 - 13.1.4
- 版本 14.1.0 - 14.1.4
- 版本 15.1.0 - 15.1.3
- 版本 16.0.0 - 16.0.1
BIG-IP (DNS)
- 版本 12.1.0 - 12.1.6
- 版本 13.1.0 - 13.1.4
- 版本 14.1.0 - 14.1.4
- 版本 15.1.0 - 15.1.3
- 版本 16.0.0 - 16.0.1
BIG-IP AFM
- 版本 12.1.0 - 12.1.6
- 版本 13.1.0 - 13.1.3
- 版本 14.1.0 - 14.1.4
- 版本 15.1.0 - 15.1.2
- 版本 16.0.0 - 16.0.1
BIG-IP (DataSafe)
- 版本 16.0.0 - 16.0.1
BIG-IP (Advanced WAF, ASM)
- 版本 11.6.1 - 11.6.5
- 版本 12.1.0 - 12.1.6
- 版本 13.1.0 - 13.1.4
- 版本 14.1.0 - 14.1.4.1
- 版本 15.1.0 - 15.1.3
- 版本 16.0.0 - 16.0.1
解決方案
在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。
安裝供應商提供的修補程式:
- https://support.f5.com/csp/article/K94255403
- https://support.f5.com/csp/article/K01153535
- https://support.f5.com/csp/article/K45407662
- https://support.f5.com/csp/article/K93231374
- https://support.f5.com/csp/article/K14903688
- https://support.f5.com/csp/article/K35408374
- https://support.f5.com/csp/article/K70652532
- https://support.f5.com/csp/article/K48321015
- https://support.f5.com/csp/article/K79428827
- https://support.f5.com/csp/article/K32734107
- https://support.f5.com/csp/article/K30523121
- https://support.f5.com/csp/article/K19012930
- https://support.f5.com/csp/article/K94941221
- https://support.f5.com/csp/article/K70415522
- https://support.f5.com/csp/article/K05043394
- https://support.f5.com/csp/article/K66782293
- https://support.f5.com/csp/article/K65397301
- https://support.f5.com/csp/article/K53854428
- https://support.f5.com/csp/article/K61643620
- https://support.f5.com/csp/article/K55543151
- https://support.f5.com/csp/article/K42526507
- https://support.f5.com/csp/article/K63163637
- https://support.f5.com/csp/article/K24301698
- https://support.f5.com/csp/article/K21435974
- https://support.f5.com/csp/article/K36942191
- https://support.f5.com/csp/article/K52420610
- https://support.f5.com/csp/article/K30291321
- https://support.f5.com/csp/article/K49549213
- https://support.f5.com/csp/article/K00602225
- https://support.f5.com/csp/article/K44553214
- https://support.f5.com/csp/article/K42051445
- https://support.f5.com/csp/article/K05314769
- https://support.f5.com/csp/article/K41351250
- https://support.f5.com/csp/article/K05391775
- https://support.f5.com/csp/article/K30150004
漏洞識別碼
- CVE-2020-5862
- CVE-2021-23025
- CVE-2021-23026
- CVE-2021-23027
- CVE-2021-23028
- CVE-2021-23029
- CVE-2021-23032
- CVE-2021-23034
- CVE-2021-23035
- CVE-2021-23036
- CVE-2021-23037
- CVE-2021-23038
- CVE-2021-23039
- CVE-2021-23040
- CVE-2021-23041
- CVE-2021-23042
- CVE-2021-23043
- CVE-2021-23044
- CVE-2021-23045
- CVE-2021-23046
- CVE-2021-23047
- CVE-2021-23048
- CVE-2021-23049
- CVE-2021-23050
- CVE-2021-23051
- CVE-2021-23052
- CVE-2021-23053
資料來源
相關連結
- https://www.auscert.org.au/bulletins/ESB-2021.2870
- https://www.auscert.org.au/bulletins/ESB-2021.2869
- https://www.auscert.org.au/bulletins/ESB-2021.2868
- https://www.auscert.org.au/bulletins/ESB-2021.2867
- https://www.auscert.org.au/bulletins/ESB-2021.2866
- https://www.auscert.org.au/bulletins/ESB-2021.2865
- https://www.auscert.org.au/bulletins/ESB-2021.2862
- https://support.f5.com/csp/article/K94255403
- https://support.f5.com/csp/article/K01153535
- https://support.f5.com/csp/article/K45407662
- https://support.f5.com/csp/article/K93231374
- https://support.f5.com/csp/article/K14903688
- https://support.f5.com/csp/article/K35408374
- https://support.f5.com/csp/article/K70652532
- https://support.f5.com/csp/article/K48321015
- https://support.f5.com/csp/article/K79428827
- https://support.f5.com/csp/article/K32734107
- https://support.f5.com/csp/article/K30523121
- https://support.f5.com/csp/article/K19012930
- https://support.f5.com/csp/article/K94941221
- https://support.f5.com/csp/article/K70415522
- https://support.f5.com/csp/article/K05043394
- https://support.f5.com/csp/article/K66782293
- https://support.f5.com/csp/article/K65397301
- https://support.f5.com/csp/article/K53854428
- https://support.f5.com/csp/article/K61643620
- https://support.f5.com/csp/article/K55543151
- https://support.f5.com/csp/article/K42526507
- https://support.f5.com/csp/article/K63163637
- https://support.f5.com/csp/article/K24301698
- https://support.f5.com/csp/article/K21435974
- https://support.f5.com/csp/article/K36942191
- https://support.f5.com/csp/article/K52420610
- https://support.f5.com/csp/article/K30291321
- https://support.f5.com/csp/article/K49549213
- https://support.f5.com/csp/article/K00602225
- https://support.f5.com/csp/article/K44553214
- https://support.f5.com/csp/article/K42051445
- https://support.f5.com/csp/article/K05314769
- https://support.f5.com/csp/article/K41351250
- https://support.f5.com/csp/article/K05391775
- https://support.f5.com/csp/article/K30150004
分享至