F5 Networks BIG-IP : TMM SSO plugin vulnerability (K95444512)

medium Nessus Plugin ID 97902

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

The TMM SSO plugin in F5 BIG-IP APM 12.0.0 - 12.1.1, 11.6.0 - 11.6.1 HF1, 11.5.4 - 11.5.4 HF2, when configured as a SAML Identity Provider with a Service Provider (SP) connector, might allow traffic to be disrupted or failover initiated when a malformed, signed SAML authentication request from an authenticated user is sent via the SP connector. (CVE-2016-7467)

This vulnerability affects BIG-IP APM systems that have the following configuration :

The BIG-IP APM system is configured as a Security Assertion Markup Language (SAML) Identity Provider (IdP) with a Service Provider (SP) connector.

The BIG-IP APM system is configured to require a signed authentication request as a SAML IdP.

The attached SP connector has a signing certificate configured.

Impact

When the system is exploited, traffic is temporarily disrupted while services restart.

Solution

Upgrade to one of the non-vulnerable versions listed in the F5 Solution K95444512.

See Also

https://support.f5.com/csp/article/K95444512

Plugin Details

Severity: Medium

ID: 97902

File Name: f5_bigip_SOL95444512.nasl

Version: 3.8

Type: local

Published: 3/23/2017

Updated: 1/4/2019

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Low

Base Score: 3.5

Temporal Score: 2.6

Vector: CVSS2#AV:N/AC:M/Au:S/C:N/I:N/A:P

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 4.6

Vector: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:f5:big-ip_access_policy_manager, cpe:/h:f5:big-ip

Required KB Items: Host/local_checks_enabled, Settings/ParanoidReport, Host/BIG-IP/hotfix, Host/BIG-IP/modules, Host/BIG-IP/version

Exploit Ease: No known exploits are available

Patch Publication Date: 3/22/2017

Reference Information

CVE: CVE-2016-7467