F5 Networks BIG-IP : BIG-IP management vulnerability (K55792317)

high Nessus Plugin ID 100004

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

In F5 BIG-IP 11.2.1, 11.4.0 through 11.6.1, and 12.0.0 through 12.1.2, an unauthenticated user with access to the control plane may be able to delete arbitrary files through an undisclosed mechanism.
(CVE-2016-9250)

Impact

An unauthenticated user with access to the management control plane may be able to delete arbitrary files through an undisclosed mechanism. There is control plane exposure for the web Configuration utility, iControl REST, and iControl SOAP. There is no data plane exposure.

Solution

Upgrade to one of the non-vulnerable versions listed in the F5 Solution K55792317.

See Also

https://support.f5.com/csp/article/K55792317

Plugin Details

Severity: High

ID: 100004

File Name: f5_bigip_SOL55792317.nasl

Version: 3.9

Type: local

Published: 5/8/2017

Updated: 5/9/2019

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:f5:big-ip_access_policy_manager, cpe:/a:f5:big-ip_advanced_firewall_manager, cpe:/a:f5:big-ip_application_acceleration_manager, cpe:/a:f5:big-ip_application_security_manager, cpe:/a:f5:big-ip_application_visibility_and_reporting, cpe:/a:f5:big-ip_global_traffic_manager, cpe:/a:f5:big-ip_link_controller, cpe:/a:f5:big-ip_local_traffic_manager, cpe:/a:f5:big-ip_policy_enforcement_manager, cpe:/a:f5:big-ip_webaccelerator, cpe:/h:f5:big-ip, cpe:/h:f5:big-ip_protocol_security_manager

Required KB Items: Host/local_checks_enabled, Host/BIG-IP/hotfix, Host/BIG-IP/modules, Host/BIG-IP/version, Settings/ParanoidReport

Exploit Ease: No known exploits are available

Patch Publication Date: 5/5/2017

Vulnerability Publication Date: 5/10/2017

Reference Information

CVE: CVE-2016-9250