F5 Networks BIG-IP : BIG-IP DNS Cache vulnerability (K48224824)

Medium Nessus Plugin ID 118670


The remote device is missing a vendor-supplied security patch.


On F5 BIG-IP 13.0.0, 12.1.0-12.1.2, 11.6.0-, or 11.2.1-11.5.6 a domain name cached within the DNS Cache of TMM may continue to be resolved by the cache even after the parent server revokes the record, if the DNS Cache is receiving a stream of requests for the cached name. (CVE-2018-5532)


The BIG-IP system may continue to serve responses from the DNS Cachefor as long as the system receives requests for the cached name, even though the authoritative nameserver removed the name.


Upgrade to one of the non-vulnerable versions listed in the F5 Solution K48224824.

See Also


Plugin Details

Severity: Medium

ID: 118670

File Name: f5_bigip_SOL48224824.nasl

Version: 1.3

Type: local

Published: 2018/11/02

Updated: 2019/07/17

Dependencies: 76940

Configuration: Enable paranoid mode

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS v3.0

Base Score: 5.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Vulnerability Information

CPE: cpe:/a:f5:big-ip_access_policy_manager, cpe:/a:f5:big-ip_advanced_firewall_manager, cpe:/a:f5:big-ip_application_acceleration_manager, cpe:/a:f5:big-ip_application_security_manager, cpe:/a:f5:big-ip_application_visibility_and_reporting, cpe:/a:f5:big-ip_global_traffic_manager, cpe:/a:f5:big-ip_link_controller, cpe:/a:f5:big-ip_local_traffic_manager, cpe:/a:f5:big-ip_policy_enforcement_manager, cpe:/a:f5:big-ip_webaccelerator, cpe:/h:f5:big-ip

Required KB Items: Host/local_checks_enabled, Host/BIG-IP/hotfix, Host/BIG-IP/modules, Host/BIG-IP/version, Settings/ParanoidReport

Patch Publication Date: 2018/07/18

Vulnerability Publication Date: 2018/07/19

Reference Information

CVE: CVE-2018-5532