F5 Networks BIG-IP : TMM vulnerability (K72442354)

High Nessus Plugin ID 118695

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

Undisclosed traffic patterns may lead to denial of service conditions for the BIG-IP system. The configuration which exposes this condition is the BIG-IP self IP address which is part of a VLAN group and has the Port Lockdown setting configured with anything other than 'allow-all'. (CVE-2018-15320)

Impact

BIG-IP

The data plane of the BIG-IP virtual serversand the management addressare not affected. The BIG-IP self IP address that has the Port Lockdown setting configured with anything other than allow-all is affected by this vulnerability.

BIG-IQ / iWorkflow / Enterprise Manager / Traffix SDC

There is no impact on these F5 products; they are not affected by this vulnerability.

Solution

Upgrade to one of the non-vulnerable versions listed in the F5 Solution K72442354.

See Also

https://support.f5.com/csp/#/article/K72442354

Plugin Details

Severity: High

ID: 118695

File Name: f5_bigip_SOL72442354.nasl

Version: 1.1

Type: local

Published: 2018/11/02

Modified: 2018/11/02

Dependencies: 76940

Risk Information

Risk Factor: High

Vulnerability Information

CPE: cpe:/a:f5:big-ip_access_policy_manager, cpe:/a:f5:big-ip_advanced_firewall_manager, cpe:/a:f5:big-ip_application_acceleration_manager, cpe:/a:f5:big-ip_application_security_manager, cpe:/a:f5:big-ip_application_visibility_and_reporting, cpe:/a:f5:big-ip_global_traffic_manager, cpe:/a:f5:big-ip_link_controller, cpe:/a:f5:big-ip_local_traffic_manager, cpe:/a:f5:big-ip_policy_enforcement_manager, cpe:/a:f5:big-ip_webaccelerator, cpe:/h:f5:big-ip

Required KB Items: Host/local_checks_enabled, Host/BIG-IP/hotfix, Host/BIG-IP/modules, Host/BIG-IP/version, Settings/ParanoidReport

Patch Publication Date: 2018/10/30

Reference Information

CVE: CVE-2018-15320