F5 Networks BIG-IP : OpenSSL and Intel processor SMT side-channel vulnerability (PortSmash) (K49711130)

medium Nessus Plugin ID 125481
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote device is missing a vendor-supplied security patch.


Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention.'(CVE-2018-5407also known as PortSmash)


The vulnerability allows an attacker who can provideand runbinary code of their choosing on the F5platform to steal secret cryptographic information.

Processes running on hyperthread-enabled cores are subject to a side-channel attack by other processes running on the same core, if their program control flow is impacted by private data. A common case for this behavior is encryption, where the secret key can influence program flow. While high-security contexts typically guard against this known behavior, a flaw in OpenSSL's protection of elliptic curve processing is vulnerable to this class of attack. Other encryption algorithms (RSA) are not affected, so configurations that do not install EC keys are not impacted.

Note : Hyper-threading is Intel's implementation of SMT.


Upgrade to one of the non-vulnerable versions listed in the F5 Solution K49711130.

See Also


Plugin Details

Severity: Medium

ID: 125481

File Name: f5_bigip_SOL49711130.nasl

Version: 1.3

Type: local

Published: 5/29/2019

Updated: 9/25/2019

Dependencies: f5_bigip_detect.nbin

Configuration: Enable paranoid mode

Risk Information


Risk Factor: Medium

Score: 5.1


Risk Factor: Low

Base Score: 1.9

Temporal Score: 1.5

Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N

Temporal Vector: E:POC/RL:OF/RC:C


Risk Factor: Medium

Base Score: 4.7

Temporal Score: 4.2

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:f5:big-ip_access_policy_manager, cpe:/a:f5:big-ip_advanced_firewall_manager, cpe:/a:f5:big-ip_application_acceleration_manager, cpe:/a:f5:big-ip_application_security_manager, cpe:/a:f5:big-ip_application_visibility_and_reporting, cpe:/a:f5:big-ip_global_traffic_manager, cpe:/a:f5:big-ip_link_controller, cpe:/a:f5:big-ip_local_traffic_manager, cpe:/a:f5:big-ip_policy_enforcement_manager, cpe:/a:f5:big-ip_webaccelerator, cpe:/h:f5:big-ip

Required KB Items: Host/local_checks_enabled, Host/BIG-IP/hotfix, Host/BIG-IP/modules, Host/BIG-IP/version, Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/29/2018

Vulnerability Publication Date: 11/15/2018

Reference Information

CVE: CVE-2018-5407