F5 Networks BIG-IP : TMM vulnerability (K95117754)

high Nessus Plugin ID 132582

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

Under certain conditions, a multi-bladed BIG-IP Virtual Clustered Multiprocessing (vCMP) may drop broadcast packets when they are rebroadcast to the vCMP guest secondary blades. An attacker can leverage the fragmented broadcast IP packets to perform any type of fragmentation-based attack. (CVE-2019-6684)

Impact

A remote attacker may cause the Traffic Management Microkernel (TMM) to restart using maliciously constructed broadcast IP fragments.This issue occurs on multi-blade chassis, including multi-blade vCMP guests. This issue does not occur on single-bladed systems, on BIG-IP Virtual Edition (VE), or on single-bladed vCMP guests.

Solution

Upgrade to one of the non-vulnerable versions listed in the F5 Solution K95117754.

See Also

https://my.f5.com/manage/s/article/K95117754

Plugin Details

Severity: High

ID: 132582

File Name: f5_bigip_SOL95117754.nasl

Version: 1.8

Type: local

Published: 12/31/2019

Updated: 11/3/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS Score Source: CVE-2019-6684

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:f5:big-ip_access_policy_manager, cpe:/a:f5:big-ip_advanced_firewall_manager, cpe:/a:f5:big-ip_application_acceleration_manager, cpe:/a:f5:big-ip_application_security_manager, cpe:/a:f5:big-ip_application_visibility_and_reporting, cpe:/a:f5:big-ip_domain_name_system, cpe:/a:f5:big-ip_global_traffic_manager, cpe:/a:f5:big-ip_link_controller, cpe:/a:f5:big-ip_local_traffic_manager, cpe:/a:f5:big-ip_policy_enforcement_manager, cpe:/h:f5:big-ip

Required KB Items: Host/local_checks_enabled, Host/BIG-IP/hotfix, Host/BIG-IP/modules, Host/BIG-IP/version

Exploit Ease: No known exploits are available

Patch Publication Date: 12/20/2019

Vulnerability Publication Date: 12/23/2019

Reference Information

CVE: CVE-2019-6684