F5 Networks BIG-IP : BIG-IP APM Edge Client vulnerability (K97733133)

low Nessus Plugin ID 138068

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

When a user connects to a VPN using BIG-IP Edge Client over an unsecure network, BIG-IP Edge Client responds to authentication requests over HTTP while sending probes for captive portal detection.
(CVE-2020-5893)

Impact

An attacker can use a man-in-the-middle (MITM) attack by deploying a maliciouscaptive portal to exploit this vulnerability to obtain the encryptedNT Lan Manager (NTLM) challenge response. This can be used to carry out brute force dictionary attacks or NTLM relay attacks if the attacker has access to the Active Directory network.

Solution

Upgrade to one of the non-vulnerable versions listed in the F5 Solution K97733133.

See Also

https://my.f5.com/manage/s/article/K97733133

Plugin Details

Severity: Low

ID: 138068

File Name: f5_bigip_SOL97733133.nasl

Version: 1.6

Type: local

Published: 7/2/2020

Updated: 11/3/2023

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 1.4

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2020-5893

CVSS v3

Risk Factor: Low

Base Score: 3.7

Temporal Score: 3.2

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:f5:big-ip_access_policy_manager, cpe:/h:f5:big-ip

Required KB Items: Host/local_checks_enabled, Settings/ParanoidReport, Host/BIG-IP/hotfix, Host/BIG-IP/modules, Host/BIG-IP/version

Exploit Ease: No known exploits are available

Patch Publication Date: 4/29/2020

Vulnerability Publication Date: 4/30/2020

Reference Information

CVE: CVE-2020-5893