F5 Networks BIG-IP : BIG-IP VIPRION MCPD vulnerability (K00103216)

high Nessus Plugin ID 139813

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

SYN flood causes a large number of MCPD context messages destined to secondary blades consuming memory and leading to MCPD failure.
(CVE-2020-5921)

Impact

This issue affects only VIPRION hosts with two or more blades installed, including those with Virtual Clustered Multiprocessing (vCMP) provisioned. vCMP guests are also affected when running on VIPRION hosts with two or more blades installed. Single-blade VIPRION hosts are not affected.

The mcpd process progressively consumes excessive memory, leading to slow response times, and eventually the mcpd process will fail. If another BIG-IP system is configured in ahigh availability (HA) group, a failover occurs.

Solution

Upgrade to one of the non-vulnerable versions listed in the F5 Solution K00103216.

See Also

https://my.f5.com/manage/s/article/K00103216

Plugin Details

Severity: High

ID: 139813

File Name: f5_bigip_SOL00103216.nasl

Version: 1.10

Type: local

Published: 8/26/2020

Updated: 11/2/2023

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS Score Source: CVE-2020-5921

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:f5:big-ip_access_policy_manager, cpe:/a:f5:big-ip_advanced_firewall_manager, cpe:/a:f5:big-ip_application_acceleration_manager, cpe:/a:f5:big-ip_application_security_manager, cpe:/a:f5:big-ip_application_visibility_and_reporting, cpe:/a:f5:big-ip_domain_name_system, cpe:/a:f5:big-ip_global_traffic_manager, cpe:/a:f5:big-ip_link_controller, cpe:/a:f5:big-ip_local_traffic_manager, cpe:/a:f5:big-ip_policy_enforcement_manager, cpe:/h:f5:big-ip

Required KB Items: Host/local_checks_enabled, Settings/ParanoidReport, Host/BIG-IP/hotfix, Host/BIG-IP/modules, Host/BIG-IP/version

Exploit Ease: No known exploits are available

Patch Publication Date: 8/25/2020

Vulnerability Publication Date: 8/26/2020

Reference Information

CVE: CVE-2020-5921

IAVA: 2020-A-0395-S