F5 TLS Session Ticket Implementation Remote Memory Disclosure (Ticketbleed) (uncredentialed check)
Medium Nessus Plugin ID 97191
SynopsisThe remote device is affected by an information disclosure vulnerability.
DescriptionBased on its response to a resumed TLS connection, the remote service appears to be affected by an information disclosure vulnerability, known as Ticketbeed, in the TLS Session Ticket implementation. The issue is due to the server incorrectly echoing back 32 bytes of memory, even if the Session ID was shorter. A remote attacker can exploit this vulnerability, by providing a 1-byte Session ID, to disclose up to 31 bytes of uninitialized memory which may contain sensitive information such as private keys, passwords, and other sensitive data.
Note that this vulnerability is only exploitable if the non-default Session Tickets option enabled.
SolutionUpgrade to a fixed version according to the vendor advisory (K05121675). Alternatively, disable the Session Ticket option on the affected Client SSL profile.