mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 09:41:31 +00:00
295 lines
12 KiB
JSON
295 lines
12 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2021-22981",
|
||
|
"sourceIdentifier": "f5sirt@f5.com",
|
||
|
"published": "2021-02-12T18:15:12.797",
|
||
|
"lastModified": "2021-02-19T17:14:08.280",
|
||
|
"vulnStatus": "Analyzed",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "On all versions of BIG-IP 12.1.x and 11.6.x, the original TLS protocol includes a weakness in the master secret negotiation that is mitigated by the Extended Master Secret (EMS) extension defined in RFC 7627. TLS connections that do not use EMS are vulnerable to man-in-the-middle attacks during renegotiation. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated."
|
||
|
},
|
||
|
{
|
||
|
"lang": "es",
|
||
|
"value": "En todas las versiones de BIG-IP 12.1.x y 11.6.x, el protocolo TLS original incluye una debilidad en la negociaci\u00f3n del secreto maestro que es mitigada por la extensi\u00f3n Extended Master Secret (EMS) definida en RFC 7627. Las conexiones TLS que no utilizan EMS son vulnerables a ataques man-in-the-middle durante la renegociaci\u00f3n. Nota: No son evaluadas las versiones de software que han alcanzado End of Software Development (EoSD)"
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV31": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "3.1",
|
||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||
|
"attackVector": "NETWORK",
|
||
|
"attackComplexity": "HIGH",
|
||
|
"privilegesRequired": "NONE",
|
||
|
"userInteraction": "NONE",
|
||
|
"scope": "UNCHANGED",
|
||
|
"confidentialityImpact": "LOW",
|
||
|
"integrityImpact": "LOW",
|
||
|
"availabilityImpact": "NONE",
|
||
|
"baseScore": 4.8,
|
||
|
"baseSeverity": "MEDIUM"
|
||
|
},
|
||
|
"exploitabilityScore": 2.2,
|
||
|
"impactScore": 2.5
|
||
|
}
|
||
|
],
|
||
|
"cvssMetricV2": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "2.0",
|
||
|
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
|
||
|
"accessVector": "NETWORK",
|
||
|
"accessComplexity": "MEDIUM",
|
||
|
"authentication": "NONE",
|
||
|
"confidentialityImpact": "PARTIAL",
|
||
|
"integrityImpact": "PARTIAL",
|
||
|
"availabilityImpact": "NONE",
|
||
|
"baseScore": 5.8
|
||
|
},
|
||
|
"baseSeverity": "MEDIUM",
|
||
|
"exploitabilityScore": 8.6,
|
||
|
"impactScore": 4.9,
|
||
|
"acInsufInfo": false,
|
||
|
"obtainAllPrivilege": false,
|
||
|
"obtainUserPrivilege": false,
|
||
|
"obtainOtherPrivilege": false,
|
||
|
"userInteractionRequired": false
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "NVD-CWE-noinfo"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"configurations": [
|
||
|
{
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "11.6.1",
|
||
|
"versionEndIncluding": "11.6.5",
|
||
|
"matchCriteriaId": "2FBA9552-4645-4BFF-91A4-47B6A3414325"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "12.1.0",
|
||
|
"versionEndIncluding": "12.1.5",
|
||
|
"matchCriteriaId": "6C3B5688-0235-4D4F-A26C-440FF24A1B43"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "11.6.1",
|
||
|
"versionEndIncluding": "11.6.5",
|
||
|
"matchCriteriaId": "61D1B91F-8672-4947-AF9A-F635679D0FB7"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "12.1.0",
|
||
|
"versionEndIncluding": "12.1.5",
|
||
|
"matchCriteriaId": "151ED6D1-AA85-4213-8F3A-8167CBEC4721"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "11.6.1",
|
||
|
"versionEndIncluding": "11.6.5",
|
||
|
"matchCriteriaId": "D8A02AA8-E1CA-487B-AAF3-9AD3206D417E"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "12.1.0",
|
||
|
"versionEndIncluding": "12.1.5",
|
||
|
"matchCriteriaId": "322AA283-E494-45E0-975E-2725E2FCC2DE"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "11.6.1",
|
||
|
"versionEndIncluding": "11.6.5",
|
||
|
"matchCriteriaId": "C3787453-ECE9-4958-8FD8-8A43A9F86077"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "12.1.0",
|
||
|
"versionEndIncluding": "12.1.5",
|
||
|
"matchCriteriaId": "5D5AA99B-08E7-4959-A3B4-41AA527B4B22"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "11.6.1",
|
||
|
"versionEndIncluding": "11.6.5",
|
||
|
"matchCriteriaId": "05ED802A-A8A0-4E96-AB45-811A98AA11C2"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "12.1.0",
|
||
|
"versionEndIncluding": "12.1.5",
|
||
|
"matchCriteriaId": "9DC86A5F-C793-4848-901F-04BFB57A07F6"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "11.6.1",
|
||
|
"versionEndIncluding": "11.6.5",
|
||
|
"matchCriteriaId": "B15992E6-85B6-4E62-A284-FE4B78F5F373"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "12.1.0",
|
||
|
"versionEndIncluding": "12.1.5",
|
||
|
"matchCriteriaId": "2E5552A3-91CD-4B97-AD33-4F1FB4C8827A"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "11.6.1",
|
||
|
"versionEndIncluding": "11.6.5",
|
||
|
"matchCriteriaId": "70F9B5A0-0EF7-4D2E-B8DF-EA3508BF4B61"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "12.1.0",
|
||
|
"versionEndIncluding": "12.1.5",
|
||
|
"matchCriteriaId": "2E42E5C6-2E8F-4879-A5A9-3FE8422D0445"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "11.6.1",
|
||
|
"versionEndIncluding": "11.6.5",
|
||
|
"matchCriteriaId": "8376922B-0D04-4E5D-BADE-0D6AC23A4696"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "12.1.0",
|
||
|
"versionEndIncluding": "12.1.5",
|
||
|
"matchCriteriaId": "55C2EC23-E78F-4447-BACF-21FC36ABF155"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "11.6.1",
|
||
|
"versionEndIncluding": "11.6.5",
|
||
|
"matchCriteriaId": "0471086D-B70E-4B87-862E-01FB99B0D5D5"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "12.1.0",
|
||
|
"versionEndIncluding": "12.1.5",
|
||
|
"matchCriteriaId": "945A19E8-51EB-42FE-9BF1-12DAC78B5286"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "11.6.1",
|
||
|
"versionEndIncluding": "11.6.5",
|
||
|
"matchCriteriaId": "CD3D5803-35A0-4FF7-9AD3-E345C53A18FC"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "12.1.0",
|
||
|
"versionEndIncluding": "12.1.5",
|
||
|
"matchCriteriaId": "EB5007D0-BBDB-4D74-9C88-98FBA74757D1"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "11.6.1",
|
||
|
"versionEndIncluding": "11.6.5",
|
||
|
"matchCriteriaId": "E20DFBD1-5469-4330-81B1-078D6487C01D"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "12.1.0",
|
||
|
"versionEndIncluding": "12.1.5",
|
||
|
"matchCriteriaId": "B7725810-66D2-4460-A174-9F3BFAD966F2"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "11.6.1",
|
||
|
"versionEndIncluding": "11.6.5",
|
||
|
"matchCriteriaId": "F92F2449-8A6E-431E-8CB1-5255D2464B31"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "12.1.0",
|
||
|
"versionEndIncluding": "12.1.5",
|
||
|
"matchCriteriaId": "EFD760FE-4347-4D36-B5C6-4009398060F2"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "11.6.1",
|
||
|
"versionEndIncluding": "11.6.5",
|
||
|
"matchCriteriaId": "53F940F3-6CF4-48C8-BFBF-4FE9B3A26D31"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "12.1.0",
|
||
|
"versionEndIncluding": "12.1.5",
|
||
|
"matchCriteriaId": "65B76F53-7D8B-477E-8B6E-91AC0A9009FF"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "11.6.1",
|
||
|
"versionEndIncluding": "11.6.5",
|
||
|
"matchCriteriaId": "2B12C324-109D-42BB-82E9-702C946491BB"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "12.1.0",
|
||
|
"versionEndIncluding": "12.1.5",
|
||
|
"matchCriteriaId": "440C631C-1C66-4A26-BE28-D3D1CCC4AD2F"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "https://support.f5.com/csp/article/K09121542",
|
||
|
"source": "f5sirt@f5.com",
|
||
|
"tags": [
|
||
|
"Vendor Advisory"
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|