{ "id": "CVE-2021-22981", "sourceIdentifier": "f5sirt@f5.com", "published": "2021-02-12T18:15:12.797", "lastModified": "2021-02-19T17:14:08.280", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "On all versions of BIG-IP 12.1.x and 11.6.x, the original TLS protocol includes a weakness in the master secret negotiation that is mitigated by the Extended Master Secret (EMS) extension defined in RFC 7627. TLS connections that do not use EMS are vulnerable to man-in-the-middle attacks during renegotiation. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated." }, { "lang": "es", "value": "En todas las versiones de BIG-IP 12.1.x y 11.6.x, el protocolo TLS original incluye una debilidad en la negociaci\u00f3n del secreto maestro que es mitigada por la extensi\u00f3n Extended Master Secret (EMS) definida en RFC 7627. Las conexiones TLS que no utilizan EMS son vulnerables a ataques man-in-the-middle durante la renegociaci\u00f3n. Nota: No son evaluadas las versiones de software que han alcanzado End of Software Development (EoSD)" } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM" }, "exploitabilityScore": 2.2, "impactScore": 2.5 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE", "baseScore": 5.8 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 4.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "11.6.1", "versionEndIncluding": "11.6.5", "matchCriteriaId": "2FBA9552-4645-4BFF-91A4-47B6A3414325" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "12.1.0", "versionEndIncluding": "12.1.5", "matchCriteriaId": "6C3B5688-0235-4D4F-A26C-440FF24A1B43" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "11.6.1", "versionEndIncluding": "11.6.5", "matchCriteriaId": "61D1B91F-8672-4947-AF9A-F635679D0FB7" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "12.1.0", "versionEndIncluding": "12.1.5", "matchCriteriaId": "151ED6D1-AA85-4213-8F3A-8167CBEC4721" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*", "versionStartIncluding": "11.6.1", "versionEndIncluding": "11.6.5", "matchCriteriaId": "D8A02AA8-E1CA-487B-AAF3-9AD3206D417E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*", "versionStartIncluding": "12.1.0", "versionEndIncluding": "12.1.5", "matchCriteriaId": "322AA283-E494-45E0-975E-2725E2FCC2DE" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "versionStartIncluding": "11.6.1", "versionEndIncluding": "11.6.5", "matchCriteriaId": "C3787453-ECE9-4958-8FD8-8A43A9F86077" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "versionStartIncluding": "12.1.0", "versionEndIncluding": "12.1.5", "matchCriteriaId": "5D5AA99B-08E7-4959-A3B4-41AA527B4B22" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "11.6.1", "versionEndIncluding": "11.6.5", "matchCriteriaId": "05ED802A-A8A0-4E96-AB45-811A98AA11C2" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "12.1.0", "versionEndIncluding": "12.1.5", "matchCriteriaId": "9DC86A5F-C793-4848-901F-04BFB57A07F6" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "11.6.1", "versionEndIncluding": "11.6.5", "matchCriteriaId": "B15992E6-85B6-4E62-A284-FE4B78F5F373" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "12.1.0", "versionEndIncluding": "12.1.5", "matchCriteriaId": "2E5552A3-91CD-4B97-AD33-4F1FB4C8827A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*", "versionStartIncluding": "11.6.1", "versionEndIncluding": "11.6.5", "matchCriteriaId": "70F9B5A0-0EF7-4D2E-B8DF-EA3508BF4B61" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*", "versionStartIncluding": "12.1.0", "versionEndIncluding": "12.1.5", "matchCriteriaId": "2E42E5C6-2E8F-4879-A5A9-3FE8422D0445" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "versionStartIncluding": "11.6.1", "versionEndIncluding": "11.6.5", "matchCriteriaId": "8376922B-0D04-4E5D-BADE-0D6AC23A4696" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "versionStartIncluding": "12.1.0", "versionEndIncluding": "12.1.5", "matchCriteriaId": "55C2EC23-E78F-4447-BACF-21FC36ABF155" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "versionStartIncluding": "11.6.1", "versionEndIncluding": "11.6.5", "matchCriteriaId": "0471086D-B70E-4B87-862E-01FB99B0D5D5" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "versionStartIncluding": "12.1.0", "versionEndIncluding": "12.1.5", "matchCriteriaId": "945A19E8-51EB-42FE-9BF1-12DAC78B5286" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "11.6.1", "versionEndIncluding": "11.6.5", "matchCriteriaId": "CD3D5803-35A0-4FF7-9AD3-E345C53A18FC" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "12.1.0", "versionEndIncluding": "12.1.5", "matchCriteriaId": "EB5007D0-BBDB-4D74-9C88-98FBA74757D1" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "versionStartIncluding": "11.6.1", "versionEndIncluding": "11.6.5", "matchCriteriaId": "E20DFBD1-5469-4330-81B1-078D6487C01D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "versionStartIncluding": "12.1.0", "versionEndIncluding": "12.1.5", "matchCriteriaId": "B7725810-66D2-4460-A174-9F3BFAD966F2" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "11.6.1", "versionEndIncluding": "11.6.5", "matchCriteriaId": "F92F2449-8A6E-431E-8CB1-5255D2464B31" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "12.1.0", "versionEndIncluding": "12.1.5", "matchCriteriaId": "EFD760FE-4347-4D36-B5C6-4009398060F2" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "11.6.1", "versionEndIncluding": "11.6.5", "matchCriteriaId": "53F940F3-6CF4-48C8-BFBF-4FE9B3A26D31" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "versionStartIncluding": "12.1.0", "versionEndIncluding": "12.1.5", "matchCriteriaId": "65B76F53-7D8B-477E-8B6E-91AC0A9009FF" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*", "versionStartIncluding": "11.6.1", "versionEndIncluding": "11.6.5", "matchCriteriaId": "2B12C324-109D-42BB-82E9-702C946491BB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*", "versionStartIncluding": "12.1.0", "versionEndIncluding": "12.1.5", "matchCriteriaId": "440C631C-1C66-4A26-BE28-D3D1CCC4AD2F" } ] } ] } ], "references": [ { "url": "https://support.f5.com/csp/article/K09121542", "source": "f5sirt@f5.com", "tags": [ "Vendor Advisory" ] } ] }