QID 376032

Date Published: 2021-12-14

QID 376032: F5 BIG-IP Application Security Manager (ASM), Local Traffic Manager (LTM), Access Policy Manager (APM) OpenSSH Vulnerability (K12252011)

An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c. CVE-2019-6109

Vulnerable Component: BIG-IP ASM,LTM,APM

Affected Versions:
16.0.0 - 16.1.2
15.1.0 - 15.1.4
14.1.0 - 14.1.4
13.1.0 - 13.1.4
12.1.0 - 12.1.6
11.6.1 - 11.6.5

QID Detection Logic(Authenticated):
This QID checks for the vulnerable versions of F5 BIG-IP devices using the tmsh command.

Missing character encoding in the progress display allows for spoofing of OpenSSH SCP client output.

  • CVSS V3 rated as High - 6.8 severity.
  • CVSS V2 rated as Medium - 4 severity.
  • Solution
    The vendor has released patch, for more information please visit: K12252011
    Vendor References

    CVEs related to QID 376032

    Software Advisories
    Advisory ID Software Component Link
    K12252011 URL Logo support.f5.com/csp/article/K12252011