QID 376567

Date Published: 2022-04-27

QID 376567: F5 BIG-IP Application Security Manager (ASM), Local Traffic Manager (LTM), Access Policy Manager (APM) Linux kernel Vulnerability (K09604370)

A flaw in the way reply ICMP packets are limited in the Linux kernel functionality was found that allows to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypassing source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well. Kernel versions before 5.10 may be vulnerable to this issue. (CVE-2020-25705)

Vulnerable Component: BIG-IP ASM,LTM,APM

Affected Versions:
13.1.0 - 13.1.4
12.1.0 - 12.1.6
11.6.1 - 11.6.5

QID Detection Logic(Authenticated):
This QID checks for the vulnerable versions of F5 BIG-IP devices using the tmsh command.

A remote off-path attacker can determine open User Datagram Protocol (UDP) source ports on a vulnerable system based on Internet Control Message Protocol (ICMP) error messages, making it possible to execute a "SAD DNS attack."

  • CVSS V3 rated as High - 7.4 severity.
  • CVSS V2 rated as Medium - 5.8 severity.
  • Solution
    For more information about patch details please refer to K09604370Workaround:
    To mitigate this vulnerability on the management interface, you can block outgoing ICMP port unreachable messages. For more info please refer to K09604370

    Vendor References

    CVEs related to QID 376567

    Software Advisories
    Advisory ID Software Component Link
    K09604370 URL Logo support.f5.com/csp/article/K09604370