描述:
F5 發布了安全公告以應對發現於 F5 裝置中的多個漏洞。有關漏洞及其相關修補的詳情可參考以下網址:
https://support.f5.com/csp/article/K50974556
有報告指 F5 BIG-IP 的漏洞 (CVE-2021-23031) 容許通過認證的攻擊者在受影響的系統中進行權限提升。系統管理員應立即為受影響的系統安裝修補程式,以減低受到網絡攻擊的風險。
受影響的系統:
- BIG-IP 16.0.0-16.0.1 版本
- BIG-IP 15.1.0-15.1.2 版本
- BIG-IP 14.1.0-14.1.4 版本
- BIG-IP 13.1.0-13.1.4 版本
- BIG-IP 12.1.0-12.1.6 版本
- BIG-IP 11.6.1-11.6.5 版本
- BIG-IQ 8.0.0-8.1.0 版本
- BIG-IQ 7.0.0-7.1.0 版本
- BIG-IQ 6.0.0-6.1.0 版本
- BIG-IP Advanced WAF/ASM 16.0.0-16.0.1 版本
- BIG-IP Advanced WAF/ASM 15.1.0-15.1.3 版本
- BIG-IP Advanced WAF/ASM 14.1.0-14.1.4.1 版本
- BIG-IP Advanced WAF/ASM 13.1.0-13.1.4 版本
- BIG-IP Advanced WAF/ASM 12.1.0-12.1.6 版本
- BIG-IP Advanced WAF/ASM 11.6.1-11.6.5 版本
- BIG-IP Guided Configuration 7.0 版本
- BIG-IP Guided Configuration 6.0 版本
- BIG-IP Guided Configuration 5.0 版本
- BIG-IP Guided Configuration 4.1 版本
- BIG-IP Guided Configuration 3.0 版本
影響:
成功利用這些漏洞可以在受影響的系統導致遠端執行指令碼、跨網址程式編程、數據操縱、服務受阻斷、泄漏資訊、權限提升、仿冒詐騙、終止系統執行或繞過保安限制。
建議:
適用於受影響系統的軟件更新已可獲取。受影響系統的系統管理員應遵從產品供應商的建議,立即採取行動以降低風險。建議諮詢產品供應商以取得修補程式及有關支援。
系統管理員應遵循良好作業模式,僅允許管理人員通過安全網絡訪問產品,並限制對受信任用戶的外殼訪問。
進一步資訊:
- https://www.hkcert.org/tc/security-bulletin/f5-big-ip-multiple-vulnerabilities_20210826
- https://us-cert.cisa.gov/ncas/current-activity/2021/08/25/f5-releases-august-2021-security-advisory
- https://support.f5.com/csp/article/K00602225
- https://support.f5.com/csp/article/K01153535
- https://support.f5.com/csp/article/K05043394
- https://support.f5.com/csp/article/K05314769
- https://support.f5.com/csp/article/K05391775
- https://support.f5.com/csp/article/K14903688
- https://support.f5.com/csp/article/K19012930
- https://support.f5.com/csp/article/K21435974
- https://support.f5.com/csp/article/K24301698
- https://support.f5.com/csp/article/K30150004
- https://support.f5.com/csp/article/K30291321
- https://support.f5.com/csp/article/K30523121
- https://support.f5.com/csp/article/K32734107
- https://support.f5.com/csp/article/K35408374
- https://support.f5.com/csp/article/K36942191
- https://support.f5.com/csp/article/K42051445
- https://support.f5.com/csp/article/K42526507
- https://support.f5.com/csp/article/K44553214
- https://support.f5.com/csp/article/K45407662
- https://support.f5.com/csp/article/K48321015
- https://support.f5.com/csp/article/K49549213
- https://support.f5.com/csp/article/K50974556
- https://support.f5.com/csp/article/K52420610
- https://support.f5.com/csp/article/K53854428
- https://support.f5.com/csp/article/K55543151
- https://support.f5.com/csp/article/K61643620
- https://support.f5.com/csp/article/K63163637
- https://support.f5.com/csp/article/K65397301
- https://support.f5.com/csp/article/K66782293
- https://support.f5.com/csp/article/K70415522
- https://support.f5.com/csp/article/K70652532
- https://support.f5.com/csp/article/K79428827
- https://support.f5.com/csp/article/K93231374
- https://support.f5.com/csp/article/K94255403
- https://support.f5.com/csp/article/K94941221
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5862
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23025 (to CVE-2021-23053)