Original Publication Date: 02/08/2013
Updated Date: 09/28/2016
Vulnerability Description
A vulnerability exists in the TLS and DTLS protocols that may allow an attacker to recover plaintext from TLS/DTLS connections that use CBC-mode encryption. (CVE-2013-0169)
Note: Stream ciphers, such as RC4, are not vulnerable to this issue.
Impact
The vulnerability may allow an attacker to recover plaintext from TLS/DTLS connections.
Security Issue Status
F5 Product Development has assigned ID 580596 and ID 407706 (BIG-IP), ID 594397 (BIG-IQ), ID 594400 Enterprise Manager, ID 410613 (FirePass), and ID 410742 (ARX) to this vulnerability. To find out whether F5 has determined that your release is vulnerable, and to obtain information about releases or hotfixes that resolve the vulnerability, refer to the following table:
Product | Versions known to be vulnerable | Versions known to be not vulnerable | Vulnerable component or feature |
BIG-IP LTM | 11.3.0 - 11.3.0 HF1 11.2.1 - 11.2.1 HF3 11.2.0 - 11.2.0 HF3 11.1.0 - 11.1.0 HF5 11.0.0 - 11.0.0 HF4 10.0.0 - 10.2.4 HF4 | 12.0.0 - 12.1.1 11.4.0 - 11.6.1 11.3.0 HF2 11.2.1 HF4 11.2.0 HF4 11.1.0 HF6 11.0.0 HF5 10.2.4 HF6 | Configuration utility |
12.1.0 - 12.1.0 HF1 12.0.0 - 12.0.0 HF3 11.6.1 11.6.0 - 11.6.0 HF7 11.5.2 - 11.5.4 HF1 11.5.1 - 11.5.1 HF10 11.4.1 - 11.4.1 HF10 11.2.1 - 11.2.1 HF15 10.0.0 - 10.2.4 | 12.1.1 12.1.0 HF2 12.0.0 HF4 11.6.1 HF1 11.6.0 HF8 11.5.4 HF2 11.5.1 HF11 11.4.1 HF11 11.2.1 HF16 | SSL/TLS virtual servers | |
BIG-IP AAM | None | 12.0.0 - 12.1.1 11.4.0 - 11.6.1 | None |
12.1.0 - 12.1.0 HF1 12.0.0 - 12.0.0 HF3 11.6.1 11.6.0 - 11.6.0 HF7 11.5.2 - 11.5.4 HF1 11.5.1 - 11.5.1 HF10 11.4.1 - 11.4.1 HF10 | 12.1.1 12.1.0 HF2 12.0.0 HF4 11.6.1 HF1 11.6.0 HF8 11.5.4 HF2 11.5.1 HF11 11.4.1 HF11 | SSL/TLS virtual servers | |
BIG-IP AFM | 11.3.0 - 11.3.0 HF1 | 12.0.0 - 12.1.1 11.4.0 - 11.6.1 11.3.0 HF2 | Configuration utility |
12.1.0 - 12.1.0 HF1 12.0.0 - 12.0.0 HF3 11.6.1 11.6.0 - 11.6.0 HF7 11.5.2 - 11.5.4 HF1 11.5.1 - 11.5.1 HF10 11.4.1 - 11.4.1 HF10 | 12.1.1 12.1.0 HF2 12.0.0 HF4 11.6.1 HF1 11.6.0 HF8 11.5.4 HF2 11.5.1 HF11 11.4.1 HF11 | SSL/TLS virtual servers | |
BIG-IP Analytics | 11.3.0 - 11.3.0 HF1 11.2.1 - 11.2.1 HF3 11.2.0 - 11.2.0 HF3 11.1.0 - 11.1.0 HF5 11.0.0 - 11.0.0 HF4 | 12.0.0 - 12.1.1 11.4.0 - 11.6.1 11.3.0 HF2 11.2.1 HF4 11.2.0 HF4 11.1.0 HF6 11.0.0 HF5 | Configuration utility |
12.1.0 - 12.1.0 HF1 12.0.0 - 12.0.0 HF3 11.6.1 11.6.0 - 11.6.0 HF7 11.5.2 - 11.5.4 HF1 11.5.1 - 11.5.1 HF10 11.4.1 - 11.4.1 HF10 11.2.1 - 11.2.1 HF15 | 12.1.1 12.1.0 HF2 12.0.0 HF4 11.6.1 HF1 11.6.0 HF8 11.5.4 HF2 11.5.1 HF11 11.4.1 HF11 11.2.1 HF16 | SSL/TLS virtual servers | |
BIG-IP APM | 11.3.0 - 11.3.0 HF1 11.2.1 - 11.2.1 HF3 11.2.0 - 11.2.0 HF3 11.1.0 - 11.1.0 HF5 11.0.0 - 11.0.0 HF4 10.0.0 - 10.2.4 HF4 | 12.0.0 - 12.1.1 11.4.0 - 11.6.1 11.3.0 HF2 11.2.1 HF4 11.2.0 HF4 11.1.0 HF6 11.0.0 HF5 10.2.4 HF6 | Configuration utility |
12.1.0 - 12.1.0 HF1 12.0.0 - 12.0.0 HF3 11.6.1 11.6.0 - 11.6.0 HF7 11.5.2 - 11.5.4 HF1 11.5.1 - 11.5.1 HF10 11.4.1 - 11.4.1 HF10 11.2.1 - 11.2.1 HF15 10.0.0 - 10.2.4 | 12.1.1 12.1.0 HF2 12.0.0 HF4 11.6.1 HF1 11.6.0 HF8 11.5.4 HF2 11.5.1 HF11 11.4.1 HF11 11.2.1 HF16 | SSL/TLS virtual servers | |
BIG-IP ASM | 11.3.0 - 11.3.0 HF1 11.2.1 - 11.2.1 HF3 11.2.0 - 11.2.0 HF3 11.1.0 - 11.1.0 HF5 11.0.0 - 11.0.0 HF4 10.0.0 - 10.2.4 HF4 | 12.0.0 - 12.1.1 11.4.0 - 11.6.1 11.3.0 HF2 11.2.1 HF4 11.2.0 HF4 11.1.0 HF6 11.0.0 HF5 10.2.4 HF6 | Configuration utility |
12.1.0 - 12.1.0 HF1 12.0.0 - 12.0.0 HF3 11.6.1 11.6.0 - 11.6.0 HF7 11.5.2 - 11.5.4 HF1 11.5.1 - 11.5.1 HF10 11.4.1 - 11.4.1 HF10 11.2.1 - 11.2.1 HF15 10.0.0 - 10.2.4 | 12.1.1 12.1.0 HF2 12.0.0 HF4 11.6.1 HF1 11.6.0 HF8 11.5.4 HF2 11.5.1 HF11 11.4.1 HF11 11.2.1 HF16 | SSL/TLS virtual servers | |
BIG-IP DNS | None | 12.0.0 - 12.1.1 | Configuration utility |
BIG-IP Edge Gateway | 11.3.0 - 11.3.0 HF1 11.2.1 - 11.2.1 HF3 11.2.0 - 11.2.0 HF3 11.1.0 - 11.1.0 HF5 11.0.0 - 11.0.0 HF4 10.0.0 - 10.2.4 HF4 | 11.3.0 HF2 11.2.1 HF4 11.2.0 HF4 11.1.0 HF6 11.0.0 HF5 10.2.4 HF6 | Configuration utility |
11.3.0 11.2.1 - 11.2.1 HF15 10.2.1 - 10.2.4 | 11.2.1 HF16 | SSL/TLS virtual servers | |
BIG-IP GTM | 11.3.0 - 11.3.0 HF1 11.2.1 - 11.2.1 HF3 11.2.0 - 11.2.0 HF3 11.1.0 - 11.1.0 HF5 11.0.0 - 11.0.0 HF4 10.0.0 - 10.2.4 HF4 | 11.4.0 - 11.6.1 11.3.0 HF2 11.2.1 HF4 11.2.0 HF4 11.1.0 HF6 11.0.0 HF5 10.2.4 HF6 | Configuration utility |
BIG-IP Link Controller | 11.3.0 - 11.3.0 HF1 11.2.1 - 11.2.1 HF3 11.2.0 - 11.2.0 HF3 11.1.0 - 11.1.0 HF5 11.0.0 - 11.0.0 HF4 10.0.0 - 10.2.4 HF4 | 12.0.0 - 12.1.1 11.4.0 - 11.6.1 11.3.0 HF2 11.2.1 HF4 11.2.0 HF4 11.1.0 HF6 11.0.0 HF5 10.2.4 HF6 | Configuration utility |
12.1.0 - 12.1.0 HF1 12.0.0 - 12.0.0 HF3 11.6.1 11.6.0 - 11.6.0 HF7 11.5.2 - 11.5.4 HF1 11.5.1 - 11.5.1 HF10 11.4.1 - 11.4.1 HF10 11.2.1 - 11.2.1 HF15 10.0.0 - 10.2.4 | 12.1.1 12.1.0 HF2 12.0.0 HF4 11.6.1 HF1 11.6.0 HF8 11.5.4 HF2 11.5.1 HF11 11.4.1 HF11 11.2.1 HF16 | SSL/TLS virtual servers | |
BIG-IP PEM | 11.3.0 - 11.3.0 HF1 | 12.0.0 - 12.1.1 11.4.0 - 11.6.1 11.3.0 HF2 | Configuration utility |
12.1.0 - 12.1.0 HF1 12.0.0 - 12.0.0 HF3 11.6.1 11.6.0 - 11.6.0 HF7 11.5.2 - 11.5.4 HF1 11.5.1 - 11.5.1 HF10 11.4.1 - 11.4.1 HF10 | 12.1.1 12.1.0 HF2 12.0.0 HF4 11.6.1 HF1 11.6.0 HF8 11.5.4 HF2 11.5.1 HF11 11.4.1 HF11 | SSL/TLS virtual servers | |
BIG-IP PSM | 11.3.0 - 11.3.0 HF1 11.2.1 - 11.2.1 HF3 11.2.0 - 11.2.0 HF3 11.1.0 - 11.1.0 HF5 11.0.0 - 11.0.0 HF4 10.0.0 - 10.2.4 HF4 | 11.4.0 - 11.4.1 11.3.0 HF2 11.2.1 HF4 11.2.0 HF4 11.1.0 HF6 11.0.0 HF5 10.2.4 HF6 | Configuration utility |
11.3.0 11.2.1 - 11.2.1 HF15 10.2.1 - 10.2.4 | 11.2.1 HF16 | SSL/TLS virtual servers | |
BIG-IP WebAccelerator | 11.3.0 - 11.3.0 HF1 11.2.1 - 11.2.1 HF3 11.2.0 - 11.2.0 HF3 11.1.0 - 11.1.0 HF5 11.0.0 - 11.0.0 HF4 10.0.0 - 10.2.4 HF4 | 11.3.0 HF2 11.2.1 HF4 11.2.0 HF4 11.1.0 HF6 11.0.0 HF5 10.2.4 HF6 | Configuration utility |
11.3.0 11.2.1 - 11.2.1 HF15 10.2.1 - 10.2.4 | 11.2.1 HF16 | SSL/TLS virtual servers | |
BIG-IP WOM | 11.3.0 - 11.3.0 HF1 11.2.1 - 11.2.1 HF3 11.2.0 - 11.2.0 HF3 11.1.0 - 11.1.0 HF5 11.0.0 - 11.0.0 HF4 10.0.0 - 10.2.4 HF4 | 11.3.0 HF2 11.2.1 HF4 11.2.0 HF4 11.1.0 HF6 11.0.0 HF5 10.2.4 HF6 | Configuration utility |
11.3.0 11.2.1 - 11.2.1 HF15 10.2.1 - 10.2.4 | 11.2.1 HF16 | SSL/TLS virtual servers | |
ARX | 6.0.0 - 6.4.0 5.0.0 - 5.3.1 | None | ARX Manager GUI API (disabled by default) |
Enterprise Manager | 3.0.0 - 3.1.1 2.0.0 - 2.3.0 1.6.0 - 1.8.0 | None | Configuration utility |
FirePass | 7.0.0 6.0.0 - 6.1.0 | None | Administrative interface WebServices |
BIG-IQ Cloud | 4.0.0 - 4.5.0 | None | TMM |
BIG-IQ Device | 4.2.0 - 4.5.0 | None | TMM |
BIG-IQ Security | 4.0.0 - 4.5.0 | None | TMM |
BIG-IQ ADC | 4.5.0 | None | TMM |
BIG-IQ Centralized Management | 5.0.0 | None | TMM |
BIG-IQ Cloud and Orchestration | 1.0.0 | None | TMM |
Vulnerability Recommended Actions
The following section describes affected BIG-IP components and how to protect those components from potential exploit.
Mitigating the exploit for the MGMT interface and the Configuration utility
The BIG-IP Configuration utility is vulnerable. To mitigate potential exploit, F5 recommends that you limit network access to the management (MGMT) interface to a secure, management-only network.
You can change the default cipher string for the BIG-IP Configuration utility. For example, to change the cipher string for the Configuration utility to use the RC4-SHA cipher, refer to the following commands:
BIG-IP 10.x - 11.x
tmsh modify /sys httpd ssl-ciphersuite RC4-SHA
Mitigating the exploit for SSL/TLS virtual servers
To mitigate potential exploit for SSL/TLS virtual servers, you can configure the SSL profile to prefer non-CBC ciphers. To do so, perform the following steps:
Impact of workaround: Changing the ciphers supported by the SSL profile may result in clients being unable to establish an SSL connection.
For BIG-IP 11.5.0 and later, configure the cipher string to prefer non-CBC ciphers. For example, the following string configures the SSL profile to prefer AES-GCM ciphers first, then RC4-SHA ciphers, before resorting to the DEFAULT string, which contains CBC ciphers:
AES-GCM:RC4-SHA:DEFAULT
For BIG-IP 11.4.0 and earlier, the following cipher string configures the SSL profile to prefer RC4-SHA before resorting to the DEFAULT string, which contains CBC ciphers:
RC4-SHA:DEFAULT
To protect the FirePass Controller Administrator interface from potential exploit, perform the following procedure:
Changing the cipher string for the FirePass Administrator interface
Impact of procedure: Changing the cipher string may prevent some connections to the Administrator interface.
To protect the Enterprise Manager Configuration utility from potential exploit, F5 recommends that you limit network access to the MGMT interface to a secure, management-only network.
You can also change the default cipher string for the Enterprise Manager Configuration utility. For example, to change the cipher string for the Configuration utility to use the RC4-SHA cipher, refer to the following commands:
Enterprise Manager 3.x
tmsh modify /sys httpd ssl-ciphersuite RC4-SHA
Enterprise Manager 2.x
bigpipe httpd sslciphersuite RC4-SHA
The following section describes how to protect the ARX Manager GUI from potential exploit (6.2.0 and later).
Changing the ARX Manager GUI cipher string (6.2.0 and later)
Impact of procedure: Changing the cipher string may prevent some connections to the ARX Manager GUI.
enable
config
ssl
cipher ssl-rsa-with-rc4-128-sha
end
Acknowledgements
F5 would like to acknowledge Nadhem J. AlFardan and Kenneth G. Paterson of the Information Security Group Royal Holloway, University of London for bringing this issue to our attention, and for following the highest standards of responsible disclosure.
Supplemental Information
Note: This link takes you to a resource outside of AskF5, and it is possible that the document may be removed without our knowledge.