Vulnerability Name: | CVE-2020-5924 (CCN-187397) |
Assigned: | 2020-08-25 |
Published: | 2020-08-25 |
Updated: | 2021-07-21 |
Summary: | In BIG-IP APM versions 12.1.0-12.1.5.1 and 11.6.1-11.6.5.2, RADIUS authentication leaks memory when the username for authentication is not set.
|
CVSS v3 Severity: | 5.3 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) 4.6 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Low | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) 4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Low |
|
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Partial | 5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Partial |
|
Vulnerability Type: | CWE-772
|
Vulnerability Consequences: | Denial of Service |
References: | Source: MITRE Type: CNA CVE-2020-5924
Source: XF Type: UNKNOWN f5-cve20205924-dos(187397)
Source: CCN Type: F5 Security Advisory K11400411 BIG-IP APM RADIUS authentication vulnerability CVE-2020-5924
Source: MISC Type: Mitigation, Vendor Advisory https://support.f5.com/csp/article/K11400411
|
Vulnerable Configuration: | Configuration 1: cpe:/a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* (Version >= 11.6.1 and <= 11.6.5)OR cpe:/a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* (Version >= 12.1.0 and < 12.1.5.2) Configuration CCN 1: cpe:/a:f5:big-ip_access_policy_manager:12.1.0:*:*:*:*:*:*:*OR cpe:/a:f5:big-ip_access_policy_manager:12.1.5:*:*:*:*:*:*:*OR cpe:/a:f5:big-ip_access_policy_manager:11.6.5:*:*:*:*:*:*:*OR cpe:/a:f5:big-ip_access_policy_manager:11.6.1:*:*:*:*:*:*:*
Denotes that component is vulnerable |
BACK |