Vulnerability CVE-2014-8730


Published: 2014-12-09   Modified: 2014-12-10

Description:
The SSL profiles component in F5 BIG-IP LTM, APM, and ASM 10.0.0 through 10.2.4 and 11.0.0 through 11.5.1, AAM 11.4.0 through 11.5.1, AFM 11.3.0 through 11.5.1, Analytics 11.0.0 through 11.5.1, Edge Gateway, WebAccelerator, and WOM 10.1.0 through 10.2.4 and 11.0.0 through 11.3.0, PEM 11.3.0 through 11.6.0, and PSM 10.0.0 through 10.2.4 and 11.0.0 through 11.4.1 and BIG-IQ Cloud and Security 4.0.0 through 4.4.0 and Device 4.2.0 through 4.4.0, when using TLS 1.x before TLS 1.2, does not properly check CBC padding bytes when terminating connections, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, a variant of CVE-2014-3566 (aka POODLE). NOTE: the scope of this identifier is limited to the F5 implementation only. Other vulnerable implementations should receive their own CVE ID, since this is not a vulnerability within the design of TLS 1.x itself.

See advisories in our WLB2 database:
Topic
Author
Date
High
TLS 1.x CBC cipher connections Padding issue
imperialviolet
09.12.2014

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
F5 -> Big-iq device 
F5 -> Big-iq security 
F5 -> ARX 
F5 -> Enterprise manager 
F5 -> Big-ip access policy manager 
F5 -> Firepass 
F5 -> Big-ip advanced firewall manager 
F5 -> Linerate 
F5 -> Big-ip analytics 
F5 -> Big-ip application acceleration manager 
F5 -> Big-ip application security manager 
F5 -> Big-ip edge gateway 
F5 -> Big-ip global traffic manager 
F5 -> Big-ip link controller 
F5 -> Big-ip local traffic manager 
F5 -> Big-ip policy enforcement manager 
F5 -> Big-ip protocol security module 
F5 -> Big-ip wan optimization manager 
F5 -> Big-ip webaccelerator 
F5 -> Big-iq cloud 

 References:
http://marc.info/?l=bugtraq&m=144372772101168&w=2
http://secunia.com/advisories/62167
http://secunia.com/advisories/62224
http://secunia.com/advisories/62388
http://www-01.ibm.com/support/docview.wss?uid=swg21693271
http://www-01.ibm.com/support/docview.wss?uid=swg21693337
http://www-01.ibm.com/support/docview.wss?uid=swg21693495
http://www.openwall.com/lists/oss-security/2014/12/09/27
https://devcentral.f5.com/articles/cve-2014-8730-padding-issue-8151
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04819635
https://support.f5.com/kb/en-us/solutions/public/15000/800/sol15882.html
https://support.lenovo.com/product_security/poodle
https://support.lenovo.com/us/en/product_security/poodle
https://www.imperialviolet.org/2014/12/08/poodleagain.html

Copyright 2022, cxsecurity.com

 

Back to Top