Forum Discussion
F5 LTM hardening (11.6.0 HF 5.0.429)
Hi Experts
How to harden the below version to fix the issues after VAPT ?
Product BIG-IP 2000 LTM
Version 11.6.0
Build 5.0.429
Edition Hotfix HF5
1) OpenSSH Commands Information Disclosure Vulnerability
2) Apache Partial HTTP Request Denial of Service Vulnerability - Zero Day
3) OpenSSH Plaintext Recovery Attack Against SSH Vulnerability
Will Hotfix HF6 cover all the above? Any help appreciated.
Thanks,
Sumanta.
7 Replies
do you have CVE ids for those? with these limited textual descriptions it is hard to determine what exactly the issue might be.
- ekaleido
Cirrus
Also, start here...
https://github.com/dnkolegov/bigipsecurity
- Chris_Grant
Employee
Go to www.askf5.com. Search for each CVE. If you don't find a solution article detailing whether we are vulnerable, please open a case with support and we will generate one. Note that this takes quite some time as it involves a code review of every product. If you don't have CVEs, you will find that support (or devcentral) is of limited assistance.
Hi All
The below are the CVEs, they are already addresses by askf5.com
CVE-2012-0814
CVE-2007-6750
CVE-2008-5161
- Chris_Grant
Employee
You cannot harden the bigIP against CVE-2012-0814 because it is not vulnerable to this CVE as per SOL14446.
The management interface is vulnerable to slow loris as per SOL12636 on all versions and it can be prevented by following best practice and not allowing public access to your management interface. You can read more about the slow loris attack and protecting virtual servers by reading SOL10260.
The correct resolution for CVE-2008-5161 is to upgrade to v11, which is not vulnerable as per SOL14609.
As you have read these articles I am guessing there is something further you feel you need. What exactly do you feel these articles are missing?
Hi Chris
Thanks for your update. I have existing version as below. Will latest HF suffice or I should plan for 11.6.1 or 12.x?
Version 11.6.0, Build 5.0.429, Edition Hotfix HF5
Regards,
Sumanta.
- Chris_Grant
Employee
You should ideally always be on the latest hotfix. Having said that 11.6.0 HF5 is only vulnerable to the slow loris attack on the management plane. It is not vulnerable to either of the other two CVEs. Make sure that your management interface is not accessible from outside your organization, and ideally not accessible outside a dedicated management network. Upgrading to the latest hotfix (or even the latest code revision) will not change this.
11.6.0 HF5 is not vulnerable to CVE-2012-0814 or CVE-2008-5161.
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com