Forum Discussion
F5 Vulnerability CVE-2015-7394 - Recomonded action
Hi all,
Recently I implemented F5 LTM,APM,ASM in one of our customer site, with the software version of 11.6 HF5. Everything was working fine with this software version. Now recently I came to know that there is a vulnerability (CVE-2015-7394) for this version, and the customer is planning to publish their application on this week.
Can I move the box to production by keeping the same software version if the vulnerability is a negligible one or is it necessary to Upgrade the box to next release (Version 12) and then put in production
can I get a advice on this.?
I heard in Version 12 ASM Configuration window is changed and I just want know what are the other changes on Version 12.
any help would be highly appreciated
5 Replies
- Renato
Altostratus
It seems to be exploitable only by users who already have administrative access to the device, what would permit them to elevate their privileges by exploiting the vulnerability. If all administrative users already have admin/root privilege, I really don't see why they would have any interest on exploiting this.
Well.... Considering the risk of changing/upgrading the BIG-IP version with all the configuration problems you may face doing that, I would prefer to wait for a hotfix for your version.
This is only my opinion.
Source: SOL17407: Datastor kernel vulnerability CVE-2015-7394
- Brad_Parker_139
Nacreous
Don't go to v12.0 in production yet! It is brand spanking new and even F5 doesn't recommend going to x.0 versions in prod unless you are prepared for undocumented bugs. Wait for v12.1 if at all possible. As mentioned above, this exploit is not very "exploitable" even though the severity is high. If bad users are already able to login as admin you have way more issue to worry about.
- siru_129409
Nimbostratus
Thanks Brad...:)
- Brad_Parker
Cirrus
Don't go to v12.0 in production yet! It is brand spanking new and even F5 doesn't recommend going to x.0 versions in prod unless you are prepared for undocumented bugs. Wait for v12.1 if at all possible. As mentioned above, this exploit is not very "exploitable" even though the severity is high. If bad users are already able to login as admin you have way more issue to worry about.
- siru_129409
Nimbostratus
Thanks Brad...:)
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com