Forum Discussion
How to protect F5 BigIP/Viprion System from shellshock
Hi All,
I have few questions regarding BigIP and Viprion vulnerabilities. 1. if tcp port 443 and ssh are open on SelP-IPs, is it vulnerable to the attack? 2. what are the mitigation to protect the BigIP system itself aside from upgrading to 11.5.1 HF5?
Thanks!
3 Replies
- nathe
Cirrocumulus
- yes
- last week's update was that the only exploit f5 had seen against the management gui was when authenticated only. This is important to note. i.e. user had to have admin/root, for example, privileges to exploit the gui with an attack.
F5's advice (and constant best practice anyway) is to have the mgmt interface connected to a secure, private subnet only, and any self-ips that are externally facing need to have 443 access disabled.
Hope this helps,
N
- Spidey_29396
Nimbostratus
Thanks Nathan. Is there any patch like the "ssh vulnerability patch" last 2012? I'm afraid one of our customers need to open port 443 via SelfIPs since it is the only way to manage it from remote.
- nathe
Cirrocumulus
I'm not sure to be honest. f5 support might be able to help on this.
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com