Vulnerability in F5 BIG-IP Allows Access to Encrypted Messages

Vulnerability in F5 BIG-IP Allows Access to Encrypted Messages



In the implementation of the RSA algorithm in F5 BIG-IP, a vulnerability has been discovered that allows attackers to gain access to encrypted messages.

The problem identified by researchers Hanno Bock, Juraj Somorovsky and Craig Young received CVE-2017-6168. According to her description, “a virtual server configured to use the SSL protocol is vulnerable to the Adaptive Chosen Ciphertext attack (also known as Daniel Bleichenbacher’s attack) on the RSA algorithm, which allows an attacker without access to a private crypto to access encrypted messages and / or attack” man in the middle. “

Vulnerability in F5 BIG-IP Allows Access to Encrypted Messages

The vulnerability affects versions of BIG-IP 11.6.0-11.6.2, 12.0.0-12.1.2 HF1, 13.0.0-13.0.0 HF2.
According to representatives of the company F5 Networks, the implementation of this attack is quite complicated.

“In practice, in most cases, an attacker with the ability to intercept traffic can exploit the above vulnerability to access encrypted messages only after the session has ended. This attack works against TLS sessions that use key exchange using the RSA algorithm, “the message says.
According to the head of the cryptographic unit Cloudflare Nick Sullivan (Nick Sullivan), the vulnerability poses a significant danger.

“It’s hard to overestimate how serious this F5 bug is. It’s practically DROWN without SSLv2. If you work with a vulnerable F5 solution, anyone can forge a digital signature with your private RSA key, “Sullivan said.

Recall, in March 2016, it became known about the vulnerability in OpenSSL, which allows a new type of attack on HTTPS – DROWN (Decrypting RSA with Obsolete and Weakened eNcryption). This vulnerability is not specific to OpenSSL and affects the SSLv2 protocol directly. Although the protocol has long been rendered obsolete, it still supports a significant number of servers.

F5 BIG-IP – a line of devices on which you can install various modules from F5 to provide fault tolerance, load balancing, protection, acceleration and optimization of applications, servers and data centres. This is a server platform for a set of software products, which can be characterized by the general term Application Delivery Networking.



Now your take on this argument.

We would also like to hear what you feel about the topic we discussed today. Your feedback is very important to us. Feel free to drop your comments and recommendations. If you have a contrary opinion, you can drop that too.


You can also join our Facebook Page CRMNigeria for more updates. You can do that by clicking on the link or searching for our page on Facebook.


Action Point.
You need to confirm your subscription by clicking on the link sent to you. You can check the spam folder for it. Add us to your mailing list to receive directly from us.


PS: Click on the link below to sign up for my Online E-Course CRM Training. Make sure you confirm your subscription by clicking on the link sent to you. Thanks.

Vulnerability in F5 BIG-IP Allows Access to Encrypted Messages 1

Adeniyi Salau PMP , CCNA R&S , CDMP, CEP, MOS, MCP, CSCU (Project 2016), Microsoft Certified Security and Networking Associate is a Google and Beingcert Certified Digital Marketer, Project Manager and SEO Expert of repute with about a decade of Blogging and online marketing experience. He is always ready to share his experience with others.

Leave a Reply

Your email address will not be published. Required fields are marked *


CommentLuv badge