CVE-2023-3470

Severity

60%

Complexity

8%

Confidentiality

86%

Specific F5 BIG-IP platforms with Cavium Nitrox FIPS HSM cards generate a deterministic password for the Crypto User account.  The predictable nature of the password allows an authenticated user with TMSH access to the BIG-IP system, or anyone with physical access to the FIPS HSM, the information required to generate the correct password.  On vCMP systems, all Guests share the same deterministic password, allowing those with TMSH access on one Guest to access keys of a different Guest. The following BIG-IP hardware platforms are affected: 10350v-F, i5820-DF, i7820-DF, i15820-DF, 5250v-F, 7200v-F, 10200v-F, 6900-F, 8900-F, 11000-F, and 11050-F. The BIG-IP rSeries r5920-DF and r10920-DF are not affected, nor does the issue affect software FIPS implementations or network HSM configurations. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS 3.1 Base Score 6. CVSS Attack Vector: local. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N).

CVSS 3.1 Base Score 6.1. CVSS Attack Vector: physical. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).

Demo Examples

Improper Authentication

CWE-287

The following code intends to ensure that the user is already logged in. If not, the code performs authentication with the user-provided username and password. If successful, it sets the loggedin and user cookies to "remember" that the user has already logged in. Finally, the code performs administrator tasks if the logged-in user has the "Administrator" username, as recorded in the user cookie.


               
}
}
ExitError("Error: you need to log in first");
);
);
DoAdministratorTasks();

Unfortunately, this code can be bypassed. The attacker can set the cookies independently so that the code does not check the username and password. The attacker could do this with an HTTP request containing headers such as:


               
[body of request]

By setting the loggedin cookie to "true", the attacker bypasses the entire authentication check. By using the "Administrator" value in the user cookie, the attacker also gains privileges to administer the software.

Improper Authentication

CWE-287

Overview

Type

F5

First reported 1 year ago

2023-08-02 16:15:00

Last updated 1 year ago

2023-10-13 14:14:00

Affected Software

F5 BIG-IP Application Acceleration Manager (AAM) 15.1.0

15.1.0

F5 BIG-IP Local Traffic Manager (LTM) 15.1.0

15.1.0

F5 BIG-IP Advanced Firewall Manager (AFM) 15.1.0

15.1.0

F5 BIG-IP Policy Enforcement Manager (PEM) 15.1.0

15.1.0

F5 BIG-IP Link Controller 15.1.0

15.1.0

F5 BIG-IP Global Traffic Manager (GTM) 15.1.0

15.1.0

F5 BIG-IP Fraud Protection Service (FPS) 15.1.0

15.1.0

F5 BIG-IP Domain Name System (DNS) 15.1.0

15.1.0

F5 BIG-IP Application Security Manager (ASM) 15.1.0

15.1.0

F5 BIG-IP Access Policy Manager (APM) 15.1.0

15.1.0

F5 BIG-IP Analytics 15.1.0

15.1.0

F5 Big-IP Application Acceleration Manager (AAM)

F5 Networks Big-IP Local Traffic Manager (LTM)

F5 Big-IP Advanced Firewall Manager (AFM)

F5 Big-IP Analytics

F5 Big-IP Application Security Manager (ASM)

F5 Big-IP Access Policy Manager (APM)

F5 Big-IP Domain Name System (DNS)

F5 Big-IP Fraud Protection Service (FPS)

F5 Big-IP Global Traffic Manager (GTM)

F5 Big-IP Link Controller

F5 Big-IP Policy Enforcement Manager (PEM)

F5 BIG-IP WebAccelerator 15.1.0

15.1.0

F5 BIG-IP Edge Gateway 15.1.0

15.1.0

F5 Big-IP Edge Gateway

F5 Big-IP WebAccelerator

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.