First published: Thu Jul 16 2015(Updated: )
The REST API in F5 BIG-IQ Cloud, Device, and Security 4.4.0 and 4.5.0 before HF2 and ADC 4.5.0 before HF2, when configured for LDAP remote authentication and the LDAP server allows anonymous BIND operations, allows remote attackers to obtain an authentication token for arbitrary users by guessing an LDAP user account name.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IQ Application Delivery Controller | =4.5.0 | |
F5 BIG-IQ Cloud and Orchestration | =4.4.0 | |
F5 BIG-IQ Cloud and Orchestration | =4.5.0 | |
F5 BIG-IQ Device | =4.4.0 | |
F5 BIG-IQ Device | =4.5.0 | |
F5 BIG-IQ Security | =4.4.0 | |
F5 BIG-IQ Security | =4.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4637 is considered a high severity vulnerability due to its potential for remote exploitation and unauthorized access.
To mitigate CVE-2015-4637, ensure that your F5 BIG-IQ devices are updated to at least version 4.5.0 HF2 or 4.4.0 HF2 to disable anonymous BIND operations.
CVE-2015-4637 affects F5 BIG-IQ Cloud, Device, and Security versions 4.4.0 and 4.5.0 before HF2.
Yes, CVE-2015-4637 can allow remote attackers to obtain an authentication token for arbitrary users if the LDAP server permits anonymous BIND operations.
If unable to update, consider disabling LDAP authentication or enforcing restrictions on anonymous BIND operations as a temporary workaround for CVE-2015-4637.