First published: Wed Jul 25 2018(Updated: )
On F5 BIG-IP DNS 13.1.0-13.1.0.7, 12.1.3-12.1.3.5, DNS Express / DNS Zones accept NOTIFY messages on the management interface from source IP addresses not listed in the 'Allow NOTIFY From' configuration parameter when the db variable "dnsexpress.notifyport" is set to any value other than the default of "0".
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP | >=12.1.3<=12.1.3.5 | |
F5 BIG-IP | >13.1.0<=13.1.0.7 | |
Riverbed SteelApp Traffic Manager | >=12.1.3<=12.1.3.5 | |
Riverbed SteelApp Traffic Manager | >=13.1.0<=13.1.0.7 | |
Riverbed SteelApp Traffic Manager | >=12.1.3<=12.1.3.5 | |
Riverbed SteelApp Traffic Manager | >=13.1.0<=13.1.0.7 | |
F5 BIG-IP Link Controller | >=12.1.3<=12.1.3.5 | |
F5 BIG-IP Link Controller | >=13.1.0<=13.1.0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-5538 has a medium severity rating, impacting the F5 BIG-IP DNS and related modules.
To address CVE-2018-5538, update your F5 BIG-IP software to the latest version that resolves this vulnerability.
CVE-2018-5538 affects F5 BIG-IP DNS, Global Traffic Manager, Local Traffic Manager, and Link Controller versions specified in the vulnerability details.
Exploitation of CVE-2018-5538 may allow unauthorized NOTIFY messages to be accepted on the management interface, leading to potential misconfigurations.
A temporary workaround for CVE-2018-5538 includes restricting the source IP addresses allowed to send NOTIFY messages based on your environment's requirements.