First published: Fri Feb 12 2021(Updated: )
On all versions of BIG-IP 12.1.x and 11.6.x, the original TLS protocol includes a weakness in the master secret negotiation that is mitigated by the Extended Master Secret (EMS) extension defined in RFC 7627. TLS connections that do not use EMS are vulnerable to man-in-the-middle attacks during renegotiation. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Access Policy Manager | >=11.6.1<=11.6.5 | |
F5 BIG-IP Access Policy Manager | >=12.1.0<=12.1.5 | |
F5 BIG-IP Advanced Firewall Manager | >=11.6.1<=11.6.5 | |
F5 BIG-IP Advanced Firewall Manager | >=12.1.0<=12.1.5 | |
F5 Big-ip Advanced Web Application Firewall | >=11.6.1<=11.6.5 | |
F5 Big-ip Advanced Web Application Firewall | >=12.1.0<=12.1.5 | |
F5 BIG-IP Analytics | >=11.6.1<=11.6.5 | |
F5 BIG-IP Analytics | >=12.1.0<=12.1.5 | |
F5 Big-ip Application Acceleration Manager | >=11.6.1<=11.6.5 | |
F5 Big-ip Application Acceleration Manager | >=12.1.0<=12.1.5 | |
F5 BIG-IP Application Security Manager | >=11.6.1<=11.6.5 | |
F5 BIG-IP Application Security Manager | >=12.1.0<=12.1.5 | |
F5 Big-ip Ddos Hybrid Defender | >=11.6.1<=11.6.5 | |
F5 Big-ip Ddos Hybrid Defender | >=12.1.0<=12.1.5 | |
F5 Big-ip Domain Name System | >=11.6.1<=11.6.5 | |
F5 Big-ip Domain Name System | >=12.1.0<=12.1.5 | |
F5 Big-ip Fraud Protection Service | >=11.6.1<=11.6.5 | |
F5 Big-ip Fraud Protection Service | >=12.1.0<=12.1.5 | |
F5 Big-ip Global Traffic Manager | >=11.6.1<=11.6.5 | |
F5 Big-ip Global Traffic Manager | >=12.1.0<=12.1.5 | |
F5 Big-ip Link Controller | >=11.6.1<=11.6.5 | |
F5 Big-ip Link Controller | >=12.1.0<=12.1.5 | |
F5 Big-ip Local Traffic Manager | >=11.6.1<=11.6.5 | |
F5 Big-ip Local Traffic Manager | >=12.1.0<=12.1.5 | |
F5 Big-ip Policy Enforcement Manager | >=11.6.1<=11.6.5 | |
F5 Big-ip Policy Enforcement Manager | >=12.1.0<=12.1.5 | |
F5 Big-ip Ssl Orchestrator | >=11.6.1<=11.6.5 | |
F5 Big-ip Ssl Orchestrator | >=12.1.0<=12.1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22981 is a vulnerability in all versions of BIG-IP 12.1.x and 11.6.x that affects the master secret negotiation in the original TLS protocol.
CVE-2021-22981 affects F5 BIG-IP products, including Access Policy Manager, Advanced Firewall Manager, Advanced Web Application Firewall, Analytics, Application Acceleration Manager, Application Security Manager, DDoS Hybrid Defender, Domain Name System, Fraud Protection Service, Global Traffic Manager, Link Controller, Local Traffic Manager, Policy Enforcement Manager, and SSL Orchestrator.
The severity of CVE-2021-22981 is medium with a CVSS score of 4.8.
CVE-2021-22981 can be mitigated by using the Extended Master Secret (EMS) extension defined in RFC 7627 for TLS connections.
For more information about CVE-2021-22981, you can refer to the F5 support article at https://support.f5.com/csp/article/K09121542.