First published: Wed Mar 31 2021(Updated: )
On all 7.x and 6.x versions (fixed in 8.0.0), BIG-IQ high availability (HA) when using a Quorum device for automatic failover does not implement any form of authentication with the Corosync daemon. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP and BIG-IQ Centralized Management | >=6.0.0<=6.1.0 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=7.0.0<=7.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-22995 is high with a severity value of 7.5.
The affected software versions for CVE-2021-22995 are F5 Big-iq Centralized Management 6.x (6.0.0 to 6.1.0) and 7.x (7.0.0 to 7.1.0).
To fix CVE-2021-22995, upgrade to version 8.0.0 of F5 Big-iq Centralized Management.
CVE-2021-22995 is a vulnerability in F5 Big-iq Centralized Management that allows unauthorized access to the Corosync daemon in high availability (HA) mode.
Yes, you can refer to the following link for more information: https://support.f5.com/csp/article/K13155201