First published: Mon May 10 2021(Updated: )
On version 15.1.x before 15.1.3, 14.1.x before 14.1.4, 13.1.x before 13.1.4, 12.1.x before 12.1.6, and all versions of 16.0.x and 11.6.x., BIG-IP APM AD (Active Directory) authentication can be bypassed via a spoofed AS-REP (Kerberos Authentication Service Response) response sent over a hijacked KDC (Kerberos Key Distribution Center) connection or from an AD server compromised by an attacker. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 Access Policy Manager | >=11.5.2<11.6.5 | |
F5 Access Policy Manager | >=12.1.0<12.1.5 | |
F5 Access Policy Manager | >=13.1.0<13.1.3 | |
F5 Access Policy Manager | >=14.1.0<14.1.3 | |
F5 Access Policy Manager | >=15.0.0<15.1.2 | |
F5 Access Policy Manager | >=16.0.0<16.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-23008 is considered a critical vulnerability due to the potential for authentication bypass.
To fix CVE-2021-23008, upgrade to the latest version of BIG-IP APM, specifically versions 15.1.3, 14.1.4, 13.1.4, 12.1.6, or newer.
CVE-2021-23008 affects BIG-IP APM versions prior to 15.1.3, 14.1.4, 13.1.4, 12.1.6, and includes all versions of 16.0.x and 11.6.x.
CVE-2021-23008 can be exploited by sending a spoofed AS-REP response over a hijacked KDC to bypass authentication.
The impact of CVE-2021-23008 is significant as it allows unauthorized access to systems protected by BIG-IP APM.