First published: Thu Mar 28 2024(Updated: )
The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP and BIG-IQ Centralized Management | >=17.1.0<=17.1.1 | 17.1.2 |
F5 BIG-IP and BIG-IQ Centralized Management | >=16.1.0<=16.1.5 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=15.1.0<=15.1.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of F5-K000139084 is high due to its potential to cause a denial of service through resource exhaustion.
To fix F5-K000139084, upgrade F5 BIG-IP to the latest versions 17.1.2, 16.1.5, or 15.1.10 as recommended by F5.
F5-K000139084 affects BIG-IP versions 17.1.0 to 17.1.1, 16.1.0 to 16.1.5, and 15.1.0 to 15.1.10.
F5-K000139084 is related to a flaw in DNSSEC responses that can be exploited for CPU consumption through NSEC3 processing.
Remote attackers can exploit the vulnerability F5-K000139084 by launching a random subdomain attack.