First published: Mon Sep 09 2024(Updated: )
RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Next Central Manager | >=20.2.0<=20.3.0 | |
F5 BIG-IP (APM) | >=17.1.0<=17.1.1 | 17.1.2417.1.1.4 |
F5 BIG-IP (APM) | >=16.1.0<=16.1.5 | - |
F5 BIG-IP (APM) | >=15.1.0<=15.1.10 | - |
F5 BIG-IP | >=17.1.0<=17.1.1 | 17.1.2417.1.1.4 |
F5 BIG-IP | >=16.1.0<=16.1.5 | - |
F5 BIG-IP | >=15.1.0<=15.1.10 | - |
F5 BIG-IQ Centralized Management | >=8.2.0<=8.3.0 | |
F5 F5OS-A | =1.7.0>=1.5.1<=1.5.2 | 1.8.0 |
F5 F5OS-C | >=1.6.0<=1.6.2 | 1.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of F5-K000141008 is considered high due to the potential for forgery attacks on the RADIUS Protocol.
To mitigate the F5-K000141008 vulnerability, upgrade to the specified remedial software versions provided by F5.
F5-K000141008 affects multiple products including F5 BIG-IP, F5 BIG-IP (APM), F5 BIG-IQ, and F5 F5OS.
F5-K000141008 allows local attackers to perform forgery attacks using a chosen-prefix collision against the MD5 Response Authenticator.
Yes, specific remedial versions like 17.1.2417.1.1.4 for BIG-IP (APM) are recommended for addressing F5-K000141008.