ID

VAR-201505-0014


CVE

CVE-2014-9326


TITLE

plural F5 BIG-IP Product Phone Home Function and Call Home Vulnerability under which man-in-the-middle attacks are executed in the automatic signature update function

Trust: 0.8

sources: JVNDB: JVNDB-2015-002594

DESCRIPTION

The automatic signature update functionality in the (1) Phone Home feature in F5 BIG-IP LTM, AAM, AFM, Analytics, APM, GTM, and Link Controller 11.5.0 through 11.6.0, ASM 10.0.0 through 11.6.0, and PEM 11.3.0 through 11.6.0 and the (2) Call Home feature in ASM 10.0.0 through 11.6.0 and PEM 11.3.0 through 11.6.0 does not properly validate server SSL certificates, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate. Supplementary information : CWE Vulnerability type by CWE-295: Improper Certificate Validation ( Incorrect certificate validation ) Has been identified. http://cwe.mitre.org/data/definitions/295.htmlMan-in-the-middle attacks through crafted certificates by third parties (man-in-the-middle attack) May be executed. Multiple F5 BIG-IP products are prone to multiple security-bypass vulnerabilities. F5 BIG-IP LTM, etc. LTM is a local traffic manager; APM is a solution that provides secure unified access to business-critical applications and networks. The vulnerability stems from the fact that the program does not properly verify the server certificate (related to the upgrade check and automatic signature update). An attacker can use this vulnerability to implement a man-in-the-middle attack by using a specially crafted certificate to deceive the F5 upgrade server. The following products and versions are affected: F5 BIG-IP LTM version 11.5.0 to 11.6.0, BIG-IP AAM version 11.5.0 to 11.6.0, BIG-IP AFM version 11.5.0 to 11.6.0, BIG-IP Analytics version 11.5.0 to 11.6.0, BIG-IP GTM version 11.5.0 to 11.6.0, BIG_IP Link Controller version 11.5.0 to 11.6.0, BIG-IP APM version 11.3.0 to Version 11.6.0, BIG-IP PEM version 11.3.0 to version 11.6.0, BIG-IP ASM version 10.0.0 and version 11.6.0

Trust: 1.98

sources: NVD: CVE-2014-9326 // JVNDB: JVNDB-2015-002594 // BID: 74650 // VULHUB: VHN-77271

AFFECTED PRODUCTS

vendor:f5model:big-ip policy enforcement managerscope:eqversion:11.5.2

Trust: 1.9

vendor:f5model:big-ip policy enforcement managerscope:eqversion:11.4.1

Trust: 1.9

vendor:f5model:big-ip application acceleration managerscope:eqversion:11.5.2

Trust: 1.9

vendor:f5model:big-ip application acceleration managerscope:eqversion:11.5.1

Trust: 1.9

vendor:f5model:big-ip policy enforcement managerscope:eqversion:11.5.0

Trust: 1.6

vendor:f5model:big-ip policy enforcement managerscope:eqversion:11.3.0

Trust: 1.6

vendor:f5model:big-ip policy enforcement managerscope:eqversion:11.4.0

Trust: 1.6

vendor:f5model:big-ip application acceleration managerscope:eqversion:11.6.0

Trust: 1.6

vendor:f5model:big-ip application acceleration managerscope:eqversion:11.5.0

Trust: 1.6

vendor:f5model:big-ip local traffic managerscope:eqversion:11.5.2

Trust: 1.3

vendor:f5model:big-ip link controllerscope:eqversion:11.5.2

Trust: 1.3

vendor:f5model:big-ip link controllerscope:eqversion:11.5.1

Trust: 1.3

vendor:f5model:big-ip global traffic managerscope:eqversion:11.5.2

Trust: 1.3

vendor:f5model:big-ip application security managerscope:eqversion:11.5.2

Trust: 1.3

vendor:f5model:big-ip application security managerscope:eqversion:11.5.1

Trust: 1.3

vendor:f5model:big-ip analyticsscope:eqversion:11.5.2

Trust: 1.3

vendor:f5model:big-ip analyticsscope:eqversion:11.5.1

Trust: 1.3

vendor:f5model:big-ip analyticsscope:eqversion:11.6.0

Trust: 1.3

vendor:f5model:big-ip advanced firewall managerscope:eqversion:11.5.2

Trust: 1.3

vendor:f5model:big-ip advanced firewall managerscope:eqversion:11.5.1

Trust: 1.3

vendor:f5model:big-ip access policy managerscope:eqversion:11.5.2

Trust: 1.3

vendor:f5model:big-ip access policy managerscope:eqversion:11.5.1

Trust: 1.3

vendor:f5model:big-ip access policy managerscope:eqversion:11.6.0

Trust: 1.3

vendor:f5model:big-ip global traffic managerscope:eqversion:11.6.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:eqversion:11.5.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:eqversion:11.5.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:eqversion:11.5.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:eqversion:11.5.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:eqversion:11.6.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:eqversion:11.6.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:eqversion:11.5.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:eqversion:11.5.1

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:eqversion:11.6.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:eqversion:11.6.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement manager11.5.1scope:eqversion:*

Trust: 1.0

vendor:f5model:big-ip link controllerscope:eqversion:11.6.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:eqversion:11.5.1

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:eqversion:11.5.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:eqversion:11.5.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:eqversion:11.5.0 to 11.6.0

Trust: 0.8

vendor:f5model:big-ip advanced firewall managerscope:eqversion:11.5.0 to 11.6.0

Trust: 0.8

vendor:f5model:big-ip analyticsscope:eqversion:11.5.0 to 11.6.0

Trust: 0.8

vendor:f5model:big-ip application acceleration managerscope:eqversion:11.5.0 to 11.6.0

Trust: 0.8

vendor:f5model:big-ip application security managerscope:eqversion:10.0.0 to 11.6.0

Trust: 0.8

vendor:f5model:big-ip global traffic managerscope:eqversion:11.5.0 to 11.6.0

Trust: 0.8

vendor:f5model:big-ip link controllerscope:eqversion:11.5.0 to 11.6.0

Trust: 0.8

vendor:f5model:big-ip local traffic managerscope:eqversion:11.5.0 to 11.6.0

Trust: 0.8

vendor:f5model:big-ip policy enforcement managerscope:eqversion:11.3.0 to 11.6.0

Trust: 0.8

vendor:f5model:big-ip policy enforcement manager11.5.1scope: - version: -

Trust: 0.6

vendor:f5model:big-ip policy enforcement managerscope:eqversion:11.6

Trust: 0.3

vendor:f5model:big-ip policy enforcement managerscope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip policy enforcement managerscope:eqversion:11.5

Trust: 0.3

vendor:f5model:big-ip policy enforcement managerscope:eqversion:11.4

Trust: 0.3

vendor:f5model:big-ip policy enforcement managerscope:eqversion:11.3

Trust: 0.3

vendor:f5model:big-ip local traffic managerscope:eqversion:11.6

Trust: 0.3

vendor:f5model:big-ip local traffic managerscope:eqversion:11.5

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.6

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.5

Trust: 0.3

vendor:f5model:big-ip global traffic managerscope:eqversion:11.6

Trust: 0.3

vendor:f5model:big-ip global traffic managerscope:eqversion:11.5

Trust: 0.3

vendor:f5model:big-ip application security managerscope:eqversion:11.6

Trust: 0.3

vendor:f5model:big-ip application security managerscope:eqversion:11.5

Trust: 0.3

vendor:f5model:big-ip application acceleration managerscope:eqversion:11.6

Trust: 0.3

vendor:f5model:big-ip application acceleration managerscope:eqversion:11.5

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.5

Trust: 0.3

vendor:f5model:big-ip advanced firewall managerscope:eqversion:11.6

Trust: 0.3

vendor:f5model:big-ip advanced firewall managerscope:eqversion:11.5

Trust: 0.3

vendor:f5model:big-ip access policy managerscope:eqversion:11.5

Trust: 0.3

sources: BID: 74650 // JVNDB: JVNDB-2015-002594 // CNNVD: CNNVD-201505-014 // NVD: CVE-2014-9326

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-9326
value: MEDIUM

Trust: 1.0

NVD: CVE-2014-9326
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201505-014
value: MEDIUM

Trust: 0.6

VULHUB: VHN-77271
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2014-9326
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-77271
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-77271 // JVNDB: JVNDB-2015-002594 // CNNVD: CNNVD-201505-014 // NVD: CVE-2014-9326

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-Other

Trust: 0.8

sources: JVNDB: JVNDB-2015-002594 // NVD: CVE-2014-9326

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201505-014

TYPE

encryption problem

Trust: 0.6

sources: CNNVD: CNNVD-201505-014

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-002594

PATCH

title:SOL16090url:https://support.f5.com/kb/en-us/solutions/public/16000/000/sol16090.html

Trust: 0.8

sources: JVNDB: JVNDB-2015-002594

EXTERNAL IDS

db:NVDid:CVE-2014-9326

Trust: 2.8

db:SECTRACKid:1032305

Trust: 1.1

db:JVNDBid:JVNDB-2015-002594

Trust: 0.8

db:SECUNIAid:64243

Trust: 0.6

db:CNNVDid:CNNVD-201505-014

Trust: 0.6

db:BIDid:74650

Trust: 0.4

db:VULHUBid:VHN-77271

Trust: 0.1

sources: VULHUB: VHN-77271 // BID: 74650 // JVNDB: JVNDB-2015-002594 // CNNVD: CNNVD-201505-014 // NVD: CVE-2014-9326

REFERENCES

url:https://support.f5.com/kb/en-us/solutions/public/16000/000/sol16090.html

Trust: 2.0

url:http://www.securitytracker.com/id/1032305

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-9326

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-9326

Trust: 0.8

url:http://secunia.com/advisories/64243

Trust: 0.6

url:http://www.f5.com/products/big-ip/

Trust: 0.3

sources: VULHUB: VHN-77271 // BID: 74650 // JVNDB: JVNDB-2015-002594 // CNNVD: CNNVD-201505-014 // NVD: CVE-2014-9326

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 74650

SOURCES

db:VULHUBid:VHN-77271
db:BIDid:74650
db:JVNDBid:JVNDB-2015-002594
db:CNNVDid:CNNVD-201505-014
db:NVDid:CVE-2014-9326

LAST UPDATE DATE

2024-11-23T22:59:36.532000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-77271date:2017-01-03T00:00:00
db:BIDid:74650date:2015-05-12T00:00:00
db:JVNDBid:JVNDB-2015-002594date:2015-05-14T00:00:00
db:CNNVDid:CNNVD-201505-014date:2015-05-13T00:00:00
db:NVDid:CVE-2014-9326date:2024-11-21T02:20:37.797

SOURCES RELEASE DATE

db:VULHUBid:VHN-77271date:2015-05-12T00:00:00
db:BIDid:74650date:2015-05-12T00:00:00
db:JVNDBid:JVNDB-2015-002594date:2015-05-14T00:00:00
db:CNNVDid:CNNVD-201505-014date:2015-05-04T00:00:00
db:NVDid:CVE-2014-9326date:2015-05-12T19:59:03.630