ID

VAR-202008-0937


CVE

CVE-2020-5921


TITLE

plural BIG-IP Product exhaustion vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2020-010302

DESCRIPTION

in BIG-IP versions 15.1.0-15.1.0.4, 15.0.0-15.0.1.3, 14.1.0-14.1.2.6, 13.1.0-13.1.3.4, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.2, Syn flood causes large number of MCPD context messages destined to secondary blades consuming memory leading to MCPD failure. This issue affects only VIPRION hosts with two or more blades installed. Single-blade VIPRION hosts are not affected. plural BIG-IP The product contains a resource exhaustion vulnerability.Service operation interruption (DoS) It may be put into a state. BIG-IP version 15.1.0 to 15.1.0.4, version 15.0.0 to 15.0.1.3, version 14.1.0 to 14.1.2.3, version 13.1.0 to 13.1.3.3, 12.1.0 Versions up to 12.1.5.1 and versions between 11.6.1 and 11.6.5.1 have a security vulnerability

Trust: 1.71

sources: NVD: CVE-2020-5921 // JVNDB: JVNDB-2020-010302 // VULHUB: VHN-184046

AFFECTED PRODUCTS

vendor:f5model:big-ip domain name systemscope:ltversion:12.1.5.2

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:ltversion:15.1.0.5

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:ltversion:14.1.2.7

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:ltversion:12.1.5.2

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:ltversion:15.0.1.4

Trust: 1.0

vendor:f5model:big-ip analyticsscope:ltversion:14.1.2.7

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:ltversion:15.1.0.5

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:ltversion:15.1.0.5

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:ltversion:15.1.0.5

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:ltversion:15.0.1.4

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:ltversion:15.1.0.5

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:ltversion:15.0.1.4

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:ltversion:15.0.1.4

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:ltversion:15.1.0.5

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:ltversion:15.0.1.4

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:ltversion:15.1.0.5

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:ltversion:15.1.0.5

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:ltversion:12.1.5.2

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:ltversion:15.0.1.4

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:ltversion:14.1.2.7

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:ltversion:12.1.5.2

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:ltversion:12.1.5.2

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:ltversion:15.0.1.4

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:ltversion:14.1.2.7

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:ltversion:14.1.2.7

Trust: 1.0

vendor:f5model:big-ip application security managerscope:ltversion:15.0.1.4

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:ltversion:12.1.5.2

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:ltversion:15.1.0.5

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:ltversion:14.1.2.7

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:ltversion:12.1.5.2

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:ltversion:15.1.0.5

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:ltversion:14.1.2.7

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:ltversion:12.1.5.2

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:ltversion:15.0.1.4

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:ltversion:12.1.5.2

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:ltversion:14.1.2.7

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:ltversion:12.1.5.2

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:ltversion:14.1.2.7

Trust: 1.0

vendor:f5model:big-ip application security managerscope:ltversion:14.1.2.7

Trust: 1.0

vendor:f5model:big-ip analyticsscope:ltversion:15.1.0.5

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:ltversion:15.0.1.4

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:ltversion:15.0.1.4

Trust: 1.0

vendor:f5model:big-ip link controllerscope:ltversion:12.1.5.2

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:ltversion:14.1.2.7

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip advanced firewall managerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip analyticsscope: - version: -

Trust: 0.8

vendor:f5model:big-ip application acceleration managerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip application security managerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip domain name systemscope: - version: -

Trust: 0.8

vendor:f5model:big-ip fraud protection servicescope: - version: -

Trust: 0.8

vendor:f5model:big-ip global traffic managerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip link controllerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip local traffic managerscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2020-010302 // NVD: CVE-2020-5921

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-5921
value: HIGH

Trust: 1.0

NVD: JVNDB-2020-010302
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202008-1223
value: HIGH

Trust: 0.6

VULHUB: VHN-184046
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-5921
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-010302
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-184046
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-5921
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: JVNDB-2020-010302
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-184046 // JVNDB: JVNDB-2020-010302 // CNNVD: CNNVD-202008-1223 // NVD: CVE-2020-5921

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-400

Trust: 0.9

sources: VULHUB: VHN-184046 // JVNDB: JVNDB-2020-010302 // NVD: CVE-2020-5921

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202008-1223

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-202008-1223

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-010302

PATCH

title:K00103216url:https://support.f5.com/csp/article/K00103216

Trust: 0.8

title:BIG-IP Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=127491

Trust: 0.6

sources: JVNDB: JVNDB-2020-010302 // CNNVD: CNNVD-202008-1223

EXTERNAL IDS

db:NVDid:CVE-2020-5921

Trust: 2.5

db:JVNDBid:JVNDB-2020-010302

Trust: 0.8

db:CNNVDid:CNNVD-202008-1223

Trust: 0.7

db:AUSCERTid:ESB-2020.2931

Trust: 0.6

db:AUSCERTid:ESB-2020.2931.2

Trust: 0.6

db:VULHUBid:VHN-184046

Trust: 0.1

sources: VULHUB: VHN-184046 // JVNDB: JVNDB-2020-010302 // CNNVD: CNNVD-202008-1223 // NVD: CVE-2020-5921

REFERENCES

url:https://support.f5.com/csp/article/k00103216

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2020-5921

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-5921

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2020.2931/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2931.2/

Trust: 0.6

url:https://vigilance.fr/vulnerability/f5-big-ip-memory-leak-via-viprion-mcpd-syn-flood-33147

Trust: 0.6

sources: VULHUB: VHN-184046 // JVNDB: JVNDB-2020-010302 // CNNVD: CNNVD-202008-1223 // NVD: CVE-2020-5921

SOURCES

db:VULHUBid:VHN-184046
db:JVNDBid:JVNDB-2020-010302
db:CNNVDid:CNNVD-202008-1223
db:NVDid:CVE-2020-5921

LAST UPDATE DATE

2024-11-23T23:07:54.161000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-184046date:2021-07-21T00:00:00
db:JVNDBid:JVNDB-2020-010302date:2021-01-06T05:44:17
db:CNNVDid:CNNVD-202008-1223date:2020-10-22T00:00:00
db:NVDid:CVE-2020-5921date:2024-11-21T05:34:49.900

SOURCES RELEASE DATE

db:VULHUBid:VHN-184046date:2020-08-26T00:00:00
db:JVNDBid:JVNDB-2020-010302date:2021-01-06T05:44:17
db:CNNVDid:CNNVD-202008-1223date:2020-08-26T00:00:00
db:NVDid:CVE-2020-5921date:2020-08-26T16:15:12.823