NVD Vulnerability Detail
Search Exploit, PoC
CVE-2020-5888
Summary

On versions 15.1.0-15.1.0.1, 15.0.0-15.0.1.2, and 14.1.0-14.1.2.3, BIG-IP Virtual Edition (VE) may expose a mechanism for adjacent network (layer 2) attackers to access local daemons and bypass port lockdown settings.

Publication Date May 1, 2020, 7:15 a.m.
Registration Date Jan. 26, 2021, 11:59 a.m.
Last Update Nov. 21, 2024, 2:34 p.m.
CVSS3.1 : HIGH
スコア 8.1
Vector CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
攻撃元区分(AV) 隣接
攻撃条件の複雑さ(AC)
攻撃に必要な特権レベル(PR) 不要
利用者の関与(UI) 不要
影響の想定範囲(S) 変更なし
機密性への影響(C)
完全性への影響(I)
可用性への影響(A) なし
CVSS2.0 : LOW
Score 3.3
Vector AV:A/AC:L/Au:N/C:P/I:N/A:N
攻撃元区分(AV) 隣接
攻撃条件の複雑さ(AC)
攻撃前の認証要否(Au) 不要
機密性への影響(C)
完全性への影響(I) なし
可用性への影響(A) なし
Get all privileges. いいえ
Get user privileges いいえ
Get other privileges いいえ
User operation required いいえ
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* 15.1.0 15.1.0.2
cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* 14.1.0 14.1.2.4
cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* 15.0.0 15.0.1.3
Configuration2 or higher or less more than less than
cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* 15.1.0 15.1.0.2
cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* 14.1.0 14.1.2.4
cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* 15.0.0 15.0.1.3
Configuration3 or higher or less more than less than
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* 15.1.0 15.1.0.2
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* 14.1.0 14.1.2.4
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* 15.0.0 15.0.1.3
Configuration4 or higher or less more than less than
cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* 14.0.0 14.1.2.4
cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* 15.1.0 15.1.0.2
cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* 15.0.0 15.0.1.3
Configuration5 or higher or less more than less than
cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* 14.0.0 14.1.2.4
cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* 15.1.0 15.1.0.2
cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* 15.0.0 15.0.1.3
Configuration6 or higher or less more than less than
cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* 14.0.0 14.1.2.4
cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* 15.1.0 15.1.0.2
cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* 15.0.0 15.0.1.3
Configuration7 or higher or less more than less than
cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* 14.0.0 14.1.2.4
cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* 15.1.0 15.1.0.2
cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* 15.0.0 15.0.1.3
Configuration8 or higher or less more than less than
cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* 14.0.0 14.1.2.4
cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* 15.1.0 15.1.0.2
cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* 15.0.0 15.0.1.3
Configuration9 or higher or less more than less than
cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* 14.0.0 14.1.2.4
cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* 15.1.0 15.1.0.2
cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* 15.0.0 15.0.1.3
Configuration10 or higher or less more than less than
cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* 14.0.0 14.1.2.4
cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* 15.1.0 15.1.0.2
cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* 15.0.0 15.0.1.3
Configuration11 or higher or less more than less than
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* 14.0.0 14.1.2.4
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* 15.1.0 15.1.0.2
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* 15.0.0 15.0.1.3
Related information, measures and tools
Common Vulnerabilities List

JVN Vulnerability Information
BIG-IP Virtual Edition における脆弱性
Title BIG-IP Virtual Edition における脆弱性
Summary

BIG-IP Virtual Edition (VE) には、不特定の脆弱性が存在します。

Possible impacts 情報を取得される、および情報を改ざんされる可能性があります。
Solution

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

Publication Date April 30, 2020, midnight
Registration Date May 28, 2020, 5:52 p.m.
Last Update May 28, 2020, 5:52 p.m.
Affected System
F5 Networks
BIG-IP Access Policy Manager (APM) 
BIG-IP Advanced Firewall Manager (AFM) 
BIG-IP Analytics 
BIG-IP Application Acceleration Manager (AAM) 
BIG-IP Application Security Manager (ASM) 
BIG-IP Domain Name System (DNS) 
BIG-IP Fraud Protection Service (FPS) 
BIG-IP Global Traffic Manager (GTM) 
BIG-IP Link Controller 
BIG-IP Local Traffic Manager (LTM) 
BIG-IP Policy Enforcement Manager (PEM) 
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
No Changed Details Date of change
1 [2020年05月28日]
  掲載
May 28, 2020, 5:52 p.m.