On all versions of BIG-IP 12.1.x and 11.6.x, the original TLS protocol includes a weakness in the master secret negotiation that is mitigated by the Extended Master Secret (EMS) extension defined in RFC 7627. TLS connections that do not use EMS are vulnerable to man-in-the-middle attacks during renegotiation. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.
References
Link | Resource |
---|---|
https://support.f5.com/csp/article/K09121542 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2021-02-12 10:15
Updated : 2021-02-19 09:14
NVD link : CVE-2021-22981
Mitre link : CVE-2021-22981
JSON object : View
CWE
Products Affected
f5
- big-ip_domain_name_system
- big-ip_global_traffic_manager
- big-ip_link_controller
- big-ip_ssl_orchestrator
- big-ip_advanced_firewall_manager
- big-ip_advanced_web_application_firewall
- big-ip_application_security_manager
- big-ip_access_policy_manager
- big-ip_local_traffic_manager
- big-ip_application_acceleration_manager
- big-ip_analytics
- big-ip_policy_enforcement_manager
- big-ip_fraud_protection_service
- big-ip_ddos_hybrid_defender