CVE Vulnerabilities

CVE-2021-23034

Exposure of Resource to Wrong Sphere

Published: Sep 14, 2021 | Modified: Sep 27, 2021
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
7.1 HIGH
AV:N/AC:M/Au:N/C:N/I:N/A:C
RedHat/V2
RedHat/V3
Ubuntu

On BIG-IP version 16.x before 16.1.0 and 15.1.x before 15.1.3.1, when a DNS profile using a DNS cache resolver is configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) process to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Weakness

The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.

Affected Software

Name Vendor Start Version End Version
Big-ip_access_policy_manager F5 15.1.0 (including) 15.1.3.1 (excluding)
Big-ip_access_policy_manager F5 16.0.0 (including) 16.1.0 (excluding)
Big-ip_advanced_firewall_manager F5 15.1.0 (including) 15.1.3.1 (excluding)
Big-ip_advanced_firewall_manager F5 16.0.0 (including) 16.1.0 (excluding)
Big-ip_analytics F5 15.1.0 (including) 15.1.3.1 (excluding)
Big-ip_analytics F5 16.0.0 (including) 16.1.0 (excluding)
Big-ip_application_acceleration_manager F5 15.1.0 (including) 15.1.3.1 (excluding)
Big-ip_application_acceleration_manager F5 16.0.0 (including) 16.1.0 (excluding)
Big-ip_application_security_manager F5 15.1.0 (including) 15.1.3.1 (excluding)
Big-ip_application_security_manager F5 16.0.0 (including) 16.1.0 (excluding)
Big-ip_domain_name_system F5 15.1.0 (including) 15.1.3.1 (excluding)
Big-ip_domain_name_system F5 16.0.0 (including) 16.1.0 (excluding)
Big-ip_fraud_protection_service F5 15.1.0 (including) 15.1.3.1 (excluding)
Big-ip_fraud_protection_service F5 16.0.0 (including) 16.1.0 (excluding)
Big-ip_global_traffic_manager F5 15.1.0 (including) 15.1.3.1 (excluding)
Big-ip_global_traffic_manager F5 16.0.0 (including) 16.1.0 (excluding)
Big-ip_link_controller F5 15.1.0 (including) 15.1.3.1 (excluding)
Big-ip_link_controller F5 16.0.0 (including) 16.1.0 (excluding)
Big-ip_local_traffic_manager F5 15.1.0 (including) 15.1.3.1 (excluding)
Big-ip_local_traffic_manager F5 16.0.0 (including) 16.1.0 (excluding)
Big-ip_policy_enforcement_manager F5 15.1.0 (including) 15.1.3.1 (excluding)
Big-ip_policy_enforcement_manager F5 16.0.0 (including) 16.1.0 (excluding)

Extended Description

Resources such as files and directories may be inadvertently exposed through mechanisms such as insecure permissions, or when a program accidentally operates on the wrong object. For example, a program may intend that private files can only be provided to a specific user. This effectively defines a control sphere that is intended to prevent attackers from accessing these private files. If the file permissions are insecure, then parties other than the user will be able to access those files. A separate control sphere might effectively require that the user can only access the private files, but not any other files on the system. If the program does not ensure that the user is only requesting private files, then the user might be able to access other files on the system. In either case, the end result is that a resource has been exposed to the wrong party.

References