On all versions of BIG-IP 12.1.x and 11.6.x, the original TLS protocol includes a weakness in the master secret negotiation that is mitigated by the Extended Master Secret (EMS) extension defined in RFC 7627. TLS connections that do not use EMS are vulnerable to man-in-the-middle attacks during renegotiation. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.
References
Link | Resource |
---|---|
https://support.f5.com/csp/article/K09121542 | Vendor Advisory |
https://support.f5.com/csp/article/K09121542 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://support.f5.com/csp/article/K09121542 - Vendor Advisory |
Information
Published : 2021-02-12 18:15
Updated : 2024-11-21 05:51
NVD link : CVE-2021-22981
Mitre link : CVE-2021-22981
CVE.ORG link : CVE-2021-22981
JSON object : View
Products Affected
f5
- big-ip_application_security_manager
- big-ip_application_acceleration_manager
- big-ip_global_traffic_manager
- big-ip_policy_enforcement_manager
- big-ip_ddos_hybrid_defender
- big-ip_domain_name_system
- big-ip_fraud_protection_service
- big-ip_link_controller
- big-ip_local_traffic_manager
- big-ip_advanced_web_application_firewall
- big-ip_advanced_firewall_manager
- big-ip_access_policy_manager
- big-ip_ssl_orchestrator
- big-ip_analytics
CWE