In versions 13.0.0-13.0.0 HF2, 12.1.0-12.1.2 HF1, and 11.6.1-11.6.2, BIG-IP platforms with Cavium Nitrox SSL hardware acceleration cards, a Virtual Server configured with a Client SSL profile, and using Anonymous (ADH) or Ephemeral (DHE) Diffie-Hellman key exchange and Single DH use option not enabled in the options list may be vulnerable to crafted SSL/TLS Handshakes that may result with a PMS (Pre-Master Secret) that starts in a 0 byte and may lead to a recovery of plaintext messages as BIG-IP TLS/SSL ADH/DHE sends different error messages acting as an oracle. Similar error messages when PMS starts with 0 byte coupled with very precise timing measurement observation may also expose this vulnerability.
References
Link | Resource |
---|---|
https://support.f5.com/csp/article/K91158923 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2020-09-25 14:15
Updated : 2024-02-28 18:08
NVD link : CVE-2020-5929
Mitre link : CVE-2020-5929
CVE.ORG link : CVE-2020-5929
JSON object : View
Products Affected
f5
- big-ip_ddos_hybrid_defender
- big-ip_domain_name_system
- big-ip_advanced_web_application_firewall
- big-ip_analytics
- ssl_orchestrator
- big-ip_advanced_firewall_manager
- big-ip_fraud_protection_service
- big-ip_local_traffic_manager
- big-ip_application_acceleration_manager
- big-ip_link_controller
- big-ip_global_traffic_manager
- big-ip_application_security_manager
- big-ip_policy_enforcement_manager
- big-ip_access_policy_manager
CWE
CWE-203
Observable Discrepancy