Lucene search

K
nessusThis script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.F5_BIGIP_EDGE_CLIENT_K33757590.NASL
HistoryJul 16, 2021 - 12:00 a.m.

F5 BIG-IP Edge Client Windows 7.2.1 < 7.2.1.3 / 7.1.6 < 7.1.9.9 Update 1 DLL Hijacking (K33757590)

2021-07-1600:00:00
This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
85

6.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

27.2%

The version of the Big-IP Edge Client Windows Component Installer installed on the remote Windows host is 7.2.1 before 7.2.1.3, or between 7.1.6 and 7.1.9.9 Update 1. It is, therefore, affected by a DLL hijacking vulnerability. A local attacker can exploit this using a malicious DLL to gain privileged or administrator access to the system.

#%NASL_MIN_LEVEL 70300
##
# (C) Tenable Network Security, Inc.
##

include('deprecated_nasl_level.inc');

include('compat.inc');

if (description)
{
  script_id(151790);
  script_version("1.2");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/07/19");

  script_cve_id("CVE-2021-23023");
  script_xref(name:"IAVA", value:"2021-A-0306");

  script_name(english:"F5 BIG-IP Edge Client Windows 7.2.1 < 7.2.1.3 / 7.1.6 < 7.1.9.9 Update 1 DLL Hijacking (K33757590)");

  script_set_attribute(attribute:"synopsis", value:
"A web client installed on the remote Windows host is affected by a DLL hijacking vulnerability.");
  script_set_attribute(attribute:"description", value:
"The version of the Big-IP Edge Client Windows Component Installer installed on the remote Windows host is 7.2.1 before
 7.2.1.3, or between 7.1.6 and 7.1.9.9 Update 1. It is, therefore, affected by a DLL hijacking vulnerability. A local 
attacker can exploit this using a malicious DLL to gain privileged or administrator access to the system.");
  script_set_attribute(attribute:"see_also", value:"https://support.f5.com/csp/article/K33757590");
  script_set_attribute(attribute:"solution", value:
"Upgrade client software to a version referenced in the advisory.");
  script_set_cvss_base_vector("CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2021-23023");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");

  script_set_attribute(attribute:"vuln_publication_date", value:"2021/06/01");
  script_set_attribute(attribute:"patch_publication_date", value:"2021/06/01");
  script_set_attribute(attribute:"plugin_publication_date", value:"2021/07/16");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_edge_gateway");
  script_set_attribute(attribute:"stig_severity", value:"I");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("f5_bigip_edge_client_win_detect.nbin");
  script_require_keys("installed_sw/Big-IP Edge Gateway Client for Windows");

  exit(0);
}

include("vcf.inc");

get_kb_item_or_exit("SMB/Registry/Enumerated");

var app, app_info, constraints;

app = 'Big-IP Edge Gateway Client for Windows';

app_info = vcf::get_app_info(app:app, win_local:TRUE);

#To clarify versioning information to customer.
app_info.display_version = app_info.display_version + ' (' + app_info.version + ')';

constraints = [
  { 'min_version' : '7210', 'fixed_version' : '7213.2021.527.649', 'fixed_display' : '7.2.1.3 (7213.2021.527.649)' },
  { 'min_version' : '7160', 'fixed_version' : '7199.2021.527.907', 'fixed_display' : '7.1.9.9 (7199.2021.527.907)' }
];

vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING);
VendorProductVersionCPE
f5big-ip_edge_gatewaycpe:/a:f5:big-ip_edge_gateway

6.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

27.2%

Related for F5_BIGIP_EDGE_CLIENT_K33757590.NASL