CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
42.5%
SYN flood causes a large number of MCPD context messages destined to secondary blades consuming memory and leading to MCPD failure.
(CVE-2020-5921)
Impact
This issue affects only VIPRION hosts with two or more blades installed, including those with Virtual Clustered Multiprocessing (vCMP) provisioned. vCMP guests are also affected when running on VIPRION hosts with two or more blades installed. Single-blade VIPRION hosts are not affected.
The mcpd process progressively consumes excessive memory, leading to slow response times, and eventually the mcpd process will fail. If another BIG-IP system is configured in ahigh availability (HA) group, a failover occurs.
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from F5 Networks BIG-IP Solution K00103216.
#
# The text description of this plugin is (C) F5 Networks.
#
include('compat.inc');
if (description)
{
script_id(139813);
script_version("1.10");
script_set_attribute(attribute:"plugin_modification_date", value:"2023/11/02");
script_cve_id("CVE-2020-5921");
script_xref(name:"IAVA", value:"2020-A-0395-S");
script_name(english:"F5 Networks BIG-IP : BIG-IP VIPRION MCPD vulnerability (K00103216)");
script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch.");
script_set_attribute(attribute:"description", value:
"SYN flood causes a large number of MCPD context messages destined to
secondary blades consuming memory and leading to MCPD failure.
(CVE-2020-5921)
Impact
This issue affects only VIPRION hosts with two or more blades
installed, including those with Virtual Clustered Multiprocessing
(vCMP) provisioned. vCMP guests are also affected when running on
VIPRION hosts with two or more blades installed. Single-blade VIPRION
hosts are not affected.
The mcpd process progressively consumes excessive memory, leading to
slow response times, and eventually the mcpd process will fail. If
another BIG-IP system is configured in ahigh availability (HA) group,
a failover occurs.");
script_set_attribute(attribute:"see_also", value:"https://my.f5.com/manage/s/article/K00103216");
script_set_attribute(attribute:"solution", value:
"Upgrade to one of the non-vulnerable versions listed in the F5 Solution K00103216.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2020-5921");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"vuln_publication_date", value:"2020/08/26");
script_set_attribute(attribute:"patch_publication_date", value:"2020/08/25");
script_set_attribute(attribute:"plugin_publication_date", value:"2020/08/26");
script_set_attribute(attribute:"potential_vulnerability", value:"true");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_access_policy_manager");
script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_advanced_firewall_manager");
script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_application_acceleration_manager");
script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_application_security_manager");
script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_application_visibility_and_reporting");
script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_domain_name_system");
script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_global_traffic_manager");
script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_link_controller");
script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_local_traffic_manager");
script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_policy_enforcement_manager");
script_set_attribute(attribute:"cpe", value:"cpe:/h:f5:big-ip");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_set_attribute(attribute:"stig_severity", value:"I");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"F5 Networks Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2020-2023 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("f5_bigip_detect.nbin");
script_require_keys("Host/local_checks_enabled", "Host/BIG-IP/hotfix", "Host/BIG-IP/modules", "Host/BIG-IP/version", "Settings/ParanoidReport");
exit(0);
}
include('f5_func.inc');
if ( ! get_kb_item('Host/local_checks_enabled') ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
var version = get_kb_item('Host/BIG-IP/version');
if ( ! version ) audit(AUDIT_OS_NOT, 'F5 Networks BIG-IP');
if ( isnull(get_kb_item('Host/BIG-IP/hotfix')) ) audit(AUDIT_KB_MISSING, 'Host/BIG-IP/hotfix');
if ( ! get_kb_item('Host/BIG-IP/modules') ) audit(AUDIT_KB_MISSING, 'Host/BIG-IP/modules');
if (report_paranoia < 2) audit(AUDIT_PARANOID);
var sol = 'K00103216';
var vmatrix = {
'AFM': {
'affected': [
'15.1.0','15.0.0-15.0.1','14.1.0-14.1.2','13.1.0-13.1.3','12.1.0-12.1.5','11.6.1-11.6.5'
],
'unaffected': [
'16.0.0','15.1.0.5','15.0.1.4','14.1.2.7','13.1.3.5','12.1.5.2','11.6.5.3'
],
},
'AM': {
'affected': [
'15.1.0','15.0.0-15.0.1','14.1.0-14.1.2','13.1.0-13.1.3','12.1.0-12.1.5','11.6.1-11.6.5'
],
'unaffected': [
'16.0.0','15.1.0.5','15.0.1.4','14.1.2.7','13.1.3.5','12.1.5.2','11.6.5.3'
],
},
'APM': {
'affected': [
'15.1.0','15.0.0-15.0.1','14.1.0-14.1.2','13.1.0-13.1.3','12.1.0-12.1.5','11.6.1-11.6.5'
],
'unaffected': [
'16.0.0','15.1.0.5','15.0.1.4','14.1.2.7','13.1.3.5','12.1.5.2','11.6.5.3'
],
},
'ASM': {
'affected': [
'15.1.0','15.0.0-15.0.1','14.1.0-14.1.2','13.1.0-13.1.3','12.1.0-12.1.5','11.6.1-11.6.5'
],
'unaffected': [
'16.0.0','15.1.0.5','15.0.1.4','14.1.2.7','13.1.3.5','12.1.5.2','11.6.5.3'
],
},
'AVR': {
'affected': [
'15.1.0','15.0.0-15.0.1','14.1.0-14.1.2','13.1.0-13.1.3','12.1.0-12.1.5','11.6.1-11.6.5'
],
'unaffected': [
'16.0.0','15.1.0.5','15.0.1.4','14.1.2.7','13.1.3.5','12.1.5.2','11.6.5.3'
],
},
'DNS': {
'affected': [
'15.1.0','15.0.0-15.0.1','14.1.0-14.1.2','13.1.0-13.1.3','12.1.0-12.1.5','11.6.1-11.6.5'
],
'unaffected': [
'16.0.0','15.1.0.5','15.0.1.4','14.1.2.7','13.1.3.5','12.1.5.2','11.6.5.3'
],
},
'GTM': {
'affected': [
'15.1.0','15.0.0-15.0.1','14.1.0-14.1.2','13.1.0-13.1.3','12.1.0-12.1.5','11.6.1-11.6.5'
],
'unaffected': [
'16.0.0','15.1.0.5','15.0.1.4','14.1.2.7','13.1.3.5','12.1.5.2','11.6.5.3'
],
},
'LC': {
'affected': [
'15.1.0','15.0.0-15.0.1','14.1.0-14.1.2','13.1.0-13.1.3','12.1.0-12.1.5','11.6.1-11.6.5'
],
'unaffected': [
'16.0.0','15.1.0.5','15.0.1.4','14.1.2.7','13.1.3.5','12.1.5.2','11.6.5.3'
],
},
'LTM': {
'affected': [
'15.1.0','15.0.0-15.0.1','14.1.0-14.1.2','13.1.0-13.1.3','12.1.0-12.1.5','11.6.1-11.6.5'
],
'unaffected': [
'16.0.0','15.1.0.5','15.0.1.4','14.1.2.7','13.1.3.5','12.1.5.2','11.6.5.3'
],
},
'PEM': {
'affected': [
'15.1.0','15.0.0-15.0.1','14.1.0-14.1.2','13.1.0-13.1.3','12.1.0-12.1.5','11.6.1-11.6.5'
],
'unaffected': [
'16.0.0','15.1.0.5','15.0.1.4','14.1.2.7','13.1.3.5','12.1.5.2','11.6.5.3'
],
}
};
if (bigip_is_affected(vmatrix:vmatrix, sol:sol))
{
var extra = NULL;
if (report_verbosity > 0) extra = bigip_report_get();
security_report_v4(
port : 0,
severity : SECURITY_WARNING,
extra : extra
);
}
else
{
var tested = bigip_get_tested_modules();
var audit_extra = 'For BIG-IP module(s) ' + tested + ',';
if (tested) audit(AUDIT_INST_VER_NOT_VULN, audit_extra, version);
else audit(AUDIT_HOST_NOT, 'running any of the affected modules');
}
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
42.5%