Vigil@nce - F5 BIG-IP: bypass of access rules to the IKE server
August 2016 by Vigil@nce
This bulletin was written by Vigil@nce : https://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can bypass the access rules applying to the IKE server
of F5 BIG-IP, in order to create unauthorized IPsec tunnels.
Impacted products: BIG-IP Hardware, TMOS.
Severity: 1/4.
Creation date: 11/08/2016.
DESCRIPTION OF THE VULNERABILITY
The F5 BIG-IP product includes an implementation of IPsec.
The IKE server manage the signaling part (peer authentication and
creation of the cryptographic context). However, one can force the
IKE server to skip the authentication step, normaly based on
certificate validation of shared key check.
An attacker can therefore bypass the access rules applying to the
IKE server of F5 BIG-IP, in order to create unauthorized IPsec
tunnels.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
https://vigilance.fr/vulnerability/F5-BIG-IP-bypass-of-access-rules-to-the-IKE-server-20368