Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2020-5913 : Security Advisory and Response

Learn about CVE-2020-5913 impacting BIG-IP versions 15.0.0-15.1.0.1, 14.1.0-14.1.2.3, 13.1.0-13.1.3.4, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.2. Find mitigation steps and long-term security practices.

A vulnerability in BIG-IP SSL/TLS CRL handling could allow for man-in-the-middle attacks on SSL/TLS connections.

Understanding CVE-2020-5913

In versions 15.0.0-15.1.0.1, 14.1.0-14.1.2.3, 13.1.0-13.1.3.4, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.2 of BIG-IP, a critical security flaw exists that impacts SSL/TLS connections.

What is CVE-2020-5913?

The vulnerability allows the BIG-IP Client or Server SSL profile to ignore revoked certificates, even with a valid Certificate Revocation List (CRL) present. This oversight can lead to potential man-in-the-middle attacks on SSL/TLS connections.

The Impact of CVE-2020-5913

The vulnerability poses a significant risk to the security of SSL/TLS connections, potentially enabling attackers to intercept and manipulate sensitive data transmitted over these connections.

Technical Details of CVE-2020-5913

This section delves into the technical aspects of the vulnerability.

Vulnerability Description

The BIG-IP SSL/TLS CRL vulnerability in affected versions allows for the bypassing of revoked certificates, exposing connections to potential interception.

Affected Systems and Versions

        BIG-IP versions 15.0.0-15.1.0.1
        BIG-IP versions 14.1.0-14.1.2.3
        BIG-IP versions 13.1.0-13.1.3.4
        BIG-IP versions 12.1.0-12.1.5.1
        BIG-IP versions 11.6.1-11.6.5.2

Exploitation Mechanism

The vulnerability allows threat actors to exploit SSL/TLS connections by ignoring revoked certificates, potentially leading to man-in-the-middle attacks.

Mitigation and Prevention

Protecting systems from CVE-2020-5913 requires immediate action and long-term security measures.

Immediate Steps to Take

        Apply vendor-supplied patches promptly to address the vulnerability.
        Monitor SSL/TLS connections for any suspicious activity.

Long-Term Security Practices

        Regularly update and patch systems to prevent known vulnerabilities.
        Implement strong encryption protocols and certificate management practices.

Patching and Updates

        F5 provides patches and updates to address the BIG-IP SSL/TLS CRL vulnerability.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now