Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2021-23005 : What You Need to Know

Learn about CVE-2021-23005 affecting BIG-IQ versions 7.x and 6.x. Understand the DoS risk due to the absence of Transport Layer Security (TLS) with Corosync protocol in high availability setups.

A high severity CVE-2021-23005 affecting BIG-IQ versions 7.x and 6.x has been identified. The vulnerability allows for a Denial of Service (DoS) attack due to the lack of Transport Layer Security (TLS) usage with the Corosync protocol in BIG-IQ HA setups.

Understanding CVE-2021-23005

This section provides an overview of the CVE-2021-23005 vulnerability.

What is CVE-2021-23005?

The vulnerability in all BIG-IQ 7.x and 6.x versions (fixed in 8.0.0) enables potential attackers to exploit a DoS risk when utilizing Quorum devices for automatic failover in a BIG-IQ high availability (HA) environment, as TLS is not employed with the Corosync protocol.

The Impact of CVE-2021-23005

The absence of TLS usage exposes systems to DoS attacks, jeopardizing the availability and stability of BIG-IQ instances.

Technical Details of CVE-2021-23005

Delve into the technical aspects of CVE-2021-23005 to better understand its implications and scope.

Vulnerability Description

The lack of TLS implementation in the Corosync protocol within BIG-IQ versions 7.x and 6.x poses a critical DoS risk, potentially leading to service disruption.

Affected Systems and Versions

All versions of BIG-IQ 7.x and 6.x are impacted by this vulnerability, with a security update available in version 8.0.0 to mitigate the risk.

Exploitation Mechanism

Attackers can exploit this vulnerability through targeted DoS attacks on BIG-IQ deployments that utilize Quorum devices for HA failover, leveraging the unencrypted Corosync protocol.

Mitigation and Prevention

Discover the necessary steps to safeguard your system against CVE-2021-23005 and prevent exploitation.

Immediate Steps to Take

Patch vulnerable systems by upgrading to the secure version 8.0.0 which addresses the TLS implementation issue within the Corosync protocol.

Long-Term Security Practices

Implement robust security measures, such as network segmentation and access controls, to fortify systems against potential DoS attacks and other security threats.

Patching and Updates

Regularly monitor security advisories from the vendor, apply patches promptly, and frequently update systems to stay protected against emerging vulnerabilities.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now