Learn about CVE-2021-23005 affecting BIG-IQ versions 7.x and 6.x. Understand the DoS risk due to the absence of Transport Layer Security (TLS) with Corosync protocol in high availability setups.
A high severity CVE-2021-23005 affecting BIG-IQ versions 7.x and 6.x has been identified. The vulnerability allows for a Denial of Service (DoS) attack due to the lack of Transport Layer Security (TLS) usage with the Corosync protocol in BIG-IQ HA setups.
Understanding CVE-2021-23005
This section provides an overview of the CVE-2021-23005 vulnerability.
What is CVE-2021-23005?
The vulnerability in all BIG-IQ 7.x and 6.x versions (fixed in 8.0.0) enables potential attackers to exploit a DoS risk when utilizing Quorum devices for automatic failover in a BIG-IQ high availability (HA) environment, as TLS is not employed with the Corosync protocol.
The Impact of CVE-2021-23005
The absence of TLS usage exposes systems to DoS attacks, jeopardizing the availability and stability of BIG-IQ instances.
Technical Details of CVE-2021-23005
Delve into the technical aspects of CVE-2021-23005 to better understand its implications and scope.
Vulnerability Description
The lack of TLS implementation in the Corosync protocol within BIG-IQ versions 7.x and 6.x poses a critical DoS risk, potentially leading to service disruption.
Affected Systems and Versions
All versions of BIG-IQ 7.x and 6.x are impacted by this vulnerability, with a security update available in version 8.0.0 to mitigate the risk.
Exploitation Mechanism
Attackers can exploit this vulnerability through targeted DoS attacks on BIG-IQ deployments that utilize Quorum devices for HA failover, leveraging the unencrypted Corosync protocol.
Mitigation and Prevention
Discover the necessary steps to safeguard your system against CVE-2021-23005 and prevent exploitation.
Immediate Steps to Take
Patch vulnerable systems by upgrading to the secure version 8.0.0 which addresses the TLS implementation issue within the Corosync protocol.
Long-Term Security Practices
Implement robust security measures, such as network segmentation and access controls, to fortify systems against potential DoS attacks and other security threats.
Patching and Updates
Regularly monitor security advisories from the vendor, apply patches promptly, and frequently update systems to stay protected against emerging vulnerabilities.