Forum Discussion
7 Replies
This answers some questions: http://support.f5.com/kb/en-us/solutions/public/13000/100/sol13163.html
TMM is not using openssl for SSL enabled virtual servers except you configure COMPAT ciphers on 11.5.x. The risk on the management traffic (configuration/iControl/big3d) is low as long as your management segment is separated.
But, still, F5 should provide an official statement that their SSL implementation is not affected.
- Michael_Kenned1NimbostratusThis tool released by redhat is indicating that my F5 sites (which don't use COMPAT ciphers) are affected: https://access.redhat.com/labs/ccsinjectiontest/ I'm eager to hear F5's official response.
- me too :-)
- Hello Team, Good Morning. Regarding OpenSSL vulnerability - CVE-2014-0224, F5 Product Development has now assigned ID 465799 (BIG-IP) to this vulnerability. To read more about this vulnerability for versions know to be vulnerable and not vulnerable, please see SOL15325 via the link below. We received a case closed message from F5 pointing to SOL15325: OpenSSL vulnerability - CVE-2014-0224 https://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html
- sergey_83319Nimbostratus
RedHat OpenSSL CCS Injection Vulnerability tool (CVE-2014-0224) https://access.redhat.com/labs/ccsinjectiontest identified VS on F5 (v.10.5.0 & v.10.5.1) as "Status: Vulnerable!"
- Same here, but as F5 does not use openssl stack here, I think that this could be a false positive.
- ericc01_137807Nimbostratus
There are a few threads open on this today, but I recommend reviewing https://devcentral.f5.com/questions/openssl-security-advisory-05-jun-2014 as it has the most technical details so far.