• Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz threat Advisory – Microsoft SharePoint Server 2016 Multiple Vulnerabilities
March 18, 2019
Rewterz Threat Alert – FASTCash/Lazarus Targeting Banks in Russia
March 18, 2019

Rewterz Threat Advisory – F5 Multiple Products OpenSSL Denial of Service Vulnerability

March 18, 2019

Severity

Low

Analysis Summary

CVE-2018-0732
During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack.

Impact

Denial of service

Affected Products

F5 BIG-IP Local Traffic Manager (LTM) 11.x
F5 BIG-IP Application Security Manager (ASM) 11.x
F5 BIG-IP Local Traffic Manager (LTM) 12.x
F5 BIG-IP Application Security Manager (ASM) 12.x
F5 BIG-IP Local Traffic Manager (LTM) 13.x
F5 BIG-IP Application Security Manager (ASM) 13.x
F5 BIG-IQ Centralized Management 5.x
F5 BIG-IP Local Traffic Manager (LTM) 14.x
F5 TMOS 11.x
F5 BIG-IP Global Traffic Manager (GTM) 11.x
F5 Enterprise Manager 3.x
F5 BIG-IP Access Policy Manager (APM) 11.x
F5 BIG-IP Application Acceleration Manager (AAM) 11.x
F5 BIG-IP Advanced Firewall Manager (AFM) 11.x
F5 BIG-IP Analytics (AVR) 11.x
F5 BIG-IP Link Controller 11.x
F5 BIG-IP Policy Enforcement Manager (PEM) 11.x
F5 BIG-IP Access Policy Manager (APM) 12.x
F5 BIG-IP Access Policy Manager (APM) 13.x
F5 BIG-IP Advanced Firewall Manager (AFM) 12.x
F5 BIG-IP Advanced Firewall Manager (AFM) 13.x
F5 TMOS 12.x
F5 BIG-IP DNS (formerly Global Traffic Manager (GTM)) 12.x

Remediation

Update to a fixed version if available:

Enterprise Manager, BIG-IQ Centralized Management:

No official solution is currently available.

BIG-IP LTM 11.x, 12.x, 13.x, 14.x:

Update to version 11.5.9, 11.6.3.3, 12.1.4, 13.1.1.2, or 14.1.0.2.

BIG-IP AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, FPS, GTM, Link Controller, PEM, WebAccelerator:

Update to version 11.5.9, 11.6.3.3, 12.1.4, or 13.1.1.2.

  • Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.