Description
On version 15.1.x before 15.1.3, 14.1.x before 14.1.4, 13.1.x before 13.1.4, 12.1.x before 12.1.6, and all versions of 16.0.x and 11.6.x., BIG-IP APM AD (Active Directory) authentication can be bypassed via a spoofed AS-REP (Kerberos Authentication Service Response) response sent over a hijacked KDC (Kerberos Key Distribution Center) connection or from an AD server compromised by an attacker. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-10126 | On version 15.1.x before 15.1.3, 14.1.x before 14.1.4, 13.1.x before 13.1.4, 12.1.x before 12.1.6, and all versions of 16.0.x and 11.6.x., BIG-IP APM AD (Active Directory) authentication can be bypassed via a spoofed AS-REP (Kerberos Authentication Service Response) response sent over a hijacked KDC (Kerberos Key Distribution Center) connection or from an AD server compromised by an attacker. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
References
| Link | Providers |
|---|---|
| https://support.f5.com/csp/article/K51213246 |
|
History
No history.
Status: PUBLISHED
Assigner: f5
Published:
Updated: 2024-08-03T18:58:26.220Z
Reserved: 2021-01-06T00:00:00.000Z
Link: CVE-2021-23008
No data.
Status : Modified
Published: 2021-05-10T14:15:07.483
Modified: 2024-11-21T05:51:08.507
Link: CVE-2021-23008
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD