Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2020.4110 The BIG-IP CFE logs sensitive Azure storage account credentials 19 November 2020 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: BIG-IP Products Publisher: F5 Networks Operating System: Network Appliance Impact/Access: Modify Arbitrary Files -- Existing Account Access Confidential Data -- Existing Account Reduced Security -- Existing Account Resolution: Patch/Upgrade Original Bulletin: https://support.f5.com/csp/article/K21125762 - --------------------------BEGIN INCLUDED TEXT-------------------- K21125762: The BIG-IP CFE logs sensitive Azure storage account credentials Original Publication Date: 18 Nov, 2020 Security Advisory Description The BIG-IP Cloud Failover Extension (CFE) logs sensitive Azure storage account credentials in /var/log/restnoded/restnoded.log. This issue occurs when all of the following conditions are met: o You configure the CFE to provide failover functionality for your BIG-IP systems in Azure. For more information on CFE, refer to CFE Overview on CloudDocs. o You increase the CFE logging level on the BIG-IP system to Silly. The default value is Info. For more information, refer to Logging in CloudDocs. Impact A malicious user who has access to the BIG-IP system log files can use the leaked storage account name and access key to access your Azure storage to read, write, or delete files. Symptoms As a result of this issue, you may encounter the following symptom: o You observe your Azure account name and access key logged in the /var/log/ restnoded/restnoded.log file on the BIG-IP system. Security Advisory Status F5 Product Development has assigned ID 964813 to this issue. F5 has confirmed that this issue exists in the products listed in the Applies to (see versions) box, located in the upper-right corner of this article. For information about releases, point releases, or hotfixes that resolve this issue, refer to the following table. +------------------------+-------------------+-----------------------+ |Type of fix |Fixes introduced in|Related articles | +------------------------+-------------------+-----------------------+ |Release |None |None | +------------------------+-------------------+-----------------------+ |Point release/hotfix |None |None | +------------------------+-------------------+-----------------------+ |Cloud Failover Extension|1.6.1 |Cloud Failover Releases| +------------------------+-------------------+-----------------------+ Security Advisory Recommended Actions Workaround To eliminate this issue, you can upgrade to a version listed in the Fixes introduced in column and delete the log files containing the Azure credentials. Additionally, if you suspect that the Storage Account name and keys have been exposed to untrusted users, you should regenerate the Azure Storage Account access key and reset the CFE on the BIG-IP system. Impact of workaround: Performing the following procedures updates and resets the CFE. F5 recommends that you perform these procedures during a scheduled maintenance window. o Upgrade the CFE o Delete the log files containing the Azure credentials. o Regenerate the Azure Storage Account access key.^1 o Reset the CFE on the BIG-IP system^1 ^1Perform this procedure when you suspect that the Storage Account name and keys have been exposed to untrusted users. Upgrade the CFE To upgrade the CFE, download the CFE package from GitHub and upload and install the package on the BIG-IP systems. For more information, refer to Download and Install Cloud Failover Extension. Delete the log files containing the Azure credentials Delete the log files /var/log/restnoded/restnoded* containing the Azure account credentials on the affected BIG-IP system. Regenerate the Azure Storage Account access key To regenerate your access key, refer to Manage storage account access keys and Storage Accounts - Regenerate Key. Note: These links take you to a resource outside of AskF5, and it is possible that the document may be removed without our knowledge. Reset the CFE on the BIG-IP system To reset the CFE on your BIG-IP systems, you can send a "resetStateFile": true json content to the /reset REST endpoint. You can use a command such as curl, as shown in the following example: curl --header "Content-Type: application/json" --request POST --data ' {"resetStateFile": true}' -ku example_user:example_password https://: <IP_address>/mgmt/shared/cloud-failover/reset For more information on the /reset endpoint, refer to the API Reference Documentation. Supplemental Information o K51812227: Understanding security advisory versioning o K41942608: Overview of AskF5 security advisory articles o K4602: Overview of the F5 security vulnerability response policy o K4918: Overview of the F5 critical issue hotfix policy o K9502: BIG-IP hotfix and point release matrix o K13123: Managing BIG-IP product hotfixes (11.x - 16.x) o K167: Downloading software and firmware from F5 o K9970: Subscribing to email notifications regarding F5 products o K9957: Creating a custom RSS feed to view new and updated documents - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBX7XbgeNLKJtyKPYoAQikEQ//QW8ux7/UFGHyY1xjE92cVVhWfGus7e7d BoL7n3nz5qlumLDy9ArOx0pfP63o6kFyc9/iedFZ8e/xmFCPaJ7Zb5SGcrXtTeI2 iWinl+JEvtubMIx9R4IAFhvWX/gYnhoDLdbPCgnkwYHTO74VyWj9avWhtIIHOdNv 31sJskxqYw5Ax6NLdWu7hpvvaTyxurkqKMX38XVIP57oKpGzxXQPaCd8NGo1Tltg VSx0yAHyNqUn+zKpP15Yn13Q2guQ0HWA3ssvXILyreCS5bfMYvzb/xaIUbAWpuQa vJ7yRPnslQK/y51NZAiEOyPrjrIUJ1tmFxZp43f6UkDwBBGXIdROxGoCMWMdOlqA D3Sbl+NL4/eUWISO0NBMKtMel661zMI5x7LtWPX5VohwZlft1B1v3nP6nA2ZK8k0 HR7RVYgt8C3S4uu6ylSNldlV7G9EXOIIfPEhQvlIWFcF/XWFgMJ+bkUBxOLNPQkI q2GLpqU/H9RtBa5d6nSGXQ3VtxIBSvqOMt2EpgrPC8ceCzDI4qMOkPCcE4vofASb TG3FXJQ5VCyCaKq1cgWvlV7eTTc1/6PrjGD8VC9bKd0tr6tzr9UhQzhv0nUmEPtd kaRp2jsquqV2eh3/simLMTxwzHfMsSW1A5uGIzGqe7cpm21HcOE8bRfVDgZjxdgo k9BaOcHOA0w= =Emn3 -----END PGP SIGNATURE-----