This security advisory addresses CVE-2015-5621, pertaining to a bug in the net-snmp software affecting versions up to and including 5.7.2. This vulnerability allows for potential denial of service and hypothetically can lead to remote code execution.
Some version of ACOS, include vulnerable version of the net-snmp libraries, and can potentially be affected by this vulnerability. The effect is known to be able to cause crash in the SNMP process which will lead to unavailability of that component, while the rest of the functionality, including the data plane will not be affected.
Furthermore, some publications indicate that a remote execution of code is theoretically possible.
The A10 QA team has not been able to cause either of those outcomes however patches are being proactively released due to the potential severity of the issue.
In regular deployments SNMP is only exposed on the management interface which already limits the exposure significantly. In addition to that it is recommended that access is further limited through Access Control Lists (ACLs) to only select IP management IP addresses. In addition to that, it is recommended that perimeter ACLs ensure no management IP addresses can be spoofed from outside the relevant network segments.
Software updates resolving this potential vulnerability will be published at the following URL when available:
https://www.a10networks.com/support/axseries/software-downloads
The following table summarizes update versions resolving all of the above CVEs.
Vulnerable Release |
Resolved Release |
4.0.1 |
4.1.0 |
3.0.x |
3.2.0 |
3.1.x |
3.2.0 |
2.6.1-GR1-P15 |
2.6.1-GR1-P16 |
2.7.2-P5 |
2.7.2-P6 |
2.7.1-GR1 |
2.7.1-GR1-P1 |
2.8.2-P3 |
2.8.2-P4 |
Affected Platforms: ADC, CGN, TPS
Affected Software Versions: 4.0.1, 3.1.x, 2.7.2-P5, 2.7.1-GR1, 2.8.2-P3
Vulnerability ID | Vulnerability Description |
---|
Ref # | General Link |
---|
Revision | Date | Description |
---|---|---|
1.0 | April 18, 2018 |
Created web page |