Last Modified: May 29, 2024
Affected Product(s):
BIG-IP APM
Known Affected Versions:
13.1.0, 13.1.0.1, 13.1.0.2, 13.1.0.3, 13.1.0.4, 13.1.0.5, 13.1.0.6, 13.1.0.7, 13.1.0.8, 13.1.1, 13.1.1.2, 13.1.1.3, 13.1.1.4, 13.1.1.5, 13.1.3, 13.1.3.1, 13.1.3.2, 13.1.3.3, 13.1.3.4, 13.1.3.5, 13.1.3.6, 13.1.4, 13.1.4.1, 13.1.5, 13.1.5.1, 14.0.0, 14.0.0.1, 14.0.0.2, 14.0.0.3, 14.0.0.4, 14.1.0, 14.1.0.1, 14.1.0.2, 14.1.0.3, 14.1.0.5
Fixed In:
15.0.0, 14.1.0.6, 14.0.0.5
Opened: Apr 08, 2019
Severity: 2-Critical
The per-Session RADIUS Acct STOP message is forged based on the pool route domain, but is sent through the default one.
The BIG-IP system sends the STOP packets according to the default routing table instead of the configured route domain RADIUS server.
1. Deploy the BIG-IP system with two route domains 2. Under each route domains you have a path to the RADIUS server. 3. Create Access Policy with a Logon Page, RADIUS Acct agent fallback-to-Deny ending. 4. Attach it to the virtual server. 5. Run tcpdump -i any port 1813 -ne on the BIG-IP system. 5. Navigate to the virtual server. 6. Wait 20 seconds till STOP packets arrive.
None.
The BIG-IP system now sends the STOP packets according to the configured route domain RADIUS server.