Yesterday F5 Networks disclosed patch of CVE-2020-5902 , The Traffic Management User Interface (TMUI), also
referred to as the Configuration utility, has a Remote Code Execution
(RCE) vulnerability in undisclosed pages
This vulnerability allows for unauthenticated attackers, or authenticated users, with network access to the TMUI, through the BIG-IP management port and/or Self IPs, to execute arbitrary system commands, create or delete files, disable services, and/or execute arbitrary Java code. This vulnerability may result in complete system compromise. The BIG-IP system in Appliance mode is also vulnerable. This issue is not exposed on the data plane; only the control plane is affected.
Product | Branch | Versions known to be vulnerable | Fixes introduced in | Severity | CVSSv3 score1 | Vulnerable component or feature |
BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, FPS, GTM, Link Controller, PEM) | 15.x | 15.1.0 | 15.1.0.4 | Critical | 10.0 | TMUI/Configuration utility |
15.0.0 | None | |||||
14.x | 14.1.0 - 14.1.2 | 14.1.2.6 | ||||
13.x | 13.1.0 - 13.1.3 | 13.1.3.4 | ||||
12.x | 12.1.0 - 12.1.5 | 12.1.5.2 | ||||
11.x | 11.6.1 - 11.6.5 | 11.6.5.2 | ||||
BIG-IQ Centralized Management | 7.x | None | Not applicable | Not vulnerable | None | None |
6.x | None | Not applicable | ||||
5.x | None | Not applicable | ||||
Traffix SDC | 5.x | None | Not applicable | Not vulnerable | None | None |
No comments:
Post a Comment