TLS Verification Bypass in NGINX Controller by F5 Networks
CVE-2020-5864
7.4HIGH
Summary
In NGINX Controller versions prior to 3.2.0, a configuration flaw allows communication between the NGINX Controller and NGINX Plus instances to bypass TLS verification by default. This oversight could potentially expose sensitive data during the transmission process, leaving it vulnerable to interception by malicious actors. Users and organizations should update their NGINX Controller to the latest version to ensure secure configuration and safeguard communications against unauthorized access.
Affected Version(s)
NGINX Controller < 3.2.0
References
CVSS V3.1
Score:
7.4
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved