iControl REST and tmsh vulnerability
CVE-2023-22326
4.9MEDIUM
Key Information
- Vendor
- F5
- Status
- BIG-IP
- BIG-IQ Centralized Management
- Vendor
- CVE Published:
- 1 February 2023
Summary
In BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all versions of 13.1.x, and all versions of BIG-IQ 8.x and 7.1.x, incorrect permission assignment vulnerabilities exist in the iControl REST and TMOS shell (tmsh) dig command which may allow an authenticated attacker with resource administrator or administrator role privileges to view sensitive information. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Affected Version(s)
BIG-IP < 17.0.0.2
BIG-IP < 16.1.3.3
BIG-IP < 15.1.8.1
Refferences
CVSS V3.1
Score:
4.9
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database
Credit
F5 acknowledges Guillaume Goessel of Aon’s Cyber Labs for bringing this issue to our attention and following the highest standards of coordinated disclosure.