Yesterday F5 Networks disclosed patch of CVE-2020-5902 , The Traffic Management User Interface (TMUI), also 
referred to as the Configuration utility, has a Remote Code Execution 
(RCE) vulnerability in undisclosed pages
This vulnerability allows for unauthenticated attackers, or authenticated users, with network access to the TMUI, through the BIG-IP management port and/or Self IPs, to execute arbitrary system commands, create or delete files, disable services, and/or execute arbitrary Java code. This vulnerability may result in complete system compromise. The BIG-IP system in Appliance mode is also vulnerable. This issue is not exposed on the data plane; only the control plane is affected.
| Product | Branch | Versions known to be vulnerable | Fixes introduced in | Severity | CVSSv3 score1 | Vulnerable component or feature | 
| BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, FPS, GTM, Link Controller, PEM) | 15.x | 15.1.0 | 15.1.0.4 | Critical | 10.0 | TMUI/Configuration utility | 
| 15.0.0 | None | |||||
| 14.x | 14.1.0 - 14.1.2 | 14.1.2.6 | ||||
| 13.x | 13.1.0 - 13.1.3 | 13.1.3.4 | ||||
| 12.x | 12.1.0 - 12.1.5 | 12.1.5.2 | ||||
| 11.x | 11.6.1 - 11.6.5 | 11.6.5.2 | ||||
| BIG-IQ Centralized Management | 7.x | None | Not applicable | Not vulnerable | None | None | 
| 6.x | None | Not applicable | ||||
| 5.x | None | Not applicable | ||||
| Traffix SDC | 5.x | None | Not applicable | Not vulnerable | None | None | 

No comments:
Post a Comment