First published: Wed Oct 31 2018(Updated: )
In some situations on BIG-IP APM 14.0.0-14.0.0.2, 13.0.0-13.1.0.7, 12.1.0-12.1.3.5, or 11.6.0-11.6.3.2, the CRLDP Auth access policy agent may treat revoked certificates as valid when the BIG-IP APM system fails to download a new Certificate Revocation List.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 Access Policy Manager | >=11.6.0<=11.6.3.2 | |
F5 Access Policy Manager | >=12.1.0<=12.1.3.5 | |
F5 Access Policy Manager | >=13.0.0<=13.1.0.7 | |
F5 Access Policy Manager | >=14.0.0<=14.0.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-15326 is classified as a medium severity vulnerability.
To mitigate CVE-2018-15326, ensure that the BIG-IP APM system is updated to a version that addresses the vulnerability.
CVE-2018-15326 affects F5 BIG-IP Access Policy Manager versions 11.6.0 through 11.6.3.2, 12.1.0 through 12.1.3.5, 13.0.0 through 13.1.0.7, and 14.0.0 through 14.0.0.2.
The impact of CVE-2018-15326 is that revoked certificates may be considered valid, which can lead to unauthorized access.
CVE-2018-15326 was reported in the year 2018.