First published: Fri Dec 28 2018(Updated: )
A cross-site request forgery (CSRF) vulnerability in the APM webtop 11.2.1 or greater may allow attacker to force an APM webtop session to log out and require re-authentication.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 Access Policy Manager | >=11.5.1<=11.6.3 | |
F5 Access Policy Manager | >=12.1.0<=12.1.3 | |
F5 Access Policy Manager | >=13.0.0<=13.1.1 | |
F5 Access Policy Manager | >=14.0.0<=14.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-15334 is classified as a moderate severity vulnerability due to its ability to trigger session logouts through cross-site request forgery.
To mitigate CVE-2018-15334, ensure that you have upgraded your F5 Big-IP Access Policy Manager to the latest version beyond the affected versions outlined in the vulnerability report.
CVE-2018-15334 affects F5 Big-IP Access Policy Manager versions from 11.5.1 up to 14.1.0, including all versions in between.
CVE-2018-15334 involves a cross-site request forgery (CSRF) attack that can force an authenticated user to be logged out.
Yes, CVE-2018-15334 can disrupt session management by logging out users, requiring them to re-authenticate.