First published: Wed Sep 12 2018(Updated: )
On BIG-IP APM 11.6.0-11.6.3, an insecure AES ECB mode is used for orig_uri parameter in an undisclosed /vdesk link of APM virtual server configured with an access profile, allowing a malicious user to build a redirect URI value using different blocks of cipher texts.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 Access Policy Manager | >=11.6.1<=11.6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-5548 is considered to have a high severity due to the potential for unauthorized access stemming from the insecure use of AES ECB mode.
To mitigate CVE-2018-5548, it is recommended to upgrade the BIG-IP APM to a version that does not use insecure encryption methods.
CVE-2018-5548 affects BIG-IP APM versions 11.6.0 to 11.6.3.
CVE-2018-5548 could potentially allow an attacker to craft malicious redirect URIs enabling phishing attacks or unauthorized access.
There are no specific workarounds for CVE-2018-5548 aside from upgrading to a secure version of the software.