First published: Thu Apr 23 2020(Updated: )
In versions prior to 3.3.0, the NGINX Controller is configured to communicate with its Postgres database server over unencrypted channels, making the communicated data vulnerable to interception via man-in-the-middle (MiTM) attacks.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 NGINX Controller API Management | >=2.0.0<=2.9.0 | |
F5 NGINX Controller API Management | >=3.0.0<3.3.0 | |
F5 NGINX Controller API Management | =1.0.1 | |
NetApp Cloud Backup |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-5865 is considered a high-severity vulnerability due to its potential for man-in-the-middle attacks.
To fix CVE-2020-5865, upgrade F5 NGINX Controller to version 3.3.0 or later to ensure encrypted communication with the Postgres database.
CVE-2020-5865 affects versions of F5 NGINX Controller prior to 3.3.0, as well as specific earlier versions such as 1.0.1.
CVE-2020-5865 enables potential man-in-the-middle (MiTM) attacks due to unencrypted communication.
There is no specific workaround for CVE-2020-5865; upgrading to a secure version is the recommended approach.