First published: Fri Apr 24 2020(Updated: )
In BIG-IQ 5.2.0-7.0.0, high availability (HA) synchronization is not secure by TLS and may allow on-path attackers to read / modify confidential data in transit.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IQ Centralized Management | >=5.2.0<=5.4.0 | |
F5 BIG-IQ Centralized Management | >=6.0.0<=6.1.0 | |
F5 BIG-IQ Centralized Management | >=7.0.0<7.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-5869.
The severity of CVE-2020-5869 is critical with a CVSS score of 9.1.
The affected software versions include BIG-IQ Centralized Management versions 5.2.0 to 7.0.0 (inclusive).
CVE-2020-5869 allows on-path attackers to read/modify confidential data in transit by exploiting the lack of secure TLS in high availability (HA) synchronization in BIG-IQ Centralized Management.
Yes, F5 has released a fix for CVE-2020-5869. It is recommended to update to a patched version of BIG-IQ Centralized Management.