First published: Thu Apr 30 2020(Updated: )
In versions 7.1.5-7.1.8, the BIG-IP Edge Client components in BIG-IP APM, Edge Gateway, and FirePass legacy allow attackers to obtain the full session ID from process memory.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 Big-ip Access Policy Manager | >=11.6.1<=11.6.5 | |
F5 Big-ip Access Policy Manager | >=12.1.0<=12.1.5 | |
F5 Big-ip Access Policy Manager | >=13.0.0<=13.1.3 | |
F5 Big-ip Access Policy Manager | >=14.0.0<=14.1.2 | |
F5 Big-ip Access Policy Manager | >=15.0.0<=15.1.0 | |
F5 Big-ip Access Policy Manager Client | >=7.1.5<=7.1.8 | |
F5 Big-ip Edge Gateway | >=11.6.1<=11.6.5 | |
F5 Big-ip Edge Gateway | >=12.1.0<=12.1.5 | |
F5 Big-ip Edge Gateway | >=13.0.0<=13.1.3 | |
F5 Big-ip Edge Gateway | >=14.0.0<=14.1.2 | |
F5 Big-ip Edge Gateway | >=15.0.0<=15.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-5892 is a vulnerability in the BIG-IP Edge Client components in BIG-IP APM, Edge Gateway, and FirePass legacy versions 7.1.5-7.1.8 that allows attackers to obtain the full session ID from process memory.
The affected software versions are F5 Big-ip Access Policy Manager versions 11.6.1-11.6.5, 12.1.0-12.1.5, 13.0.0-13.1.3, 14.0.0-14.1.2, 15.0.0-15.1.0, and F5 Big-ip Edge Gateway versions 11.6.1-11.6.5, 12.1.0-12.1.5, 13.0.0-13.1.3, 14.0.0-14.1.2, 15.0.0-15.1.0.
CVE-2020-5892 has a severity value of 6.7, which is considered medium.
To fix CVE-2020-5892, F5 recommends upgrading to a fixed software version or applying the recommended mitigations provided in the F5 security advisory.
You can find more information about CVE-2020-5892 in the F5 security advisory at the following link: [F5 Security Advisory](https://support.f5.com/csp/article/K15838353).