First published: Thu May 07 2020(Updated: )
On NGINX Controller versions 3.1.0-3.3.0, AVRD uses world-readable and world-writable permissions on its socket, which allows processes or users on the local system to write arbitrary data into the socket. A local system attacker can make AVRD segmentation fault (SIGSEGV) by writing malformed messages to the socket.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 NGINX Controller API Management | >=3.1.0<3.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-5895 is considered a critical vulnerability that can be exploited by local attackers.
To fix CVE-2020-5895, upgrade NGINX Controller to version 3.4.0 or later.
NGINX Controller versions from 3.1.0 to 3.3.0 are affected by CVE-2020-5895.
CVE-2020-5895 can facilitate local denial of service attacks through socket manipulation.
Organizations using the vulnerable versions of NGINX Controller are at risk due to CVE-2020-5895.