First published: Wed Jul 01 2020(Updated: )
In versions 13.1.0-13.1.3.3, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2, the BIG-IP system does not properly enforce the access controls for the scp.blacklist files. This allows Admin and Resource Admin users with Secure Copy (SCP) protocol access to read and overwrite blacklisted files via SCP.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 Access Policy Manager | >=11.6.1<=11.6.5 | |
F5 Access Policy Manager | >=12.1.0<=12.1.5 | |
F5 Access Policy Manager | >=13.1.0<=13.1.3 | |
F5 BIG-IP Advanced Firewall Manager | >=11.6.1<=11.6.5 | |
F5 BIG-IP Advanced Firewall Manager | >=12.1.0<=12.1.5 | |
F5 BIG-IP Advanced Firewall Manager | >=13.1.0<=13.1.3 | |
F5 BIG-IP Analytics | >=11.6.1<=11.6.5 | |
F5 BIG-IP Analytics | >=12.1.0<=12.1.5 | |
F5 BIG-IP Analytics | >=13.1.0<=13.1.3 | |
F5 BIG-IP Application Acceleration Manager | >=11.6.1<=11.6.5 | |
F5 BIG-IP Application Acceleration Manager | >=12.1.0<=12.1.5 | |
F5 BIG-IP Application Acceleration Manager | >=13.1.0<=13.1.3 | |
F5 Application Security Manager | >=11.6.1<=11.6.5 | |
F5 Application Security Manager | >=12.1.0<=12.1.5 | |
F5 Application Security Manager | >=13.1.0<=13.1.3 | |
F5 BIG-IP | >=11.6.1<=11.6.5 | |
F5 BIG-IP | >=12.1.0<=12.1.5 | |
F5 BIG-IP | >=13.1.0<=13.1.3 | |
F5 BIG-IP Fraud Protection Service | >=11.6.1<=11.6.5 | |
F5 BIG-IP Fraud Protection Service | >=12.1.0<=12.1.5 | |
F5 BIG-IP Fraud Protection Service | >=13.1.0<=13.1.3 | |
Riverbed SteelApp Traffic Manager | >=11.6.1<=11.6.5 | |
Riverbed SteelApp Traffic Manager | >=12.1.0<=12.1.5 | |
Riverbed SteelApp Traffic Manager | >=13.1.0<=13.1.3 | |
F5 BIG-IP Link Controller | >=11.6.1<=11.6.5 | |
F5 BIG-IP Link Controller | >=12.1.0<=12.1.5 | |
F5 BIG-IP Link Controller | >=13.1.0<=13.1.3 | |
Riverbed SteelApp Traffic Manager | >=11.6.1<=11.6.5 | |
Riverbed SteelApp Traffic Manager | >=12.1.0<=12.1.5 | |
Riverbed SteelApp Traffic Manager | >=13.1.0<=13.1.3 | |
F5 BIG-IP Policy Enforcement Manager | >=11.6.1<=11.6.5 | |
F5 BIG-IP Policy Enforcement Manager | >=12.1.0<=12.1.5 | |
F5 BIG-IP Policy Enforcement Manager | >=13.1.0<=13.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-5906 is considered a high-severity vulnerability due to its potential to allow unauthorized access to sensitive files.
To mitigate CVE-2020-5906, upgrade to the latest versions of BIG-IP systems as specified in the security advisory by F5 Networks.
CVE-2020-5906 affects users of F5 BIG-IP systems, specifically those running versions 11.6.1 to 11.6.5.2, 12.1.0 to 12.1.5.2, and 13.1.0 to 13.1.3.3.
If exploited, CVE-2020-5906 can allow Admin and Resource Admin users with SCP access to read and overwrite blacklisted files.
Currently, there are no publicly documented workarounds for CVE-2020-5906, so immediate upgrading is recommended.