First published: Thu Jul 02 2020(Updated: )
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 NGINX Controller API Management | >=2.0.0<=2.9.0 | |
F5 NGINX Controller API Management | >=3.0.0<=3.5.0 | |
F5 NGINX Controller API Management | =1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-5909 has been classified as medium severity due to the potential risks associated with a TLS certificate validation bypass.
CVE-2020-5909 affects users by allowing the possibility of unverified server connections leading to potential man-in-the-middle attacks.
To fix CVE-2020-5909, update the F5 Nginx Controller to a version higher than 3.5.0, 2.9.0, or 1.0.1.
Yes, CVE-2020-5909 can be exploited by remote attackers due to the server TLS certificate verification issue.
F5 Nginx Controller versions 3.0.0 to 3.5.0, 2.0.0 to 2.9.0, and 1.0.1 are vulnerable to CVE-2020-5909.