First published: Thu Jul 02 2020(Updated: )
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 NGINX Controller API Management | >=2.0.0<=2.9.0 | |
F5 NGINX Controller API Management | >=3.0.0<=3.5.0 | |
F5 NGINX Controller API Management | =1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-5910 has a high severity rating due to its lack of authentication allowing unauthorized access to messaging services.
To fix CVE-2020-5910, upgrade to a version of NGINX Controller that is outside the affected range, specifically to versions beyond 3.5.0 or 2.9.0.
CVE-2020-5910 affects NGINX Controller versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1.
The risks associated with CVE-2020-5910 include potential unauthorized access and control over messaging services without any authentication.
Yes, CVE-2020-5910 can potentially lead to data breaches due to the unauthorized access it enables.