First published: Wed Aug 26 2020(Updated: )
In BIG-IP APM versions 12.1.0-12.1.5.1 and 11.6.1-11.6.5.2, RADIUS authentication leaks memory when the username for authentication is not set.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 Access Policy Manager | >=11.6.1<=11.6.5 | |
F5 Access Policy Manager | >=12.1.0<12.1.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-5924 is rated as a medium severity vulnerability.
To fix CVE-2020-5924, upgrade F5 BIG-IP APM to a version that is not vulnerable, such as versions 12.1.5.2 or later for the affected 12.x series.
CVE-2020-5924 affects BIG-IP APM versions 12.1.0 to 12.1.5.1 and 11.6.1 to 11.6.5.2.
The impact of CVE-2020-5924 includes potential memory leaks during RADIUS authentication when the username is not set.
Organizations using the specified vulnerable versions of F5 BIG-IP APM for RADIUS authentication are impacted by CVE-2020-5924.