First published: Mon May 10 2021(Updated: )
On versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.3, and 14.1.x before 14.1.4, BIG-IP Advanced WAF and ASM are missing authorization checks for file uploads to a specific directory within the REST API which might allow Authenticated users with guest privileges to upload files. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Advanced WAF/ASM | >=14.1.0<14.1.4 | |
F5 BIG-IP Advanced WAF/ASM | >=15.1.0<15.1.3 | |
F5 BIG-IP Advanced WAF/ASM | >=16.0.0<16.0.1.1 | |
F5 Application Security Manager | >=14.1.0<14.1.4 | |
F5 Application Security Manager | >=15.1.0<15.1.3 | |
F5 Application Security Manager | >=16.0.0<16.0.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-23014 is classified as a high-severity vulnerability due to its potential for unauthorized file uploads by authenticated users.
To mitigate CVE-2021-23014, upgrade your F5 BIG-IP Advanced WAF and ASM to versions 14.1.4, 15.1.3, or 16.0.1.1 or later.
CVE-2021-23014 impacts F5 BIG-IP Advanced WAF and ASM versions 16.0.0 to 16.0.1.1, 15.1.0 to 15.1.3, and 14.1.0 to 14.1.4.
CVE-2021-23014 can be exploited by authenticated users with guest privileges who can upload files to a vulnerable directory.
CVE-2021-23014 can lead to unauthorized file uploads, potentially resulting in data breaches or further exploitation of the system.