First published: Wed Mar 29 2023(Updated: )
Insertion of Sensitive Information into log file vulnerability in NGINX Agent. NGINX Agent version 2.0 before 2.23.3 inserts sensitive information into a log file. An authenticated attacker with local access to read agent log files may gain access to private keys. This issue is only exposed when the non-default trace level logging is enabled. Note: NGINX Agent is included with NGINX Instance Manager and used in conjunction with NGINX API Connectivity Manager, and NGINX Management Suite Security Monitoring.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 NGINX Agent | >=2.0.0<2.23.3 | |
F5 NGINX Instance Manager | >=2.0.0<2.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-1550.
The title of the vulnerability is 'Insertion of Sensitive Information into log file vulnerability in NGINX Agent'.
The severity of CVE-2023-1550 is medium.
NGINX Agent version 2.0 before 2.23.3 and NGINX Instance Manager version 2.0 before 2.9.0 are affected by CVE-2023-1550.
An authenticated attacker with local access to read agent log files may gain access to private keys.
Yes, you can find references for CVE-2023-1550 [here](https://my.f5.com/manage/s/article/K000133135) and [here](https://security.netapp.com/advisory/ntap-20230511-0008/).