First published: Wed May 03 2023(Updated: )
NGINX Management Suite may allow an authenticated attacker to gain access to configuration objects outside of their assigned environment. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 NGINX API Connectivity Manager | >=1.0.0<1.5.0 | |
F5 NGINX Instance Manager | >=2.0.0<2.9.0 | |
F5 NGINX Security Monitoring | >=1.0.0<1.3.0 | |
F5 NGINX Instance Manager | >=2.0.0<=2.8.0 | 2.9.0 |
F5 NGINX Instance Manager | ||
F5 NGINX API Connectivity Manager | >=1.0.0<=1.4.1 | 1.5.0 |
F5 NGINX Security Monitoring | >=1.0.0<=1.2.0 | 1.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-28656 is a vulnerability in NGINX Management Suite that allows an authenticated attacker to gain access to configuration objects outside of their assigned environment.
CVE-2023-28656 has a severity score of 8.1, which is considered high.
The affected software versions for CVE-2023-28656 are F5 Nginx Api Connectivity Manager (versions 1.0.0 to 1.5.0), F5 Nginx Instance Manager (versions 2.0.0 to 2.9.0), and F5 Nginx Security Monitoring (versions 1.0.0 to 1.3.0).
An attacker can exploit CVE-2023-28656 by gaining authenticated access to NGINX Management Suite and then accessing configuration objects outside of their assigned environment.
Yes, F5 has released patches and it is recommended to update to the latest version of the affected software to mitigate the vulnerability.