First published: Wed May 03 2023(Updated: )
NGINX Management Suite default file permissions are set such that an authenticated attacker may be able to modify sensitive files on NGINX Instance Manager and NGINX API Connectivity Manager. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 NGINX API Connectivity Manager | >=1.0.0<1.5.0 | |
F5 NGINX Instance Manager | >=2.0.0<2.9.0 | |
F5 NGINX Security Monitoring | >=1.0.0<1.3.0 | |
F5 NGINX Instance Manager | >=2.0.0<=2.8.0 | 2.9.0 |
F5 NGINX Instance Manager | >=1.0.0<=1.0.4 | |
F5 NGINX API Connectivity Manager | >=1.0.0<=1.4.1 | 1.5.0 |
F5 NGINX Security Monitoring | >=1.0.0<=1.2.0 | 1.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-28724 is a vulnerability in the NGINX Management Suite that allows an authenticated attacker to modify sensitive files on NGINX Instance Manager and NGINX API Connectivity Manager.
CVE-2023-28724 has a severity level of 7.1, which is considered high.
The affected software versions are F5 Nginx Api Connectivity Manager 1.0.0 to 1.5.0 and F5 Nginx Instance Manager 2.0.0 to 2.9.0.
An authenticated attacker can exploit CVE-2023-28724 by modifying sensitive files on NGINX Instance Manager and NGINX API Connectivity Manager.
Yes, F5 Networks has provided mitigation steps for CVE-2023-28724 in their advisory. Please refer to the official F5 Networks advisory for more information.