First published: Tue Oct 10 2023(Updated: )
The BIG-IP SPK TMM (Traffic Management Module) f5-debug-sidecar and f5-debug-sshd containers contains hardcoded credentials that may allow an attacker with the ability to intercept traffic to impersonate the SPK Secure Shell (SSH) server on those containers. This is only exposed when ssh debug is enabled. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
Credit: f5sirt@f5.com f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 Big-ip Next Service Proxy For Kubernetes | =1.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-45226 is a vulnerability in the BIG-IP SPK TMM (Traffic Management Module) f5-debug-sidecar and f5-debug-sshd containers, where hardcoded credentials may allow an attacker to impersonate the SPK SSH server.
The severity of CVE-2023-45226 is high, with a CVSS score of 7.4.
CVE-2023-45226 affects F5 Big-ip Next Service Proxy for Kubernetes (1.5.0) by exposing hardcoded credentials that may allow an attacker to impersonate the SSH server.
To fix CVE-2023-45226, it is recommended to upgrade to a version that does not contain the hardcoded credentials.
You can find more information about CVE-2023-45226 at the following reference: [link](https://my.f5.com/manage/s/article/K000135874).