First published: Wed May 03 2023(Updated: )
A directory traversal vulnerability exists in an undisclosed page of the BIG-IP Configuration utility that may allow an authenticated attacker to read files with an .xml extension. Access to restricted information is limited and the attacker does not control what information is obtained.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP and BIG-IQ Centralized Management | =17.0.0 | 17.1.0 |
F5 BIG-IP and BIG-IQ Centralized Management | >=16.1.0<=16.1.3 | 16.1.3.4 |
F5 BIG-IP and BIG-IQ Centralized Management | >=15.1.0<=15.1.8 | 15.1.8.2 |
F5 BIG-IP and BIG-IQ Centralized Management | >=14.1.0<=14.1.5 | 14.1.5.4 |
F5 BIG-IP and BIG-IQ Centralized Management | >=13.1.0<=13.1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of F5-K000132768 is high due to its potential impact allowing unauthorized access to sensitive files.
To fix F5-K000132768, upgrade to the appropriate versions specified in the advisory for your affected BIG-IP product.
F5-K000132768 affects users of the F5 BIG-IP and BIG-IQ Centralized Management products running specific vulnerable versions.
F5-K000132768 may allow attackers to read files with an .xml extension, potentially exposing configuration and sensitive data.
Yes, F5-K000132768 requires authentication, meaning an attacker must be a logged-in user to exploit this vulnerability.