First published: Wed May 03 2023(Updated: )
NGINX Management Suite may allow an authenticated attacker to gain access to configuration objects outside of their assigned environment.( CVE-2023-28656)
Affected Software | Affected Version | How to fix |
---|---|---|
F5 NGINX Instance Manager | >=2.0.0<=2.8.0 | 2.9.0 |
F5 NGINX Instance Manager | ||
PTC ThingWorx Industrial Connectivity | >=1.0.0<=1.4.1 | 1.5.0 |
F5 NGINX Security Monitoring | >=1.0.0<=1.2.0 | 1.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of F5-K000133417 is not explicitly stated, but it involves unauthorized access to configuration objects which could lead to significant security risks.
To fix F5-K000133417, update your F5 NGINX Instance Manager, NGINX API Connectivity Manager, or NGINX Security Monitoring to the latest recommended version as specified by F5.
Users of F5 NGINX Instance Manager, NGINX API Connectivity Manager, and NGINX Security Monitoring versions specified in the advisory are affected by F5-K000133417.
An authenticated attacker could exploit F5-K000133417 to access and manipulate configuration objects that they should not have access to.
F5-K000133417 was disclosed in the context of CVE-2023-28656.