First published: Wed Aug 02 2023(Updated: )
Specific F5 BIG-IP platforms with Cavium Nitrox FIPS HSM cards generate a deterministic password for the Crypto User account. The predictable nature of the password allows an authenticated attacker with TMOS Shell (tmsh) access to the BIG-IP system, or anyone with physical access to the FIPS HSM, the information required to generate the correct password. On vCMP systems, all Guests share the same deterministic password, allowing those with tmsh access on one Guest to access FIPS HSM partitions belonging to other Guests.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP and BIG-IQ Centralized Management | 16.0.0 | |
F5 BIG-IP and BIG-IQ Centralized Management | =15.1.0 | 15.1.1 |
F5 BIG-IP and BIG-IQ Centralized Management | >=14.1.0<=14.1.3 | 14.1.4 |
F5 BIG-IP and BIG-IQ Centralized Management | >=13.1.0<=13.1.3 | 13.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The F5-K000135449 vulnerability has a high severity due to the predictable password generated for the Crypto User account.
To fix F5-K000135449, upgrade your F5 BIG-IP version to 16.0.0, 15.1.1, 14.1.4, or 13.1.4 as specified in the advisory.
F5-K000135449 affects specific F5 BIG-IP platforms that use Cavium Nitrox FIPS HSM cards.
If F5-K000135449 is not mitigated, an authenticated attacker or someone with physical access to the FIPS HSM could exploit the predictable password to gain unauthorized access.
You can determine if your system is vulnerable to F5-K000135449 by checking if it is running the affected versions of F5 BIG-IP that utilize Cavium Nitrox FIPS HSM cards.