First published: Tue Oct 10 2023(Updated: )
A directory traversal vulnerability exists in the BIG-IP Configuration utility that may allow an authenticated attacker to execute commands on the BIG-IP system. For BIG-IP systems running in Appliance mode, a successful exploit can allow the attacker to cross a security boundary.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP | =17.1.0 | 17.1.0.3 |
F5 BIG-IP | >=16.1.0<=16.1.4 | 16.1.4.1 |
F5 BIG-IP | >=15.1.0<=15.1.10 | 15.1.10.2 |
F5 BIG-IP | >=14.1.0<=14.1.5 | 14.1.5.6 |
F5 BIG-IP | >=13.1.0<=13.1.5 | |
F5 BIG-IP | =17.1.0 | 17.1.0.3 |
F5 BIG-IP | >=16.1.0<=16.1.4 | 16.1.4.1 |
F5 BIG-IP | >=15.1.0<=15.1.10 | 15.1.10.2 |
F5 BIG-IP | >=14.1.0<=14.1.5 | 14.1.5.6 |
F5 BIG-IP | >=13.1.0<=13.1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of F5-K000135689 is significant due to its potential to allow command execution on the BIG-IP system by an authenticated attacker.
To fix F5-K000135689, upgrade your BIG-IP system to the appropriate remediation version specified by F5 for your affected software.
F5-K000135689 affects multiple versions of the BIG-IP system, specifically those in Appliance Mode and Standard Deployments with versions ranging from 13.1.0 to 17.1.0.
F5-K000135689 is a directory traversal vulnerability which could lead to unauthorized command execution on the system.
F5-K000135689 requires authentication, meaning the exploit can only be executed by an authenticated attacker.