First published: Tue Oct 10 2023(Updated: )
When TACACS+ audit forwarding is configured on a BIG-IP or BIG-IQ system, shared secret is logged in plaintext in the audit log.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP and BIG-IQ Centralized Management | 17.1.0 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=16.1.0<=16.1.3 | 16.1.4 |
F5 BIG-IP and BIG-IQ Centralized Management | >=15.1.0<=15.1.8 | 15.1.9 |
F5 BIG-IP and BIG-IQ Centralized Management | >=14.1.0<=14.1.5 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=13.1.0<=13.1.5 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=8.0.0<=8.3.0 | 8.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability F5-K06110200 is considered a high severity issue due to the exposure of shared secrets in plaintext.
To resolve the F5-K06110200 vulnerability, upgrade your BIG-IP or BIG-IQ systems to the recommended versions that address this issue.
F5-K06110200 affects multiple versions of BIG-IP and BIG-IQ, specifically those prior to the patched versions 17.1.0, 16.1.4, 15.1.9, and 8.3.0.
The impact of F5-K06110200 can include unauthorized access to sensitive information as the shared secret is logged in audit logs.
As of now, F5 does not provide a specific workaround for F5-K06110200, and it is strongly advised to patch the systems as soon as possible.