First published: Tue Oct 10 2023(Updated: )
An authenticated user's session cookie may remain valid for a limited time after logging out from the BIG-IP Configuration utility on a multi-blade VIPRION platform.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP and BIG-IQ Centralized Management | 17.1.0 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=16.1.0<=16.1.3 | 16.1.4 |
F5 BIG-IP and BIG-IQ Centralized Management | >=15.1.0<=15.1.8 | 15.1.9 |
F5 BIG-IP and BIG-IQ Centralized Management | >=14.1.0<=14.1.5 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=13.1.0<=13.1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of F5-K29141800 is categorized as medium due to the potential exposure of an authenticated user's session after logout.
To fix F5-K29141800, it is recommended to upgrade to the latest version of F5 BIG-IP that addresses this vulnerability.
F5-K29141800 affects users of F5 BIG-IP versions 15.1.0 to 15.1.9, 16.1.0 to 16.1.4, and versions prior to 14.1.6 and 13.1.6.
The potential impacts of F5-K29141800 include unauthorized access to sensitive information due to lingering session cookies.
Yes, F5-K29141800 specifically pertains to authenticated session cookie vulnerabilities on the multi-blade VIPRION platforms.