First published: Tue Oct 10 2023(Updated: )
When running in Appliance mode, an authenticated user assigned the Administrator role may be able to bypass Appliance mode restrictions utilizing BIG-IP external monitor on a BIG-IP system. A successful exploit can allow the attacker to cross a security boundary.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP and BIG-IQ Centralized Management | 17.1.0 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=16.1.0<=16.1.3 | 16.1.4 |
F5 BIG-IP and BIG-IQ Centralized Management | >=15.1.0<=15.1.8 | 15.1.9 |
F5 BIG-IP and BIG-IQ Centralized Management | >=14.1.0<=14.1.5 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=13.1.0<=13.1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of F5-K41072952 is considered critical due to the potential for authenticated users to bypass security restrictions.
To fix F5-K41072952, upgrade to the recommended versions specified in the advisory for your F5 BIG-IP system.
F5-K41072952 affects F5 BIG-IP versions 14.1.0 to 14.1.5, 15.1.0 to 15.1.9, 16.1.0 to 16.1.4, and 17.1.0.
Authenticated users assigned the Administrator role on affected F5 BIG-IP systems are at risk of exploiting this vulnerability.
F5-K41072952 is a security boundary vulnerability that allows an attacker to bypass Appliance mode restrictions.