First published: Tue Oct 10 2023(Updated: )
When BIG-IP APM Guided Configuration is configured, undisclosed sensitive information may be logged in the restnoded log file.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Access Policy Manager | 17.1.0 | |
F5 BIG-IP Access Policy Manager | >=16.1.0<=16.1.3 | 16.1.4 |
F5 BIG-IP Access Policy Manager | >=15.1.0<=15.1.7 | 15.1.8 |
F5 BIG-IP Access Policy Manager | ||
F5 BIG-IP Guided Configuration | 9.0 | |
F5 BIG-IP Guided Configuration | =8.0 | |
F5 BIG-IP Guided Configuration | >=7.0<=7.7 | |
F5 BIG-IP Guided Configuration | =6.0 | |
F5 BIG-IP Guided Configuration |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of F5-K47756555 is critical due to the potential exposure of sensitive information in the logs.
To fix F5-K47756555, update to the latest versions of the affected F5 BIG-IP software as outlined in the advisory.
F5-K47756555 affects multiple versions including 17.1.0, 16.1.4, 15.1.8, and several others across BIG-IP (APM) and BIG-IP (Guided Configuration).
F5-K47756555 may expose undisclosed sensitive information logged in the restnoded log file.
There is no specific workaround for F5-K47756555, so applying the recommended patch is necessary to mitigate the risk.