First published: Wed Feb 14 2024(Updated: )
When running in Appliance mode, an authenticated attacker assigned the Administrator role may be able to bypass Appliance mode restrictions utilizing iAppsLX templates on a BIG-IP system.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP and BIG-IQ Centralized Management | =17.1.0 | 17.1.1 |
F5 BIG-IP and BIG-IQ Centralized Management | >=16.1.0<=16.1.3 | 16.1.4 |
F5 BIG-IP and BIG-IQ Centralized Management | >=15.1.0<=15.1.8 | 15.1.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability F5-K91054692 has a high severity rating due to its potential for unauthorized access and privilege escalation.
To fix F5-K91054692, upgrade your F5 BIG-IP system to versions 17.1.1, 16.1.4, or 15.1.9 or later.
F5-K91054692 affects users of BIG-IP systems running versions 17.1.0, 16.1.x prior to 16.1.4, and 15.1.x prior to 15.1.9.
Exploitation of F5-K91054692 requires authenticated access, meaning it cannot be exploited remotely without valid credentials.
iAppsLX templates are utilized within BIG-IP systems, and this vulnerability allows an authenticated attacker with administrative roles to bypass restrictions associated with Appliance mode.