First published: Tue Oct 10 2023(Updated: )
When a BIG-IP DNS or BIG-IP LTM system is enabled with the DNS Services license, and a TSIG key is created, the key is logged in plaintext in the audit log.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP (DNS, LTM enabled with DNS Services license) | 17.1.0 | |
F5 BIG-IP (DNS, LTM enabled with DNS Services license) | >=16.1.0<=16.1.3 | 16.1.4 |
F5 BIG-IP (DNS, LTM enabled with DNS Services license) | >=15.1.0<=15.1.8 | 15.1.9 |
F5 BIG-IP (DNS, LTM enabled with DNS Services license) | >=14.1.0<=14.1.5 | |
F5 BIG-IP (DNS, LTM enabled with DNS Services license) | >=13.1.0<=13.1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of F5-K98334513 is considered high due to the risk of sensitive key exposure.
To fix F5-K98334513, upgrade to the appropriate versions 17.1.0, 16.1.4, 15.1.9, or any higher patched versions indicated in the advisory.
F5-K98334513 affects BIG-IP systems that have DNS Services enabled.
F5-K98334513 exposes TSIG keys in plaintext within the audit log.
There is no documented workaround for F5-K98334513, so upgrading is essential.