Lucene search

K
cve[email protected]CVE-2023-45219
HistoryOct 10, 2023 - 1:15 p.m.

CVE-2023-45219

2023-10-1013:15:22
CWE-200
web.nvd.nist.gov
31
cve-2023-45219
sensitive information
vulnerability
big-ip
tmos
tmsh
authenticated attacker
privileges

4.4 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

4.9 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.0%

Exposure of Sensitive Information vulnerability exist in an undisclosed BIG-IP TMOS shell (tmsh) command which may allow an authenticated attacker with resource administrator role privileges to view sensitive information.

Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Affected configurations

NVD
Node
f5big-ip_access_policy_managerRange13.1.013.1.5
OR
f5big-ip_access_policy_managerRange14.1.014.1.5
OR
f5big-ip_access_policy_managerRange15.1.015.1.9
OR
f5big-ip_access_policy_managerRange16.1.016.1.4
OR
f5big-ip_advanced_firewall_managerRange13.1.013.1.5
OR
f5big-ip_advanced_firewall_managerRange14.1.014.1.5
OR
f5big-ip_advanced_firewall_managerRange15.1.015.1.9
OR
f5big-ip_advanced_firewall_managerRange16.1.016.1.4
OR
f5big-ip_advanced_web_application_firewallRange13.1.013.1.5
OR
f5big-ip_advanced_web_application_firewallRange14.1.014.1.5
OR
f5big-ip_advanced_web_application_firewallRange15.1.015.1.9
OR
f5big-ip_advanced_web_application_firewallRange16.1.016.1.4
OR
f5big-ip_analyticsRange13.1.013.1.5
OR
f5big-ip_analyticsRange14.1.014.1.5
OR
f5big-ip_analyticsRange15.1.015.1.9
OR
f5big-ip_analyticsRange16.1.016.1.4
OR
f5big-ip_application_acceleration_managerRange13.1.013.1.5
OR
f5big-ip_application_acceleration_managerRange14.1.014.1.5
OR
f5big-ip_application_acceleration_managerRange15.1.015.1.9
OR
f5big-ip_application_acceleration_managerRange16.1.016.1.4
OR
f5big-ip_application_security_managerRange13.1.013.1.5
OR
f5big-ip_application_security_managerRange14.1.014.1.5
OR
f5big-ip_application_security_managerRange15.1.015.1.9
OR
f5big-ip_application_security_managerRange16.1.016.1.4
OR
f5big-ip_application_visibility_and_reportingRange13.1.013.1.5
OR
f5big-ip_application_visibility_and_reportingRange14.1.014.1.5
OR
f5big-ip_application_visibility_and_reportingRange15.1.015.1.9
OR
f5big-ip_application_visibility_and_reportingRange16.1.016.1.4
OR
f5big-ip_carrier-grade_natRange13.1.013.1.5
OR
f5big-ip_carrier-grade_natRange14.1.014.1.5
OR
f5big-ip_carrier-grade_natRange15.1.015.1.9
OR
f5big-ip_carrier-grade_natRange16.1.016.1.4
OR
f5big-ip_ddos_hybrid_defenderRange13.1.013.1.5
OR
f5big-ip_ddos_hybrid_defenderRange14.1.014.1.5
OR
f5big-ip_ddos_hybrid_defenderRange15.1.015.1.9
OR
f5big-ip_ddos_hybrid_defenderRange16.1.016.1.4
OR
f5big-ip_domain_name_systemRange13.1.013.1.5
OR
f5big-ip_domain_name_systemRange14.1.014.1.5
OR
f5big-ip_domain_name_systemRange15.1.015.1.9
OR
f5big-ip_domain_name_systemRange16.1.016.1.4
OR
f5big-ip_edge_gatewayRange13.1.013.1.5
OR
f5big-ip_edge_gatewayRange14.1.014.1.5
OR
f5big-ip_edge_gatewayRange15.1.015.1.9
OR
f5big-ip_edge_gatewayRange16.1.016.1.4
OR
f5big-ip_fraud_protection_serviceRange13.1.013.1.5
OR
f5big-ip_fraud_protection_serviceRange14.1.014.1.5
OR
f5big-ip_fraud_protection_serviceRange15.1.015.1.9
OR
f5big-ip_fraud_protection_serviceRange16.1.016.1.4
OR
f5big-ip_global_traffic_managerRange13.1.013.1.5
OR
f5big-ip_global_traffic_managerRange14.1.014.1.5
OR
f5big-ip_global_traffic_managerRange15.1.015.1.9
OR
f5big-ip_global_traffic_managerRange16.1.016.1.4
OR
f5big-ip_link_controllerRange13.1.013.1.5
OR
f5big-ip_link_controllerRange14.1.014.1.5
OR
f5big-ip_link_controllerRange15.1.015.1.9
OR
f5big-ip_link_controllerRange16.1.016.1.4
OR
f5big-ip_local_traffic_managerRange13.1.013.1.5
OR
f5big-ip_local_traffic_managerRange14.1.014.1.5
OR
f5big-ip_local_traffic_managerRange15.1.015.1.9
OR
f5big-ip_local_traffic_managerRange16.1.016.1.4
OR
f5big-ip_policy_enforcement_managerRange13.1.013.1.5
OR
f5big-ip_policy_enforcement_managerRange14.1.014.1.5
OR
f5big-ip_policy_enforcement_managerRange15.1.015.1.9
OR
f5big-ip_policy_enforcement_managerRange16.1.016.1.4
OR
f5big-ip_ssl_orchestratorRange13.1.013.1.5
OR
f5big-ip_ssl_orchestratorRange14.1.014.1.5
OR
f5big-ip_ssl_orchestratorRange15.1.015.1.9
OR
f5big-ip_ssl_orchestratorRange16.1.016.1.4
OR
f5big-ip_webacceleratorRange13.1.013.1.5
OR
f5big-ip_webacceleratorRange14.1.014.1.5
OR
f5big-ip_webacceleratorRange15.1.015.1.9
OR
f5big-ip_webacceleratorRange16.1.016.1.4
OR
f5big-ip_websafeRange13.1.013.1.5
OR
f5big-ip_websafeRange14.1.014.1.5
OR
f5big-ip_websafeRange15.1.015.1.9
OR
f5big-ip_websafeRange16.1.016.1.4

CNA Affected

[
  {
    "defaultStatus": "unknown",
    "modules": [
      "All Modules"
    ],
    "product": "BIG-IP",
    "vendor": "F5",
    "versions": [
      {
        "lessThan": "*",
        "status": "unaffected",
        "version": "17.1.0",
        "versionType": "semver"
      },
      {
        "lessThan": "16.1.4",
        "status": "affected",
        "version": "16.1.0",
        "versionType": "semver"
      },
      {
        "lessThan": "15.1.9",
        "status": "affected",
        "version": "15.1.0",
        "versionType": "semver"
      },
      {
        "lessThan": "*",
        "status": "affected",
        "version": "14.1.0",
        "versionType": "semver"
      },
      {
        "lessThan": "*",
        "status": "affected",
        "version": "13.1.0",
        "versionType": "semver"
      }
    ]
  }
]

4.4 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

4.9 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.0%

Related for CVE-2023-45219