Lucene search

K
nvd[email protected]NVD:CVE-2020-5943
HistoryNov 05, 2020 - 8:15 p.m.

CVE-2020-5943

2020-11-0520:15:17
CWE-327
web.nvd.nist.gov
4
vulnerability
big-ip
rest interface

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

EPSS

0.001

Percentile

28.4%

In versions 14.1.0-14.1.0.1 and 14.1.2.5-14.1.2.7, when a BIG-IP object is created or listed through the REST interface, the protected fields are obfuscated in the REST response, not protected via a SecureVault cryptogram as TMSH does. One example of protected fields is the GTM monitor password.

Affected configurations

Nvd
Node
f5big-ip_access_policy_managerRange14.1.014.1.0.1
OR
f5big-ip_access_policy_managerRange14.1.2.514.1.2.7
OR
f5big-ip_advanced_firewall_managerRange14.1.014.1.0.1
OR
f5big-ip_advanced_firewall_managerRange14.1.2.514.1.2.7
OR
f5big-ip_advanced_web_application_firewallRange14.1.014.1.0.1
OR
f5big-ip_advanced_web_application_firewallRange14.1.2.514.1.2.7
OR
f5big-ip_analyticsRange14.1.014.1.0.1
OR
f5big-ip_analyticsRange14.1.2.514.1.2.7
OR
f5big-ip_application_acceleration_managerRange14.1.014.1.0.1
OR
f5big-ip_application_acceleration_managerRange14.1.2.514.1.2.7
OR
f5big-ip_application_security_managerRange14.1.014.1.0.1
OR
f5big-ip_application_security_managerRange14.1.2.514.1.2.7
OR
f5big-ip_ddos_hybrid_defenderRange14.1.014.1.0.1
OR
f5big-ip_ddos_hybrid_defenderRange14.1.2.514.1.2.7
OR
f5big-ip_domain_name_systemRange14.1.014.1.0.1
OR
f5big-ip_domain_name_systemRange14.1.2.514.1.2.7
OR
f5big-ip_fraud_protection_serviceRange14.1.014.1.0.1
OR
f5big-ip_fraud_protection_serviceRange14.1.2.514.1.2.7
OR
f5big-ip_global_traffic_managerRange14.1.014.1.0.1
OR
f5big-ip_global_traffic_managerRange14.1.2.514.1.2.7
OR
f5big-ip_link_controllerRange14.1.014.1.0.1
OR
f5big-ip_link_controllerRange14.1.2.514.1.2.7
OR
f5big-ip_local_traffic_managerRange14.1.014.1.0.1
OR
f5big-ip_local_traffic_managerRange14.1.2.514.1.2.7
OR
f5big-ip_policy_enforcement_managerRange14.1.014.1.0.1
OR
f5big-ip_policy_enforcement_managerRange14.1.2.514.1.2.7
OR
f5big-ip_ssl_orchestratorRange14.1.014.1.0.1
OR
f5big-ip_ssl_orchestratorRange14.1.2.514.1.2.7
VendorProductVersionCPE
f5big-ip_access_policy_manager*cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
f5big-ip_advanced_firewall_manager*cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*
f5big-ip_advanced_web_application_firewall*cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*
f5big-ip_analytics*cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*
f5big-ip_application_acceleration_manager*cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*
f5big-ip_application_security_manager*cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*
f5big-ip_ddos_hybrid_defender*cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*
f5big-ip_domain_name_system*cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*
f5big-ip_fraud_protection_service*cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*
f5big-ip_global_traffic_manager*cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*
Rows per page:
1-10 of 141

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

EPSS

0.001

Percentile

28.4%

Related for NVD:CVE-2020-5943