Lucene search

K
nvd[email protected]NVD:CVE-2023-3470
HistoryAug 02, 2023 - 4:15 p.m.

CVE-2023-3470

2023-08-0216:15:10
CWE-1391
CWE-287
web.nvd.nist.gov
2
f5 big-ip
cavium nitrox fips
deterministic password
tmsh access
vcmp systems
hardware platforms
rseries
software versions

CVSS3

6.1

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

AI Score

6

Confidence

High

EPSS

0.001

Percentile

23.5%

Specific F5 BIG-IP platforms with Cavium Nitrox FIPS HSM cards generate a deterministic password for the Crypto User account. Β The predictable nature of the password allows an authenticated user with TMSH access to the BIG-IP system, or anyone with physical access to the FIPS HSM, the information required to generate the correct password. Β On vCMP systems, all Guests share the same deterministic password, allowing those with TMSH access on one Guest to access keys of a different Guest.

The following BIG-IP hardware platforms are affected: 10350v-F, i5820-DF, i7820-DF, i15820-DF, 5250v-F, 7200v-F, 10200v-F, 6900-F, 8900-F, 11000-F, and 11050-F.

The BIG-IP rSeries r5920-DF and r10920-DF are not affected, nor does the issue affect software FIPS implementations or network HSM configurations.

Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Affected configurations

Nvd
Node
f5big-ip_access_policy_managerRange13.1.0–13.1.4
OR
f5big-ip_access_policy_managerRange14.1.0–14.1.4
OR
f5big-ip_access_policy_managerMatch15.1.0
OR
f5big-ip_advanced_firewall_managerRange13.1.0–13.1.4
OR
f5big-ip_advanced_firewall_managerRange14.1.0–14.1.4
OR
f5big-ip_advanced_firewall_managerMatch15.1.0
OR
f5big-ip_advanced_web_application_firewallRange13.1.0–13.1.4
OR
f5big-ip_advanced_web_application_firewallRange14.1.0–14.1.4
OR
f5big-ip_advanced_web_application_firewallMatch15.1.0
OR
f5big-ip_analyticsRange13.1.0–13.1.4
OR
f5big-ip_analyticsRange14.1.0–14.1.4
OR
f5big-ip_analyticsMatch15.1.0
OR
f5big-ip_application_acceleration_managerRange13.1.0–13.1.4
OR
f5big-ip_application_acceleration_managerRange14.1.0–14.1.4
OR
f5big-ip_application_acceleration_managerMatch15.1.0
OR
f5big-ip_application_security_managerRange13.1.0–13.1.4
OR
f5big-ip_application_security_managerRange14.1.0–14.1.4
OR
f5big-ip_application_security_managerMatch15.1.0
OR
f5big-ip_application_visibility_and_reportingRange13.1.0–13.1.4
OR
f5big-ip_application_visibility_and_reportingRange14.1.0–14.1.4
OR
f5big-ip_application_visibility_and_reportingMatch15.1.0
OR
f5big-ip_carrier-grade_natRange13.1.0–13.1.4
OR
f5big-ip_carrier-grade_natRange14.1.0–14.1.4
OR
f5big-ip_carrier-grade_natMatch15.1.0
OR
f5big-ip_ddos_hybrid_defenderRange13.1.0–13.1.4
OR
f5big-ip_ddos_hybrid_defenderRange14.1.0–14.1.4
OR
f5big-ip_ddos_hybrid_defenderMatch15.1.0
OR
f5big-ip_domain_name_systemRange13.1.0–13.1.4
OR
f5big-ip_domain_name_systemRange14.1.0–14.1.4
OR
f5big-ip_domain_name_systemMatch15.1.0
OR
f5big-ip_edge_gatewayRange13.1.0–13.1.4
OR
f5big-ip_edge_gatewayRange14.1.0–14.1.4
OR
f5big-ip_edge_gatewayMatch15.1.0
OR
f5big-ip_fraud_protection_serviceRange13.1.0–13.1.4
OR
f5big-ip_fraud_protection_serviceRange14.1.0–14.1.4
OR
f5big-ip_fraud_protection_serviceMatch15.1.0
OR
f5big-ip_global_traffic_managerRange13.1.0–13.1.4
OR
f5big-ip_global_traffic_managerRange14.1.0–14.1.4
OR
f5big-ip_global_traffic_managerMatch15.1.0
OR
f5big-ip_link_controllerRange13.1.0–13.1.4
OR
f5big-ip_link_controllerRange14.1.0–14.1.4
OR
f5big-ip_link_controllerMatch15.1.0
OR
f5big-ip_local_traffic_managerRange13.1.0–13.1.4
OR
f5big-ip_local_traffic_managerRange14.1.0–14.1.4
OR
f5big-ip_local_traffic_managerMatch15.1.0
OR
f5big-ip_policy_enforcement_managerRange13.1.0–13.1.4
OR
f5big-ip_policy_enforcement_managerRange14.1.0–14.1.4
OR
f5big-ip_policy_enforcement_managerMatch15.1.0
OR
f5big-ip_ssl_orchestratorRange13.1.0–13.1.4
OR
f5big-ip_ssl_orchestratorRange14.1.0–14.1.4
OR
f5big-ip_ssl_orchestratorMatch15.1.0
OR
f5big-ip_webacceleratorRange13.1.0–13.1.4
OR
f5big-ip_webacceleratorRange14.1.0–14.1.4
OR
f5big-ip_webacceleratorMatch15.1.0
OR
f5big-ip_websafeRange13.1.0–13.1.4
OR
f5big-ip_websafeRange14.1.0–14.1.4
OR
f5big-ip_websafeMatch15.1.0
Node
f5big-ip_10350v-fMatch-
AND
f5big-ip_10350v-f_firmwareMatch-
Node
f5big-ip_i5820-dfMatch-
AND
f5big-ip_i5820-df_firmwareMatch-
Node
f5big-ip_i7820-dfMatch-
AND
f5big-ip_i7820-df_firmwareMatch-
Node
f5big-ip_i15820-dfMatch-
AND
f5big-ip_i15820-df_firmwareMatch-
Node
f5big-ip_5250v-fMatch-
AND
f5big-ip_5250v-f_firmwareMatch-
Node
f5big-ip_7200v-fMatch-
AND
f5big-ip_7200v-f_firmwareMatch-
Node
f5big-ip_10200v-fMatch-
AND
f5big-ip_10200v-f_firmwareMatch-
Node
f5big-ip_6900-fMatch-
AND
f5big-ip_6900-f_firmwareMatch-
Node
f5big-ip_8900-f_firmwareMatch-
AND
f5big-ip_8900-fMatch-
Node
f5big-ip_11000-f_firmwareMatch-
AND
f5big-ip_11000-fMatch-
Node
f5big-ip_11050-f_firmwareMatch-
AND
f5big-ip_11050-fMatch-
VendorProductVersionCPE
f5big-ip_access_policy_manager*cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
f5big-ip_access_policy_manager15.1.0cpe:2.3:a:f5:big-ip_access_policy_manager:15.1.0:*:*:*:*:*:*:*
f5big-ip_advanced_firewall_manager*cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*
f5big-ip_advanced_firewall_manager15.1.0cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.1.0:*:*:*:*:*:*:*
f5big-ip_advanced_web_application_firewall*cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*
f5big-ip_advanced_web_application_firewall15.1.0cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:15.1.0:*:*:*:*:*:*:*
f5big-ip_analytics*cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*
f5big-ip_analytics15.1.0cpe:2.3:a:f5:big-ip_analytics:15.1.0:*:*:*:*:*:*:*
f5big-ip_application_acceleration_manager*cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*
f5big-ip_application_acceleration_manager15.1.0cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.1.0:*:*:*:*:*:*:*
Rows per page:
1-10 of 601

CVSS3

6.1

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

AI Score

6

Confidence

High

EPSS

0.001

Percentile

23.5%

Related for NVD:CVE-2023-3470