The BIG-IP SPK TMM (Traffic Management Module) f5-debug-sidecar and f5-debug-sshd containers contains hardcoded credentials that may allow an attacker with the ability to intercept traffic to impersonate the SPK Secure Shell (SSH) server on those containers. This is only exposed when ssh debug is enabled. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
References
Link | Resource |
---|---|
https://my.f5.com/manage/s/article/K000135874 | Vendor Advisory |
Configurations
History
18 Oct 2023, 01:27
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://my.f5.com/manage/s/article/K000135874 - Vendor Advisory | |
First Time |
F5
F5 big-ip Next Service Proxy For Kubernetes |
|
CPE | cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:1.5.0:*:*:*:*:*:*:* |
10 Oct 2023, 13:41
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-10 13:15
Updated : 2023-12-10 15:14
NVD link : CVE-2023-45226
Mitre link : CVE-2023-45226
CVE.ORG link : CVE-2023-45226
JSON object : View
Products Affected
f5
- big-ip_next_service_proxy_for_kubernetes
CWE
CWE-798
Use of Hard-coded Credentials