CVE-2023-45226

The BIG-IP SPK TMM (Traffic Management Module) f5-debug-sidecar and f5-debug-sshd containers contains hardcoded credentials that may allow an attacker with the ability to intercept traffic to impersonate the SPK Secure Shell (SSH) server on those containers. This is only exposed when ssh debug is enabled.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
References
Link Resource
https://my.f5.com/manage/s/article/K000135874 Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:1.5.0:*:*:*:*:*:*:*

History

18 Oct 2023, 01:27

Type Values Removed Values Added
References (MISC) https://my.f5.com/manage/s/article/K000135874 - (MISC) https://my.f5.com/manage/s/article/K000135874 - Vendor Advisory
First Time F5
F5 big-ip Next Service Proxy For Kubernetes
CPE cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:1.5.0:*:*:*:*:*:*:*

10 Oct 2023, 13:41

Type Values Removed Values Added
New CVE

Information

Published : 2023-10-10 13:15

Updated : 2023-12-10 15:14


NVD link : CVE-2023-45226

Mitre link : CVE-2023-45226

CVE.ORG link : CVE-2023-45226


JSON object : View

Products Affected

f5

  • big-ip_next_service_proxy_for_kubernetes
CWE
CWE-798

Use of Hard-coded Credentials