The BIG-IP SPK TMM (Traffic Management Module) f5-debug-sidecar and f5-debug-sshd containers contains hardcoded credentials that may allow an attacker with the ability to intercept traffic to impersonate the SPK Secure Shell (SSH) server on those containers. This is only exposed when ssh debug is enabled. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
References
Link | Resource |
---|---|
https://my.f5.com/manage/s/article/K000135874 | Vendor Advisory |
https://my.f5.com/manage/s/article/K000135874 | Vendor Advisory |
Configurations
History
21 Nov 2024, 08:26
Type | Values Removed | Values Added |
---|---|---|
References | () https://my.f5.com/manage/s/article/K000135874 - Vendor Advisory |
18 Oct 2023, 01:27
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:1.5.0:*:*:*:*:*:*:* | |
References | (MISC) https://my.f5.com/manage/s/article/K000135874 - Vendor Advisory | |
First Time |
F5 big-ip Next Service Proxy For Kubernetes
F5 |
10 Oct 2023, 13:41
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-10 13:15
Updated : 2024-11-21 08:26
NVD link : CVE-2023-45226
Mitre link : CVE-2023-45226
CVE.ORG link : CVE-2023-45226
JSON object : View
Products Affected
f5
- big-ip_next_service_proxy_for_kubernetes
CWE
CWE-798
Use of Hard-coded Credentials