CVE-2023-45226
BIG-IP Next SPK SSH vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The BIG-IP SPK TMM (Traffic Management Module) f5-debug-sidecar and f5-debug-sshd containers contains hardcoded credentials that may allow an attacker with the ability to intercept traffic to impersonate the SPK Secure Shell (SSH) server on those containers. This is only exposed when ssh debug is enabled. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
Los contenedores BIG-IP SPK TMM (Módulo de gestión de tráfico) f5-debug-sidecar y f5-debug-sshd contienen credenciales codificadas que pueden permitir que un atacante con la capacidad de interceptar el tráfico, se haga pasar por el servidor SPK Secure Shell (SSH) en esos contenedores. Esto sólo se expone cuando la depuración ssh está habilitada. Nota: Las versiones de software que han llegado al End of Technical Support (EoTS) no se evalúan
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2023-10-05 CVE Reserved
- 2023-10-10 CVE Published
- 2024-09-18 CVE Updated
- 2024-11-11 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-798: Use of Hard-coded Credentials
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://my.f5.com/manage/s/article/K000135874 | 2023-10-18 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
F5 Search vendor "F5" | Big-ip Next Service Proxy For Kubernetes Search vendor "F5" for product "Big-ip Next Service Proxy For Kubernetes" | 1.5.0 Search vendor "F5" for product "Big-ip Next Service Proxy For Kubernetes" and version "1.5.0" | - |
Affected
|