NA

CVE-2023-42768

Published: 10/10/2023 Updated: 17/10/2023
CVSS v3 Base Score: 7.2 | Impact Score: 5.9 | Exploitability Score: 1.2
VMScore: 0

Vulnerability Summary

When a non-admin user has been assigned an administrator role via an iControl REST PUT request and later the user's role is reverted back to a non-admin role via the Configuration utility, tmsh, or iControl REST. BIG-IP non-admin user can still have access to iControl REST admin resource.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Vulnerable Product Search on Vulmon Subscribe to Product

f5 big-ip analytics

f5 big-ip policy enforcement manager

f5 big-ip local traffic manager

f5 big-ip link controller

f5 big-ip global traffic manager

f5 big-ip fraud protection service

f5 big-ip domain name system

f5 big-ip application security manager

f5 big-ip application acceleration manager

f5 big-ip advanced firewall manager

f5 big-ip access policy manager

f5 big-ip advanced web application firewall

f5 big-ip application visibility and reporting

f5 big-ip carrier-grade nat

f5 big-ip ddos hybrid defender

f5 big-ip edge gateway

f5 big-ip ssl orchestrator

f5 big-ip webaccelerator

f5 big-ip websafe