Description
When a non-admin user has been assigned an administrator role via an iControl REST PUT request and later the user's role is reverted back to a non-admin role via the Configuration utility, tmsh, or iControl REST. BIG-IP non-admin user can still have access to iControl REST admin resource. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-47200 | When a non-admin user has been assigned an administrator role via an iControl REST PUT request and later the user's role is reverted back to a non-admin role via the Configuration utility, tmsh, or iControl REST. BIG-IP non-admin user can still have access to iControl REST admin resource. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
References
| Link | Providers |
|---|---|
| https://my.f5.com/manage/s/article/K26910459 |
|
History
Thu, 19 Sep 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
F5
Subscribe
Big-ip Access Policy Manager
Subscribe
Big-ip Advanced Firewall Manager
Subscribe
Big-ip Advanced Web Application Firewall
Subscribe
Big-ip Analytics
Subscribe
Big-ip Application Acceleration Manager
Subscribe
Big-ip Application Security Manager
Subscribe
Big-ip Application Visibility And Reporting
Subscribe
Big-ip Carrier-grade Nat
Subscribe
Big-ip Ddos Hybrid Defender
Subscribe
Big-ip Domain Name System
Subscribe
Big-ip Edge Gateway
Subscribe
Big-ip Fraud Protection Service
Subscribe
Big-ip Global Traffic Manager
Subscribe
Big-ip Link Controller
Subscribe
Big-ip Local Traffic Manager
Subscribe
Big-ip Policy Enforcement Manager
Subscribe
Big-ip Ssl Orchestrator
Subscribe
Big-ip Webaccelerator
Subscribe
Big-ip Websafe
Subscribe
Status: PUBLISHED
Assigner: f5
Published:
Updated: 2024-09-19T13:36:25.727Z
Reserved: 2023-10-05T19:17:25.744Z
Link: CVE-2023-42768
Updated: 2024-08-02T19:30:24.134Z
Status : Modified
Published: 2023-10-10T13:15:21.507
Modified: 2024-11-21T08:23:07.307
Link: CVE-2023-42768
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD