The BIG-IP SPK TMM (Traffic Management Module) f5-debug-sidecar and f5-debug-sshd containers contains hardcoded credentials that may allow an attacker with the ability to intercept traffic to impersonate the SPK Secure Shell (SSH) server on those containers. This is only exposed when ssh debug is enabled. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://my.f5.com/manage/s/article/K000135874 |
History
Wed, 18 Sep 2024 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: f5
Published: 2023-10-10T12:39:25.915Z
Updated: 2024-09-18T18:32:27.985Z
Reserved: 2023-10-05T19:17:25.739Z
Link: CVE-2023-45226
Vulnrichment
Updated: 2024-08-02T20:14:19.736Z
NVD
Status : Modified
Published: 2023-10-10T13:15:22.383
Modified: 2024-11-21T08:26:35.180
Link: CVE-2023-45226
Redhat
No data.