9.1

CVE-2020-5885

On versions 15.0.0-15.1.0.1, 14.1.0-14.1.2.3, 13.1.0-13.1.3.3, and 12.1.0-12.1.5.1, BIG-IP systems set up for connection mirroring in a high availability (HA) pair transfer sensitive cryptographic objects over an insecure communications channel. This is a control plane issue which is exposed only on the network used for connection mirroring.

Data is provided by the National Vulnerability Database (NVD)
F5Big-ip Access Policy Manager Version >= 12.1.0 <= 12.1.5.1
F5Big-ip Access Policy Manager Version >= 13.1.0 <= 13.1.3.3
F5Big-ip Access Policy Manager Version >= 14.1.0 <= 14.1.2.3
F5Big-ip Access Policy Manager Version >= 15.0.0 <= 15.1.0.1
F5Big-ip Advanced Firewall Manager Version >= 12.1.0 <= 12.1.5.1
F5Big-ip Advanced Firewall Manager Version >= 13.1.0 <= 13.1.3.3
F5Big-ip Advanced Firewall Manager Version >= 14.1.0 <= 14.1.2.3
F5Big-ip Advanced Firewall Manager Version >= 15.0.0 <= 15.1.0.1
F5Big-ip Analytics Version >= 12.1.0 <= 12.1.5.1
F5Big-ip Analytics Version >= 13.1.0 <= 13.1.3.3
F5Big-ip Analytics Version >= 14.1.0 <= 14.1.2.3
F5Big-ip Analytics Version >= 15.0.0 <= 15.1.0.1
F5Big-ip Application Acceleration Manager Version >= 12.1.0 <= 12.1.5.1
F5Big-ip Application Acceleration Manager Version >= 13.1.0 <= 13.1.3.3
F5Big-ip Application Acceleration Manager Version >= 14.1.0 <= 14.1.2.3
F5Big-ip Application Acceleration Manager Version >= 15.0.0 <= 15.1.0.1
F5Big-ip Application Security Manager Version >= 12.1.0 <= 12.1.5.1
F5Big-ip Application Security Manager Version >= 13.1.0 <= 13.1.3.3
F5Big-ip Application Security Manager Version >= 14.1.0 <= 14.1.2.3
F5Big-ip Application Security Manager Version >= 15.0.0 <= 15.1.0.1
F5Big-ip Domain Name System Version >= 12.1.0 <= 12.1.5.1
F5Big-ip Domain Name System Version >= 13.1.0 <= 13.1.3.3
F5Big-ip Domain Name System Version >= 14.1.0 <= 14.1.2.3
F5Big-ip Domain Name System Version >= 15.0.0 <= 15.1.0.1
F5Big-ip Fraud Protection Service Version >= 12.1.0 <= 12.1.5.1
F5Big-ip Fraud Protection Service Version >= 13.1.0 <= 13.1.3.3
F5Big-ip Fraud Protection Service Version >= 14.1.0 <= 14.1.2.3
F5Big-ip Fraud Protection Service Version >= 15.0.0 <= 15.1.0.1
F5Big-ip Global Traffic Manager Version >= 12.1.0 <= 12.1.5.1
F5Big-ip Global Traffic Manager Version >= 13.1.0 <= 13.1.3.3
F5Big-ip Global Traffic Manager Version >= 14.1.0 <= 14.1.2.3
F5Big-ip Global Traffic Manager Version >= 15.0.0 <= 15.1.0.1
F5Big-ip Link Controller Version >= 12.1.0 <= 12.1.5.1
F5Big-ip Link Controller Version >= 13.1.0 <= 13.1.3.3
F5Big-ip Link Controller Version >= 14.1.0 <= 14.1.2.3
F5Big-ip Link Controller Version >= 15.0.0 <= 15.1.0.1
F5Big-ip Local Traffic Manager Version >= 12.1.0 <= 12.1.5.1
F5Big-ip Local Traffic Manager Version >= 13.1.0 <= 13.1.3.3
F5Big-ip Local Traffic Manager Version >= 14.1.0 <= 14.1.2.3
F5Big-ip Local Traffic Manager Version >= 15.0.0 <= 15.1.0.1
F5Big-ip Policy Enforcement Manager Version >= 12.1.0 <= 12.1.5.1
F5Big-ip Policy Enforcement Manager Version >= 13.1.0 <= 13.1.3.3
F5Big-ip Policy Enforcement Manager Version >= 14.1.0 <= 14.1.2.3
F5Big-ip Policy Enforcement Manager Version >= 15.0.0 <= 15.1.0.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.24% 0.447
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.1 3.9 5.2
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
nvd@nist.gov 6.4 10 4.9
AV:N/AC:L/Au:N/C:P/I:P/A:N
CWE-319 Cleartext Transmission of Sensitive Information

The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.

CWE-326 Inadequate Encryption Strength

The product stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.