9.1
CVE-2020-5885
- EPSS 0.24%
- Published 30.04.2020 21:15:17
- Last modified 21.11.2024 05:34:45
- Source f5sirt@f5.com
- Teams watchlist Login
- Open Login
On versions 15.0.0-15.1.0.1, 14.1.0-14.1.2.3, 13.1.0-13.1.3.3, and 12.1.0-12.1.5.1, BIG-IP systems set up for connection mirroring in a high availability (HA) pair transfer sensitive cryptographic objects over an insecure communications channel. This is a control plane issue which is exposed only on the network used for connection mirroring.
Data is provided by the National Vulnerability Database (NVD)
F5 ≫ Big-ip Access Policy Manager Version >= 12.1.0 <= 12.1.5.1
F5 ≫ Big-ip Access Policy Manager Version >= 13.1.0 <= 13.1.3.3
F5 ≫ Big-ip Access Policy Manager Version >= 14.1.0 <= 14.1.2.3
F5 ≫ Big-ip Access Policy Manager Version >= 15.0.0 <= 15.1.0.1
F5 ≫ Big-ip Advanced Firewall Manager Version >= 12.1.0 <= 12.1.5.1
F5 ≫ Big-ip Advanced Firewall Manager Version >= 13.1.0 <= 13.1.3.3
F5 ≫ Big-ip Advanced Firewall Manager Version >= 14.1.0 <= 14.1.2.3
F5 ≫ Big-ip Advanced Firewall Manager Version >= 15.0.0 <= 15.1.0.1
F5 ≫ Big-ip Analytics Version >= 12.1.0 <= 12.1.5.1
F5 ≫ Big-ip Analytics Version >= 13.1.0 <= 13.1.3.3
F5 ≫ Big-ip Analytics Version >= 14.1.0 <= 14.1.2.3
F5 ≫ Big-ip Analytics Version >= 15.0.0 <= 15.1.0.1
F5 ≫ Big-ip Application Acceleration Manager Version >= 12.1.0 <= 12.1.5.1
F5 ≫ Big-ip Application Acceleration Manager Version >= 13.1.0 <= 13.1.3.3
F5 ≫ Big-ip Application Acceleration Manager Version >= 14.1.0 <= 14.1.2.3
F5 ≫ Big-ip Application Acceleration Manager Version >= 15.0.0 <= 15.1.0.1
F5 ≫ Big-ip Application Security Manager Version >= 12.1.0 <= 12.1.5.1
F5 ≫ Big-ip Application Security Manager Version >= 13.1.0 <= 13.1.3.3
F5 ≫ Big-ip Application Security Manager Version >= 14.1.0 <= 14.1.2.3
F5 ≫ Big-ip Application Security Manager Version >= 15.0.0 <= 15.1.0.1
F5 ≫ Big-ip Domain Name System Version >= 12.1.0 <= 12.1.5.1
F5 ≫ Big-ip Domain Name System Version >= 13.1.0 <= 13.1.3.3
F5 ≫ Big-ip Domain Name System Version >= 14.1.0 <= 14.1.2.3
F5 ≫ Big-ip Domain Name System Version >= 15.0.0 <= 15.1.0.1
F5 ≫ Big-ip Fraud Protection Service Version >= 12.1.0 <= 12.1.5.1
F5 ≫ Big-ip Fraud Protection Service Version >= 13.1.0 <= 13.1.3.3
F5 ≫ Big-ip Fraud Protection Service Version >= 14.1.0 <= 14.1.2.3
F5 ≫ Big-ip Fraud Protection Service Version >= 15.0.0 <= 15.1.0.1
F5 ≫ Big-ip Global Traffic Manager Version >= 12.1.0 <= 12.1.5.1
F5 ≫ Big-ip Global Traffic Manager Version >= 13.1.0 <= 13.1.3.3
F5 ≫ Big-ip Global Traffic Manager Version >= 14.1.0 <= 14.1.2.3
F5 ≫ Big-ip Global Traffic Manager Version >= 15.0.0 <= 15.1.0.1
F5 ≫ Big-ip Link Controller Version >= 12.1.0 <= 12.1.5.1
F5 ≫ Big-ip Link Controller Version >= 13.1.0 <= 13.1.3.3
F5 ≫ Big-ip Link Controller Version >= 14.1.0 <= 14.1.2.3
F5 ≫ Big-ip Link Controller Version >= 15.0.0 <= 15.1.0.1
F5 ≫ Big-ip Local Traffic Manager Version >= 12.1.0 <= 12.1.5.1
F5 ≫ Big-ip Local Traffic Manager Version >= 13.1.0 <= 13.1.3.3
F5 ≫ Big-ip Local Traffic Manager Version >= 14.1.0 <= 14.1.2.3
F5 ≫ Big-ip Local Traffic Manager Version >= 15.0.0 <= 15.1.0.1
F5 ≫ Big-ip Policy Enforcement Manager Version >= 12.1.0 <= 12.1.5.1
F5 ≫ Big-ip Policy Enforcement Manager Version >= 13.1.0 <= 13.1.3.3
F5 ≫ Big-ip Policy Enforcement Manager Version >= 14.1.0 <= 14.1.2.3
F5 ≫ Big-ip Policy Enforcement Manager Version >= 15.0.0 <= 15.1.0.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.24% | 0.447 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 9.1 | 3.9 | 5.2 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
|
nvd@nist.gov | 6.4 | 10 | 4.9 |
AV:N/AC:L/Au:N/C:P/I:P/A:N
|
CWE-319 Cleartext Transmission of Sensitive Information
The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.
CWE-326 Inadequate Encryption Strength
The product stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.