The BIG-IP SPK TMM (Traffic Management Module) f5-debug-sidecar and f5-debug-sshd containers contains hardcoded credentials that may allow an attacker with the ability to intercept traffic to impersonate the SPK Secure Shell (SSH) server on those containers. This is only exposed when ssh debug is enabled. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
References
Link | Resource |
---|---|
https://my.f5.com/manage/s/article/K000135874 | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2023-10-10 13:15
Updated : 2023-10-18 01:27
NVD link : CVE-2023-45226
Mitre link : CVE-2023-45226
CVE.ORG link : CVE-2023-45226
JSON object : View
Products Affected
f5
- big-ip_next_service_proxy_for_kubernetes
CWE
CWE-798
Use of Hard-coded Credentials