CVE-2020-5860Improper Authentication in F5 Big-ip Application Security Manager

Severity
8.1HIGHNVD
EPSS
0.3%
top 50.70%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 27
Latest updateMay 24

Description

On BIG-IP 15.0.0-15.1.0.2, 14.1.0-14.1.2.3, 13.1.0-13.1.3.2, 12.1.0-12.1.5.1, and 11.5.2-11.6.5.1 and BIG-IQ 7.0.0, 6.0.0-6.1.0, and 5.2.0-5.4.0, in a High Availability (HA) network failover in Device Service Cluster (DSC), the failover service does not require a strong form of authentication and HA network failover traffic is not encrypted by Transport Layer Security (TLS).

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9

Affected Packages12 packages

NVDf5/big-ip_fraud_protection_service11.5.211.6.5+4
NVDf5/big-ip_local_traffic_manager11.5.211.6.5+4
NVDf5/big-ip_global_traffic_manager11.5.211.6.5+4
NVDf5/big-ip_analytics11.5.211.6.5+4

🔴Vulnerability Details

2
GHSA
GHSA-7ch6-8wvc-r28c: On BIG-IP 152022-05-24
CVEList
CVE-2020-5860: On BIG-IP 152020-03-27

📋Vendor Advisories

1
F5
CVE-2020-5860: On BIG-IP 152020-03-27
CVE-2020-5860 — Improper Authentication in F5 | cvebase