CVE-2020-5876Cleartext Transmission of Sensitive Info in F5 Big-ip Global Traffic Manager

Severity
8.1HIGHNVD
EPSS
0.3%
top 46.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 30
Latest updateMay 24

Description

On BIG-IP 15.0.0-15.0.1.3, 14.1.0-14.1.2.3, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, a race condition exists where mcpd and other processes may make unencrypted connection attempts to a new configuration sync peer. The race condition can occur when changing the ConfigSync IP address of a peer, adding a new peer, or when the Traffic Management Microkernel (TMM) first starts up.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9

Affected Packages12 packages

NVDf5/big-ip_local_traffic_manager11.6.111.6.5.1+4
NVDf5/big-ip_global_traffic_manager11.6.111.6.5.1+4
NVDf5/big-ip_analytics11.6.111.6.5.1+4
NVDf5/big-ip_link_controller11.6.111.6.5.1+4
NVDf5/big-ip_domain_name_system11.6.111.6.5.1+4

🔴Vulnerability Details

2
GHSA
GHSA-4rcp-9qg3-q6jp: On BIG-IP 152022-05-24
CVEList
CVE-2020-5876: On BIG-IP 152020-04-30

📋Vendor Advisories

1
F5
CVE-2020-5876: On BIG-IP 152020-04-30
CVE-2020-5876 — F5 vulnerability | cvebase