CVE-2020-5888F5 Big-ip Access Policy Manager vulnerability

4 documents4 sources
Severity
8.1HIGHNVD
EPSS
0.2%
top 63.33%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 30
Latest updateMay 24

Description

On versions 15.1.0-15.1.0.1, 15.0.0-15.0.1.2, and 14.1.0-14.1.2.3, BIG-IP Virtual Edition (VE) may expose a mechanism for adjacent network (layer 2) attackers to access local daemons and bypass port lockdown settings.

CVSS vector

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:NExploitability: 2.8 | Impact: 5.2

Affected Packages11 packages

NVDf5/big-ip_access_policy_manager14.0.014.1.2.4+2
NVDf5/big-ip_local_traffic_manager14.1.014.1.2.4+2
NVDf5/big-ip_analytics14.0.014.1.2.4+2
NVDf5/big-ip_link_controller14.0.014.1.2.4+2
NVDf5/big-ip_domain_name_system14.0.014.1.2.4+2

🔴Vulnerability Details

2
GHSA
GHSA-96qr-vh8m-m23x: On versions 152022-05-24
CVEList
CVE-2020-5888: On versions 152020-04-30

📋Vendor Advisories

1
F5
CVE-2020-5888: On versions 152020-04-30
CVE-2020-5888 — F5 vulnerability | cvebase