CVE-2023-42768

Severity
7.2HIGH
EPSS
0.4%
top 37.57%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 10

Description

When a non-admin user has been assigned an administrator role via an iControl REST PUT request and later the user's role is reverted back to a non-admin role via the Configuration utility, tmsh, or iControl REST. BIG-IP non-admin user can still have access to iControl REST admin resource. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 1.2 | Impact: 5.9

Affected Packages20 packages

NVDf5/big-ip_access_policy_manager15.1.015.1.9+3
CVEListV5f5/big-ip16.1.016.1.4+3
NVDf5/big-ip_websafe15.1.015.1.9+3
NVDf5/big-ip_analytics15.1.015.1.9+3
NVDf5/big-ip_edge_gateway15.1.015.1.9+3

🔴Vulnerability Details

2
GHSA
GHSA-6944-qqg6-vmm7: When a non-admin user has been assigned an administrator role via an iControl REST PUT request and later the user's role is reverted back to a non-adm2023-10-10
CVEList
BIG-IP iControl REST vulnerability2023-10-10

📋Vendor Advisories

1
F5
CVE-2023-42768: When a non-admin user has been assigned an administrator role via an iControl REST PUT request and later the user's r...2023-10-10
CVE-2023-42768 (HIGH CVSS 7.2) | When a non-admin user has been assi | cvebase.io