CVE-2023-43485

Severity
5.5MEDIUM
EPSS
0.2%
top 54.63%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 10

Description

When TACACS+ audit forwarding is configured on BIG-IP or BIG-IQ system, sharedsecret is logged in plaintext in the audit log. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6

Affected Packages21 packages

NVDf5/big-ip_domain_name_system15.1.015.1.9+3
CVEListV5f5/big-ip16.1.016.1.4+3
CVEListV5f5/big-iq8.1.0*+2
NVDf5/big-ip_websafe15.1.015.1.9+3
NVDf5/big-ip_analytics15.1.015.1.9+3

🔴Vulnerability Details

2
GHSA
GHSA-8rv8-vg5p-grcr: When TACACS+ audit forwarding is configured on BIG-IP or BIG-IQ system, sharedsecret is logged in plaintext in the audit log2023-10-10
CVEList
BIGIP and BIG-IQ TACACS+ audit log Vulnerability2023-10-10

📋Vendor Advisories

1
F5
CVE-2023-43485: When TACACS+ audit forwarding is configured on BIG-IP or BIG-IQ system, sharedsecret is logged in plaintext in the au...2023-10-10