On BIG-IP ASM 15.0.0-15.0.1, 14.1.0-14.1.2, 14.0.0-14.0.1, and 13.1.0-13.1.3.1, BIG-IQ 6.0.0 and 5.2.0-5.4.0, iWorkflow 2.3.0, and Enterprise Manager 3.1.1, an attacker with access to the device communication between the BIG-IP ASM Central Policy Builder and the BIG-IQ/Enterprise Manager/F5 iWorkflow will be able to set up the proxy the same way and intercept the traffic.
2019-11-27T22:15:11.383
2024-11-21T04:46:54.860
Modified
CVSSv3.1: 9.4 (CRITICAL)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | f5 | big-ip_application_security_manager | ≤ 13.1.3.1 | Yes |
| Application | f5 | big-ip_application_security_manager | ≤ 14.0.1 | Yes |
| Application | f5 | big-ip_application_security_manager | ≤ 14.1.2 | Yes |
| Application | f5 | big-ip_application_security_manager | ≤ 15.0.1 | Yes |
| Application | f5 | big-iq_centralized_management | ≤ 5.4.0 | Yes |
| Application | f5 | big-iq_centralized_management | 6.0.0 | Yes |
| Application | f5 | enterprise_manager | 3.1.1 | Yes |
| Application | f5 | iworkflow | 2.3.0 | Yes |