Improper access control in F5 Networks products - CVE-2019-6665
Published: November 29, 2019
BIG-IQ Centralized Management
F5 iWorkflow
Enterprise Manager
BIG-IP ASM
Detailed vulnerability description
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions. A remote attacker with access to the device communication between the BIG-IP ASM Central Policy Builder and the BIG-IQ/Enterprise Manager/F5 iWorkflow can set up the proxy the same way and intercept the traffic.
This may lead to incorrect policy building suggestions or a partial denial-of-service (DoS).