#VU23805 Cleartext storage of sensitive information in BIG-IP APM


Published: 2019-12-24

Vulnerability identifier: #VU23805

Vulnerability risk: Low

CVSSv3.1: 2 [CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-19150

CWE-ID: CWE-312

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
BIG-IP APM
Hardware solutions / Security hardware applicances

Vendor: F5 Networks

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to the BIG-IP APM system logs the client-session-id when a per-session policy is attached to the virtual server with debug logging enabled. A local administrator can view the debug files and recover client-session-id values.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

BIG-IP APM: 11.6.1 - 15.0.1.0.48.11 ENG Hotfix


External links
http://support.f5.com/csp/article/K37890841


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability