#VU25003 Improper Authentication in BIG-IP APM and APM Clients


Published: 2020-02-06

Vulnerability identifier: #VU25003

Vulnerability risk: Low

CVSSv3.1: 4 [CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:U/RC:C]

CVE-ID: CVE-2020-5855

CWE-ID: CWE-287

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
BIG-IP APM
Hardware solutions / Security hardware applicances
APM Clients
Hardware solutions / Security hardware applicances

Vendor: F5 Networks

Description

The vulnerability allows a local attacker to bypass authentication process.

The vulnerability exists due to an error when the Windows Logon Integration feature is configured for BIG-IP Edge Client. An attacker with physical access to an authorized user's machine can bypass authentication to gain unauthorized access to internal resources or compromise the availability of the resources.

Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

BIG-IP APM: 11.5.2 - 15.1.0

APM Clients: 7.1.5 - 7.1.8


External links
http://support.f5.com/csp/article/K55102004


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability