#VU53575 Cleartext storage of sensitive information in NGINX Controller


Published: 2021-05-25

Vulnerability identifier: #VU53575

Vulnerability risk: High

CVSSv3.1: 7.4 [CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-23019

CWE-ID: CWE-312

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
NGINX Controller
Server applications / Web servers

Vendor: F5 Networks

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to the NGINX Controller Administrator password is exposed via the
systemd.txt file that is included in the NGINX support package. An attacker, who can obtain the support package can retrieve administrator's password and gain unauthorized access to the system.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

NGINX Controller: 2.0.0 - 3.14.0


External links
http://support.f5.com/csp/article/K04884013


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability