Vulnerability identifier: #VU53575
Vulnerability risk: High
CVSSv3.1: 7.4 [CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-312
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
NGINX Controller
Server applications /
Web servers
Vendor: F5 Networks
Description
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to the NGINX Controller Administrator password is exposed via the
systemd.txt file that is included in the NGINX support package. An attacker, who can obtain the support package can retrieve administrator's password and gain unauthorized access to the system.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
NGINX Controller: 2.0.0 - 3.14.0
External links
http://support.f5.com/csp/article/K04884013
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.