Логотип exploitDog
bind:CVE-2023-45226
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-45226

Количество 3

Количество 3

nvd логотип

CVE-2023-45226

больше 2 лет назад

The BIG-IP SPK TMM (Traffic Management Module) f5-debug-sidecar and f5-debug-sshd containers contains hardcoded credentials that may allow an attacker with the ability to intercept traffic to impersonate the SPK Secure Shell (SSH) server on those containers. This is only exposed when ssh debug is enabled.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated

CVSS3: 7.4
EPSS: Низкий
github логотип

GHSA-6vq9-584m-2q8f

больше 2 лет назад

The BIG-IP SPK TMM (Traffic Management Module) f5-debug-sidecar and f5-debug-sshd containers contains hardcoded credentials that may allow an attacker with the ability to intercept traffic to impersonate the SPK Secure Shell (SSH) server on those containers. This is only exposed when ssh debug is enabled.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated

CVSS3: 7.4
EPSS: Низкий
fstec логотип

BDU:2024-01159

больше 2 лет назад

Уязвимость модуля управления трафиком (Traffic Management Module) средства контроля доступа и удаленной аутентификации BIG-IP, позволяющая нарушителю выдать себя за сервер SPK Secure Shell (SSH)

CVSS3: 7.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-45226

The BIG-IP SPK TMM (Traffic Management Module) f5-debug-sidecar and f5-debug-sshd containers contains hardcoded credentials that may allow an attacker with the ability to intercept traffic to impersonate the SPK Secure Shell (SSH) server on those containers. This is only exposed when ssh debug is enabled.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated

CVSS3: 7.4
1%
Низкий
больше 2 лет назад
github логотип
GHSA-6vq9-584m-2q8f

The BIG-IP SPK TMM (Traffic Management Module) f5-debug-sidecar and f5-debug-sshd containers contains hardcoded credentials that may allow an attacker with the ability to intercept traffic to impersonate the SPK Secure Shell (SSH) server on those containers. This is only exposed when ssh debug is enabled.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated

CVSS3: 7.4
1%
Низкий
больше 2 лет назад
fstec логотип
BDU:2024-01159

Уязвимость модуля управления трафиком (Traffic Management Module) средства контроля доступа и удаленной аутентификации BIG-IP, позволяющая нарушителю выдать себя за сервер SPK Secure Shell (SSH)

CVSS3: 7.4
1%
Низкий
больше 2 лет назад

Уязвимостей на страницу