CVE-2020-5943
Severity CVSS v4.0:
Pending analysis
Type:
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
Publication date:
05/11/2020
Last modified:
21/07/2021
Description
In versions 14.1.0-14.1.0.1 and 14.1.2.5-14.1.2.7, when a BIG-IP object is created or listed through the REST interface, the protected fields are obfuscated in the REST response, not protected via a SecureVault cryptogram as TMSH does. One example of protected fields is the GTM monitor password.
Impact
Base Score 3.x
6.50
Severity 3.x
MEDIUM
Base Score 2.0
4.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* | 14.1.0 (including) | 14.1.0.1 (including) |
| cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* | 14.1.2.5 (including) | 14.1.2.7 (including) |
| cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* | 14.1.0 (including) | 14.1.0.1 (including) |
| cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* | 14.1.2.5 (including) | 14.1.2.7 (including) |
| cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:* | 14.1.0 (including) | 14.1.0.1 (including) |
| cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:* | 14.1.2.5 (including) | 14.1.2.7 (including) |
| cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* | 14.1.0 (including) | 14.1.0.1 (including) |
| cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* | 14.1.2.5 (including) | 14.1.2.7 (including) |
| cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* | 14.1.0 (including) | 14.1.0.1 (including) |
| cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* | 14.1.2.5 (including) | 14.1.2.7 (including) |
| cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* | 14.1.0 (including) | 14.1.0.1 (including) |
| cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* | 14.1.2.5 (including) | 14.1.2.7 (including) |
| cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:* | 14.1.0 (including) | 14.1.0.1 (including) |
| cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:* | 14.1.2.5 (including) | 14.1.2.7 (including) |
| cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* | 14.1.0 (including) | 14.1.0.1 (including) |
To consult the complete list of CPE names with products and versions, see this page



