CVE Vulnerabilities

CVE-2023-40537

Insufficient Session Expiration

Published: Oct 10, 2023 | Modified: Nov 21, 2024
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

An authenticated users session cookie may remain valid for a limited time after logging out from the BIG-IP Configuration utility on a multi-blade VIPRION platform. 

Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Weakness

According to WASC, “Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization.”

Affected Software

NameVendorStart VersionEnd Version
Big-ip_access_policy_managerF513.1.0 (including)14.1.5 (including)
Big-ip_access_policy_managerF515.1.0 (including)15.1.9 (excluding)
Big-ip_access_policy_managerF516.1.0 (including)16.1.4 (excluding)

Potential Mitigations

References