CVE Vulnerabilities

CVE-2023-40537

Insufficient Session Expiration

Published: Oct 10, 2023 | Modified: Oct 19, 2023
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

An authenticated users session cookie may remain valid for a limited time after logging out from the BIG-IP Configuration utility on a multi-blade VIPRION platform. 

Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Weakness

According to WASC, “Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization.”

Affected Software

Name Vendor Start Version End Version
Big-ip_access_policy_manager F5 13.1.0 (including) 14.1.5 (including)
Big-ip_access_policy_manager F5 15.1.0 (including) 15.1.9 (excluding)
Big-ip_access_policy_manager F5 16.1.0 (including) 16.1.4 (excluding)

Potential Mitigations

References