CVE Vulnerabilities

CVE-2023-41964

Cleartext Storage of Sensitive Information

Published: Oct 10, 2023 | Modified: Oct 17, 2023
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

The BIG-IP and BIG-IQ systems do not encrypt some sensitive information written to Database (DB) variables. 

Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Weakness

The product stores sensitive information in cleartext within a resource that might be accessible to another control sphere.

Affected Software

Name Vendor Start Version End Version
Big-ip_access_policy_manager F5 13.1.0 (including) 13.1.5 (including)
Big-ip_access_policy_manager F5 14.1.0 (including) 14.1.5 (including)
Big-ip_access_policy_manager F5 15.1.0 (including) 15.1.9 (excluding)
Big-ip_access_policy_manager F5 16.1.0 (including) 16.1.4 (excluding)
Big-ip_advanced_firewall_manager F5 13.1.0 (including) 13.1.5 (including)
Big-ip_advanced_firewall_manager F5 14.1.0 (including) 14.1.5 (including)
Big-ip_advanced_firewall_manager F5 15.1.0 (including) 15.1.9 (excluding)
Big-ip_advanced_firewall_manager F5 16.1.0 (including) 16.1.4 (excluding)
Big-ip_advanced_web_application_firewall F5 13.1.0 (including) 13.1.5 (including)
Big-ip_advanced_web_application_firewall F5 14.1.0 (including) 14.1.5 (including)
Big-ip_advanced_web_application_firewall F5 15.1.0 (including) 15.1.9 (excluding)
Big-ip_advanced_web_application_firewall F5 16.1.0 (including) 16.1.4 (excluding)
Big-ip_analytics F5 13.1.0 (including) 13.1.5 (including)
Big-ip_analytics F5 14.1.0 (including) 14.1.5 (including)
Big-ip_analytics F5 15.1.0 (including) 15.1.9 (excluding)
Big-ip_analytics F5 16.1.0 (including) 16.1.4 (excluding)
Big-ip_application_acceleration_manager F5 13.1.0 (including) 13.1.5 (including)
Big-ip_application_acceleration_manager F5 14.1.0 (including) 14.1.5 (including)
Big-ip_application_acceleration_manager F5 15.1.0 (including) 15.1.9 (excluding)
Big-ip_application_acceleration_manager F5 16.1.0 (including) 16.1.4 (excluding)
Big-ip_application_security_manager F5 13.1.0 (including) 13.1.5 (including)
Big-ip_application_security_manager F5 14.1.0 (including) 14.1.5 (including)
Big-ip_application_security_manager F5 15.1.0 (including) 15.1.9 (excluding)
Big-ip_application_security_manager F5 16.1.0 (including) 16.1.4 (excluding)
Big-ip_application_visibility_and_reporting F5 13.1.0 (including) 13.1.5 (including)
Big-ip_application_visibility_and_reporting F5 14.1.0 (including) 14.1.5 (including)
Big-ip_application_visibility_and_reporting F5 15.1.0 (including) 15.1.9 (excluding)
Big-ip_application_visibility_and_reporting F5 16.1.0 (including) 16.1.4 (excluding)
Big-ip_carrier-grade_nat F5 13.1.0 (including) 13.1.5 (including)
Big-ip_carrier-grade_nat F5 14.1.0 (including) 14.1.5 (including)
Big-ip_carrier-grade_nat F5 15.1.0 (including) 15.1.9 (excluding)
Big-ip_carrier-grade_nat F5 16.1.0 (including) 16.1.4 (excluding)
Big-ip_ddos_hybrid_defender F5 13.1.0 (including) 13.1.5 (including)
Big-ip_ddos_hybrid_defender F5 14.1.0 (including) 14.1.5 (including)
Big-ip_ddos_hybrid_defender F5 15.1.0 (including) 15.1.9 (excluding)
Big-ip_ddos_hybrid_defender F5 16.1.0 (including) 16.1.4 (excluding)
Big-ip_domain_name_system F5 13.1.0 (including) 13.1.5 (including)
Big-ip_domain_name_system F5 14.1.0 (including) 14.1.5 (including)
Big-ip_domain_name_system F5 15.1.0 (including) 15.1.9 (excluding)
Big-ip_domain_name_system F5 16.1.0 (including) 16.1.4 (excluding)
Big-ip_edge_gateway F5 13.1.0 (including) 13.1.5 (including)
Big-ip_edge_gateway F5 14.1.0 (including) 14.1.5 (including)
Big-ip_edge_gateway F5 15.1.0 (including) 15.1.9 (excluding)
Big-ip_edge_gateway F5 16.1.0 (including) 16.1.4 (excluding)
Big-ip_fraud_protection_service F5 13.1.0 (including) 13.1.5 (including)
Big-ip_fraud_protection_service F5 14.1.0 (including) 14.1.5 (including)
Big-ip_fraud_protection_service F5 15.1.0 (including) 15.1.9 (excluding)
Big-ip_fraud_protection_service F5 16.1.0 (including) 16.1.4 (excluding)
Big-ip_global_traffic_manager F5 13.1.0 (including) 13.1.5 (including)
Big-ip_global_traffic_manager F5 14.1.0 (including) 14.1.5 (including)
Big-ip_global_traffic_manager F5 15.1.0 (including) 15.1.9 (excluding)
Big-ip_global_traffic_manager F5 16.1.0 (including) 16.1.4 (excluding)
Big-ip_link_controller F5 13.1.0 (including) 13.1.5 (including)
Big-ip_link_controller F5 14.1.0 (including) 14.1.5 (including)
Big-ip_link_controller F5 15.1.0 (including) 15.1.9 (excluding)
Big-ip_link_controller F5 16.1.0 (including) 16.1.4 (excluding)
Big-ip_local_traffic_manager F5 13.1.0 (including) 13.1.5 (including)
Big-ip_local_traffic_manager F5 14.1.0 (including) 14.1.5 (including)
Big-ip_local_traffic_manager F5 15.1.0 (including) 15.1.9 (excluding)
Big-ip_local_traffic_manager F5 16.1.0 (including) 16.1.4 (excluding)
Big-ip_policy_enforcement_manager F5 13.1.0 (including) 13.1.5 (including)
Big-ip_policy_enforcement_manager F5 14.1.0 (including) 14.1.5 (including)
Big-ip_policy_enforcement_manager F5 15.1.0 (including) 15.1.9 (excluding)
Big-ip_policy_enforcement_manager F5 16.1.0 (including) 16.1.4 (excluding)
Big-ip_ssl_orchestrator F5 13.1.0 (including) 13.1.5 (including)
Big-ip_ssl_orchestrator F5 14.1.0 (including) 14.1.5 (including)
Big-ip_ssl_orchestrator F5 15.1.0 (including) 15.1.9 (excluding)
Big-ip_ssl_orchestrator F5 16.1.0 (including) 16.1.4 (excluding)
Big-ip_webaccelerator F5 13.1.0 (including) 13.1.5 (including)
Big-ip_webaccelerator F5 14.1.0 (including) 14.1.5 (including)
Big-ip_webaccelerator F5 15.1.0 (including) 15.1.9 (excluding)
Big-ip_webaccelerator F5 16.1.0 (including) 16.1.4 (excluding)
Big-ip_websafe F5 13.1.0 (including) 13.1.5 (including)
Big-ip_websafe F5 14.1.0 (including) 14.1.5 (including)
Big-ip_websafe F5 15.1.0 (including) 15.1.9 (excluding)
Big-ip_websafe F5 16.1.0 (including) 16.1.4 (excluding)
Big-iq_centralized_management F5 8.0.0 (including) 8.3.0 (including)

Extended Description

Because the information is stored in cleartext (i.e., unencrypted), attackers could potentially read it. Even if the information is encoded in a way that is not human-readable, certain techniques could determine which encoding is being used, then decode the information. When organizations adopt cloud services, it can be easier for attackers to access the data from anywhere on the Internet. In some systems/environments such as cloud, the use of “double encryption” (at both the software and hardware layer) might be required, and the developer might be solely responsible for both layers, instead of shared responsibility with the administrator of the broader system/environment.

Potential Mitigations

References