A vulnerability exists in F5OS-A software that allows a highly privileged authenticated attacker to access sensitive FIPS hardware security module (HSM) information on F5 rSeries systems. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
A process is invoked with sensitive command-line arguments, environment variables, or other elements that can be seen by other processes on the operating system.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| F5os-a | F5 | 1.5.1 (including) | 1.5.3 (excluding) |
| F5os-a | F5 | 1.8.0 (including) | 1.8.0 (including) |