A vulnerability exists in F5OS-A software that allows a highly privileged authenticated attacker to access sensitive FIPS hardware security module (HSM) information on F5 rSeries systems. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
A process is invoked with sensitive command-line arguments, environment variables, or other elements that can be seen by other processes on the operating system.