The BIG-IP SPK TMM (Traffic Management Module) f5-debug-sidecar and f5-debug-sshd containers contains hardcoded credentials that may allow an attacker with the ability to intercept traffic to impersonate the SPK Secure Shell (SSH) server on those containers. This is only exposed when ssh debug is enabled. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://my.f5.com/manage/s/article/K000135874 |
![]() ![]() |
History
Wed, 18 Sep 2024 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: f5
Published:
Updated: 2024-09-18T18:32:27.985Z
Reserved: 2023-10-05T19:17:25.739Z
Link: CVE-2023-45226

Updated: 2024-08-02T20:14:19.736Z

Status : Modified
Published: 2023-10-10T13:15:22.383
Modified: 2024-11-21T08:26:35.180
Link: CVE-2023-45226

No data.