Description
On an F5OS system, if the root user had previously configured the system to allow login via SSH key-based authentication, and then enabled Appliance Mode; access via SSH key-based authentication is still allowed. For an attacker to exploit this vulnerability they must obtain the root user's SSH private key. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Problem types
CWE-863 Incorrect Authorization
Product status
1.7.0 (custom) before 1.8.0
1.5.1 (custom) before 1.5.3
1.6.0 (custom) before 1.8.0
Credits
F5
References
my.f5.com/manage/s/article/K000140574