Description
When BIG-IP DNS is provisioned, a vulnerability exists in the gtm_add and bigip_add iControl REST commands that return the ssh-password parameter in cleartext in the iControl REST response and is also logged in the audit log. This may allow a highly privileged, authenticated attacker with access to the audit log to view sensitive information. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
Problem types
CWE-312 Cleartext Storage of Sensitive Information
Product status
21.0.0 (custom) before *
17.5.0 (custom) before 17.5.1.4
17.1.0 (custom) before 17.1.3.1
16.1.0 (custom) before *
Credits
F5
References
my.f5.com/manage/s/article/K000158070