SB2020042406 - Multiple vulnerabilities in NGINX Controller 



SB2020042406 - Multiple vulnerabilities in NGINX Controller

Published: April 24, 2020 Updated: April 24, 2020

Security Bulletin ID SB2020042406
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Improper Certificate Validation (CVE-ID: CVE-2020-5864)

The vulnerability allows a remote attacker to perform a man-in-the-middle (MitM) attack.

The vulnerability exists due to communication between NGINX Controller and NGINX Plus instances skip TLS verification by default. A remote attacker can perform a MitM attack and read/modify data in transit.


2) Improper Authorization (CVE-ID: CVE-2020-5863)

The vulnerability allows a remote attacker to perform a denial of service attack.

The vulnerability exists due to NGINX Controller allows a remote unauthenticated attacker to create unprivileged user accounts and upload a new license to the system. A remote attacker can use this behavior to consume all available disk space on the system and perform a denial of service attack.


Remediation

Install update from vendor's website.