Vulnerability identifier: #VU34178
Vulnerability risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2020-5910
CWE-ID:
CWE-287
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
NGINX Controller
Server applications /
Web servers
Vendor: F5 Networks
Description
The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
Mitigation
Install update from vendor's website.
Vulnerable software versions
NGINX Controller: 1.0.1 - 3.5.0
External links
https://support.f5.com/csp/article/K59209532
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.