Vigil@nce - F5 BIG-IP: file reading via iAppsLX REST
January 2021 by Vigil@nce
This bulletin was written by Vigil@nce : https://vigilance.fr/computer-vulnerability
SYNTHESIS OF THE VULNERABILITY
Impacted products: BIG-IP Hardware, TMOS.
Severity: 1/4.
Consequences: data reading.
Provenance: privileged account.
Confidence: confirmed by the editor (5/5).
Creation date: 17/12/2020.
DESCRIPTION OF THE VULNERABILITY
A local attacker can read a file via iAppsLX REST of F5 BIG-IP, in
order to obtain sensitive information.
ACCESS TO THE FULL VIGIL@NCE BULLETIN
https://vigilance.fr/vulnerability/F5-BIG-IP-file-reading-via-iAppsLX-REST-34153