Attacker Value
Moderate
(1 user assessed)
Exploitability
Moderate
(1 user assessed)
User Interaction
Required
Privileges Required
None
Attack Vector
Network
5

CVE-2020-5948 — F5 TMUI XSS vulnerability

Disclosure Date: December 11, 2020
Add MITRE ATT&CK tactics and techniques that apply to this CVE.
Initial Access
Techniques
Validation
Validated
Validated

Description

On BIG-IP versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, 14.1.0-14.1.2.7, 13.1.0-13.1.3.4, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2, undisclosed endpoints in iControl REST allow for a reflected XSS attack, which could lead to a complete compromise of the BIG-IP system if the victim user is granted the admin role.

Add Assessment

CVSS V3 Severity and Metrics
Base Score:
9.6 Critical
Impact Score:
6
Exploitability Score:
2.8
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
Required
Scope (S):
Changed
Confidentiality (C):
High
Integrity (I):
High
Availability (A):
High

General Information

Vendors

  • f5

Products

  • big-ip access policy manager,
  • big-ip access policy manager 16.0.0,
  • big-ip advanced firewall manager,
  • big-ip advanced firewall manager 16.0.0,
  • big-ip analytics,
  • big-ip analytics 16.0.0,
  • big-ip application acceleration manager,
  • big-ip application acceleration manager 16.0.0,
  • big-ip application security manager,
  • big-ip application security manager 16.0.0,
  • big-ip domain name system,
  • big-ip domain name system 16.0.0,
  • big-ip fraud protection service,
  • big-ip fraud protection service 16.0.0,
  • big-ip global traffic manager,
  • big-ip global traffic manager 16.0.0,
  • big-ip link controller,
  • big-ip link controller 16.0.0,
  • big-ip local traffic manager,
  • big-ip local traffic manager 16.0.0,
  • big-ip policy enforcement manager,
  • big-ip policy enforcement manager 16.0.0

Additional Info

Technical Analysis