F5 Alert
2967Warning Date
Severity Level
Warning Number
Target Sector
4 May, 2023
● High
2023-5573
All
F5 Networks has released security updates to address several vulnerabilities in the following products:
- BIG-IP
- 17.0.0
- 16.1.2.2 - 16.1.3.3
- 15.1.5.1 - 15.1.8.1
- 14.1.4.6 - 14.1.5.3
- BIG-IP (APM)
- 17.0.0 - 17.1.0
- 16.1.0 - 16.1.3
- 15.1.0 - 15.1.8
- 14.1.0 - 14.1.5
- 13.1.0 - 13.1.5
- BIG-IP APM Clients
- 7.2.1 - 7.2.4
- BIG-IP (DNS)
- 17.0.0 - 17.1.0
- 16.1.0 - 16.1.3
- 15.1.0 - 15.1.8
- 14.1.0 - 14.1.5
- 13.1.0 - 13.1.5
- NGINX Instance Manager
- 1.0.0 - 1.0.4
- 2.0.0 - 2.8.0
- NGINX API Connectivity Manager
- 1.0.0 - 1.4.1
- NGINX Security Monitoring
- 1.0.0 - 1.2.0
Attacker could exploit these vulnerabilities by doing the following:
- Authorization Bypass
- Denial of Service (DoS)
- Cross-Site Scripting (XSS)
- Man-in-the-Middle (MITM)
- Remote Command Execution
- Privilege Escalation
The CERT team encourages users to review F5 Networks security advisory and apply the necessary updates: