The BIG-IP SPK TMM (Traffic Management Module) f5-debug-sidecar and f5-debug-sshd containers contains hardcoded credentials that may allow an attacker with the ability to intercept traffic to impersonate the SPK Secure Shell (SSH) server on those containers. This is only exposed when ssh debug is enabled.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
                
            Metrics
Affected Vendors & Products
References
        | Link | Providers | 
|---|---|
| https://my.f5.com/manage/s/article/K000135874 |     | 
History
                    Wed, 18 Sep 2024 19:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: f5
Published:
Updated: 2024-09-18T18:32:27.985Z
Reserved: 2023-10-05T19:17:25.739Z
Link: CVE-2023-45226
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-08-02T20:14:19.736Z
 NVD
                        NVD
                    Status : Modified
Published: 2023-10-10T13:15:22.383
Modified: 2024-11-21T08:26:35.180
Link: CVE-2023-45226
 Redhat
                        Redhat
                    No data.