{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-28406","assignerOrgId":"9dacffd4-cb11-413f-8451-fbbfd4ddc0ab","state":"PUBLISHED","assignerShortName":"f5","dateReserved":"2023-04-14T23:08:02.581Z","datePublished":"2023-05-03T14:34:00.796Z","dateUpdated":"2025-01-29T21:02:37.724Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unknown","modules":["All Modules"],"product":"BIG-IP","vendor":"F5","versions":[{"lessThan":"*","status":"unaffected","version":"17.1.0","versionType":"semver"},{"lessThan":"*","status":"affected","version":"17.0.0","versionType":"semver"},{"lessThan":"16.1.3.4","status":"affected","version":"16.1.0","versionType":"semver"},{"lessThan":"15.1.8.2","status":"affected","version":"15.1.0","versionType":"semver"},{"lessThan":"14.1.5.4","status":"affected","version":"14.1.0","versionType":"semver"},{"lessThan":"*","status":"affected","version":"13.1.0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","user":"00000000-0000-4000-9000-000000000000","value":"F5 acknowledges Yuya Chudo of Secureworks Japan K. K for bringing this issue to our attention and following the highest standards of coordinated disclosure."}],"datePublic":"2023-05-03T14:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"A directory traversal vulnerability exists in an undisclosed page of the BIG-IP Configuration utility which may allow an authenticated attacker to read files with .xml extension. Access to restricted information is limited and the attacker does not control what information is obtained.&nbsp; \n\n\nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated."}],"value":"A directory traversal vulnerability exists in an undisclosed page of the BIG-IP Configuration utility which may allow an authenticated attacker to read files with .xml extension. Access to restricted information is limited and the attacker does not control what information is obtained.  \n\n\nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.3,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-22","description":"CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"9dacffd4-cb11-413f-8451-fbbfd4ddc0ab","shortName":"f5","dateUpdated":"2023-05-03T14:34:00.796Z"},"references":[{"tags":["vendor-advisory"],"url":"https://my.f5.com/manage/s/article/K000132768"}],"source":{"discovery":"EXTERNAL"},"title":"BIG-IP Configuration utility vulnerability","x_generator":{"engine":"F5 SIRTBot v1.0"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T12:38:25.151Z"},"title":"CVE Program Container","references":[{"tags":["vendor-advisory","x_transferred"],"url":"https://my.f5.com/manage/s/article/K000132768"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-01-29T21:02:28.697348Z","id":"CVE-2023-28406","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-01-29T21:02:37.724Z"}}]}}