Vulnerability Description
The BIG-IP Edge Client Installer on macOS does not follow best practices for elevating privileges during the installation process. This vulnerability is due to an incomplete fix for CVE-2023-38418. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| F5 | Big-Ip Access Policy Manager | >= 7.2.3, < 7.2.4.4 |
| F5 | Big-Ip Advanced Firewall Manager | >= 13.1.0, <= 13.1.5 |
| F5 | Big-Ip Advanced Web Application Firewall | >= 13.1.0, <= 13.1.5 |
| F5 | Big-Ip Analytics | >= 13.1.0, <= 13.1.5 |
| F5 | Big-Ip Application Acceleration Manager | >= 13.1.0, <= 13.1.5 |
| F5 | Big-Ip Application Security Manager | >= 13.1.0, <= 13.1.5 |
| F5 | Big-Ip Application Visibility And Reporting | >= 13.1.0, <= 13.1.5 |
| F5 | Big-Ip Carrier-Grade Nat | >= 13.1.0, <= 13.1.5 |
| F5 | Big-Ip Ddos Hybrid Defender | >= 13.1.0, <= 13.1.5 |
| F5 | Big-Ip Domain Name System | >= 13.1.0, <= 13.1.5 |
| F5 | Big-Ip Edge Gateway | >= 13.1.0, <= 13.1.5 |
| F5 | Big-Ip Fraud Protection Service | >= 13.1.0, <= 13.1.5 |
| F5 | Big-Ip Global Traffic Manager | >= 13.1.0, <= 13.1.5 |
| F5 | Big-Ip Link Controller | >= 13.1.0, <= 13.1.5 |
| F5 | Big-Ip Local Traffic Manager | >= 13.1.0, <= 13.1.5 |
| F5 | Big-Ip Policy Enforcement Manager | >= 13.1.0, <= 13.1.5 |
| F5 | Big-Ip Ssl Orchestrator | >= 13.1.0, <= 13.1.5 |
| F5 | Big-Ip Webaccelerator | >= 13.1.0, <= 13.1.5 |
| F5 | Big-Ip Websafe | >= 13.1.0, <= 13.1.5 |
| Apple | Macos | - |
Related Weaknesses (CWE)
References
- https://my.f5.com/manage/s/article/K000136185Vendor Advisory
- https://my.f5.com/manage/s/article/K000136185Vendor Advisory
FAQ
What is CVE-2023-43611?
CVE-2023-43611 is a vulnerability with a CVSS score of 7.8 (HIGH). The BIG-IP Edge Client Installer on macOS does not follow best practices for elevating privileges during the installation process. This vulnerability is due to an incomplete fix for CVE-2023-38418. ...
How severe is CVE-2023-43611?
CVE-2023-43611 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-43611?
Check the references section above for vendor advisories and patch information. Affected products include: F5 Big-Ip Access Policy Manager, F5 Big-Ip Advanced Firewall Manager, F5 Big-Ip Advanced Web Application Firewall, F5 Big-Ip Analytics, F5 Big-Ip Application Acceleration Manager.