CVE-2023-28656

NGINX Management Suite may allow an authenticated attacker to gain access to configuration objects outside of their assigned environment.   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:f5:nginx_api_connectivity_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_instance_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_security_monitoring:*:*:*:*:*:*:*:*

History

13 Feb 2025, 17:16

Type Values Removed Values Added
Summary (en) NGINX Management Suite may allow an authenticated attacker to gain access to configuration objects outside of their assigned environment.   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. (en) NGINX Management Suite may allow an authenticated attacker to gain access to configuration objects outside of their assigned environment.   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Information

Published : 2023-05-03 15:15

Updated : 2025-02-13 17:16


NVD link : CVE-2023-28656

Mitre link : CVE-2023-28656

CVE.ORG link : CVE-2023-28656


JSON object : View

Products Affected

f5

  • nginx_security_monitoring
  • nginx_instance_manager
  • nginx_api_connectivity_manager
CWE
CWE-639

Authorization Bypass Through User-Controlled Key