7.8
CVSSv2

CVE-2012-1493

Published: 09/07/2012 Updated: 10/07/2012
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
VMScore: 795
Vector: AV:N/AC:L/Au:N/C:C/I:N/A:N

Vulnerability Summary

F5 BIG-IP appliances 9.x prior to 9.4.8-HF5, 10.x prior to 10.2.4, 11.0.x prior to 11.0.0-HF2, and 11.1.x prior to 11.1.0-HF3, and Enterprise Manager prior to 2.1.0-HF2, 2.2.x prior to 2.2.0-HF1, and 2.3.x prior to 2.3.0-HF3, use a single SSH private key across different customers' installations and do not properly restrict access to this key, which makes it easier for remote malicious users to perform SSH logins via the PubkeyAuthentication option.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

f5 big-ip_local_traffic_manager 9.0.0

f5 big-ip_local_traffic_manager 10.0.0

f5 big-ip_global_traffic_manager 9.2.2

f5 big-ip_global_traffic_manager 10.0.0

f5 big-ip_global_traffic_manager 11.1.0

f5 big-ip_application_security_manager 9.2.0

f5 big-ip_application_security_manager 9.4.5

f5 big-ip_application_security_manager 10.0.1

f5 big-ip_application_security_manager 11.0.0

f5 tmos 9.2

f5 tmos 9.1.2

f5 tmos 9.3

f5 tmos 9.2.5

f5 tmos 9.4.8

f5 tmos 9.4.6

f5 tmos 9.0.5

f5 tmos 9.4.3

f5 tmos 4.5.9

f5 tmos 2.0

f5 tmos 4.2

f5 big-ip_local_traffic_manager 11.0.0

f5 big-ip_local_traffic_manager 11.1.0

f5 big-ip_application_security_manager 9.4.6

f5 big-ip_application_security_manager 9.4.7

f5 big-ip_application_security_manager 9.4.8

f5 big-ip_application_security_manager 10.0.0

f5 tmos 9.1.1

f5 tmos 9.4.5

f5 tmos 9.4.4

f5 tmos 9.4.2

f5 tmos 9.4.1

f5 tmos 9.0.2

f5 tmos 9.0.1

f5 tmos 9.0.4

f5 tmos 9.0.3

f5 tmos 4.0

f5 tmos

f5 tmos 4.4

f5 tmos 4.5

f5 big-ip_local_traffic_manager

f5 big-ip_global_traffic_manager 10.2.3

f5 big-ip_global_traffic_manager 11.0.0

f5 big-ip_application_security_manager 11.1.0

f5 tmos 9.2.4

f5 tmos 9.2.3

f5 tmos 10.0.1

f5 tmos 10.1.0

f5 tmos 9.6.1

f5 tmos 10.0.0

f5 tmos 4.5.12

f5 tmos 4.5.6

f5 tmos 4.5.10

f5 tmos 4.5.11

f5 tmos 4.6.2

f5 big-ip_local_traffic_manager 9.4.8

f5 big-ip_local_traffic_manager 10.2.3

f5 big-ip_global_traffic_manager

f5 big-ip_global_traffic_manager 9.4.8

f5 big-ip_application_security_manager 9.4.4

f5 big-ip_application_security_manager 10.2.3

f5 tmos 9.2.2

f5 tmos 9.1.3

f5 tmos 9.4

f5 tmos 9.3.1

f5 tmos 9.6.0

f5 tmos 9.4.7

f5 tmos 9.1

f5 tmos 10.2.0

f5 tmos 9.0

f5 tmos 4.6

f5 tmos 4.3

f5 big-ip_5100

f5 big-ip_3410

f5 big-ip_8800

f5 big-ip_6800

f5 big-ip_1500

f5 big-ip_2400

f5 big-ip_3900

f5 big-ip_3600

f5 big-ip_8900

f5 big-ip_1600

f5 big-ip_1000

f5 big-ip_5110

f5 big-ip_6400

f5 big-ip_8400

f5 big-ip_11000

f5 big-ip_11050

f5 big-ip_4100

f5 big-ip_3400

f5 big-ip_6900

f5 big-ip_8950

f5 enterprise manager 2.0

f5 enterprise manager 2.1.0

f5 enterprise manager 2.2.0

f5 enterprise manager 2.3.0

f5 enterprise manager

f5 enterprise manager 1.0

Exploits

F5 BIG-IP suffers from a remote root authentication bypass vulnerability Version 1110 build 19430 is affected ...
#!/usr/bin/python # # Title: F5 BIG-IP Remote Root Authentication Bypass Vulnerability (py) # # Quick script written by Dave Kennedy (ReL1K) for F5 authentication root bypass # wwwsecmaniaccom # # import subprocess,os filewrite = file("privkey", "w") filewritewrite("""-----BEGIN RSA PRIVATE KEY----- MIICWgIBAAKBgQC8iELmyRPPHIeJ//uLLfK ...
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # web site for more information on licensing and terms of use # metasploitcom/ ## require 'msf/core' require 'net/ssh' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking in ...
Matta Consulting - Matta Advisory wwwtrustmattacom F5 BIG-IP remote root authentication bypass Vulnerability Advisory ID: MATTA-2012-002 CVE reference: CVE-2012-1493 Affected platforms: BIG-IP platforms without SCCP Version: 11x 10x 9x Date: 2012-February-16 Security risk: High Vulnerability: F5 BIG-IP remote root ...