NA

CVE-2015-3628

Vulnerability Summary

This Metasploit module exploits an authenticated privilege escalation vulnerability in the iControl API on the F5 BIG-IP LTM (and likely other F5 devices). This requires valid credentials and the Resource Administrator role. The exploit should work on BIG-IP 11.3.0 - 11.6.0, (11.5.x < 11.5.3 HF2 or 11.6.x < 11.6.0 HF6, see references for more details).

Exploits

This Metasploit module exploits an authenticated privilege escalation vulnerability in the iControl API on the F5 BIG-IP LTM (and likely other F5 devices) This requires valid credentials and the Resource Administrator role The exploit should work on BIG-IP 1130 - 1160, (115x < 1153 HF2 or 116x < 1160 HF6, see references for more ...