All the vulnerabilites related to f5 - big-ip_8400
Vulnerability from fkie_nvd
Published
2012-07-09 22:55
Modified
2024-11-21 01:37
Severity ?
Summary
F5 BIG-IP appliances 9.x before 9.4.8-HF5, 10.x before 10.2.4, 11.0.x before 11.0.0-HF2, and 11.1.x before 11.1.0-HF3, and Enterprise Manager before 2.1.0-HF2, 2.2.x before 2.2.0-HF1, and 2.3.x before 2.3.0-HF3, use a single SSH private key across different customers' installations and do not properly restrict access to this key, which makes it easier for remote attackers to perform SSH logins via the PubkeyAuthentication option.
Impacted products
Vendor Product Version
f5 big-ip_application_security_manager 9.2.0
f5 big-ip_application_security_manager 9.2.0
f5 big-ip_application_security_manager 9.4.4
f5 big-ip_application_security_manager 9.4.5
f5 big-ip_application_security_manager 9.4.6
f5 big-ip_application_security_manager 9.4.7
f5 big-ip_application_security_manager 9.4.8
f5 big-ip_application_security_manager 10.0.0
f5 big-ip_application_security_manager 10.0.1
f5 big-ip_application_security_manager 10.2.3
f5 big-ip_application_security_manager 11.0.0
f5 big-ip_application_security_manager 11.0.0
f5 big-ip_application_security_manager 11.1.0
f5 big-ip_application_security_manager 11.1.0
f5 big-ip_global_traffic_manager *
f5 big-ip_global_traffic_manager 9.2.2
f5 big-ip_global_traffic_manager 9.4.8
f5 big-ip_global_traffic_manager 10.0.0
f5 big-ip_global_traffic_manager 10.2.3
f5 big-ip_global_traffic_manager 11.0.0
f5 big-ip_global_traffic_manager 11.0.0
f5 big-ip_global_traffic_manager 11.1.0
f5 big-ip_global_traffic_manager 11.1.0
f5 big-ip_local_traffic_manager *
f5 big-ip_local_traffic_manager 9.0.0
f5 big-ip_local_traffic_manager 9.4.8
f5 big-ip_local_traffic_manager 10.0.0
f5 big-ip_local_traffic_manager 10.2.3
f5 big-ip_local_traffic_manager 11.0.0
f5 big-ip_local_traffic_manager 11.0.0
f5 big-ip_local_traffic_manager 11.1.0
f5 big-ip_local_traffic_manager 11.1.0
f5 tmos *
f5 tmos 2.0
f5 tmos 4.0
f5 tmos 4.2
f5 tmos 4.3
f5 tmos 4.4
f5 tmos 4.5
f5 tmos 4.5.6
f5 tmos 4.5.9
f5 tmos 4.5.10
f5 tmos 4.5.11
f5 tmos 4.5.12
f5 tmos 4.6
f5 tmos 4.6.2
f5 tmos 9.0
f5 tmos 9.0.1
f5 tmos 9.0.2
f5 tmos 9.0.3
f5 tmos 9.0.4
f5 tmos 9.0.5
f5 tmos 9.1
f5 tmos 9.1.1
f5 tmos 9.1.2
f5 tmos 9.1.3
f5 tmos 9.2
f5 tmos 9.2.2
f5 tmos 9.2.3
f5 tmos 9.2.4
f5 tmos 9.2.5
f5 tmos 9.3
f5 tmos 9.3.1
f5 tmos 9.4
f5 tmos 9.4.1
f5 tmos 9.4.2
f5 tmos 9.4.3
f5 tmos 9.4.4
f5 tmos 9.4.5
f5 tmos 9.4.6
f5 tmos 9.4.7
f5 tmos 9.4.8
f5 tmos 9.6.0
f5 tmos 9.6.1
f5 tmos 10.0.0
f5 tmos 10.0.1
f5 tmos 10.1.0
f5 tmos 10.2.0
f5 big-ip_1000 *
f5 big-ip_11000 *
f5 big-ip_11050 *
f5 big-ip_1500 *
f5 big-ip_1600 *
f5 big-ip_2400 *
f5 big-ip_3400 *
f5 big-ip_3410 *
f5 big-ip_3600 *
f5 big-ip_3900 *
f5 big-ip_4100 *
f5 big-ip_5100 *
f5 big-ip_5110 *
f5 big-ip_6400 *
f5 big-ip_6800 *
f5 big-ip_6900 *
f5 big-ip_8400 *
f5 big-ip_8800 *
f5 big-ip_8900 *
f5 big-ip_8950 *
f5 enterprise_manager *
f5 enterprise_manager 1.0
f5 enterprise_manager 2.0
f5 enterprise_manager 2.1.0
f5 enterprise_manager 2.1.0
f5 enterprise_manager 2.2.0
f5 enterprise_manager 2.3.0
f5 enterprise_manager 2.3.0
f5 enterprise_manager *
f5 enterprise_manager 1.0
f5 enterprise_manager 2.0
f5 enterprise_manager 2.1.0
f5 enterprise_manager 2.1.0
f5 enterprise_manager 2.2.0
f5 enterprise_manager 2.3.0
f5 enterprise_manager 2.3.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:9.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EE189B0-8D8C-4958-BD3C-02ED116E1C1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:9.2.0:hf4:*:*:*:*:*:*",
              "matchCriteriaId": "CE7833D8-E7F0-4BE0-82D0-E091D51FB647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:9.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "45BB546C-C3F6-408D-A5B2-37C115C5F81D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:9.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "37414FCA-F520-4C5F-8649-65A05EB67A63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:9.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB92D5C1-4BA5-40B3-A4A2-D0D9EBA41204",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:9.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A18371B8-13AC-4F9A-8BFB-CAC052E7BDD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:9.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D43BDE50-98A0-47DB-A5EA-463A137E3C8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:10.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "65D810F8-6062-4901-9832-226F80287C8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:10.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBC2A0DC-D931-4450-8D0F-3223A8EDCED9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:10.2.3:hf1:*:*:*:*:*:*",
              "matchCriteriaId": "A2A0390D-6C9E-4417-9265-B9C3C2D3ABC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:11.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "094BD2B6-E269-4647-A77C-B584805B6203",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:11.0.0:hf1:*:*:*:*:*:*",
              "matchCriteriaId": "9AED0FFD-DFF4-431D-A189-DCD1F00600D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:11.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "45C31572-6C40-4621-AB57-6768DE0D59A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:11.1.0:hf2:*:*:*:*:*:*",
              "matchCriteriaId": "CEE80F37-A5A9-4276-83D4-13F65101A4E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A90BD6BC-E7C9-4173-BD2F-16C4D96CE4B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:9.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A885EC50-94FA-4367-A9B2-79C8678DEE45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:9.4.8:hf4:*:*:*:*:*:*",
              "matchCriteriaId": "A2D8F66D-D004-441F-8592-072DC08588E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:10.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "16ACB60E-B9E9-402A-BE42-DF5C892C2257",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:10.2.3:hf1:*:*:*:*:*:*",
              "matchCriteriaId": "17826296-E488-4AB3-9D81-908BA3783985",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AA7DCB7-D01E-492A-A810-01B15F03A783",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.0.0:hf1:*:*:*:*:*:*",
              "matchCriteriaId": "EACC4566-B29A-41DD-A568-7A3E1F1CDBD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7F8D9A5-0C91-4458-8554-13947FD8B116",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.1.0:hf2:*:*:*:*:*:*",
              "matchCriteriaId": "BD3700DB-FF49-4B44-8480-77ABC4C287E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "73DDA0EE-E994-4533-980D-1BD21FD68CFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:9.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A19A678-1BEC-407E-BC8C-FB38B2AB7DC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:9.4.8:hf4:*:*:*:*:*:*",
              "matchCriteriaId": "13091AF2-84E3-4342-A588-D81EDFCED025",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:10.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E1C4384-1728-4A71-8634-DCE3F2AEB8F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:10.2.3:hf1:*:*:*:*:*:*",
              "matchCriteriaId": "7F317BE0-1121-4CD9-A4BE-9EC07DB7834E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C72FF118-E7A5-42DE-A9A0-703E71615045",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.0.0:hf1:*:*:*:*:*:*",
              "matchCriteriaId": "6A3F75C1-864F-4F20-AAF3-29DAA5F3B421",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "45A53EC8-8E16-42DC-9FD8-58493C5D1EC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.1.0:hf2:*:*:*:*:*:*",
              "matchCriteriaId": "E752C74C-BE49-45EA-8ACC-C0ACBF3A795C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "12B9EDF4-53E1-472C-A4FD-0F5BEC3A70D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "119C2CB6-23C5-40B2-805C-E48B4A7FDBF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "04C3A906-6DB7-405A-924B-35D9C53E2453",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ADD5E15-8174-4C87-A8DF-A266B90D0644",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "63D35C2D-DD83-4337-AEA1-5B7E9D5E2EE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DFC90CF-9AAA-4D3E-9F91-1B278EA46E40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0DB69D7-AEBB-428F-A229-9132D91342CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:4.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A96B67C-DD7B-441D-A18B-59F5680D10AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:4.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E8D947C-2A9F-47AD-B221-C80107DD341E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:4.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "431E7D83-CC65-4A8B-8A3E-5D9C5D6BE406",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:4.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "A49E573B-F732-4F96-B7F2-DE7989D403CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:4.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F98E8B40-12E1-4B27-98F3-AF589E516EF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E71C845-F308-4B36-81DD-906F2C5D8226",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:4.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FAE8872-60E7-453E-8C6F-20D970EFAA70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "96240FCA-244C-40E5-9509-2F79ECF51BE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:9.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "724E2496-E0D2-47AF-AC30-CC671731A37D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:9.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A70E46B6-FFE2-47A6-A907-E606E8D16495",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:9.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8783BBE4-A081-4409-A369-B063C4D73C46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:9.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "951A82A0-3C91-4B50-AE4D-929A4EA75F34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:9.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "38992D08-E1FF-4C89-982E-635C43B5BC2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0E5C68-817D-4C60-9FF8-EFD823AF0155",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:9.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E2DB005-3F29-4688-A6A8-10F4A2C0C32B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:9.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "51E24585-5039-4907-A405-75A939699F40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:9.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "829DAFB8-7166-42BA-85BE-91FFC835AB75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "18FDF8B1-F050-47D8-B13D-1374D686D58A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:9.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E2CFEAE-3E21-4C3C-98B7-018B18412326",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:9.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AA276CB-747E-483D-91D0-9C5D7FB605F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:9.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "015A58C4-0DD1-4DC3-9C24-640C20991187",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:9.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "489ED68B-86BF-4ED8-B06A-B6822E8EA55A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD8E11B7-CC05-468D-BD7F-5A97824621A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:9.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFEF3EF7-264D-4A0F-8321-4630E5676DA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAE7E3E7-E092-44D5-9945-2E4A6BF7ACAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:9.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "55F5D334-5D5D-4315-B417-F9882114F603",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:9.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED1620D-7812-4155-9645-EC2900E8A9B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:9.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "238F0964-D138-4673-9747-C73E8D84E367",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:9.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7532FEDA-37FF-4860-9ACE-6D904A2EFF5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:9.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEE51BD2-9C95-426D-B420-CB8D76EDB572",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:9.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DE7FE6C-0B24-44B0-8204-095DADECA17C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:9.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "986D8ED8-9128-4C26-98F6-A93D331077DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:9.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5B62E51-32C6-4F35-81EC-7628DFC87F48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:9.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2E015C9-15AE-4533-AD9C-92281861EE9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:9.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCE2E420-940D-4AAC-94FD-C8B80A8423A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:10.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C6935B3-E935-4865-8B61-3B17FA87B436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:10.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C757A92-C427-4626-82A3-988886F9809D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:10.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFDCE34A-8ECE-43F5-9E62-70BB43405B0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:f5:tmos:10.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3648FF8-817B-436B-806C-0781DFC927E6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:f5:big-ip_1000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2086937F-F558-4B49-B222-0646AE61D157",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:f5:big-ip_11000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1656DDF4-5B0E-40A5-8D93-D03CA8F10E60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:f5:big-ip_11050:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "69EBCB26-1BDE-4DFC-B3B7-28E5D69AC461",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:f5:big-ip_1500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9BA13D-B0B3-4870-83E3-9796B5883ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:f5:big-ip_1600:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "786326DC-6C7F-4D6C-BE65-6C4723D857FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:f5:big-ip_2400:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D17AAFBC-0012-4E61-81D1-336A2F24EEA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:f5:big-ip_3400:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "766D79A2-E51D-491F-9785-95984A7F0DBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:f5:big-ip_3410:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD3FD207-C83A-470F-96CA-FA2EB17F4315",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:f5:big-ip_3600:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "47A17505-8B61-4535-B0F8-754B7B6D0EAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:f5:big-ip_3900:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A1A153E-E21A-4594-97D5-B02C34E7D7C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:f5:big-ip_4100:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E63AF29-2F47-4899-A829-3CC458E3850E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:f5:big-ip_5100:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C78855DC-931D-48AD-A30C-F82C03032EE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:f5:big-ip_5110:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B5CE67A-4D32-4786-9E01-61FAD67C3666",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:f5:big-ip_6400:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F065083A-5334-48FF-A756-3352D15E089B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:f5:big-ip_6800:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "28CC85A9-E82A-4B0F-A375-D13D51860322",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:f5:big-ip_6900:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "88F44776-0C3A-4B46-BD9B-D7E1EAFCF8B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:f5:big-ip_8400:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33C2197-1A09-4792-85BD-63474611563E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:f5:big-ip_8800:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "936172D6-E69E-4794-841D-A153295EA2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:f5:big-ip_8900:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "888652BB-4ED1-4326-94E1-C82B63D9017B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:f5:big-ip_8950:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F5C08EA-74CF-44F6-9344-3E6E4ADE3891",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:f5:enterprise_manager:*:*:virtual:*:*:*:*:*",
              "matchCriteriaId": "FE4802B8-7017-4D39-8507-5A59FCFE6CCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:enterprise_manager:1.0:*:virtual:*:*:*:*:*",
              "matchCriteriaId": "CD819E94-A350-47F3-B71A-C7E11002A192",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:enterprise_manager:2.0:*:virtual:*:*:*:*:*",
              "matchCriteriaId": "C9ABB363-0A07-41ED-BA02-EEE66E08A1BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:enterprise_manager:2.1.0:*:virtual:*:*:*:*:*",
              "matchCriteriaId": "BA9E53D2-8C14-4667-8DC1-C8AF30753D25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:enterprise_manager:2.1.0:hf1:virtual:*:*:*:*:*",
              "matchCriteriaId": "B8212A6F-4B50-4CE0-BC6A-CFB994981310",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:enterprise_manager:2.2.0:*:virtual:*:*:*:*:*",
              "matchCriteriaId": "360AC53C-552B-4657-8C34-F744D632029D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:enterprise_manager:2.3.0:*:virtual:*:*:*:*:*",
              "matchCriteriaId": "F5D5159F-3673-417B-A861-FDE121828B26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:enterprise_manager:2.3.0:hf2:virtual:*:*:*:*:*",
              "matchCriteriaId": "4C305BD6-2C86-4D6C-B456-EC9B5FB4A2EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:f5:enterprise_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D1E65DC-8232-473E-8D78-D41208F89906",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:f5:enterprise_manager:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4331A16E-D66C-40E8-B595-46F3C77949F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:f5:enterprise_manager:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FD4C91A-63A0-4535-9E5A-731518911707",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:f5:enterprise_manager:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE619B40-18EB-4F01-A416-63A66577F14F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:f5:enterprise_manager:2.1.0:hf1:*:*:*:*:*:*",
              "matchCriteriaId": "A7C407F0-CE8C-4F4D-9198-8E9D5B1550E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:f5:enterprise_manager:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "003DFFC0-C51B-43B8-897A-6AD71A7B60FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:f5:enterprise_manager:2.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "05803D5C-15CD-4600-9703-951D28173E49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:f5:enterprise_manager:2.3.0:hf2:*:*:*:*:*:*",
              "matchCriteriaId": "62C482B1-27D7-4A44-956A-2F7D107206A4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "F5 BIG-IP appliances 9.x before 9.4.8-HF5, 10.x before 10.2.4, 11.0.x before 11.0.0-HF2, and 11.1.x before 11.1.0-HF3, and Enterprise Manager before 2.1.0-HF2, 2.2.x before 2.2.0-HF1, and 2.3.x before 2.3.0-HF3, use a single SSH private key across different customers\u0027 installations and do not properly restrict access to this key, which makes it easier for remote attackers to perform SSH logins via the PubkeyAuthentication option."
    },
    {
      "lang": "es",
      "value": "El dispositivo F5 BIG-IP v9.x anteriores a v9.4.8-HF5, v10.x anteriores a v10.2.4, v11.0.x anteriores a v11.0.0-HF2, y v11.1.x anteriores a v11.1.0-HF3, y Enterprise Manager anteriores a v2.1.0-HF2, v2.2.x anteriores a v2.2.0-HF1, y v2.3.x anteriores a v2.3.0-HF3, usa una clave privada SSH en distintas instalaciones de clientes, y no restringe el acceso a la mismas de forma adecuada, lo que facilita a atacantes remotos hacer login SSH a trav\u00e9s de la opci\u00f3n PubkeyAuthentication."
    }
  ],
  "id": "CVE-2012-1493",
  "lastModified": "2024-11-21T01:37:05.797",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 7.8,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-07-09T22:55:00.887",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://support.f5.com/kb/en-us/solutions/public/13000/600/sol13600.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.theregister.co.uk/2012/06/13/f5_kit_metasploit_exploit/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/ssh/f5_bigip_known_privkey.rb"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.trustmatta.com/advisories/MATTA-2012-002.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://support.f5.com/kb/en-us/solutions/public/13000/600/sol13600.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.theregister.co.uk/2012/06/13/f5_kit_metasploit_exploit/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/ssh/f5_bigip_known_privkey.rb"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.trustmatta.com/advisories/MATTA-2012-002.txt"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-255"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2012-1493
Vulnerability from cvelistv5
Published
2012-07-09 22:00
Modified
2024-09-17 01:20
Severity ?
Summary
F5 BIG-IP appliances 9.x before 9.4.8-HF5, 10.x before 10.2.4, 11.0.x before 11.0.0-HF2, and 11.1.x before 11.1.0-HF3, and Enterprise Manager before 2.1.0-HF2, 2.2.x before 2.2.0-HF1, and 2.3.x before 2.3.0-HF3, use a single SSH private key across different customers' installations and do not properly restrict access to this key, which makes it easier for remote attackers to perform SSH logins via the PubkeyAuthentication option.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:01:02.059Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.f5.com/kb/en-us/solutions/public/13000/600/sol13600.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/ssh/f5_bigip_known_privkey.rb"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.trustmatta.com/advisories/MATTA-2012-002.txt"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.theregister.co.uk/2012/06/13/f5_kit_metasploit_exploit/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "F5 BIG-IP appliances 9.x before 9.4.8-HF5, 10.x before 10.2.4, 11.0.x before 11.0.0-HF2, and 11.1.x before 11.1.0-HF3, and Enterprise Manager before 2.1.0-HF2, 2.2.x before 2.2.0-HF1, and 2.3.x before 2.3.0-HF3, use a single SSH private key across different customers\u0027 installations and do not properly restrict access to this key, which makes it easier for remote attackers to perform SSH logins via the PubkeyAuthentication option."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-07-09T22:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.f5.com/kb/en-us/solutions/public/13000/600/sol13600.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/ssh/f5_bigip_known_privkey.rb"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.trustmatta.com/advisories/MATTA-2012-002.txt"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.theregister.co.uk/2012/06/13/f5_kit_metasploit_exploit/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-1493",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "F5 BIG-IP appliances 9.x before 9.4.8-HF5, 10.x before 10.2.4, 11.0.x before 11.0.0-HF2, and 11.1.x before 11.1.0-HF3, and Enterprise Manager before 2.1.0-HF2, 2.2.x before 2.2.0-HF1, and 2.3.x before 2.3.0-HF3, use a single SSH private key across different customers\u0027 installations and do not properly restrict access to this key, which makes it easier for remote attackers to perform SSH logins via the PubkeyAuthentication option."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://support.f5.com/kb/en-us/solutions/public/13000/600/sol13600.html",
              "refsource": "CONFIRM",
              "url": "http://support.f5.com/kb/en-us/solutions/public/13000/600/sol13600.html"
            },
            {
              "name": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/ssh/f5_bigip_known_privkey.rb",
              "refsource": "MISC",
              "url": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/ssh/f5_bigip_known_privkey.rb"
            },
            {
              "name": "https://www.trustmatta.com/advisories/MATTA-2012-002.txt",
              "refsource": "MISC",
              "url": "https://www.trustmatta.com/advisories/MATTA-2012-002.txt"
            },
            {
              "name": "http://www.theregister.co.uk/2012/06/13/f5_kit_metasploit_exploit/",
              "refsource": "MISC",
              "url": "http://www.theregister.co.uk/2012/06/13/f5_kit_metasploit_exploit/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-1493",
    "datePublished": "2012-07-09T22:00:00Z",
    "dateReserved": "2012-03-01T00:00:00Z",
    "dateUpdated": "2024-09-17T01:20:39.832Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}