CVE-2012-1493
Vulnerability from cvelistv5
Published
2012-07-09 22:00
Modified
2024-09-17 01:20
Severity ?
Summary
F5 BIG-IP appliances 9.x before 9.4.8-HF5, 10.x before 10.2.4, 11.0.x before 11.0.0-HF2, and 11.1.x before 11.1.0-HF3, and Enterprise Manager before 2.1.0-HF2, 2.2.x before 2.2.0-HF1, and 2.3.x before 2.3.0-HF3, use a single SSH private key across different customers' installations and do not properly restrict access to this key, which makes it easier for remote attackers to perform SSH logins via the PubkeyAuthentication option.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:01:02.059Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.f5.com/kb/en-us/solutions/public/13000/600/sol13600.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/ssh/f5_bigip_known_privkey.rb"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.trustmatta.com/advisories/MATTA-2012-002.txt"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.theregister.co.uk/2012/06/13/f5_kit_metasploit_exploit/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "F5 BIG-IP appliances 9.x before 9.4.8-HF5, 10.x before 10.2.4, 11.0.x before 11.0.0-HF2, and 11.1.x before 11.1.0-HF3, and Enterprise Manager before 2.1.0-HF2, 2.2.x before 2.2.0-HF1, and 2.3.x before 2.3.0-HF3, use a single SSH private key across different customers\u0027 installations and do not properly restrict access to this key, which makes it easier for remote attackers to perform SSH logins via the PubkeyAuthentication option."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-07-09T22:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.f5.com/kb/en-us/solutions/public/13000/600/sol13600.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/ssh/f5_bigip_known_privkey.rb"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.trustmatta.com/advisories/MATTA-2012-002.txt"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.theregister.co.uk/2012/06/13/f5_kit_metasploit_exploit/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-1493",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "F5 BIG-IP appliances 9.x before 9.4.8-HF5, 10.x before 10.2.4, 11.0.x before 11.0.0-HF2, and 11.1.x before 11.1.0-HF3, and Enterprise Manager before 2.1.0-HF2, 2.2.x before 2.2.0-HF1, and 2.3.x before 2.3.0-HF3, use a single SSH private key across different customers\u0027 installations and do not properly restrict access to this key, which makes it easier for remote attackers to perform SSH logins via the PubkeyAuthentication option."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://support.f5.com/kb/en-us/solutions/public/13000/600/sol13600.html",
              "refsource": "CONFIRM",
              "url": "http://support.f5.com/kb/en-us/solutions/public/13000/600/sol13600.html"
            },
            {
              "name": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/ssh/f5_bigip_known_privkey.rb",
              "refsource": "MISC",
              "url": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/ssh/f5_bigip_known_privkey.rb"
            },
            {
              "name": "https://www.trustmatta.com/advisories/MATTA-2012-002.txt",
              "refsource": "MISC",
              "url": "https://www.trustmatta.com/advisories/MATTA-2012-002.txt"
            },
            {
              "name": "http://www.theregister.co.uk/2012/06/13/f5_kit_metasploit_exploit/",
              "refsource": "MISC",
              "url": "http://www.theregister.co.uk/2012/06/13/f5_kit_metasploit_exploit/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-1493",
    "datePublished": "2012-07-09T22:00:00Z",
    "dateReserved": "2012-03-01T00:00:00Z",
    "dateUpdated": "2024-09-17T01:20:39.832Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2012-1493\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2012-07-09T22:55:00.887\",\"lastModified\":\"2012-07-10T04:00:00.000\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"F5 BIG-IP appliances 9.x before 9.4.8-HF5, 10.x before 10.2.4, 11.0.x before 11.0.0-HF2, and 11.1.x before 11.1.0-HF3, and Enterprise Manager before 2.1.0-HF2, 2.2.x before 2.2.0-HF1, and 2.3.x before 2.3.0-HF3, use a single SSH private key across different customers\u0027 installations and do not properly restrict access to this key, which makes it easier for remote attackers to perform SSH logins via the PubkeyAuthentication option.\"},{\"lang\":\"es\",\"value\":\"El dispositivo F5 BIG-IP v9.x anteriores a v9.4.8-HF5, v10.x anteriores a v10.2.4, v11.0.x anteriores a v11.0.0-HF2, y v11.1.x anteriores a v11.1.0-HF3, y Enterprise Manager anteriores a v2.1.0-HF2, v2.2.x anteriores a v2.2.0-HF1, y v2.3.x anteriores a v2.3.0-HF3, usa una clave privada SSH en distintas instalaciones de clientes, y no restringe el acceso a la mismas de forma adecuada, lo que facilita a atacantes remotos hacer login SSH a trav\u00e9s de la opci\u00f3n PubkeyAuthentication.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:N/A:N\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":7.8},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-255\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:9.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EE189B0-8D8C-4958-BD3C-02ED116E1C1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:9.2.0:hf4:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE7833D8-E7F0-4BE0-82D0-E091D51FB647\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:9.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45BB546C-C3F6-408D-A5B2-37C115C5F81D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:9.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37414FCA-F520-4C5F-8649-65A05EB67A63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:9.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB92D5C1-4BA5-40B3-A4A2-D0D9EBA41204\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:9.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A18371B8-13AC-4F9A-8BFB-CAC052E7BDD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:9.4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D43BDE50-98A0-47DB-A5EA-463A137E3C8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:10.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65D810F8-6062-4901-9832-226F80287C8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:10.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBC2A0DC-D931-4450-8D0F-3223A8EDCED9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:10.2.3:hf1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2A0390D-6C9E-4417-9265-B9C3C2D3ABC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:11.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"094BD2B6-E269-4647-A77C-B584805B6203\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:11.0.0:hf1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AED0FFD-DFF4-431D-A189-DCD1F00600D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:11.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45C31572-6C40-4621-AB57-6768DE0D59A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:11.1.0:hf2:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEE80F37-A5A9-4276-83D4-13F65101A4E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A90BD6BC-E7C9-4173-BD2F-16C4D96CE4B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:9.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A885EC50-94FA-4367-A9B2-79C8678DEE45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:9.4.8:hf4:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2D8F66D-D004-441F-8592-072DC08588E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:10.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16ACB60E-B9E9-402A-BE42-DF5C892C2257\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:10.2.3:hf1:*:*:*:*:*:*\",\"matchCriteriaId\":\"17826296-E488-4AB3-9D81-908BA3783985\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:11.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AA7DCB7-D01E-492A-A810-01B15F03A783\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:11.0.0:hf1:*:*:*:*:*:*\",\"matchCriteriaId\":\"EACC4566-B29A-41DD-A568-7A3E1F1CDBD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:11.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7F8D9A5-0C91-4458-8554-13947FD8B116\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:11.1.0:hf2:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD3700DB-FF49-4B44-8480-77ABC4C287E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73DDA0EE-E994-4533-980D-1BD21FD68CFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:9.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A19A678-1BEC-407E-BC8C-FB38B2AB7DC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:9.4.8:hf4:*:*:*:*:*:*\",\"matchCriteriaId\":\"13091AF2-84E3-4342-A588-D81EDFCED025\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:10.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E1C4384-1728-4A71-8634-DCE3F2AEB8F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:10.2.3:hf1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F317BE0-1121-4CD9-A4BE-9EC07DB7834E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:11.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C72FF118-E7A5-42DE-A9A0-703E71615045\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:11.0.0:hf1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A3F75C1-864F-4F20-AAF3-29DAA5F3B421\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:11.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45A53EC8-8E16-42DC-9FD8-58493C5D1EC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:11.1.0:hf2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E752C74C-BE49-45EA-8ACC-C0ACBF3A795C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12B9EDF4-53E1-472C-A4FD-0F5BEC3A70D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"119C2CB6-23C5-40B2-805C-E48B4A7FDBF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04C3A906-6DB7-405A-924B-35D9C53E2453\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ADD5E15-8174-4C87-A8DF-A266B90D0644\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63D35C2D-DD83-4337-AEA1-5B7E9D5E2EE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DFC90CF-9AAA-4D3E-9F91-1B278EA46E40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0DB69D7-AEBB-428F-A229-9132D91342CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:4.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A96B67C-DD7B-441D-A18B-59F5680D10AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:4.5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E8D947C-2A9F-47AD-B221-C80107DD341E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:4.5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"431E7D83-CC65-4A8B-8A3E-5D9C5D6BE406\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:4.5.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A49E573B-F732-4F96-B7F2-DE7989D403CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:4.5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F98E8B40-12E1-4B27-98F3-AF589E516EF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E71C845-F308-4B36-81DD-906F2C5D8226\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:4.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FAE8872-60E7-453E-8C6F-20D970EFAA70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96240FCA-244C-40E5-9509-2F79ECF51BE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:9.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"724E2496-E0D2-47AF-AC30-CC671731A37D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:9.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A70E46B6-FFE2-47A6-A907-E606E8D16495\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:9.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8783BBE4-A081-4409-A369-B063C4D73C46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:9.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"951A82A0-3C91-4B50-AE4D-929A4EA75F34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:9.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38992D08-E1FF-4C89-982E-635C43B5BC2C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC0E5C68-817D-4C60-9FF8-EFD823AF0155\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:9.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E2DB005-3F29-4688-A6A8-10F4A2C0C32B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:9.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51E24585-5039-4907-A405-75A939699F40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:9.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"829DAFB8-7166-42BA-85BE-91FFC835AB75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18FDF8B1-F050-47D8-B13D-1374D686D58A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:9.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E2CFEAE-3E21-4C3C-98B7-018B18412326\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:9.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AA276CB-747E-483D-91D0-9C5D7FB605F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:9.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"015A58C4-0DD1-4DC3-9C24-640C20991187\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:9.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"489ED68B-86BF-4ED8-B06A-B6822E8EA55A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD8E11B7-CC05-468D-BD7F-5A97824621A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:9.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFEF3EF7-264D-4A0F-8321-4630E5676DA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAE7E3E7-E092-44D5-9945-2E4A6BF7ACAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:9.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55F5D334-5D5D-4315-B417-F9882114F603\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:9.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AED1620D-7812-4155-9645-EC2900E8A9B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:9.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"238F0964-D138-4673-9747-C73E8D84E367\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:9.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7532FEDA-37FF-4860-9ACE-6D904A2EFF5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:9.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEE51BD2-9C95-426D-B420-CB8D76EDB572\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:9.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DE7FE6C-0B24-44B0-8204-095DADECA17C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:9.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"986D8ED8-9128-4C26-98F6-A93D331077DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:9.4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5B62E51-32C6-4F35-81EC-7628DFC87F48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:9.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2E015C9-15AE-4533-AD9C-92281861EE9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:9.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCE2E420-940D-4AAC-94FD-C8B80A8423A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:10.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C6935B3-E935-4865-8B61-3B17FA87B436\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:10.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C757A92-C427-4626-82A3-988886F9809D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:10.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFDCE34A-8ECE-43F5-9E62-70BB43405B0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:tmos:10.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3648FF8-817B-436B-806C-0781DFC927E6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:f5:big-ip_1000:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2086937F-F558-4B49-B222-0646AE61D157\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:f5:big-ip_11000:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1656DDF4-5B0E-40A5-8D93-D03CA8F10E60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:f5:big-ip_11050:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69EBCB26-1BDE-4DFC-B3B7-28E5D69AC461\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:f5:big-ip_1500:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C9BA13D-B0B3-4870-83E3-9796B5883ED8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:f5:big-ip_1600:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"786326DC-6C7F-4D6C-BE65-6C4723D857FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:f5:big-ip_2400:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D17AAFBC-0012-4E61-81D1-336A2F24EEA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:f5:big-ip_3400:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"766D79A2-E51D-491F-9785-95984A7F0DBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:f5:big-ip_3410:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD3FD207-C83A-470F-96CA-FA2EB17F4315\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:f5:big-ip_3600:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47A17505-8B61-4535-B0F8-754B7B6D0EAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:f5:big-ip_3900:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A1A153E-E21A-4594-97D5-B02C34E7D7C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:f5:big-ip_4100:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E63AF29-2F47-4899-A829-3CC458E3850E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:f5:big-ip_5100:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C78855DC-931D-48AD-A30C-F82C03032EE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:f5:big-ip_5110:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B5CE67A-4D32-4786-9E01-61FAD67C3666\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:f5:big-ip_6400:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F065083A-5334-48FF-A756-3352D15E089B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:f5:big-ip_6800:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28CC85A9-E82A-4B0F-A375-D13D51860322\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:f5:big-ip_6900:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88F44776-0C3A-4B46-BD9B-D7E1EAFCF8B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:f5:big-ip_8400:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F33C2197-1A09-4792-85BD-63474611563E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:f5:big-ip_8800:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"936172D6-E69E-4794-841D-A153295EA2F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:f5:big-ip_8900:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"888652BB-4ED1-4326-94E1-C82B63D9017B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:f5:big-ip_8950:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F5C08EA-74CF-44F6-9344-3E6E4ADE3891\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:enterprise_manager:*:*:virtual:*:*:*:*:*\",\"matchCriteriaId\":\"FE4802B8-7017-4D39-8507-5A59FCFE6CCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:enterprise_manager:1.0:*:virtual:*:*:*:*:*\",\"matchCriteriaId\":\"CD819E94-A350-47F3-B71A-C7E11002A192\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:enterprise_manager:2.0:*:virtual:*:*:*:*:*\",\"matchCriteriaId\":\"C9ABB363-0A07-41ED-BA02-EEE66E08A1BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:enterprise_manager:2.1.0:*:virtual:*:*:*:*:*\",\"matchCriteriaId\":\"BA9E53D2-8C14-4667-8DC1-C8AF30753D25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:enterprise_manager:2.1.0:hf1:virtual:*:*:*:*:*\",\"matchCriteriaId\":\"B8212A6F-4B50-4CE0-BC6A-CFB994981310\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:enterprise_manager:2.2.0:*:virtual:*:*:*:*:*\",\"matchCriteriaId\":\"360AC53C-552B-4657-8C34-F744D632029D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:enterprise_manager:2.3.0:*:virtual:*:*:*:*:*\",\"matchCriteriaId\":\"F5D5159F-3673-417B-A861-FDE121828B26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:enterprise_manager:2.3.0:hf2:virtual:*:*:*:*:*\",\"matchCriteriaId\":\"4C305BD6-2C86-4D6C-B456-EC9B5FB4A2EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:f5:enterprise_manager:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D1E65DC-8232-473E-8D78-D41208F89906\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:f5:enterprise_manager:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4331A16E-D66C-40E8-B595-46F3C77949F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:f5:enterprise_manager:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FD4C91A-63A0-4535-9E5A-731518911707\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:f5:enterprise_manager:2.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE619B40-18EB-4F01-A416-63A66577F14F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:f5:enterprise_manager:2.1.0:hf1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7C407F0-CE8C-4F4D-9198-8E9D5B1550E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:f5:enterprise_manager:2.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"003DFFC0-C51B-43B8-897A-6AD71A7B60FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:f5:enterprise_manager:2.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05803D5C-15CD-4600-9703-951D28173E49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:f5:enterprise_manager:2.3.0:hf2:*:*:*:*:*:*\",\"matchCriteriaId\":\"62C482B1-27D7-4A44-956A-2F7D107206A4\"}]}]}],\"references\":[{\"url\":\"http://support.f5.com/kb/en-us/solutions/public/13000/600/sol13600.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.theregister.co.uk/2012/06/13/f5_kit_metasploit_exploit/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/ssh/f5_bigip_known_privkey.rb\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"https://www.trustmatta.com/advisories/MATTA-2012-002.txt\",\"source\":\"cve@mitre.org\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.