ID

VAR-201207-0327


CVE

CVE-2012-1493


TITLE

plural F5 In product SSH Login vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2012-003032

DESCRIPTION

F5 BIG-IP appliances 9.x before 9.4.8-HF5, 10.x before 10.2.4, 11.0.x before 11.0.0-HF2, and 11.1.x before 11.1.0-HF3, and Enterprise Manager before 2.1.0-HF2, 2.2.x before 2.2.0-HF1, and 2.3.x before 2.3.0-HF3, use a single SSH private key across different customers' installations and do not properly restrict access to this key, which makes it easier for remote attackers to perform SSH logins via the PubkeyAuthentication option. F5 BIG-IP is a device product for application delivery services manufactured by F5 Network, which is mainly used for load balancing, business acceleration optimization and other purposes. F5 BIG-IP (11.x 10.x 9.x version) There is a set of public SSH public-private key pairs in the device file system, which can be used for user permission verification, and the root user authority is obtained after the verification is passed. The vulnerability can be used to remotely obtain management control of the device, and further launch attacks against related network information systems. Multiple F5 Products are prone to an unauthorized-access vulnerability. A remote attacker can exploit this issue to gain unauthorized root access to affected devices. Successfully exploiting this issue allows attackers to completely compromise the devices. The following products are affected: BIG-IP LTM BIG-IP GTM BIG-IP ASM BIG-IP Link Controller BIG-IP PSM BIG-IP WOM BIG-IP APM BIG-IP Analytics BIG-IP Edge Gateway Enterprise Manager. Malicious actors could exploit this vulnerability to manipulate the affected system. ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch ---------------------------------------------------------------------- TITLE: F5 Products Unspecified SSH Configuration Security Issue SECUNIA ADVISORY ID: SA49396 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/49396/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=49396 RELEASE DATE: 2012-06-08 DISCUSS ADVISORY: http://secunia.com/advisories/49396/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/49396/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=49396 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A security issue has been reported in multiple F5 products, which can be exploited by malicious people to compromise a vulnerable system. The security issue is caused due to an unspecified configuration error. No further information is currently available. The security issue affects the following products and versions: * BIG-IP LTM versions 9.x, 10.x, and 11.x * BIG-IP GTM versions 9.x, 10.x, and 11.x * BIG-IP ASM versions 9.x, 10.x, and 11.x * BIG-IP Link Controller versions 9.x, 10.x, and 11.x * BIG-IP PSM versions 9.x, 10.x, and 11.x * BIG-IP WOM versions 10.x and 11.x * BIG-IP APM versions 10.x and 11.x * BIG-IP Edge Gateway versions 10.x and 11.x * BIG-IP Analytics versions 11.x * Enterprise Manager versions 1.x and 2.x SOLUTION: Update to the fixed versions. Please see vendor's advisory for more details. PROVIDED AND/OR DISCOVERED BY: The vendor credits Florent Daignier, Matta Consulting. ORIGINAL ADVISORY: http://support.f5.com/kb/en-us/solutions/public/13000/600/sol13600.html OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.61

sources: NVD: CVE-2012-1493 // JVNDB: JVNDB-2012-003032 // CNVD: CNVD-2012-3150 // BID: 53897 // VULHUB: VHN-54774 // PACKETSTORM: 113442

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2012-3150

AFFECTED PRODUCTS

vendor:f5model:tmosscope:eqversion:10.0.0

Trust: 1.6

vendor:f5model:tmosscope:eqversion:10.1.0

Trust: 1.6

vendor:f5model:tmosscope:eqversion:9.6.1

Trust: 1.6

vendor:f5model:tmosscope:eqversion:9.0.1

Trust: 1.6

vendor:f5model:tmosscope:eqversion:9.0.4

Trust: 1.6

vendor:f5model:tmosscope:eqversion:10.0.1

Trust: 1.6

vendor:f5model:tmosscope:eqversion:9.2.5

Trust: 1.6

vendor:f5model:tmosscope:eqversion:9.3.1

Trust: 1.6

vendor:f5model:big-ip local traffic managerscope: - version: -

Trust: 1.4

vendor:f5model:enterprise managerscope:eqversion:2.0

Trust: 1.3

vendor:f5model:enterprise managerscope:eqversion:1.0

Trust: 1.3

vendor:f5model:big-ip local traffic managerscope:eqversion:10.0.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:eqversion:9.4.6

Trust: 1.0

vendor:f5model:big-ip application security managerscope:eqversion:10.0.1

Trust: 1.0

vendor:f5model:tmosscope:eqversion:9.4

Trust: 1.0

vendor:f5model:tmosscope:eqversion:9.4.5

Trust: 1.0

vendor:f5model:big-ip 3410scope:eqversion:*

Trust: 1.0

vendor:f5model:big-ip application security managerscope:eqversion:9.2.0

Trust: 1.0

vendor:f5model:big-ip 1000scope:eqversion:*

Trust: 1.0

vendor:f5model:tmosscope:eqversion:4.5.12

Trust: 1.0

vendor:f5model:tmosscope:eqversion:9.4.4

Trust: 1.0

vendor:f5model:big-ip application security managerscope:eqversion:9.4.8

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:eqversion:*

Trust: 1.0

vendor:f5model:tmosscope:eqversion:*

Trust: 1.0

vendor:f5model:tmosscope:eqversion:9.2.3

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:eqversion:9.4.8

Trust: 1.0

vendor:f5model:tmosscope:eqversion:4.0

Trust: 1.0

vendor:f5model:big-ip 6900scope:eqversion:*

Trust: 1.0

vendor:f5model:big-ip 3900scope:eqversion:*

Trust: 1.0

vendor:f5model:tmosscope:eqversion:2.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:eqversion:9.4.7

Trust: 1.0

vendor:f5model:tmosscope:eqversion:4.4

Trust: 1.0

vendor:f5model:tmosscope:eqversion:9.1.1

Trust: 1.0

vendor:f5model:tmosscope:eqversion:9.1.2

Trust: 1.0

vendor:f5model:big-ip application security managerscope:eqversion:11.1.0

Trust: 1.0

vendor:f5model:big-ip 8400scope:eqversion:*

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:eqversion:9.2.2

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:eqversion:10.2.3

Trust: 1.0

vendor:f5model:tmosscope:eqversion:4.2

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:eqversion:11.0.0

Trust: 1.0

vendor:f5model:tmosscope:eqversion:4.3

Trust: 1.0

vendor:f5model:tmosscope:eqversion:9.2

Trust: 1.0

vendor:f5model:big-ip 6800scope:eqversion:*

Trust: 1.0

vendor:f5model:big-ip 5100scope:eqversion:*

Trust: 1.0

vendor:f5model:big-ip 1600scope:eqversion:*

Trust: 1.0

vendor:f5model:tmosscope:eqversion:9.4.3

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:eqversion:11.1.0

Trust: 1.0

vendor:f5model:big-ip 2400scope:eqversion:*

Trust: 1.0

vendor:f5model:tmosscope:eqversion:9.3

Trust: 1.0

vendor:f5model:big-ip application security managerscope:eqversion:10.0.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:eqversion:9.4.5

Trust: 1.0

vendor:f5model:big-ip application security managerscope:eqversion:9.4.4

Trust: 1.0

vendor:f5model:tmosscope:eqversion:9.4.2

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:eqversion:10.0.0

Trust: 1.0

vendor:f5model:tmosscope:eqversion:4.5.6

Trust: 1.0

vendor:f5model:tmosscope:eqversion:4.5.10

Trust: 1.0

vendor:f5model:big-ip 8800scope:eqversion:*

Trust: 1.0

vendor:f5model:tmosscope:eqversion:4.5

Trust: 1.0

vendor:f5model:enterprise managerscope:eqversion:2.1.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:eqversion:*

Trust: 1.0

vendor:f5model:enterprise managerscope:eqversion:2.3.0

Trust: 1.0

vendor:f5model:tmosscope:eqversion:9.1.3

Trust: 1.0

vendor:f5model:tmosscope:eqversion:9.6.0

Trust: 1.0

vendor:f5model:enterprise managerscope:eqversion:2.2.0

Trust: 1.0

vendor:f5model:big-ip 6400scope:eqversion:*

Trust: 1.0

vendor:f5model:big-ip 4100scope:eqversion:*

Trust: 1.0

vendor:f5model:tmosscope:eqversion:9.1

Trust: 1.0

vendor:f5model:tmosscope:eqversion:9.4.6

Trust: 1.0

vendor:f5model:tmosscope:eqversion:4.6.2

Trust: 1.0

vendor:f5model:tmosscope:eqversion:9.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:eqversion:10.2.3

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:eqversion:9.4.8

Trust: 1.0

vendor:f5model:big-ip 3400scope:eqversion:*

Trust: 1.0

vendor:f5model:big-ip application security managerscope:eqversion:11.0.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:eqversion:9.0.0

Trust: 1.0

vendor:f5model:tmosscope:eqversion:4.5.9

Trust: 1.0

vendor:f5model:tmosscope:eqversion:9.4.8

Trust: 1.0

vendor:f5model:tmosscope:eqversion:9.0.5

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:eqversion:10.2.3

Trust: 1.0

vendor:f5model:tmosscope:eqversion:9.4.1

Trust: 1.0

vendor:f5model:tmosscope:eqversion:9.4.7

Trust: 1.0

vendor:f5model:big-ip 5110scope:eqversion:*

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:eqversion:11.0.0

Trust: 1.0

vendor:f5model:big-ip 8950scope:eqversion:*

Trust: 1.0

vendor:f5model:tmosscope:eqversion:9.2.2

Trust: 1.0

vendor:f5model:big-ip 11000scope:eqversion:*

Trust: 1.0

vendor:f5model:big-ip 1500scope:eqversion:*

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:eqversion:11.1.0

Trust: 1.0

vendor:f5model:tmosscope:eqversion:9.2.4

Trust: 1.0

vendor:f5model:big-ip 8900scope:eqversion:*

Trust: 1.0

vendor:f5model:tmosscope:eqversion:9.0.3

Trust: 1.0

vendor:f5model:big-ip 11050scope:eqversion:*

Trust: 1.0

vendor:f5model:tmosscope:eqversion:4.6

Trust: 1.0

vendor:f5model:enterprise managerscope:eqversion:*

Trust: 1.0

vendor:f5model:tmosscope:eqversion:9.0.2

Trust: 1.0

vendor:f5model:tmosscope:eqversion:10.2.0

Trust: 1.0

vendor:f5model:tmosscope:eqversion:4.5.11

Trust: 1.0

vendor:f5model:big-ip 3600scope:eqversion:*

Trust: 1.0

vendor:f5model:big-ipscope:eqversion:2000

Trust: 0.8

vendor:f5model:big-ipscope:eqversion:5000

Trust: 0.8

vendor:f5model:big-ipscope:eqversion:520

Trust: 0.8

vendor:f5model:big-ipscope:eqversion:540

Trust: 0.8

vendor:f5model:big-ip 1000scope: - version: -

Trust: 0.8

vendor:f5model:big-ip 11000scope: - version: -

Trust: 0.8

vendor:f5model:big-ip 11050scope: - version: -

Trust: 0.8

vendor:f5model:big-ip 1600scope: - version: -

Trust: 0.8

vendor:f5model:big-ip 2400scope: - version: -

Trust: 0.8

vendor:f5model:big-ip 3600scope: - version: -

Trust: 0.8

vendor:f5model:big-ip 3900scope: - version: -

Trust: 0.8

vendor:f5model:big-ip 5100scope: - version: -

Trust: 0.8

vendor:f5model:big-ip 6900scope: - version: -

Trust: 0.8

vendor:f5model:big-ip 8900scope: - version: -

Trust: 0.8

vendor:f5model:big-ip 8950scope: - version: -

Trust: 0.8

vendor:f5model:big-ip access policy managerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip analyticsscope: - version: -

Trust: 0.8

vendor:f5model:big-ip application security managerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip edge gatewayscope: - version: -

Trust: 0.8

vendor:f5model:big-ip global traffic managerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip link controllerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip protocol security modulescope: - version: -

Trust: 0.8

vendor:f5model:big-ip wan optimization managerscope: - version: -

Trust: 0.8

vendor:f5model:enterprise managerscope:eqversion:3000

Trust: 0.8

vendor:f5model:enterprise managerscope:eqversion:4000

Trust: 0.8

vendor:f5model:enterprise manager softwarescope: - version: -

Trust: 0.8

vendor:f5model:tmosscope: - version: -

Trust: 0.8

vendor:f5model:viprionscope:eqversion:b2100

Trust: 0.8

vendor:f5model:viprionscope:eqversion:b4100

Trust: 0.8

vendor:f5model:viprionscope:eqversion:b4200

Trust: 0.8

vendor:f5model:networks big-ip application security managerscope:eqversion:9.x

Trust: 0.6

vendor:f5model:networks enterprise managerscope:eqversion:2.x

Trust: 0.6

vendor:f5model:networks enterprise managerscope:eqversion:1.x

Trust: 0.6

vendor:f5model:networks tmosscope:eqversion:11.x

Trust: 0.6

vendor:f5model:networks tmosscope:eqversion:10.x

Trust: 0.6

vendor:f5model:networks tmosscope:eqversion:9.x

Trust: 0.6

vendor:f5model:enterprise managerscope:eqversion:virtual

Trust: 0.6

vendor:f5model:enterprise managerscope:eqversion:2.3

Trust: 0.3

vendor:f5model:enterprise managerscope:eqversion:2.2

Trust: 0.3

vendor:f5model:enterprise managerscope:eqversion:1.4.1

Trust: 0.3

vendor:f5model:enterprise managerscope:eqversion:1.8

Trust: 0.3

vendor:f5model:enterprise managerscope:eqversion:1.6

Trust: 0.3

vendor:f5model:enterprise managerscope:eqversion:1.4

Trust: 0.3

vendor:f5model:enterprise managerscope:eqversion:1.2

Trust: 0.3

vendor:f5model:bigip psmscope:eqversion:10.1

Trust: 0.3

vendor:f5model:bigip psmscope:eqversion:10.0.1

Trust: 0.3

vendor:f5model:bigip psmscope:eqversion:10.0

Trust: 0.3

vendor:f5model:bigip psmscope:eqversion:9.4.8

Trust: 0.3

vendor:f5model:bigip psmscope:eqversion:9.4.5

Trust: 0.3

vendor:f5model:bigip local traffic manager hf2scope:eqversion:10.2.1

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:10.1

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:10.0.1

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:10.0

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:9.4.8

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:9.3.5

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:9.1.3

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:9.4

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:9.3.1

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:9.3

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:9.2

Trust: 0.3

vendor:f5model:bigip local traffic managerscope:eqversion:9.0

Trust: 0.3

vendor:f5model:bigip link controllerscope:eqversion:10.1

Trust: 0.3

vendor:f5model:bigip link controllerscope:eqversion:10.0.1

Trust: 0.3

vendor:f5model:bigip link controllerscope:eqversion:10.0

Trust: 0.3

vendor:f5model:bigip link controllerscope:eqversion:9.4.8

Trust: 0.3

vendor:f5model:bigip link controllerscope:eqversion:9.3.1

Trust: 0.3

vendor:f5model:bigip link controllerscope:eqversion:9.2.5

Trust: 0.3

vendor:f5model:bigip link controllerscope:eqversion:9.2.2

Trust: 0.3

vendor:f5model:bigip link controllerscope:eqversion:9.4

Trust: 0.3

vendor:f5model:bigip link controllerscope:eqversion:9.3

Trust: 0.3

vendor:f5model:bigip global traffic managerscope:eqversion:9.4.8

Trust: 0.3

vendor:f5model:bigip global traffic managerscope:eqversion:9.3.1

Trust: 0.3

vendor:f5model:bigip global traffic managerscope:eqversion:9.2.5

Trust: 0.3

vendor:f5model:bigip global traffic managerscope:eqversion:9.2.2

Trust: 0.3

vendor:f5model:bigip global traffic managerscope:eqversion:9.4

Trust: 0.3

vendor:f5model:bigip global traffic managerscope:eqversion:9.3

Trust: 0.3

vendor:f5model:bigip application security managerscope:eqversion:10.1

Trust: 0.3

vendor:f5model:bigip application security managerscope:eqversion:10.0.1

Trust: 0.3

vendor:f5model:bigip application security managerscope:eqversion:10.0

Trust: 0.3

vendor:f5model:bigip application security managerscope:eqversion:9.4.8

Trust: 0.3

vendor:f5model:bigip application security managerscope:eqversion:9.3.1

Trust: 0.3

vendor:f5model:bigip application security managerscope:eqversion:9.2.5

Trust: 0.3

vendor:f5model:bigip application security managerscope:eqversion:9.4

Trust: 0.3

vendor:f5model:bigip application security managerscope:eqversion:9.3

Trust: 0.3

vendor:f5model:bigip application security managerscope:eqversion:9.2

Trust: 0.3

vendor:f5model:bigip apmscope:eqversion:10.1

Trust: 0.3

sources: CNVD: CNVD-2012-3150 // BID: 53897 // JVNDB: JVNDB-2012-003032 // CNNVD: CNNVD-201206-137 // NVD: CVE-2012-1493

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-1493
value: HIGH

Trust: 1.0

NVD: CVE-2012-1493
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201206-137
value: HIGH

Trust: 0.6

VULHUB: VHN-54774
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2012-1493
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-54774
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-54774 // JVNDB: JVNDB-2012-003032 // CNNVD: CNNVD-201206-137 // NVD: CVE-2012-1493

PROBLEMTYPE DATA

problemtype:CWE-255

Trust: 1.9

sources: VULHUB: VHN-54774 // JVNDB: JVNDB-2012-003032 // NVD: CVE-2012-1493

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201206-137

TYPE

trust management

Trust: 0.6

sources: CNNVD: CNNVD-201206-137

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-003032

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-54774

PATCH

title:SOL13600: SSH vulnerability CVE-2012-1493url:http://support.f5.com/kb/en-us/solutions/public/13000/600/sol13600.html

Trust: 0.8

title:Patches for F5 multiple products with unknown SSH configuration security (remote root authentication security bypass) vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/17996

Trust: 0.6

sources: CNVD: CNVD-2012-3150 // JVNDB: JVNDB-2012-003032

EXTERNAL IDS

db:NVDid:CVE-2012-1493

Trust: 3.4

db:SECUNIAid:49396

Trust: 1.3

db:JVNDBid:JVNDB-2012-003032

Trust: 0.8

db:CNNVDid:CNNVD-201206-137

Trust: 0.7

db:CNVDid:CNVD-2012-3150

Trust: 0.6

db:NSFOCUSid:19768

Trust: 0.6

db:BIDid:53897

Trust: 0.4

db:EXPLOIT-DBid:19099

Trust: 0.1

db:EXPLOIT-DBid:19064

Trust: 0.1

db:EXPLOIT-DBid:19091

Trust: 0.1

db:SEEBUGid:SSVID-73065

Trust: 0.1

db:SEEBUGid:SSVID-88845

Trust: 0.1

db:SEEBUGid:SSVID-60202

Trust: 0.1

db:SEEBUGid:SSVID-73034

Trust: 0.1

db:SEEBUGid:SSVID-62575

Trust: 0.1

db:PACKETSTORMid:113577

Trust: 0.1

db:PACKETSTORMid:113526

Trust: 0.1

db:VULHUBid:VHN-54774

Trust: 0.1

db:PACKETSTORMid:113442

Trust: 0.1

sources: CNVD: CNVD-2012-3150 // VULHUB: VHN-54774 // BID: 53897 // JVNDB: JVNDB-2012-003032 // PACKETSTORM: 113442 // CNNVD: CNNVD-201206-137 // NVD: CVE-2012-1493

REFERENCES

url:http://support.f5.com/kb/en-us/solutions/public/13000/600/sol13600.html

Trust: 2.1

url:https://www.trustmatta.com/advisories/matta-2012-002.txt

Trust: 2.0

url:http://www.theregister.co.uk/2012/06/13/f5_kit_metasploit_exploit/

Trust: 1.7

url:https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/ssh/f5_bigip_known_privkey.rb

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1493

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1493

Trust: 0.8

url:http://secunia.com/advisories/49396/http

Trust: 0.6

url:http://secunia.com/advisories/49396

Trust: 0.6

url:http://www.nsfocus.net/vulndb/19768

Trust: 0.6

url:http://www.f5.com/

Trust: 0.3

url:http://secunia.com/psi_30_beta_launch

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/49396/#comments

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/advisories/49396/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=49396

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2012-3150 // VULHUB: VHN-54774 // BID: 53897 // JVNDB: JVNDB-2012-003032 // PACKETSTORM: 113442 // CNNVD: CNNVD-201206-137 // NVD: CVE-2012-1493

CREDITS

Florent Daignier, Matta Consulting

Trust: 0.3

sources: BID: 53897

SOURCES

db:CNVDid:CNVD-2012-3150
db:VULHUBid:VHN-54774
db:BIDid:53897
db:JVNDBid:JVNDB-2012-003032
db:PACKETSTORMid:113442
db:CNNVDid:CNNVD-201206-137
db:NVDid:CVE-2012-1493

LAST UPDATE DATE

2024-11-23T22:49:41.970000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2012-3150date:2012-06-14T00:00:00
db:VULHUBid:VHN-54774date:2012-07-10T00:00:00
db:BIDid:53897date:2015-03-19T09:29:00
db:JVNDBid:JVNDB-2012-003032date:2012-07-11T00:00:00
db:CNNVDid:CNNVD-201206-137date:2012-06-14T00:00:00
db:NVDid:CVE-2012-1493date:2024-11-21T01:37:05.797

SOURCES RELEASE DATE

db:CNVDid:CNVD-2012-3150date:2012-06-14T00:00:00
db:VULHUBid:VHN-54774date:2012-07-09T00:00:00
db:BIDid:53897date:2012-06-08T00:00:00
db:JVNDBid:JVNDB-2012-003032date:2012-07-11T00:00:00
db:PACKETSTORMid:113442date:2012-06-08T04:38:33
db:CNNVDid:CNNVD-201206-137date:2012-06-12T00:00:00
db:NVDid:CVE-2012-1493date:2012-07-09T22:55:00.887