9.8
CVE-2017-6131
- EPSS 0.78%
- Veröffentlicht 23.05.2017 15:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
- Quelle f5sirt@f5.com
- Teams Watchlist Login
- Unerledigt Login
In some circumstances, an F5 BIG-IP version 12.0.0 to 12.1.2 and 13.0.0 Azure cloud instance may contain a default administrative password which could be used to remotely log into the BIG-IP system. The impacted administrative account is the Azure instance administrative user that was created at deployment. The root and admin accounts are not vulnerable. An attacker may be able to remotely access the BIG-IP host via SSH.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
F5 ≫ Big-ip Local Traffic Manager Version12.0.0
F5 ≫ Big-ip Local Traffic Manager Version12.1.0
F5 ≫ Big-ip Local Traffic Manager Version12.1.1
F5 ≫ Big-ip Local Traffic Manager Version12.1.2
F5 ≫ Big-ip Local Traffic Manager Version13.0.0
F5 ≫ Big-ip Application Acceleration Manager Version12.0.0
F5 ≫ Big-ip Application Acceleration Manager Version12.1.0
F5 ≫ Big-ip Application Acceleration Manager Version12.1.1
F5 ≫ Big-ip Application Acceleration Manager Version12.1.2
F5 ≫ Big-ip Application Acceleration Manager Version13.0.0
F5 ≫ Big-ip Advanced Firewall Manager Version12.0.0
F5 ≫ Big-ip Advanced Firewall Manager Version12.1.0
F5 ≫ Big-ip Advanced Firewall Manager Version12.1.1
F5 ≫ Big-ip Advanced Firewall Manager Version12.1.2
F5 ≫ Big-ip Advanced Firewall Manager Version13.0.0
F5 ≫ Big-ip Access Policy Manager Version12.0.0
F5 ≫ Big-ip Access Policy Manager Version12.1.0
F5 ≫ Big-ip Access Policy Manager Version12.1.1
F5 ≫ Big-ip Access Policy Manager Version12.1.2
F5 ≫ Big-ip Access Policy Manager Version13.0.0
F5 ≫ Big-ip Application Security Manager Version12.0.0
F5 ≫ Big-ip Application Security Manager Version12.1.0
F5 ≫ Big-ip Application Security Manager Version12.1.1
F5 ≫ Big-ip Application Security Manager Version12.1.2
F5 ≫ Big-ip Application Security Manager Version13.0.0
F5 ≫ Big-ip Domain Name System Version12.0.0
F5 ≫ Big-ip Domain Name System Version12.1.0
F5 ≫ Big-ip Domain Name System Version12.1.1
F5 ≫ Big-ip Domain Name System Version12.1.2
F5 ≫ Big-ip Domain Name System Version13.0.0
F5 ≫ Big-ip Link Controller Version12.0.0
F5 ≫ Big-ip Link Controller Version12.1.0
F5 ≫ Big-ip Link Controller Version12.1.1
F5 ≫ Big-ip Link Controller Version12.1.2
F5 ≫ Big-ip Link Controller Version13.0.0
F5 ≫ Big-ip Policy Enforcement Manager Version12.0.0
F5 ≫ Big-ip Policy Enforcement Manager Version12.1.0
F5 ≫ Big-ip Policy Enforcement Manager Version12.1.1
F5 ≫ Big-ip Policy Enforcement Manager Version12.1.2
F5 ≫ Big-ip Policy Enforcement Manager Version13.0.0
F5 ≫ Big-ip Websafe Version12.0.0
F5 ≫ Big-ip Websafe Version12.1.0
F5 ≫ Big-ip Websafe Version12.1.1
F5 ≫ Big-ip Websafe Version12.1.2
F5 ≫ Big-ip Websafe Version13.0.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.78% | 0.713 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 7.5 | 10 | 6.4 |
AV:N/AC:L/Au:N/C:P/I:P/A:P
|
CWE-798 Use of Hard-coded Credentials
The product contains hard-coded credentials, such as a password or cryptographic key.