[Forgot Password]
Login  Register Subscribe

23631

 
 

115083

 
 

97147

 
 

909

 
 

78764

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2012-1493

Date: (C)2012-07-09   (M)2016-03-13 


F5 BIG-IP appliances 9.x before 9.4.8-HF5, 10.x before 10.2.4, 11.0.x before 11.0.0-HF2, and 11.1.x before 11.1.0-HF3, and Enterprise Manager before 2.1.0-HF2, 2.2.x before 2.2.0-HF1, and 2.3.x before 2.3.0-HF3, use a single SSH private key across different customers' installations and do not properly restrict access to this key, which makes it easier for remote attackers to perform SSH logins via the PubkeyAuthentication option.

CVSS Score: 7.8Access Vector: NETWORK
Exploit Score: 10.0Access Complexity: LOW
Impact Score: 6.9Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: NONE
 Availability: NONE





Reference:
http://support.f5.com/kb/en-us/solutions/public/13000/600/sol13600.html
http://www.theregister.co.uk/2012/06/13/f5_kit_metasploit_exploit/
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/ssh/f5_bigip_known_privkey.rb
https://www.trustmatta.com/advisories/MATTA-2012-002.txt

CPE    73
cpe:/h:f5:big-ip_2400
cpe:/h:f5:big-ip_8900
cpe:/h:f5:big-ip_3900
cpe:/h:f5:big-ip_1600
...
CWE    1
CWE-255

© 2013 SecPod Technologies