F5 BIG-IP appliances 9.x before 9.4.8-HF5, 10.x before 10.2.4, 11.0.x before 11.0.0-HF2, and 11.1.x before 11.1.0-HF3, and Enterprise Manager before 2.1.0-HF2, 2.2.x before 2.2.0-HF1, and 2.3.x before 2.3.0-HF3, use a single SSH private key across different customers' installations and do not properly restrict access to this key, which makes it easier for remote attackers to perform SSH logins via the PubkeyAuthentication option.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
|
History
21 Nov 2024, 01:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://support.f5.com/kb/en-us/solutions/public/13000/600/sol13600.html - Vendor Advisory | |
References | () http://www.theregister.co.uk/2012/06/13/f5_kit_metasploit_exploit/ - | |
References | () https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/ssh/f5_bigip_known_privkey.rb - Exploit, Patch | |
References | () https://www.trustmatta.com/advisories/MATTA-2012-002.txt - |
Information
Published : 2012-07-09 22:55
Updated : 2024-11-21 01:37
NVD link : CVE-2012-1493
Mitre link : CVE-2012-1493
CVE.ORG link : CVE-2012-1493
JSON object : View
Products Affected
f5
- big-ip_11000
- big-ip_3410
- big-ip_global_traffic_manager
- big-ip_8950
- big-ip_2400
- big-ip_3600
- big-ip_5100
- big-ip_8400
- big-ip_1500
- big-ip_6800
- big-ip_6900
- big-ip_3400
- big-ip_11050
- enterprise_manager
- big-ip_1600
- big-ip_5110
- tmos
- big-ip_3900
- big-ip_application_security_manager
- big-ip_4100
- big-ip_8800
- big-ip_8900
- big-ip_local_traffic_manager
- big-ip_1000
- big-ip_6400
CWE
CWE-255
Credentials Management Errors