Unknown
CVE-2016-5700
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)Unknown
Unknown
Unknown
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
Virtual servers in F5 BIG-IP systems 11.5.0, 11.5.1 before HF11, 11.5.2, 11.5.3, 11.5.4 before HF2, 11.6.0 before HF8, 11.6.1 before HF1, 12.0.0 before HF4, and 12.1.0 before HF2, when configured with the HTTP Explicit Proxy functionality or SOCKS profile, allow remote attackers to modify the system configuration, read system files, and possibly execute arbitrary code via unspecified vectors.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- big-ip access policy manager 11.5.0,
- big-ip access policy manager 11.5.1,
- big-ip access policy manager 11.5.2,
- big-ip access policy manager 11.5.3,
- big-ip access policy manager 11.5.4,
- big-ip access policy manager 11.6.0,
- big-ip access policy manager 11.6.1,
- big-ip access policy manager 12.0.0,
- big-ip access policy manager 12.1.0,
- big-ip advanced firewall manager 11.5.0,
- big-ip advanced firewall manager 11.5.1,
- big-ip advanced firewall manager 11.5.2,
- big-ip advanced firewall manager 11.5.3,
- big-ip advanced firewall manager 11.5.4,
- big-ip advanced firewall manager 11.6.0,
- big-ip advanced firewall manager 11.6.1,
- big-ip advanced firewall manager 12.0.0,
- big-ip advanced firewall manager 12.1.0,
- big-ip application acceleration manager 11.5.0,
- big-ip application acceleration manager 11.5.1,
- big-ip application acceleration manager 11.5.2,
- big-ip application acceleration manager 11.5.3,
- big-ip application acceleration manager 11.5.4,
- big-ip application acceleration manager 11.6.0,
- big-ip application acceleration manager 11.6.1,
- big-ip application acceleration manager 12.0.0,
- big-ip application acceleration manager 12.1.0,
- big-ip application security manager 11.5.0,
- big-ip application security manager 11.5.1,
- big-ip application security manager 11.5.2,
- big-ip application security manager 11.5.3,
- big-ip application security manager 11.5.4,
- big-ip application security manager 11.6.0,
- big-ip application security manager 11.6.1,
- big-ip application security manager 12.0.0,
- big-ip application security manager 12.1.0,
- big-ip link controller 11.5.0,
- big-ip link controller 11.5.1,
- big-ip link controller 11.5.2,
- big-ip link controller 11.5.3,
- big-ip link controller 11.5.4,
- big-ip link controller 11.6.0,
- big-ip link controller 11.6.1,
- big-ip link controller 12.0.0,
- big-ip link controller 12.1.0,
- big-ip local traffic manager 11.5.0,
- big-ip local traffic manager 11.5.1,
- big-ip local traffic manager 11.5.2,
- big-ip local traffic manager 11.5.3,
- big-ip local traffic manager 11.5.4,
- big-ip local traffic manager 11.6.0,
- big-ip local traffic manager 11.6.1,
- big-ip local traffic manager 12.0.0,
- big-ip local traffic manager 12.1.0,
- big-ip policy enforcement manager 11.5.0,
- big-ip policy enforcement manager 11.5.1,
- big-ip policy enforcement manager 11.5.2,
- big-ip policy enforcement manager 11.5.3,
- big-ip policy enforcement manager 11.5.4,
- big-ip policy enforcement manager 11.6.0,
- big-ip policy enforcement manager 11.6.1,
- big-ip policy enforcement manager 12.0.0,
- big-ip policy enforcement manager 12.1.0,
- big-ip websafe 11.6.0,
- big-ip websafe 11.6.1,
- big-ip websafe 12.0.0,
- big-ip websafe 12.1.0
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: