Unknown
CVE-2017-6131
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)Unknown
Unknown
Unknown
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
In some circumstances, an F5 BIG-IP version 12.0.0 to 12.1.2 and 13.0.0 Azure cloud instance may contain a default administrative password which could be used to remotely log into the BIG-IP system. The impacted administrative account is the Azure instance administrative user that was created at deployment. The root and admin accounts are not vulnerable. An attacker may be able to remotely access the BIG-IP host via SSH.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- big-ip access policy manager 12.0.0,
- big-ip access policy manager 12.1.0,
- big-ip access policy manager 12.1.1,
- big-ip access policy manager 12.1.2,
- big-ip access policy manager 13.0.0,
- big-ip advanced firewall manager 12.0.0,
- big-ip advanced firewall manager 12.1.0,
- big-ip advanced firewall manager 12.1.1,
- big-ip advanced firewall manager 12.1.2,
- big-ip advanced firewall manager 13.0.0,
- big-ip application acceleration manager 12.0.0,
- big-ip application acceleration manager 12.1.0,
- big-ip application acceleration manager 12.1.1,
- big-ip application acceleration manager 12.1.2,
- big-ip application acceleration manager 13.0.0,
- big-ip application security manager 12.0.0,
- big-ip application security manager 12.1.0,
- big-ip application security manager 12.1.1,
- big-ip application security manager 12.1.2,
- big-ip application security manager 13.0.0,
- big-ip domain name system 12.0.0,
- big-ip domain name system 12.1.0,
- big-ip domain name system 12.1.1,
- big-ip domain name system 12.1.2,
- big-ip domain name system 13.0.0,
- big-ip link controller 12.0.0,
- big-ip link controller 12.1.0,
- big-ip link controller 12.1.1,
- big-ip link controller 12.1.2,
- big-ip link controller 13.0.0,
- big-ip local traffic manager 12.0.0,
- big-ip local traffic manager 12.1.0,
- big-ip local traffic manager 12.1.1,
- big-ip local traffic manager 12.1.2,
- big-ip local traffic manager 13.0.0,
- big-ip policy enforcement manager 12.0.0,
- big-ip policy enforcement manager 12.1.0,
- big-ip policy enforcement manager 12.1.1,
- big-ip policy enforcement manager 12.1.2,
- big-ip policy enforcement manager 13.0.0,
- big-ip websafe 12.0.0,
- big-ip websafe 12.1.0,
- big-ip websafe 12.1.1,
- big-ip websafe 12.1.2,
- big-ip websafe 13.0.0
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: