Unknown
CVE-2016-5021
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)Unknown
Unknown
Unknown
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
The iControl REST service in F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, Link Controller, and PEM 11.5.x before 11.5.4, 11.6.x before 11.6.1, and 12.x before 12.0.0 HF3; BIG-IP DNS 12.x before 12.0.0 HF3; BIG-IP GTM 11.5.x before 11.5.4 and 11.6.x before 11.6.1; BIG-IQ Cloud and Security 4.0.0 through 4.5.0; BIG-IQ Device 4.2.0 through 4.5.0; BIG-IQ ADC 4.5.0; BIG-IQ Centralized Management 4.6.0; and BIG-IQ Cloud and Orchestration 1.0.0 allows remote authenticated administrators to obtain sensitive information via unspecified vectors.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- big-ip access policy manager 11.5.0,
- big-ip access policy manager 11.5.1,
- big-ip access policy manager 11.5.2,
- big-ip access policy manager 11.5.3,
- big-ip access policy manager 11.6.0,
- big-ip access policy manager 12.0.0,
- big-ip advanced firewall manager 11.5.0,
- big-ip advanced firewall manager 11.5.1,
- big-ip advanced firewall manager 11.5.2,
- big-ip advanced firewall manager 11.5.3,
- big-ip advanced firewall manager 11.6.0,
- big-ip advanced firewall manager 12.0.0,
- big-ip analytics 11.5.0,
- big-ip analytics 11.5.1,
- big-ip analytics 11.5.2,
- big-ip analytics 11.5.3,
- big-ip analytics 11.6.0,
- big-ip analytics 12.0.0,
- big-ip application acceleration manager 11.5.0,
- big-ip application acceleration manager 11.5.1,
- big-ip application acceleration manager 11.5.2,
- big-ip application acceleration manager 11.5.3,
- big-ip application acceleration manager 11.6.0,
- big-ip application acceleration manager 12.0.0,
- big-ip application security manager 11.5.0,
- big-ip application security manager 11.5.1,
- big-ip application security manager 11.5.2,
- big-ip application security manager 11.5.3,
- big-ip application security manager 11.6.0,
- big-ip application security manager 12.0.0,
- big-ip domain name system 12.0.0,
- big-ip global traffic manager 11.5.0,
- big-ip global traffic manager 11.5.1,
- big-ip global traffic manager 11.5.2,
- big-ip global traffic manager 11.5.3,
- big-ip global traffic manager 11.6.0,
- big-ip link controller 11.5.0,
- big-ip link controller 11.5.1,
- big-ip link controller 11.5.2,
- big-ip link controller 11.5.3,
- big-ip link controller 11.6.0,
- big-ip link controller 12.0.0,
- big-ip local traffic manager 11.5.0,
- big-ip local traffic manager 11.5.1,
- big-ip local traffic manager 11.5.2,
- big-ip local traffic manager 11.5.3,
- big-ip local traffic manager 11.6.0,
- big-ip local traffic manager 12.0.0,
- big-ip policy enforcement manager 11.5.0,
- big-ip policy enforcement manager 11.5.1,
- big-ip policy enforcement manager 11.5.2,
- big-ip policy enforcement manager 11.5.3,
- big-ip policy enforcement manager 11.6.0,
- big-ip policy enforcement manager 12.0.0,
- big-iq application delivery controller 4.5.0,
- big-iq centralized management 4.6.0,
- big-iq cloud 4.0.0,
- big-iq cloud 4.1.0,
- big-iq cloud 4.2.0,
- big-iq cloud 4.3.0,
- big-iq cloud 4.4.0,
- big-iq cloud 4.5.0,
- big-iq cloud and orchestration 1.0.0,
- big-iq device 4.2.0,
- big-iq device 4.3.0,
- big-iq device 4.4.0,
- big-iq device 4.5.0,
- big-iq security 4.0.0,
- big-iq security 4.1.0,
- big-iq security 4.2.0,
- big-iq security 4.3.0,
- big-iq security 4.4.0,
- big-iq security 4.5.0
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: