Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2012-1493 |
CWE-ID | CWE-255 |
Exploitation vector | Network |
Public exploit | Public exploit code for vulnerability #1 is available. |
Vulnerable software Subscribe |
Enterprise Manager Client/Desktop applications / Other client software |
Vendor | F5 Networks |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU43907
Risk: Medium
CVSSv3.1: 7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C]
CVE-ID: CVE-2012-1493
CWE-ID:
CWE-255 - Credentials Management
Exploit availability: Yes
DescriptionThe vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
F5 BIG-IP appliances 9.x before 9.4.8-HF5, 10.x before 10.2.4, 11.0.x before 11.0.0-HF2, and 11.1.x before 11.1.0-HF3, and Enterprise Manager before 2.1.0-HF2, 2.2.x before 2.2.0-HF1, and 2.3.x before 2.3.0-HF3, use a single SSH private key across different customers' installations and do not properly restrict access to this key, which makes it easier for remote attackers to perform SSH logins via the PubkeyAuthentication option.
MitigationInstall update from vendor's website.
Vulnerable software versionsEnterprise Manager: 1.0 - 2.3.0
External linkshttp://support.f5.com/kb/en-us/solutions/public/13000/600/sol13600.html
http://www.theregister.co.uk/2012/06/13/f5_kit_metasploit_exploit/
http://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/ssh/f5_bigip_known_privkey.rb
http://www.trustmatta.com/advisories/MATTA-2012-002.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.