Lucene search

K
f5F5F5:K9875
HistoryMar 27, 2013 - 12:00 a.m.

K9875 : BIG-IP management interface vulnerability CVE-2008-6474

2013-03-2700:00:00
my.f5.com
2

7.6 High

AI Score

Confidence

Low

9 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

0.003 Low

EPSS

Percentile

65.6%

Security Advisory Description

Note: Versions that are not listed in this article have not been evaluated for vulnerability to this security advisory. For information about the F5 security policy regarding evaluating older and unsupported versions of F5 products, refer to K4602: Overview of the F5 security vulnerability response policy.

F5 products and versions that have been evaluated for this Security Advisory

Product Affected Not Affected
BIG-IP LTM 9.3.0 - 9.3.1
9.4.0 - 9.4.4
9.6.0 - 9.6.1 9.4.5 - 9.4.8
10.x
11.x
BIG-IP GTM 9.3.0 - 9.3.1
9.4.0 - 9.4.4 9.4.5 - 9.4.8
10.x
11.x
BIG-IP ASM 9.3.0 - 9.3.1
9.4.0 - 9.4.4 9.4.5 - 9.4.8
10.x
11.x
BIG-IP Link Controller 9.3.0 - 9.3.1
9.4.0 - 9.4.4 9.4.5 - 9.4.8
10.x
11.x
BIG-IP WebAccelerator 9.4.0 - 9.4.4 9.4.5 - 9.4.8
10.x
11.x
BIG-IP PSM None 9.4.5 - 9.4.8
10.x
11.x
BIG-IP WAN Optimization None 10.x
11.x
BIG-IP APM None 10.x
11.x
BIG-IP Edge Gateway None 10.x
11.x
BIG-IP Analytics None 11.x
BIG-IP AFM None 11.x
BIG-IP PEM
None 11.x
FirePass None 5.x
6.x
7.x
Enterprise Manager None 1.x
2.x
3.x
ARX None 2.x
3.x
4.x
5.x
6.x

The BIG-IP CLI and Web Management Interface are vulnerable to a remote code-injection because the application fails to properly sanitize user-supplied input. Exploiting this issue may allow an attacker to execute arbitrary code with the privileges of the user running the affected application.

Important: The exploitation risk of this vulnerability is considered to be low, as exploitation requires the user to have a valid authenticated management session. A privileged user should not paste arbitrary or untrusted commands into the BIG-IP system.

Information about this advisory is available at the following location:

Note: This link takes you to a resource outside of AskF5, and it is possible that the information may be removed without our knowledge.

<https://vulners.com/cve/CVE-2008-6474&gt;

F5 Product Development tracked this issue as CR97806, and it was fixed in version 9.4.5. For information about upgrading, refer to the BIG-IP LTM, GTM, ASM, Link Controller, or WebAccelerator release notes.

7.6 High

AI Score

Confidence

Low

9 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

0.003 Low

EPSS

Percentile

65.6%

Related for F5:K9875