7.6 High
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
0.067 Low
EPSS
Percentile
93.1%
Vulnerability Recommended Actions
If the previous table lists a version in the Versions known to be not vulnerable column, you can eliminate this vulnerability by upgrading to the listed version. If the listed version is older than the version you are currently running, or if the table does not list any version in the column, then no upgrade candidate currently exists.
To mitigate this vulnerability, you can perform one of the following procedures:
All BIG-IP and BIG-IQ Modules
For all BIG-IP and BIG-IQ modules, allow only trusted users to access the system shell.
Traffix SDC
Impact of action: Performing the following procedure should not have a negative impact on your system.
rpm --import /etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-release
rpm -K <rpm_package_name>
For example, to verify the samba-common-3.6.23-14.el6_6.x86_64.rpm RPM, type the following command:
rpm -K samba-common-3.6.23-14.el6_6.x86_64.rpm
samba-common-3.6.23-14.el6_6.x86_64.rpm: rsa sha1 (md5) pgp md5 OK
Supplemental Information
support.f5.com/kb/en-us/solutions/public/0000/100/sol167.html
support.f5.com/kb/en-us/solutions/public/10000/000/sol10025.html
support.f5.com/kb/en-us/solutions/public/13000/100/sol13123.html
support.f5.com/kb/en-us/solutions/public/15000/100/sol15106.html
support.f5.com/kb/en-us/solutions/public/15000/100/sol15113.html
support.f5.com/kb/en-us/solutions/public/4000/600/sol4602.html
support.f5.com/kb/en-us/solutions/public/4000/900/sol4918.html
support.f5.com/kb/en-us/solutions/public/9000/500/sol9502.html
support.f5.com/kb/en-us/solutions/public/9000/900/sol9957.html
support.f5.com/kb/en-us/solutions/public/9000/900/sol9970.html