Description
In some circumstances, an F5 BIG-IP version 12.0.0 to 12.1.2 and 13.0.0 Azure cloud instance may contain a default administrative password which could be used to remotely log into the BIG-IP system. The impacted administrative account is the Azure instance administrative user that was created at deployment. The root and admin accounts are not vulnerable. An attacker may be able to remotely access the BIG-IP host via SSH.
Published: 2017-05-23
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2017-15196 In some circumstances, an F5 BIG-IP version 12.0.0 to 12.1.2 and 13.0.0 Azure cloud instance may contain a default administrative password which could be used to remotely log into the BIG-IP system. The impacted administrative account is the Azure instance administrative user that was created at deployment. The root and admin accounts are not vulnerable. An attacker may be able to remotely access the BIG-IP host via SSH.
History

No history.

Subscriptions

F5 Big-ip Access Policy Manager Big-ip Advanced Firewall Manager Big-ip Application Acceleration Manager Big-ip Application Security Manager Big-ip Domain Name System Big-ip Link Controller Big-ip Local Traffic Manager Big-ip Policy Enforcement Manager Big-ip Websafe
cve-icon MITRE

Status: PUBLISHED

Assigner: f5

Published:

Updated: 2024-08-05T15:18:49.911Z

Reserved: 2017-02-21T00:00:00.000Z

Link: CVE-2017-6131

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-05-23T15:29:00.190

Modified: 2025-04-20T01:37:25.860

Link: CVE-2017-6131

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses