Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2015-3628 | First vendor Publication | 2015-12-07 |
Vendor | Cve | Last vendor Modification | 2019-06-06 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:S/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 8 | Authentication | Requires single instance |
Calculate full CVSS 2.0 Vectors scores |
Detail
The iControl API in F5 BIG-IP LTM, AFM, Analytics, APM, ASM, Link Controller, and PEM 11.3.0 before 11.5.3 HF2 and 11.6.0 before 11.6.0 HF6, BIG-IP AAM 11.4.0 before 11.5.3 HF2 and 11.6.0 before 11.6.0 HF6, BIG-IP Edge Gateway, WebAccelerator, and WOM 11.3.0, BIG-IP GTM 11.3.0 before 11.6.0 HF6, BIG-IP PSM 11.3.0 through 11.4.1, Enterprise Manager 3.1.0 through 3.1.1, BIG-IQ Cloud and Security 4.0.0 through 4.5.0, BIG-IQ Device 4.2.0 through 4.5.0, and BIG-IQ ADC 4.5.0 allows remote authenticated users with the "Resource Administrator" role to gain privileges via an iCall (1) script or (2) handler in a SOAP request to iControl/iControlPortal.cgi. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3628 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-264 | Permissions, Privileges, and Access Controls |
CPE : Common Platform Enumeration
Snort® IPS/IDS
Date | Description |
---|---|
2016-03-14 | F5 BIG-IP iControl API arbitrary command execution attempt RuleID : 36778 - Revision : 2 - Type : SERVER-WEBAPP |
Metasploit Database
id | Description |
---|---|
2015-09-03 | F5 iControl iCall::Script Root Command Execution |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-09-04 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL16728.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2021-05-04 12:39:48 |
|
2021-04-22 01:48:44 |
|
2020-05-23 13:17:07 |
|
2020-05-23 00:45:15 |
|
2019-06-06 21:19:39 |
|
2017-09-13 09:23:31 |
|
2015-12-09 05:24:36 |
|
2015-12-09 00:25:06 |
|
2015-12-08 00:25:41 |
|