Executive Summary

Informations
Name CVE-2015-3628 First vendor Publication 2015-12-07
Vendor Cve Last vendor Modification 2019-06-06

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:S/C:C/I:C/A:C)
Cvss Base Score 9 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 8 Authentication Requires single instance
Calculate full CVSS 2.0 Vectors scores

Detail

The iControl API in F5 BIG-IP LTM, AFM, Analytics, APM, ASM, Link Controller, and PEM 11.3.0 before 11.5.3 HF2 and 11.6.0 before 11.6.0 HF6, BIG-IP AAM 11.4.0 before 11.5.3 HF2 and 11.6.0 before 11.6.0 HF6, BIG-IP Edge Gateway, WebAccelerator, and WOM 11.3.0, BIG-IP GTM 11.3.0 before 11.6.0 HF6, BIG-IP PSM 11.3.0 through 11.4.1, Enterprise Manager 3.1.0 through 3.1.1, BIG-IQ Cloud and Security 4.0.0 through 4.5.0, BIG-IQ Device 4.2.0 through 4.5.0, and BIG-IQ ADC 4.5.0 allows remote authenticated users with the "Resource Administrator" role to gain privileges via an iCall (1) script or (2) handler in a SOAP request to iControl/iControlPortal.cgi.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3628

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-264 Permissions, Privileges, and Access Controls

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Application 8
Application 8
Application 7
Application 8
Application 1
Application 3
Application 8
Application 8
Application 8
Application 8
Application 3
Application 1
Application 1
Application 1
Application 6
Application 4
Application 6

Snort® IPS/IDS

Date Description
2016-03-14 F5 BIG-IP iControl API arbitrary command execution attempt
RuleID : 36778 - Revision : 2 - Type : SERVER-WEBAPP

Metasploit Database

id Description
2015-09-03 F5 iControl iCall::Script Root Command Execution

Nessus® Vulnerability Scanner

Date Description
2015-09-04 Name : The remote device is missing a vendor-supplied security patch.
File : f5_bigip_SOL16728.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
CONFIRM https://support.f5.com/kb/en-us/solutions/public/16000/700/sol16728.html
EXPLOIT-DB https://www.exploit-db.com/exploits/38764/
MISC http://packetstormsecurity.com/files/134434/F5-iControl-iCall-Script-Root-Com...
http://www.rapid7.com/db/modules/exploit/linux/http/f5_icall_cmd
https://gdssecurity.squarespace.com/labs/2015/9/8/f5-icallscript-privilege-es...
SECTRACK http://www.securitytracker.com/id/1034306
http://www.securitytracker.com/id/1034307

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
Date Informations
2021-05-04 12:39:48
  • Multiple Updates
2021-04-22 01:48:44
  • Multiple Updates
2020-05-23 13:17:07
  • Multiple Updates
2020-05-23 00:45:15
  • Multiple Updates
2019-06-06 21:19:39
  • Multiple Updates
2017-09-13 09:23:31
  • Multiple Updates
2015-12-09 05:24:36
  • Multiple Updates
2015-12-09 00:25:06
  • Multiple Updates
2015-12-08 00:25:41
  • First insertion