Language:
Severity: High
ID: 78166
File Name: f5_bigip_SOL15220.nasl
Version: 1.10
Type: local
Published: 10/10/2014
Updated: 5/9/2019
Configuration: Enable paranoid mode
Supported Sensors: Nessus
Risk Factor: High
Score: 7.4
Risk Factor: High
Base Score: 7.1
Temporal Score: 6.4
Vector: CVSS2#AV:N/AC:H/Au:S/C:C/I:C/A:C
CPE: cpe:/a:f5:big-ip_access_policy_manager, cpe:/a:f5:big-ip_advanced_firewall_manager, cpe:/a:f5:big-ip_application_acceleration_manager, cpe:/a:f5:big-ip_application_security_manager, cpe:/a:f5:big-ip_application_visibility_and_reporting, cpe:/a:f5:big-ip_global_traffic_manager, cpe:/a:f5:big-ip_link_controller, cpe:/a:f5:big-ip_local_traffic_manager, cpe:/a:f5:big-ip_policy_enforcement_manager, cpe:/a:f5:big-ip_wan_optimization_manager, cpe:/a:f5:big-ip_webaccelerator, cpe:/h:f5:big-ip, cpe:/h:f5:big-ip_protocol_security_manager
Required KB Items: Host/local_checks_enabled, Host/BIG-IP/hotfix, Host/BIG-IP/modules, Host/BIG-IP/version, Settings/ParanoidReport
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 9/15/2015
Vulnerability Publication Date: 5/12/2014
Metasploit (F5 iControl Remote Root Command Execution)
CVE: CVE-2014-2928
BID: 67278