First published: Mon Jul 09 2012(Updated: )
F5 BIG-IP appliances 9.x before 9.4.8-HF5, 10.x before 10.2.4, 11.0.x before 11.0.0-HF2, and 11.1.x before 11.1.0-HF3, and Enterprise Manager before 2.1.0-HF2, 2.2.x before 2.2.0-HF1, and 2.3.x before 2.3.0-HF3, use a single SSH private key across different customers' installations and do not properly restrict access to this key, which makes it easier for remote attackers to perform SSH logins via the PubkeyAuthentication option.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
F5 Application Security Manager | =9.2.0 | |
F5 Application Security Manager | =9.2.0-hf4 | |
F5 Application Security Manager | =9.4.4 | |
F5 Application Security Manager | =9.4.5 | |
F5 Application Security Manager | =9.4.6 | |
F5 Application Security Manager | =9.4.7 | |
F5 Application Security Manager | =9.4.8 | |
F5 Application Security Manager | =10.0.0 | |
F5 Application Security Manager | =10.0.1 | |
F5 Application Security Manager | =10.2.3-hf1 | |
F5 Application Security Manager | =11.0.0 | |
F5 Application Security Manager | =11.0.0-hf1 | |
F5 Application Security Manager | =11.1.0 | |
F5 Application Security Manager | =11.1.0-hf2 | |
Riverbed SteelApp Traffic Manager | ||
Riverbed SteelApp Traffic Manager | =9.2.2 | |
Riverbed SteelApp Traffic Manager | =9.4.8-hf4 | |
Riverbed SteelApp Traffic Manager | =10.0.0 | |
Riverbed SteelApp Traffic Manager | =10.2.3-hf1 | |
Riverbed SteelApp Traffic Manager | =11.0.0 | |
Riverbed SteelApp Traffic Manager | =11.0.0-hf1 | |
Riverbed SteelApp Traffic Manager | =11.1.0 | |
Riverbed SteelApp Traffic Manager | =11.1.0-hf2 | |
Riverbed SteelApp Traffic Manager | ||
Riverbed SteelApp Traffic Manager | =9.0.0 | |
Riverbed SteelApp Traffic Manager | =9.4.8-hf4 | |
Riverbed SteelApp Traffic Manager | =10.0.0 | |
Riverbed SteelApp Traffic Manager | =10.2.3-hf1 | |
Riverbed SteelApp Traffic Manager | =11.0.0 | |
Riverbed SteelApp Traffic Manager | =11.0.0-hf1 | |
Riverbed SteelApp Traffic Manager | =11.1.0 | |
Riverbed SteelApp Traffic Manager | =11.1.0-hf2 | |
F5 BIG-IP | ||
F5 BIG-IP | =2.0 | |
F5 BIG-IP | =4.0 | |
F5 BIG-IP | =4.2 | |
F5 BIG-IP | =4.3 | |
F5 BIG-IP | =4.4 | |
F5 BIG-IP | =4.5 | |
F5 BIG-IP | =4.5.6 | |
F5 BIG-IP | =4.5.9 | |
F5 BIG-IP | =4.5.10 | |
F5 BIG-IP | =4.5.11 | |
F5 BIG-IP | =4.5.12 | |
F5 BIG-IP | =4.6 | |
F5 BIG-IP | =4.6.2 | |
F5 BIG-IP | =9.0 | |
F5 BIG-IP | =9.0.1 | |
F5 BIG-IP | =9.0.2 | |
F5 BIG-IP | =9.0.3 | |
F5 BIG-IP | =9.0.4 | |
F5 BIG-IP | =9.0.5 | |
F5 BIG-IP | =9.1 | |
F5 BIG-IP | =9.1.1 | |
F5 BIG-IP | =9.1.2 | |
F5 BIG-IP | =9.1.3 | |
F5 BIG-IP | =9.2 | |
F5 BIG-IP | =9.2.2 | |
F5 BIG-IP | =9.2.3 | |
F5 BIG-IP | =9.2.4 | |
F5 BIG-IP | =9.2.5 | |
F5 BIG-IP | =9.3 | |
F5 BIG-IP | =9.3.1 | |
F5 BIG-IP | =9.4 | |
F5 BIG-IP | =9.4.1 | |
F5 BIG-IP | =9.4.2 | |
F5 BIG-IP | =9.4.3 | |
F5 BIG-IP | =9.4.4 | |
F5 BIG-IP | =9.4.5 | |
F5 BIG-IP | =9.4.6 | |
F5 BIG-IP | =9.4.7 | |
F5 BIG-IP | =9.4.8 | |
F5 BIG-IP | =9.6.0 | |
F5 BIG-IP | =9.6.1 | |
F5 BIG-IP | =10.0.0 | |
F5 BIG-IP | =10.0.1 | |
F5 BIG-IP | =10.1.0 | |
F5 BIG-IP | =10.2.0 | |
F5 BIG-IP | ||
F5 BIG-IP | ||
F5 BIG-IP 11050-F firmware | ||
F5 BIG-IP | ||
F5 BIG-IP | ||
F5 BIG-IP | ||
F5 BIG-IP | ||
F5 BIG-IP | ||
F5 BIG-IP | ||
F5 BIG-IP 3900 | ||
F5 BIG-IP 4100 | ||
F5 BIG-IP | ||
F5 BIG-IP 5110 | ||
F5 BIG-IP 6400 | ||
F5 BIG-IP | ||
F5 BIG-IP 6900 | ||
F5 BIG-IP | ||
F5 BIG-IP | ||
F5 BIG-IP | ||
F5 BIG-IP | ||
F5 Enterprise Manager | ||
F5 Enterprise Manager | =1.0 | |
F5 Enterprise Manager | =2.0 | |
F5 Enterprise Manager | =2.1.0 | |
F5 Enterprise Manager | =2.1.0-hf1 | |
F5 Enterprise Manager | =2.2.0 | |
F5 Enterprise Manager | =2.3.0 | |
F5 Enterprise Manager | =2.3.0-hf2 | |
F5 Enterprise Manager | ||
F5 Enterprise Manager | =1.0 | |
F5 Enterprise Manager | =2.0 | |
F5 Enterprise Manager | =2.1.0 | |
F5 Enterprise Manager | =2.1.0-hf1 | |
F5 Enterprise Manager | =2.2.0 | |
F5 Enterprise Manager | =2.3.0 | |
F5 Enterprise Manager | =2.3.0-hf2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1493 has a critical severity rating as it allows attackers to exploit the use of a single SSH private key across multiple installations.
To fix CVE-2012-1493, update your F5 BIG-IP appliances to the latest version that is not affected by this vulnerability, specifically versions after 9.4.8-HF5, 10.2.4, 11.0.0-HF2, or 11.1.0-HF3.
CVE-2012-1493 affects F5 BIG-IP appliances across versions from 9.x to 11.1.x and also impacts older versions of Enterprise Manager.
CVE-2012-1493 can facilitate unauthorized access to affected systems, potentially leading to data breaches and system compromise.
While the best solution is to apply the update, consider implementing strict access controls and monitoring SSH access as a temporary measure.