First published: Tue Jan 12 2016(Updated: )
BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Link Controller, and PEM 12.0.0 before HF1 on the 2000, 4000, 5000, 7000, and 10000 platforms do not properly sync passwords with the Always-On Management (AOM) subsystem, which might allow remote attackers to obtain login access to AOM via an (1) expired or (2) default password.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP | =12.0.0 | |
F5 BIG-IP Application Acceleration Manager | =12.0.0 | |
F5 BIG-IP Link Controller | =12.0.0 | |
F5 BIG-IP Policy Enforcement Manager | =12.0.0 | |
F5 BIG-IP Advanced Firewall Manager | =12.0.0 | |
Riverbed SteelApp Traffic Manager | =12.0.0 | |
F5 Access Policy Manager | =12.0.0 | |
F5 Application Security Manager | =12.0.0 | |
F5 BIG-IP Analytics | =12.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8611 has a medium severity level, indicating a moderate risk to affected systems.
To fix CVE-2015-8611, upgrade BIG-IP systems to version 12.0.0 HF1 or later to ensure proper password synchronization.
CVE-2015-8611 affects F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Link Controller, and PEM on version 12.0.0.
Yes, CVE-2015-8611 can potentially allow remote attackers to gain unauthorized login access.
The issue in CVE-2015-8611 arises from improper synchronization of passwords with the Always-On Management subsystem.