First published: Tue May 23 2017(Updated: )
In some circumstances, an F5 BIG-IP version 12.0.0 to 12.1.2 and 13.0.0 Azure cloud instance may contain a default administrative password which could be used to remotely log into the BIG-IP system. The impacted administrative account is the Azure instance administrative user that was created at deployment. The root and admin accounts are not vulnerable. An attacker may be able to remotely access the BIG-IP host via SSH.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
Riverbed SteelApp Traffic Manager | =12.0.0 | |
Riverbed SteelApp Traffic Manager | =12.1.0 | |
Riverbed SteelApp Traffic Manager | =12.1.1 | |
Riverbed SteelApp Traffic Manager | =12.1.2 | |
Riverbed SteelApp Traffic Manager | =13.0.0 | |
F5 BIG-IP Application Acceleration Manager | =12.0.0 | |
F5 BIG-IP Application Acceleration Manager | =12.1.0 | |
F5 BIG-IP Application Acceleration Manager | =12.1.1 | |
F5 BIG-IP Application Acceleration Manager | =12.1.2 | |
F5 BIG-IP Application Acceleration Manager | =13.0.0 | |
F5 BIG-IP Advanced Firewall Manager | =12.0.0 | |
F5 BIG-IP Advanced Firewall Manager | =12.1.0 | |
F5 BIG-IP Advanced Firewall Manager | =12.1.1 | |
F5 BIG-IP Advanced Firewall Manager | =12.1.2 | |
F5 BIG-IP Advanced Firewall Manager | =13.0.0 | |
F5 Access Policy Manager | =12.0.0 | |
F5 Access Policy Manager | =12.1.0 | |
F5 Access Policy Manager | =12.1.1 | |
F5 Access Policy Manager | =12.1.2 | |
F5 Access Policy Manager | =13.0.0 | |
F5 Application Security Manager | =12.0.0 | |
F5 Application Security Manager | =12.1.0 | |
F5 Application Security Manager | =12.1.1 | |
F5 Application Security Manager | =12.1.2 | |
F5 Application Security Manager | =13.0.0 | |
F5 BIG-IP | =12.0.0 | |
F5 BIG-IP | =12.1.0 | |
F5 BIG-IP | =12.1.1 | |
F5 BIG-IP | =12.1.2 | |
F5 BIG-IP | =13.0.0 | |
F5 BIG-IP Link Controller | =12.0.0 | |
F5 BIG-IP Link Controller | =12.1.0 | |
F5 BIG-IP Link Controller | =12.1.1 | |
F5 BIG-IP Link Controller | =12.1.2 | |
F5 BIG-IP Link Controller | =13.0.0 | |
F5 BIG-IP Policy Enforcement Manager | =12.0.0 | |
F5 BIG-IP Policy Enforcement Manager | =12.1.0 | |
F5 BIG-IP Policy Enforcement Manager | =12.1.1 | |
F5 BIG-IP Policy Enforcement Manager | =12.1.2 | |
F5 BIG-IP Policy Enforcement Manager | =13.0.0 | |
F5 WebSafe | =12.0.0 | |
F5 WebSafe | =12.1.0 | |
F5 WebSafe | =12.1.1 | |
F5 WebSafe | =12.1.2 | |
F5 WebSafe | =13.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6131 has a severity rating of critical due to the potential for unauthorized remote access using a default administrative password.
To fix CVE-2017-6131, users should change the default administrative password of the affected F5 BIG-IP versions immediately.
CVE-2017-6131 affects F5 BIG-IP versions 12.0.0 to 12.1.2 and 13.0.0.
CVE-2017-6131 poses risks such as unauthorized access to the management console and potential modifications to system configurations.
Yes, there are patches available from F5 for CVE-2017-6131 that address this vulnerability.