| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 4.5 | $0-$5k | 0.00 |
Summary
A vulnerability labeled as problematic has been found in F5 BIG-IP. This affects an unknown part of the component iControl REST Service. Such manipulation leads to information disclosure. This vulnerability is uniquely identified as CVE-2016-5021. The attack can be launched remotely. No exploit exists. The affected component should be upgraded.
Details
A vulnerability, which was classified as problematic, has been found in F5 BIG-IP (Firewall Software) (the affected version unknown). Affected by this issue is an unknown part of the component iControl REST Service. The manipulation with an unknown input leads to a information disclosure vulnerability. Using CWE to declare the problem leads to CWE-200. The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. Impacted is confidentiality. CVE summarizes:
The iControl REST service in F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, Link Controller, and PEM 11.5.x before 11.5.4, 11.6.x before 11.6.1, and 12.x before 12.0.0 HF3; BIG-IP DNS 12.x before 12.0.0 HF3; BIG-IP GTM 11.5.x before 11.5.4 and 11.6.x before 11.6.1; BIG-IQ Cloud and Security 4.0.0 through 4.5.0; BIG-IQ Device 4.2.0 through 4.5.0; BIG-IQ ADC 4.5.0; BIG-IQ Centralized Management 4.6.0; and BIG-IQ Cloud and Orchestration 1.0.0 allows remote authenticated administrators to obtain sensitive information via unspecified vectors.
The weakness was disclosed 06/24/2016 (Website). The advisory is shared for download at support.f5.com. This vulnerability is handled as CVE-2016-5021. The exploitation is known to be easy. The attack may be launched remotely. A simple authentication is necessary for exploitation. There are neither technical details nor an exploit publicly available. The MITRE ATT&CK project declares the attack technique as T1592.
The vulnerability scanner Nessus provides a plugin with the ID 91552 (F5 Networks BIG-IP : iControl REST vulnerability (SOL99998454)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family F5 Networks Local Security Checks.
Upgrading eliminates this vulnerability.
The vulnerability is also documented in the databases at Tenable (91552) and SecurityTracker (ID 1036172†). VulDB is the best source for vulnerability data and more expert information about this specific topic.
Product
Type
Vendor
Name
License
Website
- Vendor: https://f5.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 4.6VulDB Meta Temp Score: 4.5
VulDB Base Score: 4.3
VulDB Temp Score: 4.1
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 4.9
NVD Vector: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Information disclosureCWE: CWE-200 / CWE-284 / CWE-266
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 91552
Nessus Name: F5 Networks BIG-IP : iControl REST vulnerability (SOL99998454)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
OpenVAS ID: 863423
OpenVAS Name: F5 BIG-IP - SOL99998454 - iControl REST vulnerability CVE-2016-5021
OpenVAS File: 🔍
OpenVAS Family: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Timeline
05/24/2016 🔍06/24/2016 🔍
06/24/2016 🔍
06/24/2016 🔍
06/25/2016 🔍
08/24/2022 🔍
Sources
Vendor: f5.comAdvisory: K99998454
Status: Confirmed
CVE: CVE-2016-5021 (🔍)
GCVE (CVE): GCVE-0-2016-5021
GCVE (VulDB): GCVE-100-88112
SecurityTracker: 1036172 - F5 BIG-IP iControl REST API Bug Lets Remote Authenticated Administrative Users Obtain Potentially Sensitive Information
Entry
Created: 06/25/2016 11:01Updated: 08/24/2022 14:58
Changes: 06/25/2016 11:01 (39), 05/17/2018 23:26 (20), 08/24/2022 14:53 (2), 08/24/2022 14:57 (11), 08/24/2022 14:58 (2)
Complete: 🔍
Cache ID: 216:A21:103
VulDB is the best source for vulnerability data and more expert information about this specific topic.

No comments yet. Languages: en.
Please log in to comment.