Vulnerability Details : CVE-2012-2053
The sudoers file in the Linux system configuration in F5 FirePass 6.0.0 through 6.1.0 and 7.0.0 does not require a password for executing commands as root, which allows local users to gain privileges via the sudo program, as demonstrated by the user account that executes PHP scripts, a different vulnerability than CVE-2012-1777.
Products affected by CVE-2012-2053
- cpe:2.3:h:f5:firepass:6.0:*:*:*:*:*:*:*
- cpe:2.3:h:f5:firepass:7.0.0:*:*:*:*:*:*:*
- cpe:2.3:h:f5:firepass:6.1.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-2053
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-2053
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST |
CWE ids for CVE-2012-2053
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-2053
-
https://www.sec-consult.com/files/20120328-0_F5_FirePass_SSL_VPN_unauthenticated_remote_root_v1.0.txt
Page not found | SEC ConsultExploit
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/74813
Firepass sudoers file privilege escalation CVE-2012-2053 Vulnerability Report
Jump to