Vulnerability Details : CVE-2014-3220
F5 BIG-IQ Cloud and Security 4.0.0 through 4.1.0 allows remote authenticated users to change the password of arbitrary users via the name parameter in a request to the user's page in mgmt/shared/authz/users/.
Products affected by CVE-2014-3220
- cpe:2.3:h:f5:big-iq:4.1.0.2013.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-3220
1.35%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 86 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-3220
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.0
|
HIGH | AV:N/AC:L/Au:S/C:C/I:C/A:C |
8.0
|
10.0
|
NIST |
CWE ids for CVE-2014-3220
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-3220
-
http://seclists.org/fulldisclosure/2014/May/16
Full Disclosure: Re: F5 BIG-IQ authed arbitrary user password change
-
http://www.securityfocus.com/bid/67191
F5 Networks BIG-IQ Remote Privilege Escalation Vulnerability
-
http://www.securityfocus.com/bid/67227
Multiple F5 BIG-IQ Products Configuration Utility Access Control Security Bypass Vulnerability
-
http://support.f5.com/kb/en-us/solutions/public/15000/200/sol15229.html
-
http://seclists.org/fulldisclosure/2014/May/11
Full Disclosure: Re: F5 BIG-IQ authed arbitrary user password changeExploit
-
http://volatile-minds.blogspot.com/2014/05/f5-big-iq-v41020130-authenticated.html
Volatile Minds: F5 BIG-IQ v4.1.0.2013.0 authenticated arbitrary user password change
-
http://www.exploit-db.com/exploits/33143
F5 BIG-IQ 4.1.0.2013.0 - Privilege Escalation (Metasploit) - Hardware remote Exploit
-
https://gist.github.com/brandonprry/2e73acd63094fa2a4f63
Sometimes the module is too fast and fails to change the root password. Just run it again. ยท GitHubExploit
-
http://seclists.org/fulldisclosure/2014/May/10
Full Disclosure: F5 BIG-IQ authed arbitrary user password change
Jump to