Vulnerability Name: | CVE-2012-2053 (CCN-74813) | ||||||||
Assigned: | 2012-02-03 | ||||||||
Published: | 2012-02-03 | ||||||||
Updated: | 2017-12-20 | ||||||||
Summary: | The sudoers file in the Linux system configuration in F5 FirePass 6.0.0 through 6.1.0 and 7.0.0 does not require a password for executing commands as root, which allows local users to gain privileges via the sudo program, as demonstrated by the user account that executes PHP scripts, a different vulnerability than CVE-2012-1777. | ||||||||
CVSS v3 Severity: | 9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C) 5.8 Medium (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:U/RC:UR)
5.8 Medium (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:U/RC:UR)
| ||||||||
Vulnerability Type: | CWE-264 | ||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||
References: | Source: MITRE Type: CNA CVE-2012-2053 Source: CCN Type: F5 Web site Firepass Source: CCN Type: OSVDB ID: 81501 F5 FirePass Command Execution Authentication Weakness Local Privilege Escalation Source: XF Type: UNKNOWN firepass-sudoers-priv-escalation(74813) Source: XF Type: UNKNOWN firepass-sudoers-priv-escalation(74813) Source: CCN Type: SEC Consult Vulnerability Lab Security Advisory 20120328-0 Unauthenticated remote root through SQL injection Source: MISC Type: Exploit https://www.sec-consult.com/files/20120328-0_F5_FirePass_SSL_VPN_unauthenticated_remote_root_v1.0.txt | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |