CVE-2007-0188
Published Jan 12, 2007
Last updated 16 years ago
Overview
- Description
- F5 FirePass 5.4 through 5.5.1 does not properly enforce host access restrictions when a client uses a single integer (dword) representation of an IP address ("dotless IP address"), which allows remote authenticated users to connect to the FirePass administrator console and certain other network resources.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.5
- Impact score
- 6.4
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:firepass:5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D1F4903-B7FB-4F0E-A4F0-5BC813F5BA22" }, { "criteria": "cpe:2.3:h:f5:firepass:5.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FD7A44F4-212D-445E-A283-8CC68C7415DE" }, { "criteria": "cpe:2.3:h:f5:firepass:5.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8BEFC14C-CD35-43BD-BCC9-CD437DAC688D" }, { "criteria": "cpe:2.3:h:f5:firepass:5.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DAE893BF-A7DA-4FEC-9290-0FD202EC0D8F" }, { "criteria": "cpe:2.3:h:f5:firepass:5.4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3347FD7A-49F6-464B-A3DA-4D9DD8B0955C" }, { "criteria": "cpe:2.3:h:f5:firepass:5.4.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "34DE479A-5D1B-4A21-94AE-D613BA9E6120" }, { "criteria": "cpe:2.3:h:f5:firepass:5.4.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A9767F21-1539-4313-B2DA-2D368CADDA66" }, { "criteria": "cpe:2.3:h:f5:firepass:5.4.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0286D438-6F1B-4D91-9A5B-CF12FEDDF427" }, { "criteria": "cpe:2.3:h:f5:firepass:5.4.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0ADF9E53-79F7-4678-A599-20385EEF993C" }, { "criteria": "cpe:2.3:h:f5:firepass:5.4.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E646309D-AAF0-48D7-B8FF-A57DFAADCF05" }, { "criteria": "cpe:2.3:h:f5:firepass:5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "186F19A2-C1F4-4D87-828B-6825B89F9C9D" }, { "criteria": "cpe:2.3:h:f5:firepass:5.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "48D051A9-891E-4C1F-904C-058B37F95441" }, { "criteria": "cpe:2.3:h:f5:firepass:5.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4982DC66-27A6-4A23-A8C7-CF3CC4A5F2BF" }, { "criteria": "cpe:2.3:h:f5:firepass:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0BDC49A3-D95D-4DDA-AAFD-4C58C7BA5042" } ], "operator": "OR" } ] } ]