CVE-2016-5745
Published Oct 5, 2016
Last updated 8 years ago
Overview
- Description
- F5 BIG-IP LTM systems 11.x before 11.2.1 HF16, 11.3.x, 11.4.x before 11.4.1 HF11, 11.5.0, 11.5.1 before HF11, 11.5.2, 11.5.3, 11.5.4 before HF2, 11.6.0 before HF8, 11.6.1 before HF1, 12.0.0 before HF4, and 12.1.0 before HF2 allow remote attackers to modify or extract system configuration files via vectors involving NAT64.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-284
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C72FF118-E7A5-42DE-A9A0-703E71615045" }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "45A53EC8-8E16-42DC-9FD8-58493C5D1EC5" }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DDB299B4-5893-4D91-8E5B-09BDFDB86FEF" }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F9EA336A-8055-4DA8-8F79-07C4ADE83E32" }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "624EFAEB-15C2-422F-BAD1-D0BC37878349" }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "76C1525D-46DE-4362-BBAD-095BBF718990" }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "259C05BB-6349-4005-9372-21623DC5002D" }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E5D27D4A-BD5C-4FA9-AA72-F7956298DE06" }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "12F86EB5-D581-4103-A802-44D968BA8D55" }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "36F383ED-8CB5-400D-BFDB-BD5B8CD8C7AE" }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E6203A11-82C3-4ABA-94E9-085BFF1A0E4C" }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "06224D59-35F8-4168-80C5-CF5B17E99050" }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2FF5A5F6-4BA3-4276-8679-B5560EACF2E0" }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A2B502F2-404C-463B-B6BE-87489DC881F9" }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:12.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "44F1E5E0-BD63-4A4A-BC4E-A1D5495F8B5C" }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:12.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A82C7B1C-E195-4D94-B604-78FB464C4F81" } ], "operator": "OR" } ] } ]