F5 iControl iCall::Script Root Command Execution

Discussion in 'News Aggregator' started by Packet Storm, 19 Nov 2015.

  1. Packet Storm

    Packet Storm Guest

    This Metasploit module exploits an authenticated privilege escalation vulnerability in the iControl API on the F5 BIG-IP LTM (and likely other F5 devices). This requires valid credentials and the Resource Administrator role. The exploit should work on BIG-IP 11.3.0 - 11.6.0, (11.5.x < 11.5.3 HF2 or 11.6.x < 11.6.0 HF6, see references for more details).

    Continue reading...
     

Share This Page

Loading...