Описание
BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Link Controller, and PEM 12.0.0 before HF1 on the 2000, 4000, 5000, 7000, and 10000 platforms do not properly sync passwords with the Always-On Management (AOM) subsystem, which might allow remote attackers to obtain login access to AOM via an (1) expired or (2) default password.
BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Link Controller, and PEM 12.0.0 before HF1 on the 2000, 4000, 5000, 7000, and 10000 platforms do not properly sync passwords with the Always-On Management (AOM) subsystem, which might allow remote attackers to obtain login access to AOM via an (1) expired or (2) default password.
Связанные уязвимости
BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Link Controller, and PEM 12.0.0 before HF1 on the 2000, 4000, 5000, 7000, and 10000 platforms do not properly sync passwords with the Always-On Management (AOM) subsystem, which might allow remote attackers to obtain login access to AOM via an (1) expired or (2) default password.
Уязвимость средства контроля доступа и удаленной аутентификации BIG-IP Access Policy Manager, средства анализа состояния инфраструктуры BIG-IP Analytics, системы контроля и управления сетевым трафиком BIG-IP Policy Enforcement Manager, DNS-сервера BIG-IP DNS, средства защиты приложений BIG-IP Application Security Manager, системы балансировки локального трафика BIG-IP Local Traffic Manager, средства доставки приложений BIG-IP Application Acceleration Manager, системы балансировки интернет-трафика BIG-IP Link Controller, межсетевого экрана BIG-IP Advanced Firewall Manager, позволяющая нарушителю получить авторизованный доступ к подсистеме Always-On Management