F5 iControl iCall::Script Root Command Execution
Posted by deepcore on November 19, 2015 – 4:37 pm
This Metasploit module exploits an authenticated privilege escalation vulnerability in the iControl API on the F5 BIG-IP LTM (and likely other F5 devices). This requires valid credentials and the Resource Administrator role. The exploit should work on BIG-IP 11.3.0 – 11.6.0, (11.5.x < 11.5.3 HF2 or 11.6.x < 11.6.0 HF6, see references for more details).
Post a reply
You must be logged in to post a comment.