Show plain JSON{"id": "CVE-2016-5745", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 10.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 3.9}]}, "published": "2016-10-05T16:59:03.790", "references": [{"url": "http://www.securityfocus.com/bid/94240", "source": "cve@mitre.org"}, {"url": "http://www.securitytracker.com/id/1036927", "tags": ["Third Party Advisory", "VDB Entry"], "source": "cve@mitre.org"}, {"url": "https://support.f5.com/kb/en-us/solutions/public/k/64/sol64743453.html", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/94240", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securitytracker.com/id/1036927", "tags": ["Third Party Advisory", "VDB Entry"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://support.f5.com/kb/en-us/solutions/public/k/64/sol64743453.html", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-284"}]}], "descriptions": [{"lang": "en", "value": "F5 BIG-IP LTM systems 11.x before 11.2.1 HF16, 11.3.x, 11.4.x before 11.4.1 HF11, 11.5.0, 11.5.1 before HF11, 11.5.2, 11.5.3, 11.5.4 before HF2, 11.6.0 before HF8, 11.6.1 before HF1, 12.0.0 before HF4, and 12.1.0 before HF2 allow remote attackers to modify or extract system configuration files via vectors involving NAT64."}, {"lang": "es", "value": "Sistemas F5 BIG-IP LTM 11.x en versiones anteriores a 11.2.1 HF16, 11.3.x, 11.4.x en versiones anteriores a 11.4.1 HF11, 11.5.0, 11.5.1 en versiones anteriores a HF11, 11.5.2, 11.5.3, 11.5.4 en versiones anteriores a HF2, 11.6.0 en versiones anteriores a HF8, 11.6.1 en versiones anteriores a HF1, 12.0.0 en versiones anteriores a HF4 y 12.1.0 en versiones anteriores a HF2 permiten a atacantes remotos modificar o extraer archivos de configuraci\u00f3n de sistema a trav\u00e9s de vectores relacionados con NAT64."}], "lastModified": "2024-11-21T02:54:56.613", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C72FF118-E7A5-42DE-A9A0-703E71615045"}, {"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "45A53EC8-8E16-42DC-9FD8-58493C5D1EC5"}, {"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DDB299B4-5893-4D91-8E5B-09BDFDB86FEF"}, {"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F9EA336A-8055-4DA8-8F79-07C4ADE83E32"}, {"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "624EFAEB-15C2-422F-BAD1-D0BC37878349"}, {"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "76C1525D-46DE-4362-BBAD-095BBF718990"}, {"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "259C05BB-6349-4005-9372-21623DC5002D"}, {"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E5D27D4A-BD5C-4FA9-AA72-F7956298DE06"}, {"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "12F86EB5-D581-4103-A802-44D968BA8D55"}, {"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "36F383ED-8CB5-400D-BFDB-BD5B8CD8C7AE"}, {"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E6203A11-82C3-4ABA-94E9-085BFF1A0E4C"}, {"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "06224D59-35F8-4168-80C5-CF5B17E99050"}, {"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2FF5A5F6-4BA3-4276-8679-B5560EACF2E0"}, {"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A2B502F2-404C-463B-B6BE-87489DC881F9"}, {"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:12.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "44F1E5E0-BD63-4A4A-BC4E-A1D5495F8B5C"}, {"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:12.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A82C7B1C-E195-4D94-B604-78FB464C4F81"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}