Deploy autonomous AI agents that reason, exploit, and validate complex vulnerability chains — not another scanner, an agentic system that thinks like a senior pentester.
CVE-2017-6131 is a low severity vulnerability with a CVSS score of 0.0. No known exploits currently, and patches are available.
Lower probability of exploitation
EPSS predicts the probability of exploitation in the next 30 days based on real-world threat data, complementing CVSS severity scores with actual risk assessment.
In some circumstances, an F5 BIG-IP version 12.0.0 to 12.1.2 and 13.0.0 Azure cloud instance may contain a default administrative password which could be used to remotely log into the BIG-IP system. The impacted administrative account is the Azure instance administrative user that was created at deployment. The root and admin accounts are not vulnerable. An attacker may be able to remotely access the BIG-IP host via SSH.
| Vendor | Product |
|---|---|
| F5 | Big IP Policy Enforcement Manager |
| F5 | Big IP Advanced Firewall Manager |
| F5 | Big IP Domain Name System |
| F5 | Big IP Websafe |
| F5 | Big IP Access Policy Manager |
| F5 | Big IP Local Traffic Manager |
| F5 | Big IP Link Controller |
| F5 | Big IP Application Security Manager |
| F5 | Big IP Application Acceleration Manager |
Please cite this page when referencing data from Strobes VI. Proper attribution helps support our vulnerability intelligence research.