CVE-2018-5516

MEDIUM

F5 BIG-IP <13.1.0.5 - Privilege Escalation

Title source: llm
STIX 2.1

Description

On F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.2, or 11.2.1-11.6.3.1, Enterprise Manager 3.1.1, BIG-IQ Centralized Management 5.0.0-5.4.0 or 4.6.0, BIG-IQ Cloud and Orchestration 1.0.0, or F5 iWorkflow 2.0.2-2.3.0, authenticated users granted TMOS Shell (tmsh) access can access objects on the file system which would normally be disallowed by tmsh restrictions. This allows for authenticated, low privileged attackers to exfiltrate objects on the file system which should not be allowed.

References (3)

Core 3
Core References
Vendor Advisory x_refsource_confirm
https://support.f5.com/csp/article/K37442533
Third Party Advisory, VDB Entry vdb-entry x_refsource_sectrack
http://www.securitytracker.com/id/1040800
Third Party Advisory, VDB Entry vdb-entry x_refsource_sectrack
http://www.securitytracker.com/id/1040799

Scores

CVSS v3 4.7
EPSS 0.0011
EPSS Percentile 29.7%
Attack Vector LOCAL
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

Details

CWE
CWE-732
Status published
Products (18)
f5/big-ip_access_policy_manager 11.2.1 - 11.6.3
f5/big-ip_advanced_firewall_manager 11.2.1 - 11.6.3
f5/big-ip_analytics 11.2.1 - 11.6.3
f5/big-ip_application_acceleration_manager 11.2.1 - 11.6.3
f5/big-ip_application_security_manager 11.2.1 - 11.6.3
f5/big-ip_domain_name_system 11.2.1 - 11.6.3
f5/big-ip_edge_gateway 11.2.1 - 11.6.3
f5/big-ip_enterprise_manager 3.1.1
f5/big-ip_global_traffic_manager 11.2.1 - 11.6.3
f5/big-ip_link_controller 11.2.1 - 11.6.3
... and 8 more
Published May 02, 2018
Tracked Since Feb 18, 2026