Lucene search

K
cve[email protected]CVE-2018-15321
HistoryOct 31, 2018 - 2:29 p.m.

CVE-2018-15321

2018-10-3114:29:00
CWE-269
web.nvd.nist.gov
26
cve-2018-15321
big-ip
appliance mode
security
tmsh
system files

5.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:N/I:P/A:P

4.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N

5.1 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

19.5%

When BIG-IP 14.0.0-14.0.0.2, 13.0.0-13.1.0.5, 12.1.0-12.1.3.5, 11.6.0-11.6.3.2, or 11.2.1-11.5.6, BIG-IQ Centralized Management 5.0.0-5.4.0 or 4.6.0, BIG-IQ Cloud and Orchestration 1.0.0, iWorkflow 2.1.0-2.3.0, or Enterprise Manager 3.1.1 is licensed for Appliance Mode, Admin and Resource administrator roles can by-pass BIG-IP Appliance Mode restrictions to overwrite critical system files. Attackers of high privilege level are able to overwrite critical system files which bypasses security controls in place to limit TMSH commands. This is possible with an administrator or resource administrator roles when granted TMSH. Resource administrator roles must have TMSH access in order to perform this attack.

Affected configurations

NVD
Node
f5big-ip_local_traffic_managerRange11.2.111.5.6
OR
f5big-ip_local_traffic_managerRange11.6.011.6.3.2
OR
f5big-ip_local_traffic_managerRange12.1.012.1.3.5
OR
f5big-ip_local_traffic_managerRange13.0.013.1.0.7
OR
f5big-ip_local_traffic_managerRange14.0.014.0.0.2
Node
f5big-ip_advanced_firewall_managerRange11.2.111.5.6
OR
f5big-ip_advanced_firewall_managerRange11.6.011.6.3.2
OR
f5big-ip_advanced_firewall_managerRange12.1.012.1.3.5
OR
f5big-ip_advanced_firewall_managerRange13.0.013.1.0.7
OR
f5big-ip_advanced_firewall_managerRange14.0.014.0.0.2
Node
f5big-ip_application_acceleration_managerRange11.2.111.5.6
OR
f5big-ip_application_acceleration_managerRange11.6.011.6.3.2
OR
f5big-ip_application_acceleration_managerRange12.1.012.1.3.5
OR
f5big-ip_application_acceleration_managerRange13.0.013.1.0.7
OR
f5big-ip_application_acceleration_managerRange14.0.014.0.0.2
Node
f5big-ip_analyticsRange11.2.111.5.6
OR
f5big-ip_analyticsRange11.6.011.6.3.2
OR
f5big-ip_analyticsRange12.1.012.1.3.5
OR
f5big-ip_analyticsRange13.0.013.1.0.7
OR
f5big-ip_analyticsRange14.0.014.0.0.2
Node
f5big-ip_access_policy_managerRange11.2.111.5.6
OR
f5big-ip_access_policy_managerRange11.6.011.6.3.2
OR
f5big-ip_access_policy_managerRange12.1.012.1.3.5
OR
f5big-ip_access_policy_managerRange13.0.013.1.0.7
OR
f5big-ip_access_policy_managerRange14.0.014.0.0.2
Node
f5big-ip_protocol_security_moduleRange11.2.111.5.6
OR
f5big-ip_protocol_security_moduleRange11.6.011.6.3.2
OR
f5big-ip_protocol_security_moduleRange12.1.012.1.3.5
OR
f5big-ip_protocol_security_moduleRange13.0.013.1.0.7
OR
f5big-ip_protocol_security_moduleRange14.0.014.0.0.2
Node
f5big-ip_domain_name_systemRange11.2.111.5.6
OR
f5big-ip_domain_name_systemRange11.6.011.6.3.2
OR
f5big-ip_domain_name_systemRange12.1.012.1.3.5
OR
f5big-ip_domain_name_systemRange13.0.013.1.0.7
OR
f5big-ip_domain_name_systemRange14.0.014.0.0.2
Node
f5big-ip_edge_gatewayRange11.2.111.5.6
OR
f5big-ip_edge_gatewayRange11.6.011.6.3.2
OR
f5big-ip_edge_gatewayRange12.1.012.1.3.5
OR
f5big-ip_edge_gatewayRange13.0.013.1.0.7
OR
f5big-ip_edge_gatewayRange14.0.014.0.0.2
Node
f5big-ip_fraud_protection_serviceRange11.2.111.5.6
OR
f5big-ip_fraud_protection_serviceRange11.6.011.6.3.2
OR
f5big-ip_fraud_protection_serviceRange12.1.012.1.3.5
OR
f5big-ip_fraud_protection_serviceRange13.0.013.1.0.7
OR
f5big-ip_fraud_protection_serviceRange14.0.014.0.0.2
Node
f5big-ip_global_traffic_managerRange11.2.111.5.6
OR
f5big-ip_global_traffic_managerRange11.6.011.6.3.2
OR
f5big-ip_global_traffic_managerRange12.1.012.1.3.5
OR
f5big-ip_global_traffic_managerRange13.0.013.1.0.7
OR
f5big-ip_global_traffic_managerRange14.0.014.0.0.2
Node
f5big-ip_link_controllerRange11.2.111.5.6
OR
f5big-ip_link_controllerRange11.6.011.6.3.2
OR
f5big-ip_link_controllerRange12.1.012.1.3.5
OR
f5big-ip_link_controllerRange13.0.013.1.0.7
OR
f5big-ip_link_controllerRange14.0.014.0.0.2
Node
f5big-ip_policy_enforcement_managerRange11.2.111.5.6
OR
f5big-ip_policy_enforcement_managerRange11.6.011.6.3.2
OR
f5big-ip_policy_enforcement_managerRange12.1.012.1.3.5
OR
f5big-ip_policy_enforcement_managerRange13.0.013.1.0.7
OR
f5big-ip_policy_enforcement_managerRange14.0.014.0.0.2
Node
f5big-ip_webacceleratorRange11.2.111.5.6
OR
f5big-ip_webacceleratorRange11.6.011.6.3.2
OR
f5big-ip_webacceleratorRange12.1.012.1.3.5
OR
f5big-ip_webacceleratorRange13.0.013.1.0.7
OR
f5big-ip_webacceleratorRange14.0.014.0.0.2
Node
f5enterprise_managerMatch3.1.1
Node
f5big-iq_centralized_managementRange5.0.05.4.0
OR
f5big-iq_centralized_managementMatch4.6.0
Node
f5big-iq_cloud_and_orchestrationMatch1.0.0
Node
f5iworkflowRange2.1.02.3.0

CNA Affected

[
  {
    "product": "BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, FPS, GTM, Link Controller, PEM, WebAccelerator), BIG-IQ Centralized Management, BIG-IQ Cloud and Orchestration, iWorkflow, Enterprise Manager",
    "vendor": "F5 Networks, Inc.",
    "versions": [
      {
        "status": "affected",
        "version": "14.0.0-14.0.0.2, 13.0.0-13.1.0.5, 12.1.0-12.1.3.5, 11.6.0-11.6.3.2, 11.2.1-11.5.6"
      }
    ]
  }
]

5.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:N/I:P/A:P

4.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N

5.1 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

19.5%

Related for CVE-2018-15321