Lucene search

K
cve[email protected]CVE-2019-6642
HistoryJul 01, 2019 - 9:15 p.m.

CVE-2019-6642

2019-07-0121:15:11
web.nvd.nist.gov
112
cve-2019-6642
big-ip
privilege escalation
authenticated users
tmsh interface
nvd

9 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

42.9%

In BIG-IP 15.0.0, 14.0.0-14.1.0.5, 13.0.0-13.1.1.5, 12.1.0-12.1.4.2, and 11.5.2-11.6.4, BIG-IQ 6.0.0-6.1.0 and 5.1.0-5.4.0, iWorkflow 2.3.0, and Enterprise Manager 3.1.1, authenticated users with the ability to upload files (via scp, for example) can escalate their privileges to allow root shell access from within the TMOS Shell (tmsh) interface. The tmsh interface allows users to execute a secondary program via tools like sftp or scp.

Affected configurations

NVD
Node
f5big-ip_access_policy_managerRange11.5.211.6.4
OR
f5big-ip_access_policy_managerRange12.1.012.1.4.2
OR
f5big-ip_access_policy_managerRange13.0.013.1.1.5
OR
f5big-ip_access_policy_managerRange14.0.014.1.0.5
OR
f5big-ip_access_policy_managerMatch15.0.0
Node
f5big-ip_advanced_firewall_managerRange11.5.211.6.4
OR
f5big-ip_advanced_firewall_managerRange12.1.012.1.4.2
OR
f5big-ip_advanced_firewall_managerRange13.0.013.1.1.5
OR
f5big-ip_advanced_firewall_managerRange14.0.014.1.0.5
OR
f5big-ip_advanced_firewall_managerMatch15.0.0
Node
f5big-ip_application_acceleration_managerRange11.5.211.6.4
OR
f5big-ip_application_acceleration_managerRange12.1.012.1.4.2
OR
f5big-ip_application_acceleration_managerRange13.0.013.1.1.5
OR
f5big-ip_application_acceleration_managerRange14.0.014.1.0.5
OR
f5big-ip_application_acceleration_managerMatch15.0.0
Node
f5big-ip_link_controllerRange11.5.211.6.4
OR
f5big-ip_link_controllerRange12.1.012.1.4.2
OR
f5big-ip_link_controllerRange13.0.013.1.1.5
OR
f5big-ip_link_controllerRange14.0.014.1.0.5
OR
f5big-ip_link_controllerMatch15.0.0
Node
f5big-ip_policy_enforcement_managerRange11.5.211.6.4
OR
f5big-ip_policy_enforcement_managerRange12.1.012.1.4.2
OR
f5big-ip_policy_enforcement_managerRange13.0.013.1.1.5
OR
f5big-ip_policy_enforcement_managerRange14.0.014.1.0.5
OR
f5big-ip_policy_enforcement_managerMatch15.0.0
Node
f5big-ip_webacceleratorRange11.5.211.6.4
OR
f5big-ip_webacceleratorRange12.1.012.1.4.2
OR
f5big-ip_webacceleratorRange13.0.013.1.1.5
OR
f5big-ip_webacceleratorRange14.0.014.1.0.5
OR
f5big-ip_webacceleratorMatch15.0.0
Node
f5big-ip_application_security_managerRange11.5.211.6.4
OR
f5big-ip_application_security_managerRange12.1.012.1.4.2
OR
f5big-ip_application_security_managerRange13.0.013.1.1.5
OR
f5big-ip_application_security_managerRange14.0.014.1.0.5
OR
f5big-ip_application_security_managerMatch15.0.0
Node
f5big-ip_local_traffic_managerRange11.5.211.6.4
OR
f5big-ip_local_traffic_managerRange12.1.012.1.4.2
OR
f5big-ip_local_traffic_managerRange13.0.013.1.1.5
OR
f5big-ip_local_traffic_managerRange14.0.014.1.0.5
OR
f5big-ip_local_traffic_managerMatch15.0.0
Node
f5big-ip_fraud_protection_serviceRange11.5.211.6.4
OR
f5big-ip_fraud_protection_serviceRange12.1.012.1.4.2
OR
f5big-ip_fraud_protection_serviceRange13.0.013.1.1.5
OR
f5big-ip_fraud_protection_serviceRange14.0.014.1.0.5
OR
f5big-ip_fraud_protection_serviceMatch15.0.0
Node
f5big-ip_global_traffic_managerRange11.5.211.6.4
OR
f5big-ip_global_traffic_managerRange12.1.012.1.4.2
OR
f5big-ip_global_traffic_managerRange13.0.013.1.1.5
OR
f5big-ip_global_traffic_managerRange14.0.014.1.0.5
OR
f5big-ip_global_traffic_managerMatch15.0.0
Node
f5big-ip_analyticsRange11.5.211.6.4
OR
f5big-ip_analyticsRange12.1.012.1.4.2
OR
f5big-ip_analyticsRange13.0.013.1.1.5
OR
f5big-ip_analyticsRange14.0.014.1.0.5
OR
f5big-ip_analyticsMatch15.0.0
Node
f5big-ip_edge_gatewayRange11.5.211.6.4
OR
f5big-ip_edge_gatewayRange12.1.012.1.4.2
OR
f5big-ip_edge_gatewayRange13.0.013.1.1.5
OR
f5big-ip_edge_gatewayRange14.0.014.1.0.5
OR
f5big-ip_edge_gatewayMatch15.0.0
Node
f5big-ip_domain_name_systemRange11.5.211.6.4
OR
f5big-ip_domain_name_systemRange12.1.012.1.4.2
OR
f5big-ip_domain_name_systemRange13.0.013.1.1.5
OR
f5big-ip_domain_name_systemRange14.0.014.1.0.5
OR
f5big-ip_domain_name_systemMatch15.0.0
Node
f5big-iq_centralized_managementRange5.1.05.4.0
OR
f5big-iq_centralized_managementRange6.0.06.1.0
Node
f5enterprise_managerMatch3.1.1
OR
f5iworkflowMatch2.3.0

CNA Affected

[
  {
    "product": "BIG-IP, BIG-IQ, iWorkflow, Enterprise Manager",
    "vendor": "F5",
    "versions": [
      {
        "status": "affected",
        "version": "BIG-IP 15.0.0"
      },
      {
        "status": "affected",
        "version": "14.0.0-14.1.0.5"
      },
      {
        "status": "affected",
        "version": "13.0.0-13.1.1.5"
      },
      {
        "status": "affected",
        "version": "12.1.0-12.1.4.2"
      },
      {
        "status": "affected",
        "version": "11.5.2-11.6.4"
      },
      {
        "status": "affected",
        "version": "BIG-IQ 6.0.0-6.1.0"
      },
      {
        "status": "affected",
        "version": "5.1.0-5.4.0"
      },
      {
        "status": "affected",
        "version": "iWorkflow 2.3.0"
      },
      {
        "status": "affected",
        "version": "Enterprise Manager 3.1.1"
      }
    ]
  }
]

9 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

42.9%

Related for CVE-2019-6642