Authenticated users granted TMOS Shell (tmsh) access can access objects on the file system which would normally be disallowed by tmsh restrictions. This allows for authenticated, low privileged attackers to exfiltrate objects on the file system which should not be allowed. (CVE-2018-5516)
Impact
This vulnerability allows unauthorized privileges to authenticated administrative users with tmsh access.