Vulnerability Description
On F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.3, or 11.2.1-11.6.3.1, administrative users by way of undisclosed methods can exploit the ssldump utility to write to arbitrary file paths. For users who do not have Advanced Shell access (for example, any user when licensed for Appliance Mode), this allows more permissive file access than intended.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| F5 | Big-Ip Local Traffic Manager | >= 11.2.1, <= 11.6.3 |
| F5 | Big-Ip Application Acceleration Manager | >= 11.2.1, <= 11.6.3 |
| F5 | Big-Ip Advanced Firewall Manager | >= 11.2.1, <= 11.6.3 |
| F5 | Big-Ip Analytics | >= 11.2.1, <= 11.6.3 |
| F5 | Big-Ip Access Policy Manager | >= 11.2.1, <= 11.6.3 |
| F5 | Big-Ip Application Security Manager | >= 11.2.1, <= 11.6.3 |
| F5 | Big-Ip Edge Gateway | >= 11.2.1, <= 11.6.3 |
| F5 | Big-Ip Global Traffic Manager | >= 11.2.1, <= 11.6.3 |
| F5 | Big-Ip Link Controller | >= 11.2.1, <= 11.6.3 |
| F5 | Big-Ip Policy Enforcement Manager | >= 11.2.1, <= 11.6.3 |
| F5 | Big-Ip Webaccelerator | >= 11.2.1, <= 11.6.3 |
| F5 | Big-Ip Websafe | >= 11.2.1, <= 11.6.3 |
| F5 | Big-Ip Domain Name System | >= 11.2.1, <= 11.6.3 |
References
- http://www.securitytracker.com/id/1040803Third Party AdvisoryVDB Entry
- https://support.f5.com/csp/article/K46121888Vendor Advisory
- http://www.securitytracker.com/id/1040803Third Party AdvisoryVDB Entry
- https://support.f5.com/csp/article/K46121888Vendor Advisory
FAQ
What is CVE-2018-5519?
CVE-2018-5519 is a vulnerability with a CVSS score of 4.9 (MEDIUM). On F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.3, or 11.2.1-11.6.3.1, administrative users by way of undisclosed methods can exploit the ssldump utility to write to arbitrary file paths. For users who do...
How severe is CVE-2018-5519?
CVE-2018-5519 has been rated MEDIUM with a CVSS base score of 4.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-5519?
Check the references section above for vendor advisories and patch information. Affected products include: F5 Big-Ip Local Traffic Manager, F5 Big-Ip Application Acceleration Manager, F5 Big-Ip Advanced Firewall Manager, F5 Big-Ip Analytics, F5 Big-Ip Access Policy Manager.