MEDIUM · 4.9

CVE-2018-5519

On F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.3, or 11.2.1-11.6.3.1, administrative users by way of undisclosed methods can exploit the ssldump utility to write to arbitrary file paths. For users who do...

Vulnerability Description

On F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.3, or 11.2.1-11.6.3.1, administrative users by way of undisclosed methods can exploit the ssldump utility to write to arbitrary file paths. For users who do not have Advanced Shell access (for example, any user when licensed for Appliance Mode), this allows more permissive file access than intended.

CVSS Score

4.9

MEDIUM

CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
HIGH
Availability
NONE

Affected Products

VendorProductVersions
F5Big-Ip Local Traffic Manager>= 11.2.1, <= 11.6.3
F5Big-Ip Application Acceleration Manager>= 11.2.1, <= 11.6.3
F5Big-Ip Advanced Firewall Manager>= 11.2.1, <= 11.6.3
F5Big-Ip Analytics>= 11.2.1, <= 11.6.3
F5Big-Ip Access Policy Manager>= 11.2.1, <= 11.6.3
F5Big-Ip Application Security Manager>= 11.2.1, <= 11.6.3
F5Big-Ip Edge Gateway>= 11.2.1, <= 11.6.3
F5Big-Ip Global Traffic Manager>= 11.2.1, <= 11.6.3
F5Big-Ip Link Controller>= 11.2.1, <= 11.6.3
F5Big-Ip Policy Enforcement Manager>= 11.2.1, <= 11.6.3
F5Big-Ip Webaccelerator>= 11.2.1, <= 11.6.3
F5Big-Ip Websafe>= 11.2.1, <= 11.6.3
F5Big-Ip Domain Name System>= 11.2.1, <= 11.6.3

References

FAQ

What is CVE-2018-5519?

CVE-2018-5519 is a vulnerability with a CVSS score of 4.9 (MEDIUM). On F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.3, or 11.2.1-11.6.3.1, administrative users by way of undisclosed methods can exploit the ssldump utility to write to arbitrary file paths. For users who do...

How severe is CVE-2018-5519?

CVE-2018-5519 has been rated MEDIUM with a CVSS base score of 4.9/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2018-5519?

Check the references section above for vendor advisories and patch information. Affected products include: F5 Big-Ip Local Traffic Manager, F5 Big-Ip Application Acceleration Manager, F5 Big-Ip Advanced Firewall Manager, F5 Big-Ip Analytics, F5 Big-Ip Access Policy Manager.