Vulnerability CVE-2018-5511


Published: 2018-04-13   Modified: 2018-04-15

Description:
On F5 BIG-IP 13.1.0-13.1.0.3 or 13.0.0, when authenticated administrative users execute commands in the Traffic Management User Interface (TMUI), also referred to as the BIG-IP Configuration utility, restrictions on allowed commands may not be enforced.

Type:

CWE-284

(Improper Access Control)

Vendor: F5
Product: Big-ip enterprise manager 
Version: 3.1.1;
Product: Big-ip analytics 
Version: 13.1.0; 13.0.0;
Product: Big-ip policy enforcement manager 
Version: 13.1.0; 13.0.0;
Product: Big-ip application acceleration manager 
Version: 13.1.0; 13.0.0;
Product: Big-ip webaccelerator 
Version: 13.1.0; 13.0.0;
Product: Big-ip application security manager 
Version: 13.1.0; 13.0.0;
Product: Big-ip websafe 
Version: 13.1.0; 13.0.0;
Product: Big-ip global traffic manager 
Version: 13.1.0; 13.0.0;
Product: Big-ip domain name system 
Version: 13.1.0; 13.0.0;
Product: Big-ip access policy manager 
Version: 13.1.0; 13.0.0;
Product: Big-ip link controller 
Version: 13.1.0; 13.0.0;
Product: Big-ip edge gateway 
Version: 13.1.0; 13.0.0;
Product: Big-ip advanced firewall manager 
Version: 13.1.0; 13.0.0;
Product: Big-ip local traffic manager 
Version: 13.1.0; 13.0.0;
Vendor: Vmware
Product: Workstation player 
Version: 15.0.2;
Product: Workstation 
Version: 14.1.5;

CVSS2 => (AV:N/AC:L/Au:S/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.5/10
6.4/10
8/10
Exploit range
Attack complexity
Authentication
Remote
Low
Single time
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial

 References:
http://packetstormsecurity.com/files/152213/VMware-Host-VMX-Process-Impersonation-Hijack-Privilege-Escalation.html
https://support.f5.com/csp/article/K30500703
https://www.exploit-db.com/exploits/46600/

Related CVE
CVE-2019-5526
VMware Workstation (15.x before 15.1.0) contains a DLL hijacking issue because some DLL files are improperly loaded by the application. Successful exploitation of this issue may allow attackers with normal user privileges to escalate their privileges...
CVE-2019-5520
VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201903001), Workstation (15.x before 15.0.3 and 14.x before 14.1.6), Fusion (11.x before 11.0.3 and 10.x before 10.1.6) updates address an out-of-bounds read vulnerability. Exploitat...
CVE-2019-5517
VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201903001), Workstation (15.x before 15.0.3 and 14.x before 14.1.6), Fusion (11.x before 11.0.3 and 10.x before 10.1.6) contain multiple out-of-bounds read vulnerabilities in the sha...
CVE-2019-5516
VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201903001), Workstation (15.x before 15.0.3 and 14.x before 14.1.6), Fusion (11.x before 11.0.3 and 10.x before 10.1.6) updates address an out-of-bounds vulnerability with the vertex...
CVE-2019-5519
VMware ESXi (6.7 before ESXi670-201903001, 6.5 before ESXi650-201903001, 6.0 before ESXi600-201903001), Workstation (15.x before 15.0.4, 14.x before 14.1.7), Fusion (11.x before 11.0.3, 10.x before 10.1.6) contain a Time-of-check Time-of-use (TOCTOU)...
CVE-2019-5518
VMware ESXi (6.7 before ESXi670-201903001, 6.5 before ESXi650-201903001, 6.0 before ESXi600-201903001), Workstation (15.x before 15.0.4, 14.x before 14.1.7), Fusion (11.x before 11.0.3, 10.x before 10.1.6) contain an out-of-bounds read/write vulnerab...
CVE-2018-6982
VMware ESXi 6.7 without ESXi670-201811401-BG and VMware ESXi 6.5 without ESXi650-201811301-BG contain uninitialized stack memory usage in the vmxnet3 virtual network adapter which may lead to an information leak from host to guest.
CVE-2018-6981
VMware ESXi 6.7 without ESXi670-201811401-BG and VMware ESXi 6.5 without ESXi650-201811301-BG, VMware ESXi 6.0 without ESXi600-201811401-BG, VMware Workstation 15, VMware Workstation 14.1.3 or below, VMware Fusion 11, VMware Fusion 10.1.3 or below co...

Copyright 2019, cxsecurity.com

 

Back to Top