Vulnerability CVE-2018-5511


Published: 2018-04-13   Modified: 2018-04-15

Description:
On F5 BIG-IP 13.1.0-13.1.0.3 or 13.0.0, when authenticated administrative users execute commands in the Traffic Management User Interface (TMUI), also referred to as the BIG-IP Configuration utility, restrictions on allowed commands may not be enforced.

Type:

CWE-284

(Improper Access Control)

Vendor: F5
Product: Big-ip enterprise manager 
Version: 3.1.1;
Product: Big-ip analytics 
Version: 13.1.0; 13.0.0;
Product: Big-ip policy enforcement manager 
Version: 13.1.0; 13.0.0;
Product: Big-ip application acceleration manager 
Version: 13.1.0; 13.0.0;
Product: Big-ip webaccelerator 
Version: 13.1.0; 13.0.0;
Product: Big-ip application security manager 
Version: 13.1.0; 13.0.0;
Product: Big-ip websafe 
Version: 13.1.0; 13.0.0;
Product: Big-ip global traffic manager 
Version: 13.1.0; 13.0.0;
Product: Big-ip domain name system 
Version: 13.1.0; 13.0.0;
Product: Big-ip access policy manager 
Version: 13.1.0; 13.0.0;
Product: Big-ip link controller 
Version: 13.1.0; 13.0.0;
Product: Big-ip edge gateway 
Version: 13.1.0; 13.0.0;
Product: Big-ip advanced firewall manager 
Version: 13.1.0; 13.0.0;
Product: Big-ip local traffic manager 
Version: 13.1.0; 13.0.0;
Vendor: Vmware
Product: Workstation player 
Version: 15.0.2;
Product: Workstation 
Version: 14.1.5;

CVSS2 => (AV:N/AC:L/Au:S/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.5/10
6.4/10
8/10
Exploit range
Attack complexity
Authentication
Remote
Low
Single time
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial

 References:
http://packetstormsecurity.com/files/152213/VMware-Host-VMX-Process-Impersonation-Hijack-Privilege-Escalation.html
https://support.f5.com/csp/article/K30500703
https://www.exploit-db.com/exploits/46600/

Related CVE
CVE-2019-5528
VMware ESXi 6.5 suffers from partial denial of service vulnerability in hostd process. Patch ESXi650-201907201-UG for this issue is available.
CVE-2019-5525
VMware Workstation (15.x before 15.1.0) contains a use-after-free vulnerability in the Advanced Linux Sound Architecture (ALSA) backend. A malicious user with normal user privileges on the guest machine may exploit this issue in conjunction with othe...
CVE-2019-5522
VMware Tools for Windows update addresses an out of bounds read vulnerability in vm3dmp driver which is installed with vmtools in Windows guest machines. This issue is present in versions 10.2.x and 10.3.x prior to 10.3.10. A local attacker with non-...
CVE-2019-5526
VMware Workstation (15.x before 15.1.0) contains a DLL hijacking issue because some DLL files are improperly loaded by the application. Successful exploitation of this issue may allow attackers with normal user privileges to escalate their privileges...
CVE-2019-5520
VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201903001), Workstation (15.x before 15.0.3 and 14.x before 14.1.6), Fusion (11.x before 11.0.3 and 10.x before 10.1.6) updates address an out-of-bounds read vulnerability. Exploitat...
CVE-2019-5517
VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201903001), Workstation (15.x before 15.0.3 and 14.x before 14.1.6), Fusion (11.x before 11.0.3 and 10.x before 10.1.6) contain multiple out-of-bounds read vulnerabilities in the sha...
CVE-2019-5516
VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201903001), Workstation (15.x before 15.0.3 and 14.x before 14.1.6), Fusion (11.x before 11.0.3 and 10.x before 10.1.6) updates address an out-of-bounds vulnerability with the vertex...
CVE-2019-5515
VMware Workstation (15.x before 15.0.3, 14.x before 14.1.6) and Fusion (11.x before 11.0.3, 10.x before 10.1.6) updates address an out-of-bounds write vulnerability in the e1000 and e1000e virtual network adapters. Exploitation of this issue may lead...

Copyright 2019, cxsecurity.com

 

Back to Top