Denial of Service Vulnerability in F5 BIG-IP Software by Malicious VCMP Root User
CVE-2018-5518
Key Information:
- Vendor
- F5
- Vendor
- CVE Published:
- 2 May 2018
Summary
A vulnerability exists in F5 BIG-IP software that allows malicious root users with access to a Virtual Clustered Multiprocessing (VCMP) guest to disrupt the service of adjacent VCMP guests hosted on the same system. Specifically, when this vulnerability is exploited, the vCMPd process on the affected VCMP guest may restart, resulting in potential service interruptions and the generation of core files. It is important to note that this vulnerability can only be leveraged when the VCMP guest is configured in 'host-only' or 'bridged' mode; isolated guests are unaffected. Additionally, guests running in 'Appliance Mode' may face risks, but no exploit can be executed from these types of guests. To successfully exploit this vulnerability, root access to the vulnerable VCMP guest is required.
Affected Version(s)
BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, WebAccelerator, WebSafe) 13.0.0-13.1.0.5
BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, WebAccelerator, WebSafe) 12.0.0-12.1.3.3
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved