Sensitive File Overwrite Vulnerability in BIG-IP by F5 Networks
CVE-2019-6617

6.5MEDIUM

Summary

On certain versions of BIG-IP by F5 Networks, users assigned the Resource Administrator role can exploit a vulnerability that allows them to overwrite sensitive low-level files, such as '/etc/passwd', using SFTP. This occurs without requiring Advanced Shell access, which contravenes the defined restrictions for the Resource Administrator role. This flaw exposes critical system files to unauthorized modifications, potentially leading to unauthorized access and privilege escalation.

Affected Version(s)

BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, FPS, GTM, Link Controller, PEM, WebAccelerator) 14.0.0-14.1.0.1

BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, FPS, GTM, Link Controller, PEM, WebAccelerator) 13.0.0-13.1.1.4

BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, FPS, GTM, Link Controller, PEM, WebAccelerator) 12.1.0-12.1.4

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.