File System Modification Vulnerability in BIG-IP by F5 Networks
CVE-2019-6618
Key Information:
- Vendor
- F5
- Vendor
- CVE Published:
- 3 May 2019
Summary
Users with the Resource Administrator role in certain versions of BIG-IP can gain unauthorized access to sensitive areas of the filesystem if granted Advanced Shell Access. This includes the ability to edit critical files such as /etc/passwd, potentially enabling malicious modifications to user objects and violating the inherent restrictions associated with the Resource Administrator role.
Affected Version(s)
BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, FPS, GTM, Link Controller, PEM, WebAccelerator) 14.0.0-14.1.0.1
BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, FPS, GTM, Link Controller, PEM, WebAccelerator) 13.0.0-13.1.1.4
BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, FPS, GTM, Link Controller, PEM, WebAccelerator) 12.1.0-12.1.4
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved