CVE-2018-5520

Severity

35%

Complexity

68%

Confidentiality

48%

On an F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.1, or 11.2.1-11.6.3.1 system configured in Appliance mode, the TMOS Shell (tmsh) may allow an administrative user to use the dig utility to gain unauthorized access to file system resources.

On an F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.1, or 11.2.1-11.6.3.1 system configured in Appliance mode, the TMOS Shell (tmsh) may allow an administrative user to use the dig utility to gain unauthorized access to file system resources.

CVSS 3.0 Base Score 4.4. CVSS Attack Vector: network. CVSS Attack Complexity: high. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N).

CVSS 2.0 Base Score 3.5. CVSS Attack Vector: network. CVSS Attack Complexity: medium. CVSS Vector: (AV:N/AC:M/Au:S/C:P/I:N/A:N).

Overview

Type

F5

First reported 6 years ago

2018-05-02 13:29:00

Last updated 5 years ago

2019-10-03 00:03:00

Affected Software

F5 Networks Big-IP Local Traffic Manager (LTM)

F5 Big-IP Application Acceleration Manager (AAM)

F5 Big-IP Advanced Firewall Manager (AFM)

F5 Big-IP Analytics

F5 Big-IP Access Policy Manager (APM)

F5 Big-IP Application Security Manager (ASM)

F5 Big-IP Edge Gateway

F5 Big-IP Global Traffic Manager (GTM)

F5 Big-IP Link Controller

F5 Big-IP Policy Enforcement Manager (PEM)

F5 Big-IP WebAccelerator

F5 Big-IP Domain Name System (DNS)

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.