CVE-2018-15321

When BIG-IP 14.0.0-14.0.0.2, 13.0.0-13.1.0.5, 12.1.0-12.1.3.5, 11.6.0-11.6.3.2, or 11.2.1-11.5.6, BIG-IQ Centralized Management 5.0.0-5.4.0 or 4.6.0, BIG-IQ Cloud and Orchestration 1.0.0, iWorkflow 2.1.0-2.3.0, or Enterprise Manager 3.1.1 is licensed for Appliance Mode, Admin and Resource administrator roles can by-pass BIG-IP Appliance Mode restrictions to overwrite critical system files. Attackers of high privilege level are able to overwrite critical system files which bypasses security controls in place to limit TMSH commands. This is possible with an administrator or resource administrator roles when granted TMSH. Resource administrator roles must have TMSH access in order to perform this attack.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.9 MEDIUM
NETWORK
LOW
HIGH
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
f5CNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 41%
VendorProductVersion
f5big-ip_local_traffic_manager
11.2.1 ≤
𝑥
≤ 11.5.6
f5big-ip_local_traffic_manager
11.6.0 ≤
𝑥
≤ 11.6.3.2
f5big-ip_local_traffic_manager
12.1.0 ≤
𝑥
≤ 12.1.3.5
f5big-ip_local_traffic_manager
13.0.0 ≤
𝑥
≤ 13.1.0.7
f5big-ip_local_traffic_manager
14.0.0 ≤
𝑥
≤ 14.0.0.2
f5big-ip_advanced_firewall_manager
11.2.1 ≤
𝑥
≤ 11.5.6
f5big-ip_advanced_firewall_manager
11.6.0 ≤
𝑥
≤ 11.6.3.2
f5big-ip_advanced_firewall_manager
12.1.0 ≤
𝑥
≤ 12.1.3.5
f5big-ip_advanced_firewall_manager
13.0.0 ≤
𝑥
≤ 13.1.0.7
f5big-ip_advanced_firewall_manager
14.0.0 ≤
𝑥
≤ 14.0.0.2
f5big-ip_application_acceleration_manager
11.2.1 ≤
𝑥
≤ 11.5.6
f5big-ip_application_acceleration_manager
11.6.0 ≤
𝑥
≤ 11.6.3.2
f5big-ip_application_acceleration_manager
12.1.0 ≤
𝑥
≤ 12.1.3.5
f5big-ip_application_acceleration_manager
13.0.0 ≤
𝑥
≤ 13.1.0.7
f5big-ip_application_acceleration_manager
14.0.0 ≤
𝑥
≤ 14.0.0.2
f5big-ip_analytics
11.2.1 ≤
𝑥
≤ 11.5.6
f5big-ip_analytics
11.6.0 ≤
𝑥
≤ 11.6.3.2
f5big-ip_analytics
12.1.0 ≤
𝑥
≤ 12.1.3.5
f5big-ip_analytics
13.0.0 ≤
𝑥
≤ 13.1.0.7
f5big-ip_analytics
14.0.0 ≤
𝑥
≤ 14.0.0.2
f5big-ip_access_policy_manager
11.2.1 ≤
𝑥
≤ 11.5.6
f5big-ip_access_policy_manager
11.6.0 ≤
𝑥
≤ 11.6.3.2
f5big-ip_access_policy_manager
12.1.0 ≤
𝑥
≤ 12.1.3.5
f5big-ip_access_policy_manager
13.0.0 ≤
𝑥
≤ 13.1.0.7
f5big-ip_access_policy_manager
14.0.0 ≤
𝑥
≤ 14.0.0.2
f5big-ip_protocol_security_module
11.2.1 ≤
𝑥
≤ 11.5.6
f5big-ip_protocol_security_module
11.6.0 ≤
𝑥
≤ 11.6.3.2
f5big-ip_protocol_security_module
12.1.0 ≤
𝑥
≤ 12.1.3.5
f5big-ip_protocol_security_module
13.0.0 ≤
𝑥
≤ 13.1.0.7
f5big-ip_protocol_security_module
14.0.0 ≤
𝑥
≤ 14.0.0.2
f5big-ip_domain_name_system
11.2.1 ≤
𝑥
≤ 11.5.6
f5big-ip_domain_name_system
11.6.0 ≤
𝑥
≤ 11.6.3.2
f5big-ip_domain_name_system
12.1.0 ≤
𝑥
≤ 12.1.3.5
f5big-ip_domain_name_system
13.0.0 ≤
𝑥
≤ 13.1.0.7
f5big-ip_domain_name_system
14.0.0 ≤
𝑥
≤ 14.0.0.2
f5big-ip_edge_gateway
11.2.1 ≤
𝑥
≤ 11.5.6
f5big-ip_edge_gateway
11.6.0 ≤
𝑥
≤ 11.6.3.2
f5big-ip_edge_gateway
12.1.0 ≤
𝑥
≤ 12.1.3.5
f5big-ip_edge_gateway
13.0.0 ≤
𝑥
≤ 13.1.0.7
f5big-ip_edge_gateway
14.0.0 ≤
𝑥
≤ 14.0.0.2
f5big-ip_fraud_protection_service
11.2.1 ≤
𝑥
≤ 11.5.6
f5big-ip_fraud_protection_service
11.6.0 ≤
𝑥
≤ 11.6.3.2
f5big-ip_fraud_protection_service
12.1.0 ≤
𝑥
≤ 12.1.3.5
f5big-ip_fraud_protection_service
13.0.0 ≤
𝑥
≤ 13.1.0.7
f5big-ip_fraud_protection_service
14.0.0 ≤
𝑥
≤ 14.0.0.2
f5big-ip_global_traffic_manager
11.2.1 ≤
𝑥
≤ 11.5.6
f5big-ip_global_traffic_manager
11.6.0 ≤
𝑥
≤ 11.6.3.2
f5big-ip_global_traffic_manager
12.1.0 ≤
𝑥
≤ 12.1.3.5
f5big-ip_global_traffic_manager
13.0.0 ≤
𝑥
≤ 13.1.0.7
f5big-ip_global_traffic_manager
14.0.0 ≤
𝑥
≤ 14.0.0.2
f5big-ip_link_controller
11.2.1 ≤
𝑥
≤ 11.5.6
f5big-ip_link_controller
11.6.0 ≤
𝑥
≤ 11.6.3.2
f5big-ip_link_controller
12.1.0 ≤
𝑥
≤ 12.1.3.5
f5big-ip_link_controller
13.0.0 ≤
𝑥
≤ 13.1.0.7
f5big-ip_link_controller
14.0.0 ≤
𝑥
≤ 14.0.0.2
f5big-ip_policy_enforcement_manager
11.2.1 ≤
𝑥
≤ 11.5.6
f5big-ip_policy_enforcement_manager
11.6.0 ≤
𝑥
≤ 11.6.3.2
f5big-ip_policy_enforcement_manager
12.1.0 ≤
𝑥
≤ 12.1.3.5
f5big-ip_policy_enforcement_manager
13.0.0 ≤
𝑥
≤ 13.1.0.7
f5big-ip_policy_enforcement_manager
14.0.0 ≤
𝑥
≤ 14.0.0.2
f5big-ip_webaccelerator
11.2.1 ≤
𝑥
≤ 11.5.6
f5big-ip_webaccelerator
11.6.0 ≤
𝑥
≤ 11.6.3.2
f5big-ip_webaccelerator
12.1.0 ≤
𝑥
≤ 12.1.3.5
f5big-ip_webaccelerator
13.0.0 ≤
𝑥
≤ 13.1.0.7
f5big-ip_webaccelerator
14.0.0 ≤
𝑥
≤ 14.0.0.2
f5enterprise_manager
3.1.1
f5big-iq_centralized_management
5.0.0 ≤
𝑥
≤ 5.4.0
f5big-iq_centralized_management
4.6.0
f5big-iq_cloud_and_orchestration
1.0.0
f5iworkflow
2.1.0 ≤
𝑥
≤ 2.3.0
𝑥
= Vulnerable software versions