Privilege escalation in F5 Enterprise Manager



Published: 2018-11-12
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2018-15327
CWE-ID CWE-264
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Enterprise Manager
Client/Desktop applications / Other client software

Vendor F5 Networks

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Privilege escalation

EUVDB-ID: #VU15797

Risk: Low

CVSSv3.1: 6.3 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-15327

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote administrative attacker to gain elevated privileges on the target system.

The weakness exists due to improper privileges and access controls. When authenticated administrative user runs commands in the Traffic Management User Interface (TMUI), also referred to as the BIG-IP Configuration utility, restrictions on allowed commands may not be enforced.

Mitigation

Update to version 3.1.1.

Vulnerable software versions

Enterprise Manager: 3.0.0 - 3.1.0

External links

http://support.f5.com/csp/article/K20222812


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###