Vulnerability Name:

CVE-2018-5519 (CCN-142681)

Assigned:2018-05-02
Published:2018-05-02
Updated:2019-10-03
Summary:On F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.3, or 11.2.1-11.6.3.1, administrative users by way of undisclosed methods can exploit the ssldump utility to write to arbitrary file paths. For users who do not have Advanced Shell access (for example, any user when licensed for Appliance Mode), this allows more permissive file access than intended.
CVSS v3 Severity:4.9 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N)
4.3 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): High
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): High
Availibility (A): None
6.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N)
5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): High
Availibility (A): None
CVSS v2 Severity:5.5 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): Partial
6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:C/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): Complete
Availibility (A): None
Vulnerability Type:CWE-noinfo
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2018-5519

Source: CCN
Type: SECTRACK ID: 1040803
F5 BIG-IP ssldump Lets Remote Authenticated Users Modify Files on the Target System

Source: SECTRACK
Type: Third Party Advisory, VDB Entry
1040803

Source: XF
Type: UNKNOWN
f5-cve20185519-sec-bypass(142681)

Source: CCN
Type: F5 Security Advisory K46121888
ssldump vulnerability CVE-2018-5519

Source: CONFIRM
Type: Vendor Advisory
https://support.f5.com/csp/article/K46121888

Vulnerable Configuration:Configuration 1:
  • cpe:/a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* (Version >= 11.2.1 and <= 11.6.3)
  • OR cpe:/a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* (Version >= 12.1.0 and <= 12.1.3)
  • OR cpe:/a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* (Version >= 13.0.0 and <= 13.1.0)

  • Configuration 2:
  • cpe:/a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* (Version >= 11.2.1 and <= 11.6.3)
  • OR cpe:/a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* (Version >= 12.1.0 and <= 12.1.3)
  • OR cpe:/a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* (Version >= 13.0.0 and <= 13.1.0)

  • Configuration 3:
  • cpe:/a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* (Version >= 11.2.1 and <= 11.6.3)
  • OR cpe:/a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* (Version >= 12.1.0 and <= 12.1.3)
  • OR cpe:/a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* (Version >= 13.0.0 and <= 13.1.0)

  • Configuration 4:
  • cpe:/a:f5:big-ip_analytics:*:*:*:*:*:*:*:* (Version >= 11.2.1 and <= 11.6.3)
  • OR cpe:/a:f5:big-ip_analytics:*:*:*:*:*:*:*:* (Version >= 12.1.0 and <= 12.1.3)
  • OR cpe:/a:f5:big-ip_analytics:*:*:*:*:*:*:*:* (Version >= 13.0.0 and <= 13.1.0)

  • Configuration 5:
  • cpe:/a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* (Version >= 11.2.1 and <= 11.6.3)
  • OR cpe:/a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* (Version >= 12.1.0 and <= 12.1.3)
  • OR cpe:/a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* (Version >= 13.0.0 and <= 13.1.0)

  • Configuration 6:
  • cpe:/a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* (Version >= 11.2.1 and <= 11.6.3)
  • OR cpe:/a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* (Version >= 12.1.0 and <= 12.1.3)
  • OR cpe:/a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* (Version >= 13.0.0 and <= 13.1.0)

  • Configuration 7:
  • cpe:/a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* (Version >= 11.2.1 and <= 11.6.3)
  • OR cpe:/a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* (Version >= 12.1.0 and <= 12.1.3)
  • OR cpe:/a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* (Version >= 13.0.0 and <= 13.1.0)

  • Configuration 8:
  • cpe:/a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* (Version >= 11.2.1 and <= 11.6.3)
  • OR cpe:/a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* (Version >= 12.1.0 and <= 12.1.3)
  • OR cpe:/a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* (Version >= 13.0.0 and <= 13.1.0)

  • Configuration 9:
  • cpe:/a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* (Version >= 11.2.1 and <= 11.6.3)
  • OR cpe:/a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* (Version >= 12.1.0 and <= 12.1.3)
  • OR cpe:/a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* (Version >= 13.0.0 and <= 13.1.0)

  • Configuration 10:
  • cpe:/a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* (Version >= 11.2.1 and <= 11.6.3)
  • OR cpe:/a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* (Version >= 12.1.0 and <= 12.1.3)
  • OR cpe:/a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* (Version >= 13.0.0 and <= 13.1.0)

  • Configuration 11:
  • cpe:/a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* (Version >= 11.2.1 and <= 11.6.3)
  • OR cpe:/a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* (Version >= 12.1.0 and <= 12.1.3)
  • OR cpe:/a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* (Version >= 13.0.0 and <= 13.1.0)

  • Configuration 12:
  • cpe:/a:f5:big-ip_websafe:*:*:*:*:*:*:*:* (Version >= 11.2.1 and <= 11.6.3)
  • OR cpe:/a:f5:big-ip_websafe:*:*:*:*:*:*:*:* (Version >= 12.1.0 and <= 12.1.3)
  • OR cpe:/a:f5:big-ip_websafe:*:*:*:*:*:*:*:* (Version >= 13.0.0 and <= 13.1.0)

  • Configuration 13:
  • cpe:/a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* (Version >= 11.2.1 and <= 11.6.3)
  • OR cpe:/a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* (Version >= 12.1.0 and <= 12.1.3)
  • OR cpe:/a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* (Version >= 13.0.0 and <= 13.1.0)

  • Configuration CCN 1:
  • cpe:/a:f5:big-ip:11.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:f5:big-ip:12.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:f5:big-ip:13.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:f5:big-ip:13.1.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:f5:big-ip:11.6.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:f5:big-ip:12.1.3.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    f5 big-ip local traffic manager *
    f5 big-ip local traffic manager *
    f5 big-ip local traffic manager *
    f5 big-ip application acceleration manager *
    f5 big-ip application acceleration manager *
    f5 big-ip application acceleration manager *
    f5 big-ip advanced firewall manager *
    f5 big-ip advanced firewall manager *
    f5 big-ip advanced firewall manager *
    f5 big-ip analytics *
    f5 big-ip analytics *
    f5 big-ip analytics *
    f5 big-ip access policy manager *
    f5 big-ip access policy manager *
    f5 big-ip access policy manager *
    f5 big-ip application security manager *
    f5 big-ip application security manager *
    f5 big-ip application security manager *
    f5 big-ip edge gateway *
    f5 big-ip edge gateway *
    f5 big-ip edge gateway *
    f5 big-ip global traffic manager *
    f5 big-ip global traffic manager *
    f5 big-ip global traffic manager *
    f5 big-ip link controller *
    f5 big-ip link controller *
    f5 big-ip link controller *
    f5 big-ip policy enforcement manager *
    f5 big-ip policy enforcement manager *
    f5 big-ip policy enforcement manager *
    f5 big-ip webaccelerator *
    f5 big-ip webaccelerator *
    f5 big-ip webaccelerator *
    f5 big-ip websafe *
    f5 big-ip websafe *
    f5 big-ip websafe *
    f5 big-ip domain name system *
    f5 big-ip domain name system *
    f5 big-ip domain name system *
    f5 big-ip 11.2.1
    f5 big-ip 12.1.0
    f5 big-ip 13.0.0
    f5 big-ip 13.1.0.5
    f5 big-ip 11.6.3.1
    f5 big-ip 12.1.3.3