複数の F5 BIG-IP 製品におけるアクセス制御に関する脆弱性
| Title |
複数の F5 BIG-IP 製品におけるアクセス制御に関する脆弱性
|
| Summary |
複数の F5 BIG-IP 製品には、アクセス制御に関する脆弱性が存在します。
|
| Possible impacts |
情報を改ざんされる可能性があります。 |
| Solution |
ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date |
May 1, 2018, midnight |
| Registration Date |
July 2, 2018, 5:07 p.m. |
| Last Update |
July 2, 2018, 5:07 p.m. |
|
CVSS3.0 : 警告
|
| Score |
4.9
|
| Vector |
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N |
|
CVSS2.0 : 警告
|
| Score |
5.5
|
| Vector |
AV:N/AC:L/Au:S/C:N/I:P/A:P |
Affected System
| F5 Networks |
|
BIG-IP Access Policy Manager (APM)
|
|
BIG-IP Advanced Firewall Manager (AFM)
|
|
BIG-IP Analytics
|
|
BIG-IP Application Acceleration Manager (AAM)
|
|
BIG-IP Application Security Manager (ASM)
|
|
BIG-IP Domain Name System (DNS)
|
|
BIG-IP Edge Gateway
|
|
BIG-IP Global Traffic Manager (GTM)
|
|
BIG-IP Link Controller
|
|
BIG-IP Local Traffic Manager (LTM)
|
|
BIG-IP Policy Enforcement Manager (PEM)
|
|
BIG-IP WebAccelerator
|
|
BIG-IP WebSafe
|
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
| No |
Changed Details |
Date of change |
| 1 |
[2018年07月02日] 掲載 |
July 2, 2018, 5:07 p.m. |
NVD Vulnerability Information
CVE-2018-5519
| Summary |
On F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.3, or 11.2.1-11.6.3.1, administrative users by way of undisclosed methods can exploit the ssldump utility to write to arbitrary file paths. For users who do not have Advanced Shell access (for example, any user when licensed for Appliance Mode), this allows more permissive file access than intended.
|
| Publication Date |
May 2, 2018, 10:29 p.m. |
| Registration Date |
March 1, 2021, 7:31 p.m. |
| Last Update |
Nov. 21, 2024, 1:08 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* |
12.1.0 |
12.1.3 |
|
|
| cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* |
11.2.1 |
11.6.3 |
|
|
| cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* |
13.0.0 |
13.1.0 |
|
|
| Configuration2 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* |
12.1.0 |
12.1.3 |
|
|
| cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* |
11.2.1 |
11.6.3 |
|
|
| cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* |
13.0.0 |
13.1.0 |
|
|
| Configuration3 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* |
12.1.0 |
12.1.3 |
|
|
| cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* |
11.2.1 |
11.6.3 |
|
|
| cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* |
13.0.0 |
13.1.0 |
|
|
| Configuration4 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* |
12.1.0 |
12.1.3 |
|
|
| cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* |
11.2.1 |
11.6.3 |
|
|
| cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* |
13.0.0 |
13.1.0 |
|
|
| Configuration5 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* |
12.1.0 |
12.1.3 |
|
|
| cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* |
11.2.1 |
11.6.3 |
|
|
| cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* |
13.0.0 |
13.1.0 |
|
|
| Configuration6 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* |
12.1.0 |
12.1.3 |
|
|
| cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* |
11.2.1 |
11.6.3 |
|
|
| cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* |
13.0.0 |
13.1.0 |
|
|
| Configuration7 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* |
12.1.0 |
12.1.3 |
|
|
| cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* |
11.2.1 |
11.6.3 |
|
|
| cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* |
13.0.0 |
13.1.0 |
|
|
| Configuration8 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* |
12.1.0 |
12.1.3 |
|
|
| cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* |
11.2.1 |
11.6.3 |
|
|
| cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* |
13.0.0 |
13.1.0 |
|
|
| Configuration9 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* |
12.1.0 |
12.1.3 |
|
|
| cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* |
11.2.1 |
11.6.3 |
|
|
| cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* |
13.0.0 |
13.1.0 |
|
|
| Configuration10 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* |
12.1.0 |
12.1.3 |
|
|
| cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* |
11.2.1 |
11.6.3 |
|
|
| cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* |
13.0.0 |
13.1.0 |
|
|
| Configuration11 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* |
12.1.0 |
12.1.3 |
|
|
| cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* |
11.2.1 |
11.6.3 |
|
|
| cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* |
13.0.0 |
13.1.0 |
|
|
| Configuration12 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:* |
12.1.0 |
12.1.3 |
|
|
| cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:* |
11.2.1 |
11.6.3 |
|
|
| cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:* |
13.0.0 |
13.1.0 |
|
|
| Configuration13 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* |
12.1.0 |
12.1.3 |
|
|
| cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* |
11.2.1 |
11.6.3 |
|
|
| cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* |
13.0.0 |
13.1.0 |
|
|
Related information, measures and tools
Common Vulnerabilities List