CVE-2018-5519 vulnerability in F5 Networks Products
Published on May 2, 2018
On F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.3, or 11.2.1-11.6.3.1, administrative users by way of undisclosed methods can exploit the ssldump utility to write to arbitrary file paths. For users who do not have Advanced Shell access (for example, any user when licensed for Appliance Mode), this allows more permissive file access than intended.
Products Associated with CVE-2018-5519
Want to know whenever a new CVE is published for F5 Networks products? stack.watch will email you.
Affected Versions
F5 Networks, Inc. BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, WebAccelerator, WebSafe):- Version 13.0.0-13.1.0.5 is affected.
- Version 12.1.0-12.1.3.3 is affected.
- Version 11.2.1-11.6.3.1 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.