CVE-2018-5520 vulnerability in F5 Networks Products
Published on May 2, 2018
On an F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.1, or 11.2.1-11.6.3.1 system configured in Appliance mode, the TMOS Shell (tmsh) may allow an administrative user to use the dig utility to gain unauthorized access to file system resources.
Products Associated with CVE-2018-5520
Want to know whenever a new CVE is published for F5 Networks products? stack.watch will email you.
Affected Versions
F5 Networks, Inc. BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, WebAccelerator, WebSafe):- Version 13.0.0-13.1.0.5 is affected.
- Version 12.1.0-12.1.3.1 is affected.
- Version 11.2.1-11.6.3.1 is affected.
Exploit Probability
EPSS
0.19%
Percentile
40.79%
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.