All the vulnerabilites related to F5 - BIG-IP APM Clients
cve-2022-28714
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://support.f5.com/csp/article/K54460845 | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
F5 | BIG-IP APM | |
F5 | BIG-IP APM Clients |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:03:52.638Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.f5.com/csp/article/K54460845" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "BIG-IP APM", "vendor": "F5", "versions": [ { "status": "affected", "version": "12.1.x" }, { "status": "affected", "version": "11.6.x" }, { "lessThan": "17.0.x*", "status": "unaffected", "version": "17.0.0", "versionType": "custom" }, { "lessThan": "16.1.2.2", "status": "affected", "version": "16.1.x", "versionType": "custom" }, { "lessThan": "15.1.5.1", "status": "affected", "version": "15.1.x", "versionType": "custom" }, { "lessThan": "14.1.4.6", "status": "affected", "version": "14.1.x", "versionType": "custom" }, { "lessThan": "13.1.5", "status": "affected", "version": "13.1.x", "versionType": "custom" } ] }, { "product": "BIG-IP APM Clients", "vendor": "F5", "versions": [ { "lessThan": "7.2.1.5", "status": "affected", "version": "7.x", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "F5 would like to acknowledge Minki Jang of HackEnTerBoBs and Raeez Abdulla of CodeGreen Systems, UAE for bringing this issue to our attention and following the highest standards of coordinated disclosure." } ], "datePublic": "2022-05-04T00:00:00", "descriptions": [ { "lang": "en", "value": "On F5 BIG-IP APM 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all versions of 12.1.x and 11.6.x, as well as F5 BIG-IP APM Clients 7.x versions prior to 7.2.1.5, a DLL Hijacking vulnerability exists in the BIG-IP Edge Client Windows Installer. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-427", "description": "CWE-427 Uncontrolled Search Path Element", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-05T16:40:53", "orgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "shortName": "f5" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.f5.com/csp/article/K54460845" } ], "source": { "discovery": "EXTERNAL" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "f5sirt@f5.com", "DATE_PUBLIC": "2022-05-04T14:00:00.000Z", "ID": "CVE-2022-28714", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "BIG-IP APM", "version": { "version_data": [ { "version_affected": "!\u003e=", "version_name": "17.0.x", "version_value": "17.0.0" }, { "version_affected": "\u003c", "version_name": "16.1.x", "version_value": "16.1.2.2" }, { "version_affected": "\u003c", "version_name": "15.1.x", "version_value": "15.1.5.1" }, { "version_affected": "\u003c", "version_name": "14.1.x", "version_value": "14.1.4.6" }, { "version_affected": "\u003c", "version_name": "13.1.x", "version_value": "13.1.5" }, { "version_affected": "=", "version_name": "12.1.x", "version_value": "12.1.x" }, { "version_affected": "=", "version_name": "11.6.x", "version_value": "11.6.x" } ] } }, { "product_name": "BIG-IP APM Clients", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "7.x", "version_value": "7.2.1.5" } ] } } ] }, "vendor_name": "F5" } ] } }, "credit": [ { "lang": "eng", "value": "F5 would like to acknowledge Minki Jang of HackEnTerBoBs and Raeez Abdulla of CodeGreen Systems, UAE for bringing this issue to our attention and following the highest standards of coordinated disclosure." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "On F5 BIG-IP APM 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all versions of 12.1.x and 11.6.x, as well as F5 BIG-IP APM Clients 7.x versions prior to 7.2.1.5, a DLL Hijacking vulnerability exists in the BIG-IP Edge Client Windows Installer. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-427 Uncontrolled Search Path Element" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.f5.com/csp/article/K54460845", "refsource": "MISC", "url": "https://support.f5.com/csp/article/K54460845" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "assignerShortName": "f5", "cveId": "CVE-2022-28714", "datePublished": "2022-05-05T16:40:53.297009Z", "dateReserved": "2022-04-19T00:00:00", "dateUpdated": "2024-09-16T17:18:27.730Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-27636
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://support.f5.com/csp/article/K57110035 | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
F5 | BIG-IP APM | |
F5 | BIG-IP APM Clients |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:32:59.994Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.f5.com/csp/article/K57110035" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "BIG-IP APM", "vendor": "F5", "versions": [ { "status": "affected", "version": "12.1.x" }, { "status": "affected", "version": "11.6.x" }, { "lessThan": "17.0.x*", "status": "unaffected", "version": "17.0.0", "versionType": "custom" }, { "lessThan": "16.1.2.2", "status": "affected", "version": "16.1.x", "versionType": "custom" }, { "lessThan": "15.1.5.1", "status": "affected", "version": "15.1.x", "versionType": "custom" }, { "lessThan": "14.1.4.6", "status": "affected", "version": "14.1.x", "versionType": "custom" }, { "lessThan": "13.1.5", "status": "affected", "version": "13.1.x", "versionType": "custom" } ] }, { "product": "BIG-IP APM Clients", "vendor": "F5", "versions": [ { "lessThan": "7.2.1.5", "status": "affected", "version": "7.x", "versionType": "custom" } ] } ], "datePublic": "2022-05-04T00:00:00", "descriptions": [ { "lang": "en", "value": "On F5 BIG-IP APM 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all versions of 12.1.x and 11.6.x, as well as F5 BIG-IP APM Clients 7.x versions prior to 7.2.1.5, BIG-IP Edge Client may log sensitive APM session-related information when VPN is launched on a Windows system. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-532", "description": "CWE-532 Insertion of Sensitive Information into Log File", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-05T16:13:46", "orgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "shortName": "f5" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.f5.com/csp/article/K57110035" } ], "source": { "discovery": "INTERNAL" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "f5sirt@f5.com", "DATE_PUBLIC": "2022-05-04T14:00:00.000Z", "ID": "CVE-2022-27636", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "BIG-IP APM", "version": { "version_data": [ { "version_affected": "!\u003e=", "version_name": "17.0.x", "version_value": "17.0.0" }, { "version_affected": "\u003c", "version_name": "16.1.x", "version_value": "16.1.2.2" }, { "version_affected": "\u003c", "version_name": "15.1.x", "version_value": "15.1.5.1" }, { "version_affected": "\u003c", "version_name": "14.1.x", "version_value": "14.1.4.6" }, { "version_affected": "\u003c", "version_name": "13.1.x", "version_value": "13.1.5" }, { "version_affected": "=", "version_name": "12.1.x", "version_value": "12.1.x" }, { "version_affected": "=", "version_name": "11.6.x", "version_value": "11.6.x" } ] } }, { "product_name": "BIG-IP APM Clients", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "7.x", "version_value": "7.2.1.5" } ] } } ] }, "vendor_name": "F5" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "On F5 BIG-IP APM 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all versions of 12.1.x and 11.6.x, as well as F5 BIG-IP APM Clients 7.x versions prior to 7.2.1.5, BIG-IP Edge Client may log sensitive APM session-related information when VPN is launched on a Windows system. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-532 Insertion of Sensitive Information into Log File" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.f5.com/csp/article/K57110035", "refsource": "MISC", "url": "https://support.f5.com/csp/article/K57110035" } ] }, "source": { "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "assignerShortName": "f5", "cveId": "CVE-2022-27636", "datePublished": "2022-05-05T16:13:46.323343Z", "dateReserved": "2022-04-19T00:00:00", "dateUpdated": "2024-09-17T01:56:56.866Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-29263
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://support.f5.com/csp/article/K33552735 | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
F5 | BIG-IP APM | |
F5 | BIG-IP APM Clients |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:17:54.512Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.f5.com/csp/article/K33552735" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "BIG-IP APM", "vendor": "F5", "versions": [ { "status": "affected", "version": "12.1.x" }, { "status": "affected", "version": "11.6.x" }, { "lessThan": "17.0.x*", "status": "unaffected", "version": "17.0.0", "versionType": "custom" }, { "lessThan": "16.1.2.2", "status": "affected", "version": "16.1.x", "versionType": "custom" }, { "lessThan": "15.1.5.1", "status": "affected", "version": "15.1.x", "versionType": "custom" }, { "lessThan": "14.1.4.6", "status": "affected", "version": "14.1.x", "versionType": "custom" }, { "lessThan": "13.1.5", "status": "affected", "version": "13.1.x", "versionType": "custom" } ] }, { "product": "BIG-IP APM Clients", "vendor": "F5", "versions": [ { "lessThan": "7.2.1.5", "status": "affected", "version": "7.x", "versionType": "custom" } ] } ], "datePublic": "2022-05-04T00:00:00", "descriptions": [ { "lang": "en", "value": "On F5 BIG-IP APM 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all versions of 12.1.x and 11.6.x, as well as F5 BIG-IP APM Clients 7.x versions prior to 7.2.1.5, the BIG-IP Edge Client Component Installer Service does not use best practice while saving temporary files. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-732", "description": "CWE-732 Incorrect Permission Assignment for Critical Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-05T16:43:25", "orgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "shortName": "f5" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.f5.com/csp/article/K33552735" } ], "source": { "discovery": "INTERNAL" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "f5sirt@f5.com", "DATE_PUBLIC": "2022-05-04T14:00:00.000Z", "ID": "CVE-2022-29263", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "BIG-IP APM", "version": { "version_data": [ { "version_affected": "!\u003e=", "version_name": "17.0.x", "version_value": "17.0.0" }, { "version_affected": "\u003c", "version_name": "16.1.x", "version_value": "16.1.2.2" }, { "version_affected": "\u003c", "version_name": "15.1.x", "version_value": "15.1.5.1" }, { "version_affected": "\u003c", "version_name": "14.1.x", "version_value": "14.1.4.6" }, { "version_affected": "\u003c", "version_name": "13.1.x", "version_value": "13.1.5" }, { "version_affected": "=", "version_name": "12.1.x", "version_value": "12.1.x" }, { "version_affected": "=", "version_name": "11.6.x", "version_value": "11.6.x" } ] } }, { "product_name": "BIG-IP APM Clients", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "7.x", "version_value": "7.2.1.5" } ] } } ] }, "vendor_name": "F5" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "On F5 BIG-IP APM 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all versions of 12.1.x and 11.6.x, as well as F5 BIG-IP APM Clients 7.x versions prior to 7.2.1.5, the BIG-IP Edge Client Component Installer Service does not use best practice while saving temporary files. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-732 Incorrect Permission Assignment for Critical Resource" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.f5.com/csp/article/K33552735", "refsource": "MISC", "url": "https://support.f5.com/csp/article/K33552735" } ] }, "source": { "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "assignerShortName": "f5", "cveId": "CVE-2022-29263", "datePublished": "2022-05-05T16:43:25.102294Z", "dateReserved": "2022-04-19T00:00:00", "dateUpdated": "2024-09-16T23:27:04.518Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-201807-2198
Vulnerability from variot
The svpn component of the F5 BIG-IP APM client prior to version 7.1.7 for Linux and Mac OS X runs as a privileged process and can allow an unprivileged user to assume super-user privileges on the local client host. A malicious local unprivileged user may gain knowledge of sensitive information, manipulate certain data, or disrupt service. F5 BIG-IP APM client Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. F5 BIG-IP APM Client is prone to a local privilege escalation vulnerability. Local attackers may exploit this issue to gain elevated privileges. The software primarily provides unified access to business-critical applications and networks. svpn is one of the VPN components. policyserver is one of the policy servers. There are security vulnerabilities in the svpn and policyserver components of F5 BIG-IP APM client versions earlier than 7.1.7.1 based on Linux and macOS platforms
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201807-2198", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "big-ip access policy manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "7.1.5" }, { "model": "big-ip access policy manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip access policy manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "12.1.3" }, { "model": "big-ip access policy manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "12.1.0" }, { "model": "big-ip access policy manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "11.5.6" }, { "model": "big-ip edge", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "7101" }, { "model": "big-ip access policy manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "13.0.0" }, { "model": "big-ip access policy manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "7.1.6.1" }, { "model": "big-ip edge", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "7150" }, { "model": "big-ip access policy manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "13.1.0" }, { "model": "big-ip access policy manager", "scope": "eq", "trust": 0.8, "vendor": "f5", "version": "11.5.1 to 11.5.6" }, { "model": "big-ip access policy manager", "scope": "eq", "trust": 0.8, "vendor": "f5", "version": "12.1.0 to 12.1.3" }, { "model": "big-ip access policy manager", "scope": "eq", "trust": 0.8, "vendor": "f5", "version": "13.0.0 to 13.1.0" }, { "model": "big-ip access policy manager", "scope": "eq", "trust": 0.8, "vendor": "f5", "version": "clients 7.1.5 to 7.1.6.1" }, { "model": "big-ip edge client", "scope": null, "trust": 0.8, "vendor": "f5", "version": null }, { "model": "big-ip access policy manager", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "12.1.0" }, { "model": "big-ip access policy manager", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "11.5.2" }, { "model": "big-ip access policy manager", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "12.1.1" }, { "model": "big-ip access policy manager", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip access policy manager", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "11.5.3" }, { "model": "big-ip access policy manager", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip access policy manager", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "11.5.5" }, { "model": "big-ip edge client", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "7150" }, { "model": "big-ip edge client", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "7101" }, { "model": "big-ip apm clients", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "7.1.5" }, { "model": "big-ip apm clients", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "7.1.6.1" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.1" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.3" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.1" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.6" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.5" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.2" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.0" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip apm clients", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "7.1.7" } ], "sources": [ { "db": "BID", "id": "104730" }, { "db": "JVNDB", "id": "JVNDB-2018-007937" }, { "db": "NVD", "id": "CVE-2018-5529" }, { "db": "CNNVD", "id": "CNNVD-201807-1120" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "13.1.0", "versionStartIncluding": "13.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "12.1.3", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.5.6", "versionStartIncluding": "11.5.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_edge:*:*:*:*:clients:*:*:*", "cpe_name": [], "versionEndIncluding": "7150", "versionStartIncluding": "7101", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:clients:*:*:*", "cpe_name": [], "versionEndIncluding": "7.1.6.1", "versionStartIncluding": "7.1.5", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2018-5529" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Rich Mirch", "sources": [ { "db": "BID", "id": "104730" } ], "trust": 0.3 }, "cve": "CVE-2018-5529", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.6, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2018-5529", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-135577", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-135560", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2018-5529", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2018-5529", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201807-1120", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-135577", "trust": 0.1, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-135560", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2018-5529", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-135577" }, { "db": "VULHUB", "id": "VHN-135560" }, { "db": "VULMON", "id": "CVE-2018-5529" }, { "db": "JVNDB", "id": "JVNDB-2018-007937" }, { "db": "NVD", "id": "CVE-2018-5529" }, { "db": "CNNVD", "id": "CNNVD-201807-1120" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The svpn component of the F5 BIG-IP APM client prior to version 7.1.7 for Linux and Mac OS X runs as a privileged process and can allow an unprivileged user to assume super-user privileges on the local client host. A malicious local unprivileged user may gain knowledge of sensitive information, manipulate certain data, or disrupt service. F5 BIG-IP APM client Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. F5 BIG-IP APM Client is prone to a local privilege escalation vulnerability. \nLocal attackers may exploit this issue to gain elevated privileges. The software primarily provides unified access to business-critical applications and networks. svpn is one of the VPN components. policyserver is one of the policy servers. There are security vulnerabilities in the svpn and policyserver components of F5 BIG-IP APM client versions earlier than 7.1.7.1 based on Linux and macOS platforms", "sources": [ { "db": "NVD", "id": "CVE-2018-5529" }, { "db": "JVNDB", "id": "JVNDB-2018-007937" }, { "db": "BID", "id": "104730" }, { "db": "VULHUB", "id": "VHN-135577" }, { "db": "VULHUB", "id": "VHN-135560" }, { "db": "VULMON", "id": "CVE-2018-5529" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-5529", "trust": 3.0 }, { "db": "BID", "id": "104730", "trust": 2.1 }, { "db": "JVNDB", "id": "JVNDB-2018-007937", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201807-1120", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-201808-560", "trust": 0.1 }, { "db": "SECTRACK", "id": "1041510", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-135577", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-135560", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2018-5529", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-135577" }, { "db": "VULHUB", "id": "VHN-135560" }, { "db": "VULMON", "id": "CVE-2018-5529" }, { "db": "BID", "id": "104730" }, { "db": "JVNDB", "id": "JVNDB-2018-007937" }, { "db": "NVD", "id": "CVE-2018-5529" }, { "db": "CNNVD", "id": "CNNVD-201807-1120" } ] }, "id": "VAR-201807-2198", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-135577" }, { "db": "VULHUB", "id": "VHN-135560" } ], "trust": 0.64448256 }, "last_update_date": "2023-12-18T12:56:50.254000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "K52171282", "trust": 0.8, "url": "https://support.f5.com/csp/article/k52171282" }, { "title": "F5 BIG-IP APM client svpn Fixes for component security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=82125" }, { "title": "security-research", "trust": 0.1, "url": "https://github.com/mirchr/security-research " } ], "sources": [ { "db": "VULMON", "id": "CVE-2018-5529" }, { "db": "JVNDB", "id": "JVNDB-2018-007937" }, { "db": "CNNVD", "id": "CNNVD-201807-1120" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.0 }, { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-732", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-135577" }, { "db": "VULHUB", "id": "VHN-135560" }, { "db": "JVNDB", "id": "JVNDB-2018-007937" }, { "db": "NVD", "id": "CVE-2018-5529" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "http://www.securityfocus.com/bid/104730" }, { "trust": 2.1, "url": "https://support.f5.com/csp/article/k52171282" }, { "trust": 1.9, "url": "https://github.com/mirchr/security-research/blob/master/vulnerabilities/f5/cve-2018-5529.txt" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-5529" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-5529" }, { "trust": 0.3, "url": "http://www.f5.com/" }, { "trust": 0.1, "url": "https://support.f5.com/csp/article/k54431371" }, { "trust": 0.1, "url": "http://www.securitytracker.com/id/1041510" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/mirchr/security-research" } ], "sources": [ { "db": "VULHUB", "id": "VHN-135577" }, { "db": "VULHUB", "id": "VHN-135560" }, { "db": "VULMON", "id": "CVE-2018-5529" }, { "db": "BID", "id": "104730" }, { "db": "JVNDB", "id": "JVNDB-2018-007937" }, { "db": "NVD", "id": "CVE-2018-5529" }, { "db": "CNNVD", "id": "CNNVD-201807-1120" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-135577" }, { "db": "VULHUB", "id": "VHN-135560" }, { "db": "VULMON", "id": "CVE-2018-5529" }, { "db": "BID", "id": "104730" }, { "db": "JVNDB", "id": "JVNDB-2018-007937" }, { "db": "NVD", "id": "CVE-2018-5529" }, { "db": "CNNVD", "id": "CNNVD-201807-1120" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-08-17T00:00:00", "db": "VULHUB", "id": "VHN-135577" }, { "date": "2018-07-12T00:00:00", "db": "VULHUB", "id": "VHN-135560" }, { "date": "2018-07-12T00:00:00", "db": "VULMON", "id": "CVE-2018-5529" }, { "date": "2018-07-12T00:00:00", "db": "BID", "id": "104730" }, { "date": "2018-10-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-007937" }, { "date": "2018-07-12T18:29:00.577000", "db": "NVD", "id": "CVE-2018-5529" }, { "date": "2018-07-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201807-1120" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-10-03T00:00:00", "db": "VULHUB", "id": "VHN-135577" }, { "date": "2019-10-03T00:00:00", "db": "VULHUB", "id": "VHN-135560" }, { "date": "2019-10-03T00:00:00", "db": "VULMON", "id": "CVE-2018-5529" }, { "date": "2018-07-12T00:00:00", "db": "BID", "id": "104730" }, { "date": "2018-10-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-007937" }, { "date": "2019-10-03T00:03:26.223000", "db": "NVD", "id": "CVE-2018-5529" }, { "date": "2019-10-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201807-1120" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "104730" }, { "db": "CNNVD", "id": "CNNVD-201807-1120" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "F5 BIG-IP APM client Vulnerabilities related to authorization, permissions, and access control", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-007937" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control issues", "sources": [ { "db": "CNNVD", "id": "CNNVD-201807-1120" } ], "trust": 0.6 } }
var-201810-0912
Vulnerability from variot
In F5 BIG-IP APM 13.0.0-13.1.1.1, APM Client 7.1.5-7.1.6, and/or Edge Client 7101-7160, the BIG-IP APM Edge Client component loads the policy library with user permission and bypassing the endpoint checks. Multiple F5 BIG-IP Products are prone to a security-bypass vulnerability. An attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions; this may aid in launching further attacks. Edge Client is an integrated remote access client used in BIG-IP solutions. A local attacker could exploit this vulnerability to bypass endpoint detection
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201810-0912", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "big-ip access policy manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "13.0.0" }, { "model": "big-ip access policy manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "13.1.1.1" }, { "model": "big-ip edge client", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "7101" }, { "model": "big-ip access policy manager client", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "7.1.5" }, { "model": "big-ip access policy manager client", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "7.1.6" }, { "model": "big-ip edge client", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "7160" }, { "model": "big-ip access policy manager", "scope": "eq", "trust": 0.8, "vendor": "f5", "version": "13.0.0 to 13.1.1.1" }, { "model": "big-ip access policy manager client", "scope": "eq", "trust": 0.8, "vendor": "f5", "version": "7.1.5 to 7.1.6" }, { "model": "big-ip edge client", "scope": "eq", "trust": 0.8, "vendor": "f5", "version": "7101 to 7160" }, { "model": "big-ip access policy manager", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "13.1.0.8" }, { "model": "big-ip access policy manager", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "13.1.0.7" }, { "model": "big-ip access policy manager", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "13.1.0.2" }, { "model": "big-ip access policy manager", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "13.1.0.5" }, { "model": "big-ip access policy manager", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "13.1.0.6" }, { "model": "big-ip access policy manager", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "13.1.1" }, { "model": "big-ip access policy manager", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "13.1.0.3" }, { "model": "big-ip access policy manager", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "13.1.0.4" }, { "model": "big-ip access policy manager client", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "7.1.6" }, { "model": "big-ip access policy manager client", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "7.1.5" }, { "model": "big-ip edge client", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "7160" }, { "model": "big-ip edge client", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "7150" }, { "model": "big-ip edge client", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "7101" }, { "model": "big-ip apm clients", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "7.1.6" }, { "model": "big-ip apm clients", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "7.1.5" }, { "model": "big-ip apm clients", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "7.1.6.1" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.1.1" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.1" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0.1" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.1.0.8" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.1.0.6" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.1.0.5" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.1.0.4" }, { "model": "big-ip edge client", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "7170" }, { "model": "big-ip apm clients", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "7.1.7" }, { "model": "big-ip apm", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "13.1.1.2" } ], "sources": [ { "db": "BID", "id": "105731" }, { "db": "JVNDB", "id": "JVNDB-2018-011247" }, { "db": "NVD", "id": "CVE-2018-15316" }, { "db": "CNNVD", "id": "CNNVD-201810-1094" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "13.1.1.1", "versionStartIncluding": "13.0.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager_client:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "7.1.6", "versionStartIncluding": "7.1.5", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:f5:big-ip_edge_client:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "7160", "versionStartIncluding": "7101", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2018-15316" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "105731" } ], "trust": 0.3 }, "cve": "CVE-2018-15316", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 2.1, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2018-15316", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-125563", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2018-15316", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2018-15316", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201810-1094", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-125563", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-125563" }, { "db": "JVNDB", "id": "JVNDB-2018-011247" }, { "db": "NVD", "id": "CVE-2018-15316" }, { "db": "CNNVD", "id": "CNNVD-201810-1094" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In F5 BIG-IP APM 13.0.0-13.1.1.1, APM Client 7.1.5-7.1.6, and/or Edge Client 7101-7160, the BIG-IP APM Edge Client component loads the policy library with user permission and bypassing the endpoint checks. Multiple F5 BIG-IP Products are prone to a security-bypass vulnerability. \nAn attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions; this may aid in launching further attacks. Edge Client is an integrated remote access client used in BIG-IP solutions. A local attacker could exploit this vulnerability to bypass endpoint detection", "sources": [ { "db": "NVD", "id": "CVE-2018-15316" }, { "db": "JVNDB", "id": "JVNDB-2018-011247" }, { "db": "BID", "id": "105731" }, { "db": "VULHUB", "id": "VHN-125563" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-15316", "trust": 2.8 }, { "db": "BID", "id": "105731", "trust": 2.0 }, { "db": "SECTRACK", "id": "1041936", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2018-011247", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201810-1094", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-125563", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-125563" }, { "db": "BID", "id": "105731" }, { "db": "JVNDB", "id": "JVNDB-2018-011247" }, { "db": "NVD", "id": "CVE-2018-15316" }, { "db": "CNNVD", "id": "CNNVD-201810-1094" } ] }, "id": "VAR-201810-0912", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-125563" } ], "trust": 0.5444825600000001 }, "last_update_date": "2023-12-18T12:36:27.719000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "K51220077", "trust": 0.8, "url": "https://support.f5.com/csp/article/k51220077" }, { "title": "F5 BIG-IP APM , APM Client and Edge Client Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=86220" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-011247" }, { "db": "CNNVD", "id": "CNNVD-201810-1094" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-254", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-125563" }, { "db": "JVNDB", "id": "JVNDB-2018-011247" }, { "db": "NVD", "id": "CVE-2018-15316" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://support.f5.com/csp/article/k51220077" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/105731" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1041936" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-15316" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-15316" }, { "trust": 0.3, "url": "http://www.f5.com/products/big-ip/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-125563" }, { "db": "BID", "id": "105731" }, { "db": "JVNDB", "id": "JVNDB-2018-011247" }, { "db": "NVD", "id": "CVE-2018-15316" }, { "db": "CNNVD", "id": "CNNVD-201810-1094" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-125563" }, { "db": "BID", "id": "105731" }, { "db": "JVNDB", "id": "JVNDB-2018-011247" }, { "db": "NVD", "id": "CVE-2018-15316" }, { "db": "CNNVD", "id": "CNNVD-201810-1094" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-19T00:00:00", "db": "VULHUB", "id": "VHN-125563" }, { "date": "2018-10-18T00:00:00", "db": "BID", "id": "105731" }, { "date": "2019-01-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-011247" }, { "date": "2018-10-19T13:29:00.587000", "db": "NVD", "id": "CVE-2018-15316" }, { "date": "2018-10-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201810-1094" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-10-03T00:00:00", "db": "VULHUB", "id": "VHN-125563" }, { "date": "2018-10-18T00:00:00", "db": "BID", "id": "105731" }, { "date": "2019-01-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-011247" }, { "date": "2019-10-03T00:03:26.223000", "db": "NVD", "id": "CVE-2018-15316" }, { "date": "2019-10-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201810-1094" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201810-1094" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural F5 Vulnerabilities related to security functions in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-011247" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "lack of information", "sources": [ { "db": "CNNVD", "id": "CNNVD-201810-1094" } ], "trust": 0.6 } }
var-201812-0372
Vulnerability from variot
The svpn component of the F5 BIG-IP APM client prior to version 7.1.7.2 for Linux and macOS runs as a privileged process and can allow an unprivileged user to get ownership of files owned by root on the local client host in a race condition. F5 BIG-IP APM Client is prone to a local privilege escalation vulnerability. Local attackers may exploit this issue to gain elevated privileges. BIG-IP APM Client prior to 7.1.7.2 are vulnerable
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201812-0372", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "big-ip access policy manager", "scope": "eq", "trust": 1.6, "vendor": "f5", "version": "14.0.0" }, { "model": "big-ip access policy manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip access policy manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "12.1.3" }, { "model": "big-ip access policy manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "12.1.0" }, { "model": "big-ip access policy manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "13.0.0" }, { "model": "big-ip access policy manager client", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "7.1.5" }, { "model": "big-ip access policy manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "13.1.1" }, { "model": "big-ip access policy manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "11.6.3" }, { "model": "big-ip access policy manager client", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "7.1.7" }, { "model": "big-ip access policy manager", "scope": null, "trust": 0.8, "vendor": "f5", "version": null }, { "model": "big-ip access policy manager client", "scope": "lt", "trust": 0.8, "vendor": "f5", "version": "7.1.7.2 (linux and macos)" }, { "model": "big-ip access policy manager", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "13.1.0.8" }, { "model": "big-ip access policy manager", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "13.1.0.7" }, { "model": "big-ip access policy manager client", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "7.1.6.1" }, { "model": "big-ip access policy manager", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "13.1.0.5" }, { "model": "big-ip access policy manager", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "13.1.0.6" }, { "model": "big-ip access policy manager", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "13.1.1" }, { "model": "big-ip access policy manager client", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "7.1.7" }, { "model": "big-ip access policy manager client", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "7.1.6" }, { "model": "big-ip access policy manager client", "scope": "eq", "trust": 0.6, "vendor": "f5", "version": "7.1.5" }, { "model": "big-ip edge client", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "7150" }, { "model": "big-ip edge client", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "7101" }, { "model": "big-ip apm clients", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "7.1.7" }, { "model": "big-ip apm clients", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "7.1.6" }, { "model": "big-ip apm clients", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "7.1.5" }, { "model": "big-ip apm clients", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "7.1.7.1" }, { "model": "big-ip apm clients", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "7.1.6.1" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "14.0" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.1.1" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.1" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.3" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.1" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.3" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.2" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.6" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.5" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.2" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.0" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip apm clients", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "7.1.7.2" } ], "sources": [ { "db": "BID", "id": "106135" }, { "db": "JVNDB", "id": "JVNDB-2018-013272" }, { "db": "NVD", "id": "CVE-2018-15332" }, { "db": "CNNVD", "id": "CNNVD-201812-237" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager_client:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "7.1.7", "versionStartIncluding": "7.1.5", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "12.1.3", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "13.1.1", "versionStartIncluding": "13.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:14.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.6.3", "versionStartIncluding": "11.5.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2018-15332" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Rich Mirch", "sources": [ { "db": "BID", "id": "106135" } ], "trust": 0.3 }, "cve": "CVE-2018-15332", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.4, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2018-15332", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.0, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "High", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.0, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2018-15332", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2018-15332", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201812-237", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2018-15332", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2018-15332" }, { "db": "JVNDB", "id": "JVNDB-2018-013272" }, { "db": "NVD", "id": "CVE-2018-15332" }, { "db": "CNNVD", "id": "CNNVD-201812-237" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The svpn component of the F5 BIG-IP APM client prior to version 7.1.7.2 for Linux and macOS runs as a privileged process and can allow an unprivileged user to get ownership of files owned by root on the local client host in a race condition. F5 BIG-IP APM Client is prone to a local privilege escalation vulnerability. \nLocal attackers may exploit this issue to gain elevated privileges. \nBIG-IP APM Client prior to 7.1.7.2 are vulnerable", "sources": [ { "db": "NVD", "id": "CVE-2018-15332" }, { "db": "JVNDB", "id": "JVNDB-2018-013272" }, { "db": "BID", "id": "106135" }, { "db": "VULMON", "id": "CVE-2018-15332" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-15332", "trust": 2.8 }, { "db": "BID", "id": "106135", "trust": 2.0 }, { "db": "JVNDB", "id": "JVNDB-2018-013272", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201812-237", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2018-15332", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2018-15332" }, { "db": "BID", "id": "106135" }, { "db": "JVNDB", "id": "JVNDB-2018-013272" }, { "db": "NVD", "id": "CVE-2018-15332" }, { "db": "CNNVD", "id": "CNNVD-201812-237" } ] }, "id": "VAR-201812-0372", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.44448256 }, "last_update_date": "2023-12-18T13:56:49.955000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "K12130880", "trust": 0.8, "url": "https://support.f5.com/csp/article/k12130880" }, { "title": "F5 BIG-IP APM and BIG-IP APM Clients svpn Fixes for component security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=87513" }, { "title": "security-research", "trust": 0.1, "url": "https://github.com/mirchr/security-research " } ], "sources": [ { "db": "VULMON", "id": "CVE-2018-15332" }, { "db": "JVNDB", "id": "JVNDB-2018-013272" }, { "db": "CNNVD", "id": "CNNVD-201812-237" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-013272" }, { "db": "NVD", "id": "CVE-2018-15332" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://support.f5.com/csp/article/k12130880" }, { "trust": 1.8, "url": "http://www.securityfocus.com/bid/106135" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-15332" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-15332" }, { "trust": 0.3, "url": "http://www.f5.com/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/362.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/mirchr/security-research" } ], "sources": [ { "db": "VULMON", "id": "CVE-2018-15332" }, { "db": "BID", "id": "106135" }, { "db": "JVNDB", "id": "JVNDB-2018-013272" }, { "db": "NVD", "id": "CVE-2018-15332" }, { "db": "CNNVD", "id": "CNNVD-201812-237" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2018-15332" }, { "db": "BID", "id": "106135" }, { "db": "JVNDB", "id": "JVNDB-2018-013272" }, { "db": "NVD", "id": "CVE-2018-15332" }, { "db": "CNNVD", "id": "CNNVD-201812-237" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-12-06T00:00:00", "db": "VULMON", "id": "CVE-2018-15332" }, { "date": "2018-12-06T00:00:00", "db": "BID", "id": "106135" }, { "date": "2019-02-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-013272" }, { "date": "2018-12-06T13:29:00.247000", "db": "NVD", "id": "CVE-2018-15332" }, { "date": "2018-12-07T00:00:00", "db": "CNNVD", "id": "CNNVD-201812-237" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-09-08T00:00:00", "db": "VULMON", "id": "CVE-2018-15332" }, { "date": "2018-12-06T00:00:00", "db": "BID", "id": "106135" }, { "date": "2019-02-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-013272" }, { "date": "2021-09-08T17:21:45.233000", "db": "NVD", "id": "CVE-2018-15332" }, { "date": "2021-09-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201812-237" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "106135" }, { "db": "CNNVD", "id": "CNNVD-201812-237" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Linux and macOS for F5 BIG-IP APM client Race condition vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-013272" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competition condition problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201812-237" } ], "trust": 0.6 } }