Vulnerabilities > CVE-2018-15327 - Missing Authorization vulnerability in F5 products
Attack vector
NETWORK Attack complexity
LOW Privileges required
HIGH Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
In BIG-IP 14.0.0-14.0.0.2 or 13.0.0-13.1.1.1 or Enterprise Manager 3.1.1, when authenticated administrative users run commands in the Traffic Management User Interface (TMUI), also referred to as the BIG-IP Configuration utility, restrictions on allowed commands may not be enforced.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Nessus
NASL family | F5 Networks Local Security Checks |
NASL id | F5_BIGIP_SOL20222812.NASL |
description | When authenticated administrative users run commands in the Traffic Management User Interface (TMUI), also referred to as the BIG-IP Configuration utility, restrictions on allowed commands may not be enforced. (CVE-2018-15327) Impact BIG-IP and Enterprise Manager This vulnerability allowsa privilege escalation for authenticated administrative users. BIG-IQ, F5 iWorkflow, and Traffix SDC There is no impact; these F5 products are not affected by this vulnerability. |
last seen | 2020-03-17 |
modified | 2018-11-02 |
plugin id | 118638 |
published | 2018-11-02 |
reporter | This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/118638 |
title | F5 Networks BIG-IP : BIG-IP Configuration utility vulnerability (K20222812) |