Vulnerabilities > CVE-2020-5858 - Unspecified vulnerability in F5 products

047910
CVSS 7.8 - HIGH
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
LOW
Confidentiality impact
HIGH
Integrity impact
HIGH
Availability impact
HIGH
local
low complexity
f5
nessus

Summary

On BIG-IP 15.0.0-15.0.1.2, 14.1.0-14.1.2.2, 13.1.0-13.1.3.2, 12.1.0-12.1.5, and 11.5.2-11.6.5.1 and BIG-IQ 7.0.0, 6.0.0-6.1.0, and 5.2.0-5.4.0, users with non-administrator roles (for example, Guest or Resource Administrator) with tmsh shell access can execute arbitrary commands with elevated privilege via a crafted tmsh command.

Vulnerable Configurations

Part Description Count
Application
F5
1065

Nessus

NASL familyF5 Networks Local Security Checks
NASL idF5_BIGIP_SOL36814487.NASL
descriptionUsers with non-administrator roles (for example, Guest or Resource Administrator)with TMOS Shell ( tmsh ) access can run arbitrary commands with elevated privilege using a crafted tmsh command.(CVE-2020-5858) Impact BIG-IP andBIG-IQ This vulnerability allows unauthorized privileges to authenticated non-administrator users who have tmsh access. Traffix SDC There is no impact; these F5 products are not affected by this vulnerability.
last seen2020-04-04
modified2020-03-27
plugin id134958
published2020-03-27
reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/134958
titleF5 Networks BIG-IP : BIG-IP tmsh vulnerability (K36814487)