First published: Wed Oct 31 2018(Updated: )
When BIG-IP 14.0.0-14.0.0.2, 13.0.0-13.1.0.5, 12.1.0-12.1.3.5, 11.6.0-11.6.3.2, or 11.2.1-11.5.6, BIG-IQ Centralized Management 5.0.0-5.4.0 or 4.6.0, BIG-IQ Cloud and Orchestration 1.0.0, iWorkflow 2.1.0-2.3.0, or Enterprise Manager 3.1.1 is licensed for Appliance Mode, Admin and Resource administrator roles can by-pass BIG-IP Appliance Mode restrictions to overwrite critical system files. Attackers of high privilege level are able to overwrite critical system files which bypasses security controls in place to limit TMSH commands. This is possible with an administrator or resource administrator roles when granted TMSH. Resource administrator roles must have TMSH access in order to perform this attack.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 Big-ip Local Traffic Manager | >=11.2.1<=11.5.6 | |
F5 Big-ip Local Traffic Manager | >=11.6.0<=11.6.3.2 | |
F5 Big-ip Local Traffic Manager | >=12.1.0<=12.1.3.5 | |
F5 Big-ip Local Traffic Manager | >=13.0.0<=13.1.0.7 | |
F5 Big-ip Local Traffic Manager | >=14.0.0<=14.0.0.2 | |
F5 BIG-IP Advanced Firewall Manager | >=11.2.1<=11.5.6 | |
F5 BIG-IP Advanced Firewall Manager | >=11.6.0<=11.6.3.2 | |
F5 BIG-IP Advanced Firewall Manager | >=12.1.0<=12.1.3.5 | |
F5 BIG-IP Advanced Firewall Manager | >=13.0.0<=13.1.0.7 | |
F5 BIG-IP Advanced Firewall Manager | >=14.0.0<=14.0.0.2 | |
F5 Big-ip Application Acceleration Manager | >=11.2.1<=11.5.6 | |
F5 Big-ip Application Acceleration Manager | >=11.6.0<=11.6.3.2 | |
F5 Big-ip Application Acceleration Manager | >=12.1.0<=12.1.3.5 | |
F5 Big-ip Application Acceleration Manager | >=13.0.0<=13.1.0.7 | |
F5 Big-ip Application Acceleration Manager | >=14.0.0<=14.0.0.2 | |
F5 BIG-IP Analytics | >=11.2.1<=11.5.6 | |
F5 BIG-IP Analytics | >=11.6.0<=11.6.3.2 | |
F5 BIG-IP Analytics | >=12.1.0<=12.1.3.5 | |
F5 BIG-IP Analytics | >=13.0.0<=13.1.0.7 | |
F5 BIG-IP Analytics | >=14.0.0<=14.0.0.2 | |
F5 BIG-IP Access Policy Manager | >=11.2.1<=11.5.6 | |
F5 BIG-IP Access Policy Manager | >=11.6.0<=11.6.3.2 | |
F5 BIG-IP Access Policy Manager | >=12.1.0<=12.1.3.5 | |
F5 BIG-IP Access Policy Manager | >=13.0.0<=13.1.0.7 | |
F5 BIG-IP Access Policy Manager | >=14.0.0<=14.0.0.2 | |
F5 Big-ip Protocol Security Module | >=11.2.1<=11.5.6 | |
F5 Big-ip Protocol Security Module | >=11.6.0<=11.6.3.2 | |
F5 Big-ip Protocol Security Module | >=12.1.0<=12.1.3.5 | |
F5 Big-ip Protocol Security Module | >=13.0.0<=13.1.0.7 | |
F5 Big-ip Protocol Security Module | >=14.0.0<=14.0.0.2 | |
F5 Big-ip Domain Name System | >=11.2.1<=11.5.6 | |
F5 Big-ip Domain Name System | >=11.6.0<=11.6.3.2 | |
F5 Big-ip Domain Name System | >=12.1.0<=12.1.3.5 | |
F5 Big-ip Domain Name System | >=13.0.0<=13.1.0.7 | |
F5 Big-ip Domain Name System | >=14.0.0<=14.0.0.2 | |
F5 Big-ip Edge Gateway | >=11.2.1<=11.5.6 | |
F5 Big-ip Edge Gateway | >=11.6.0<=11.6.3.2 | |
F5 Big-ip Edge Gateway | >=12.1.0<=12.1.3.5 | |
F5 Big-ip Edge Gateway | >=13.0.0<=13.1.0.7 | |
F5 Big-ip Edge Gateway | >=14.0.0<=14.0.0.2 | |
F5 Big-ip Fraud Protection Service | >=11.2.1<=11.5.6 | |
F5 Big-ip Fraud Protection Service | >=11.6.0<=11.6.3.2 | |
F5 Big-ip Fraud Protection Service | >=12.1.0<=12.1.3.5 | |
F5 Big-ip Fraud Protection Service | >=13.0.0<=13.1.0.7 | |
F5 Big-ip Fraud Protection Service | >=14.0.0<=14.0.0.2 | |
F5 Big-ip Global Traffic Manager | >=11.2.1<=11.5.6 | |
F5 Big-ip Global Traffic Manager | >=11.6.0<=11.6.3.2 | |
F5 Big-ip Global Traffic Manager | >=12.1.0<=12.1.3.5 | |
F5 Big-ip Global Traffic Manager | >=13.0.0<=13.1.0.7 | |
F5 Big-ip Global Traffic Manager | >=14.0.0<=14.0.0.2 | |
F5 Big-ip Link Controller | >=11.2.1<=11.5.6 | |
F5 Big-ip Link Controller | >=11.6.0<=11.6.3.2 | |
F5 Big-ip Link Controller | >=12.1.0<=12.1.3.5 | |
F5 Big-ip Link Controller | >=13.0.0<=13.1.0.7 | |
F5 Big-ip Link Controller | >=14.0.0<=14.0.0.2 | |
F5 Big-ip Policy Enforcement Manager | >=11.2.1<=11.5.6 | |
F5 Big-ip Policy Enforcement Manager | >=11.6.0<=11.6.3.2 | |
F5 Big-ip Policy Enforcement Manager | >=12.1.0<=12.1.3.5 | |
F5 Big-ip Policy Enforcement Manager | >=13.0.0<=13.1.0.7 | |
F5 Big-ip Policy Enforcement Manager | >=14.0.0<=14.0.0.2 | |
F5 Big-ip Webaccelerator | >=11.2.1<=11.5.6 | |
F5 Big-ip Webaccelerator | >=11.6.0<=11.6.3.2 | |
F5 Big-ip Webaccelerator | >=12.1.0<=12.1.3.5 | |
F5 Big-ip Webaccelerator | >=13.0.0<=13.1.0.7 | |
F5 Big-ip Webaccelerator | >=14.0.0<=14.0.0.2 | |
F5 Enterprise Manager | =3.1.1 | |
F5 BIG-IQ Centralized Management | >=5.0.0<=5.4.0 | |
F5 BIG-IQ Centralized Management | =4.6.0 | |
F5 Big-iq Cloud And Orchestration | =1.0.0 | |
F5 iWorkflow | >=2.1.0<=2.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.