First published: Wed Oct 31 2018(Updated: )
In BIG-IP 14.0.0-14.0.0.2 or 13.0.0-13.1.1.1 or Enterprise Manager 3.1.1, when authenticated administrative users run commands in the Traffic Management User Interface (TMUI), also referred to as the BIG-IP Configuration utility, restrictions on allowed commands may not be enforced.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
f5 big-ip local traffic manager | >=13.0.0<=13.1.1.1 | |
f5 big-ip local traffic manager | >=14.0.0<=14.0.0.2 | |
F5 BIG-IP Advanced Firewall Manager | >=13.0.0<=13.1.1.1 | |
F5 BIG-IP Advanced Firewall Manager | >=14.0.0<=14.0.0.2 | |
f5 big-ip application acceleration manager | >=13.0.0<=13.1.1.1 | |
f5 big-ip application acceleration manager | >=14.0.0<=14.0.0.2 | |
F5 BIG-IP Analytics | >=13.0.0<=13.1.1.1 | |
F5 BIG-IP Analytics | >=14.0.0<=14.0.0.2 | |
F5 BIG-IP Access Policy Manager | >=13.0.0<=13.1.1.1 | |
F5 BIG-IP Access Policy Manager | >=14.0.0<=14.0.0.2 | |
F5 BIG-IP Protocol Security Module | >=13.0.0<=13.1.1.1 | |
F5 BIG-IP Protocol Security Module | >=14.0.0<=14.0.0.2 | |
f5 big-ip domain name system | >=13.0.0<=13.1.1.1 | |
f5 big-ip domain name system | >=14.0.0<=14.0.0.2 | |
f5 big-ip edge gateway | >=13.0.0<=13.1.1.1 | |
f5 big-ip edge gateway | >=14.0.0<=14.0.0.2 | |
f5 big-ip fraud protection service | >=13.0.0<=13.1.1.1 | |
f5 big-ip fraud protection service | >=14.0.0<=14.0.0.2 | |
f5 big-ip global traffic manager | >=13.0.0<=13.1.1.1 | |
f5 big-ip global traffic manager | >=14.0.0<=14.0.0.2 | |
f5 big-ip link controller | >=13.0.0<=13.1.1.1 | |
f5 big-ip link controller | >=14.0.0<=14.0.0.2 | |
f5 big-ip policy enforcement manager | >=13.0.0<=13.1.1.1 | |
f5 big-ip policy enforcement manager | >=14.0.0<=14.0.0.2 | |
f5 big-ip webaccelerator | >=13.0.0<=13.1.1.1 | |
f5 big-ip webaccelerator | >=14.0.0<=14.0.0.2 | |
f5 enterprise manager | =3.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-15327 is a vulnerability in BIG-IP and Enterprise Manager that allows authenticated administrative users to bypass command restrictions.
Versions 14.0.0-14.0.0.2 and 13.0.0-13.1.1.1 of BIG-IP, as well as version 3.1.1 of Enterprise Manager are affected by CVE-2018-15327.
The severity of CVE-2018-15327 is rated as high with a CVSS score of 7.2.
To fix CVE-2018-15327, upgrade to a version above 14.0.0.2 or 13.1.1.1 for BIG-IP, and upgrade to a version above 3.1.1 for Enterprise Manager.
You can find more information about CVE-2018-15327 on the F5 support website: https://support.f5.com/csp/article/K20222812