First published: Thu Jul 12 2018(Updated: )
The svpn component of the F5 BIG-IP APM client prior to version 7.1.7 for Linux and Mac OS X runs as a privileged process and can allow an unprivileged user to assume super-user privileges on the local client host. A malicious local unprivileged user may gain knowledge of sensitive information, manipulate certain data, or disrupt service.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Access Policy Manager | >=7.1.5<=7.1.6.1 | |
F5 BIG-IP Access Policy Manager | >=11.5.1<=11.5.6 | |
F5 BIG-IP Access Policy Manager | >=12.1.0<=12.1.3 | |
F5 BIG-IP Access Policy Manager | >=13.0.0<=13.1.0 | |
F5 BIG-IP Edge | >=7101<=7150 | |
macOS Yosemite | ||
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-5529 is classified as a high severity vulnerability due to the potential for unprivileged users to escalate their privileges.
To remediate CVE-2018-5529, upgrade to F5 BIG-IP APM client version 7.1.7 or later.
CVE-2018-5529 affects F5 BIG-IP Access Policy Manager versions prior to 7.1.7, as well as several versions from 11.5.1 to 12.1.3.
No, CVE-2018-5529 requires local access to the client machine to exploit.
The exploitation of CVE-2018-5529 can lead to unauthorized access to sensitive information and the ability for an attacker to execute commands with super-user privileges.