First published: Fri Sep 06 2024(Updated: )
An improper link resolution flaw while extracting an archive can lead to changing the access control list (ACL) of the target of the link. An attacker may provide a malicious archive to a victim user, who would trigger this flaw when trying to extract the archive. A local attacker may use this flaw to change the ACL of a file on the system and gain more privileges.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP and BIG-IQ Centralized Management | >=17.1.0<=17.1.1 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=16.1.0<=16.1.5 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=15.1.0<=15.1.10 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=8.2.0<=8.3.0 | |
F5 Traffix Systems Signaling Delivery Controller | =5.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of F5-K000140961 is classified as a medium-risk vulnerability.
To fix F5-K000140961, upgrade to the latest versions of the affected F5 products as specified in the advisory.
Affected products include F5 BIG-IP versions 15.1.0 to 15.1.10, 16.1.0 to 16.1.5, 17.1.0 to 17.1.1, F5 BIG-IQ Centralized Management versions 8.2.0 to 8.3.0, and F5 Traffix Systems Signaling Delivery Controller version 5.2.0.
F5-K000140961 exposes systems to potential unauthorized changes of access control list (ACL) through malicious archive extraction.
A local attacker can exploit the F5-K000140961 vulnerability by providing a malicious archive to the victim user.