// For flags

CVE-2018-5518

 

Severity Score

5.4
*CVSS v3

Exploit Likelihood

< 1%
*EPSS

Affected Versions

26
*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

On F5 BIG-IP 13.0.0-13.1.0.5 or 12.0.0-12.1.3.3, malicious root users with access to a VCMP guest can cause a disruption of service on adjacent VCMP guests running on the same host. Exploiting this vulnerability causes the vCMPd process on the adjacent VCMP guest to restart and produce a core file. This issue is only exploitable on a VCMP guest which is operating in "host-only" or "bridged" mode. VCMP guests which are "isolated" are not impacted by this issue and do not provide mechanism to exploit the vulnerability. Guests which are deployed in "Appliance Mode" may be impacted however the exploit is not possible from an Appliance Mode guest. To exploit this vulnerability root access on a guest system deployed as "host-only" or "bridged" mode is required.

En F5 BIG-IP 13.0.0-13.1.0.5 o 12.0.0-12.1.3.3, usuarios root maliciosos con acceso a un VCMP invitado pueden provocar una interrupción del servicio en VCMP invitados adyacentes que se estén ejecutando en el mismo host. La explotación de esta vulnerabilidad hace que el proceso vCMPd en el VCMP invitado adyacente se reinicie y produzca un archivo core. Este problema solo puede explotarse en un VCMP invitado que opere en los modos "host-only" o "bridged". Los VCMP invitados que están "aislados" no se ven afectados por este problema y no proporcionan mecanismos para explotar esta vulnerabilidad. Los invitados desplegados en "modo appliance" podrían verse afectados; sin embargo, el exploit no es posible desde un invitado en modo appliance. Para explotar esta vulnerabilidad, se requiere acceso root en un sistema invitado desplegado en los modos "host-only" o "bridged".

*Credits: N/A
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
High
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Adjacent
Attack Complexity
Medium
Authentication
Single
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-01-12 CVE Reserved
  • 2018-05-02 CVE Published
  • 2024-09-16 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
References (2)
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions (26)