// For flags

CVE-2018-5518

 

Severity Score

5.4
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

On F5 BIG-IP 13.0.0-13.1.0.5 or 12.0.0-12.1.3.3, malicious root users with access to a VCMP guest can cause a disruption of service on adjacent VCMP guests running on the same host. Exploiting this vulnerability causes the vCMPd process on the adjacent VCMP guest to restart and produce a core file. This issue is only exploitable on a VCMP guest which is operating in "host-only" or "bridged" mode. VCMP guests which are "isolated" are not impacted by this issue and do not provide mechanism to exploit the vulnerability. Guests which are deployed in "Appliance Mode" may be impacted however the exploit is not possible from an Appliance Mode guest. To exploit this vulnerability root access on a guest system deployed as "host-only" or "bridged" mode is required.

En F5 BIG-IP 13.0.0-13.1.0.5 o 12.0.0-12.1.3.3, usuarios root maliciosos con acceso a un VCMP invitado pueden provocar una interrupción del servicio en VCMP invitados adyacentes que se estén ejecutando en el mismo host. La explotación de esta vulnerabilidad hace que el proceso vCMPd en el VCMP invitado adyacente se reinicie y produzca un archivo core. Este problema solo puede explotarse en un VCMP invitado que opere en los modos "host-only" o "bridged". Los VCMP invitados que están "aislados" no se ven afectados por este problema y no proporcionan mecanismos para explotar esta vulnerabilidad. Los invitados desplegados en "modo appliance" podrían verse afectados; sin embargo, el exploit no es posible desde un invitado en modo appliance. Para explotar esta vulnerabilidad, se requiere acceso root en un sistema invitado desplegado en los modos "host-only" o "bridged".

*Credits: N/A
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
High
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Adjacent
Attack Complexity
Medium
Authentication
Single
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-01-12 CVE Reserved
  • 2018-05-02 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
References (2)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
F5
Search vendor "F5"
Big-ip Local Traffic Manager
Search vendor "F5" for product "Big-ip Local Traffic Manager"
>= 12.0.0 <= 12.1.3
Search vendor "F5" for product "Big-ip Local Traffic Manager" and version " >= 12.0.0 <= 12.1.3"
-
Affected
F5
Search vendor "F5"
Big-ip Local Traffic Manager
Search vendor "F5" for product "Big-ip Local Traffic Manager"
>= 13.0.0 <= 13.1.0
Search vendor "F5" for product "Big-ip Local Traffic Manager" and version " >= 13.0.0 <= 13.1.0"
-
Affected
F5
Search vendor "F5"
Big-ip Application Acceleration Manager
Search vendor "F5" for product "Big-ip Application Acceleration Manager"
>= 12.0.0 <= 12.1.3
Search vendor "F5" for product "Big-ip Application Acceleration Manager" and version " >= 12.0.0 <= 12.1.3"
-
Affected
F5
Search vendor "F5"
Big-ip Application Acceleration Manager
Search vendor "F5" for product "Big-ip Application Acceleration Manager"
>= 13.0.0 <= 13.1.0
Search vendor "F5" for product "Big-ip Application Acceleration Manager" and version " >= 13.0.0 <= 13.1.0"
-
Affected
F5
Search vendor "F5"
Big-ip Advanced Firewall Manager
Search vendor "F5" for product "Big-ip Advanced Firewall Manager"
>= 12.0.0 <= 12.1.3
Search vendor "F5" for product "Big-ip Advanced Firewall Manager" and version " >= 12.0.0 <= 12.1.3"
-
Affected
F5
Search vendor "F5"
Big-ip Advanced Firewall Manager
Search vendor "F5" for product "Big-ip Advanced Firewall Manager"
>= 13.0.0 <= 13.1.0
Search vendor "F5" for product "Big-ip Advanced Firewall Manager" and version " >= 13.0.0 <= 13.1.0"
-
Affected
F5
Search vendor "F5"
Big-ip Analytics
Search vendor "F5" for product "Big-ip Analytics"
>= 12.0.0 <= 12.1.3
Search vendor "F5" for product "Big-ip Analytics" and version " >= 12.0.0 <= 12.1.3"
-
Affected
F5
Search vendor "F5"
Big-ip Analytics
Search vendor "F5" for product "Big-ip Analytics"
>= 13.0.0 <= 13.1.0
Search vendor "F5" for product "Big-ip Analytics" and version " >= 13.0.0 <= 13.1.0"
-
Affected
F5
Search vendor "F5"
Big-ip Access Policy Manager
Search vendor "F5" for product "Big-ip Access Policy Manager"
>= 12.0.0 <= 12.1.3
Search vendor "F5" for product "Big-ip Access Policy Manager" and version " >= 12.0.0 <= 12.1.3"
-
Affected
F5
Search vendor "F5"
Big-ip Access Policy Manager
Search vendor "F5" for product "Big-ip Access Policy Manager"
>= 13.0.0 <= 13.1.0
Search vendor "F5" for product "Big-ip Access Policy Manager" and version " >= 13.0.0 <= 13.1.0"
-
Affected
F5
Search vendor "F5"
Big-ip Application Security Manager
Search vendor "F5" for product "Big-ip Application Security Manager"
>= 12.0.0 <= 12.1.3
Search vendor "F5" for product "Big-ip Application Security Manager" and version " >= 12.0.0 <= 12.1.3"
-
Affected
F5
Search vendor "F5"
Big-ip Application Security Manager
Search vendor "F5" for product "Big-ip Application Security Manager"
>= 13.0.0 <= 13.1.0
Search vendor "F5" for product "Big-ip Application Security Manager" and version " >= 13.0.0 <= 13.1.0"
-
Affected
F5
Search vendor "F5"
Big-ip Edge Gateway
Search vendor "F5" for product "Big-ip Edge Gateway"
>= 12.0.0 <= 12.1.3
Search vendor "F5" for product "Big-ip Edge Gateway" and version " >= 12.0.0 <= 12.1.3"
-
Affected
F5
Search vendor "F5"
Big-ip Edge Gateway
Search vendor "F5" for product "Big-ip Edge Gateway"
>= 13.0.0 <= 13.1.0
Search vendor "F5" for product "Big-ip Edge Gateway" and version " >= 13.0.0 <= 13.1.0"
-
Affected
F5
Search vendor "F5"
Big-ip Global Traffic Manager
Search vendor "F5" for product "Big-ip Global Traffic Manager"
>= 12.0.0 <= 12.1.3
Search vendor "F5" for product "Big-ip Global Traffic Manager" and version " >= 12.0.0 <= 12.1.3"
-
Affected
F5
Search vendor "F5"
Big-ip Global Traffic Manager
Search vendor "F5" for product "Big-ip Global Traffic Manager"
>= 13.0.0 <= 13.1.0
Search vendor "F5" for product "Big-ip Global Traffic Manager" and version " >= 13.0.0 <= 13.1.0"
-
Affected
F5
Search vendor "F5"
Big-ip Link Controller
Search vendor "F5" for product "Big-ip Link Controller"
>= 12.0.0 <= 12.1.3
Search vendor "F5" for product "Big-ip Link Controller" and version " >= 12.0.0 <= 12.1.3"
-
Affected
F5
Search vendor "F5"
Big-ip Link Controller
Search vendor "F5" for product "Big-ip Link Controller"
>= 13.0.0 <= 13.1.0
Search vendor "F5" for product "Big-ip Link Controller" and version " >= 13.0.0 <= 13.1.0"
-
Affected
F5
Search vendor "F5"
Big-ip Policy Enforcement Manager
Search vendor "F5" for product "Big-ip Policy Enforcement Manager"
>= 12.0.0 <= 12.1.3
Search vendor "F5" for product "Big-ip Policy Enforcement Manager" and version " >= 12.0.0 <= 12.1.3"
-
Affected
F5
Search vendor "F5"
Big-ip Policy Enforcement Manager
Search vendor "F5" for product "Big-ip Policy Enforcement Manager"
>= 13.0.0 <= 13.1.0
Search vendor "F5" for product "Big-ip Policy Enforcement Manager" and version " >= 13.0.0 <= 13.1.0"
-
Affected
F5
Search vendor "F5"
Big-ip Webaccelerator
Search vendor "F5" for product "Big-ip Webaccelerator"
>= 12.0.0 <= 12.1.3
Search vendor "F5" for product "Big-ip Webaccelerator" and version " >= 12.0.0 <= 12.1.3"
-
Affected
F5
Search vendor "F5"
Big-ip Webaccelerator
Search vendor "F5" for product "Big-ip Webaccelerator"
>= 13.0.0 <= 13.1.0
Search vendor "F5" for product "Big-ip Webaccelerator" and version " >= 13.0.0 <= 13.1.0"
-
Affected
F5
Search vendor "F5"
Big-ip Websafe
Search vendor "F5" for product "Big-ip Websafe"
>= 12.0.0 <= 12.1.3
Search vendor "F5" for product "Big-ip Websafe" and version " >= 12.0.0 <= 12.1.3"
-
Affected
F5
Search vendor "F5"
Big-ip Websafe
Search vendor "F5" for product "Big-ip Websafe"
>= 13.0.0 <= 13.1.0
Search vendor "F5" for product "Big-ip Websafe" and version " >= 13.0.0 <= 13.1.0"
-
Affected
F5
Search vendor "F5"
Big-ip Domain Name System
Search vendor "F5" for product "Big-ip Domain Name System"
>= 12.0.0 <= 12.1.3
Search vendor "F5" for product "Big-ip Domain Name System" and version " >= 12.0.0 <= 12.1.3"
-
Affected
F5
Search vendor "F5"
Big-ip Domain Name System
Search vendor "F5" for product "Big-ip Domain Name System"
>= 13.0.0 <= 13.1.0
Search vendor "F5" for product "Big-ip Domain Name System" and version " >= 13.0.0 <= 13.1.0"
-
Affected