8.8
CVSSv3

CVE-2019-6642

Published: 01/07/2019 Updated: 07/11/2023
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 801
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

In BIG-IP 15.0.0, 14.0.0-14.1.0.5, 13.0.0-13.1.1.5, 12.1.0-12.1.4.2, and 11.5.2-11.6.4, BIG-IQ 6.0.0-6.1.0 and 5.1.0-5.4.0, iWorkflow 2.3.0, and Enterprise Manager 3.1.1, authenticated users with the ability to upload files (via scp, for example) can escalate their privileges to allow root shell access from within the TMOS Shell (tmsh) interface. The tmsh interface allows users to execute a secondary program via tools like sftp or scp.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

f5 big-ip access policy manager

f5 big-ip access policy manager 15.0.0

f5 big-ip advanced firewall manager

f5 big-ip advanced firewall manager 15.0.0

f5 big-ip application acceleration manager

f5 big-ip application acceleration manager 15.0.0

f5 big-ip link controller

f5 big-ip link controller 15.0.0

f5 big-ip policy enforcement manager

f5 big-ip policy enforcement manager 15.0.0

f5 big-ip webaccelerator

f5 big-ip webaccelerator 15.0.0

f5 big-ip application security manager

f5 big-ip application security manager 15.0.0

f5 big-ip local traffic manager

f5 big-ip local traffic manager 15.0.0

f5 big-ip fraud protection service

f5 big-ip fraud protection service 15.0.0

f5 big-ip global traffic manager

f5 big-ip global traffic manager 15.0.0

f5 big-ip analytics

f5 big-ip analytics 15.0.0

f5 big-ip edge gateway

f5 big-ip edge gateway 15.0.0

f5 big-ip domain name system

f5 big-ip domain name system 15.0.0

f5 big-iq centralized management

f5 enterprise manager 3.1.1

f5 iworkflow 2.3.0