10

CVE-2020-5902

Warning
Exploit

In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, the Traffic Management User Interface (TMUI), also referred to as the Configuration utility, has a Remote Code Execution (RCE) vulnerability in undisclosed pages.

Data is provided by the National Vulnerability Database (NVD)
F5Big-ip Access Policy Manager Version >= 11.6.1 < 11.6.5.2
F5Big-ip Access Policy Manager Version >= 12.1.0 < 12.1.5.2
F5Big-ip Access Policy Manager Version >= 13.1.0 < 13.1.3.4
F5Big-ip Access Policy Manager Version >= 14.1.0 < 14.1.2.6
F5Big-ip Access Policy Manager Version >= 15.0.0 <= 15.0.1.4
F5Big-ip Access Policy Manager Version >= 15.1.0 < 15.1.0.4
F5Big-ip Advanced Firewall Manager Version >= 11.6.1 < 11.6.5.2
F5Big-ip Advanced Firewall Manager Version >= 12.1.0 < 12.1.5.2
F5Big-ip Advanced Firewall Manager Version >= 13.1.0 < 13.1.3.4
F5Big-ip Advanced Firewall Manager Version >= 14.1.0 < 14.1.2.6
F5Big-ip Advanced Firewall Manager Version >= 15.0.0 < 15.0.1.4
F5Big-ip Advanced Firewall Manager Version >= 15.1.0 < 15.1.0.4
F5Big-ip Advanced Web Application Firewall Version >= 11.6.1 < 11.6.5.2
F5Big-ip Advanced Web Application Firewall Version >= 12.1.0 < 12.1.5.2
F5Big-ip Advanced Web Application Firewall Version >= 13.1.0 < 13.1.3.4
F5Big-ip Advanced Web Application Firewall Version >= 14.1.0 < 14.1.2.6
F5Big-ip Advanced Web Application Firewall Version >= 15.0.0 < 15.0.1.4
F5Big-ip Advanced Web Application Firewall Version >= 15.1.0 < 15.1.0.4
F5Big-ip Analytics Version >= 11.6.1 < 11.6.5.2
F5Big-ip Analytics Version >= 12.1.0 < 12.1.5.2
F5Big-ip Analytics Version >= 13.1.0 < 13.1.3.4
F5Big-ip Analytics Version >= 14.1.0 < 14.1.2.6
F5Big-ip Analytics Version >= 15.0.0 < 15.0.1.4
F5Big-ip Analytics Version >= 15.1.0 < 15.1.0.4
F5Big-ip Application Acceleration Manager Version >= 11.6.1 < 11.6.5.2
F5Big-ip Application Acceleration Manager Version >= 12.1.0 < 12.1.5.2
F5Big-ip Application Acceleration Manager Version >= 13.1.0 < 13.1.3.4
F5Big-ip Application Acceleration Manager Version >= 14.1.0 < 14.1.2.6
F5Big-ip Application Acceleration Manager Version >= 15.0.0 < 15.0.1.4
F5Big-ip Application Acceleration Manager Version >= 15.1.0 < 15.1.0.4
F5Big-ip Application Security Manager Version >= 11.6.1 < 11.6.5.2
F5Big-ip Application Security Manager Version >= 12.1.0 < 12.1.5.2
F5Big-ip Application Security Manager Version >= 13.1.0 < 13.1.3.4
F5Big-ip Application Security Manager Version >= 14.1.0 < 14.1.2.6
F5Big-ip Application Security Manager Version >= 15.0.0 < 15.0.1.4
F5Big-ip Application Security Manager Version >= 15.1.0 < 15.1.0.4
F5Big-ip Ddos Hybrid Defender Version >= 11.6.1 < 11.6.5.2
F5Big-ip Ddos Hybrid Defender Version >= 12.1.0 < 12.1.5.2
F5Big-ip Ddos Hybrid Defender Version >= 13.1.0 < 13.1.3.4
F5Big-ip Ddos Hybrid Defender Version >= 14.1.0 < 14.1.2.6
F5Big-ip Ddos Hybrid Defender Version >= 15.0.0 < 15.0.1.4
F5Big-ip Ddos Hybrid Defender Version >= 15.1.0 < 15.1.0.4
F5Big-ip Domain Name System Version >= 11.6.1 < 11.6.5.2
F5Big-ip Domain Name System Version >= 12.1.0 < 12.1.5.2
F5Big-ip Domain Name System Version >= 13.1.0 < 13.1.3.4
F5Big-ip Domain Name System Version >= 14.1.0 < 14.1.2.6
F5Big-ip Domain Name System Version >= 15.0.0 < 15.0.1.4
F5Big-ip Domain Name System Version >= 15.1.0 < 15.1.0.4
F5Big-ip Fraud Protection Service Version >= 11.6.1 < 11.6.5.2
F5Big-ip Fraud Protection Service Version >= 12.1.0 < 12.1.5.2
F5Big-ip Fraud Protection Service Version >= 13.1.0 < 13.1.3.4
F5Big-ip Fraud Protection Service Version >= 14.1.0 < 14.1.2.6
F5Big-ip Fraud Protection Service Version >= 15.0.0 < 15.0.1.4
F5Big-ip Fraud Protection Service Version >= 15.1.0 < 15.1.0.4
F5Big-ip Global Traffic Manager Version >= 11.6.1 < 11.6.5.2
F5Big-ip Global Traffic Manager Version >= 12.1.0 < 12.1.5.2
F5Big-ip Global Traffic Manager Version >= 13.1.0 < 13.1.3.4
F5Big-ip Global Traffic Manager Version >= 14.1.0 < 14.1.2.6
F5Big-ip Global Traffic Manager Version >= 15.0.0 < 15.0.1.4
F5Big-ip Global Traffic Manager Version >= 15.1.0 < 15.1.0.4
F5Big-ip Link Controller Version >= 11.6.1 < 11.6.5.2
F5Big-ip Link Controller Version >= 12.1.0 < 12.1.5.2
F5Big-ip Link Controller Version >= 13.1.0 < 13.1.3.4
F5Big-ip Link Controller Version >= 14.1.0 < 14.1.2.6
F5Big-ip Link Controller Version >= 15.0.0 < 15.0.1.4
F5Big-ip Link Controller Version >= 15.1.0 < 15.1.0.4
F5Big-ip Local Traffic Manager Version >= 11.6.1 < 11.6.5.2
F5Big-ip Local Traffic Manager Version >= 12.1.0 < 12.1.5.2
F5Big-ip Local Traffic Manager Version >= 13.1.0 < 13.1.3.4
F5Big-ip Local Traffic Manager Version >= 14.1.0 < 14.1.2.6
F5Big-ip Local Traffic Manager Version >= 15.0.0 < 15.0.1.4
F5Big-ip Local Traffic Manager Version >= 15.1.0 < 15.1.0.4
F5Big-ip Policy Enforcement Manager Version >= 11.6.1 < 11.6.5.2
F5Big-ip Policy Enforcement Manager Version >= 12.1.0 < 12.1.5.2
F5Big-ip Policy Enforcement Manager Version >= 13.1.0 < 13.1.3.4
F5Big-ip Policy Enforcement Manager Version >= 14.1.0 < 14.1.2.6
F5Big-ip Policy Enforcement Manager Version >= 15.0.0 < 15.0.1.4
F5Big-ip Policy Enforcement Manager Version >= 15.1.0 < 15.1.0.4
F5Ssl Orchestrator Version >= 11.6.1 < 11.6.5.2
F5Ssl Orchestrator Version >= 12.1.0 < 12.1.5.2
F5Ssl Orchestrator Version >= 13.1.0 < 13.1.3.4
F5Ssl Orchestrator Version >= 14.1.0 < 14.1.2.6
F5Ssl Orchestrator Version >= 15.0.0 < 15.0.1.4
F5Ssl Orchestrator Version >= 15.1.0 < 15.1.0.4

03.11.2021: CISA Known Exploited Vulnerabilities (KEV) Catalog

F5 BIG-IP Traffic Management User Interface (TMUI) Remote Code Execution Vulnerability

Vulnerability

F5 BIG-IP Traffic Management User Interface (TMUI) contains a remote code execution vulnerability in undisclosed pages.

Description

Apply updates per vendor instructions.

Required actions
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 94.43% 1
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 10 10 10
AV:N/AC:L/Au:N/C:C/I:C/A:C
134c704f-9b21-4f2e-91b3-4a467353bcc0 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.

https://www.kb.cert.org/vuls/id/290915
Third Party Advisory
US Government Resource