The svpn and policyserver components of the F5 BIG-IP APM client prior to version 7.1.7.1 for Linux and macOS runs as a privileged process and can allow an unprivileged user to get ownership of files owned by root on the local client host. A malicious local unprivileged user may gain knowledge of sensitive information, manipulate certain data, or assume super-user privileges on the local client host.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.securitytracker.com/id/1041510 | Broken Link | 
| https://github.com/mirchr/security-research/blob/master/vulnerabilities/F5/CVE-2018-5529.txt | Exploit Third Party Advisory | 
| https://support.f5.com/csp/article/K54431371 | Vendor Advisory | 
| http://www.securitytracker.com/id/1041510 | Broken Link | 
| https://github.com/mirchr/security-research/blob/master/vulnerabilities/F5/CVE-2018-5529.txt | Exploit Third Party Advisory | 
| https://support.f5.com/csp/article/K54431371 | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
Configuration 2 (hide)
| AND | 
 
 | 
History
                    No history.
Information
                Published : 2018-08-17 12:29
Updated : 2024-11-21 04:09
NVD link : CVE-2018-5546
Mitre link : CVE-2018-5546
CVE.ORG link : CVE-2018-5546
JSON object : View
Products Affected
                apple
- macos
f5
- big-ip_access_policy_manager
- big-ip_access_policy_manager_client
linux
- linux_kernel
CWE
                
                    
                        
                        CWE-732
                        
            Incorrect Permission Assignment for Critical Resource
