Description
A vulnerability exists in the iHealth command that may allow an authenticated attacker with at least a resource administrator role to bypass tmsh restrictions and gain access to a bash shell. For BIG-IP systems running in Appliance mode, a successful exploit can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Appliance Mode
Non-Appliance Mode
Problem types
CWE-250: Execution with Unnecessary Privileges
Product status
17.5.0 before 17.5.1.1
17.1.0 before 17.1.3
16.1.0 before 16.1.6.1
15.1.0 before 15.1.10.8
Credits
F5 acknowledges Australian Cyber Security Centre for bringing this issue to our attention and following the highest standards of coordinated disclosure.
References
my.f5.com/manage/s/article/K000154647