A vulnerability exists in F5OS-A and F5OS-C system that may allow an authenticated attacker with local access to escalate their privileges. A successful exploit may allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
The product performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| F5os-a | F5 | 1.5.1 (including) | 1.5.4 (excluding) |
| F5os-a | F5 | 1.8.0 (including) | 1.8.0 (including) |
| F5os-c | F5 | 1.6.0 (including) | 1.6.2 (including) |
| F5os-c | F5 | 1.8.0 (including) | 1.8.2 (excluding) |