Vulnerability identifier: #VU52753
Vulnerability risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-254
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
APM Clients
Hardware solutions /
Security hardware applicances
Vendor: F5 Networks
Description
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to after generating the Diagnostics Report, command prompts with elevated privileges remain on the client Windows system. An attacker with access to the system can execute arbitrary code with elevated privileges.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
APM Clients: 7.1.5 - 7.2.1.1
External links
https://support.f5.com/csp/article/K03544414
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.