A vulnerability exists in F5OS-A and F5OS-C system that may allow an authenticated attacker with local access to escalate their privileges. A successful exploit may allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
| Software | From | Fixed in |
|---|---|---|
| f5 / f5os-a | 1.5.1 | 1.5.4 |
| f5 / f5os-a | 1.8.0 | 1.8.0.x |
| f5 / f5os-c | 1.6.0 | 1.6.2.x |
| f5 / f5os-c | 1.8.0 | 1.8.2 |