### [CVE-2018-5546](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5546) ![](https://img.shields.io/static/v1?label=Product&message=BIG-IP%20APM%20client%20for%20Linux&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=BIG-IP%20APM%20client%20for%20macOS&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Privilege%20Escalation&color=brighgreen) ### Description The svpn and policyserver components of the F5 BIG-IP APM client prior to version 7.1.7.1 for Linux and macOS runs as a privileged process and can allow an unprivileged user to get ownership of files owned by root on the local client host. A malicious local unprivileged user may gain knowledge of sensitive information, manipulate certain data, or assume super-user privileges on the local client host. ### POC #### Reference - https://github.com/mirchr/security-research/blob/master/vulnerabilities/F5/CVE-2018-5529.txt #### Github - https://github.com/mirchr/security-research