ID

VAR-201902-0140


CVE

CVE-2019-6592


TITLE

plural BIG-IP Certificate validation vulnerabilities in products

Trust: 0.8

sources: JVNDB: JVNDB-2019-002024

DESCRIPTION

On BIG-IP 14.1.0-14.1.0.1, TMM may restart and produce a core file when validating SSL certificates in client SSL or server SSL profiles. plural BIG-IP The product contains a certificate validation vulnerability.Tampering with information and disrupting service operations (DoS) There is a possibility of being put into a state. Multiple F5 BIG-IP Products are prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to cause a denial-of-service condition. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. A security vulnerability exists in F5 BIG-IP versions 14.1.0 through 14.1.0.1. A remote attacker could exploit this vulnerability to cause the Traffic Management Microkernel to restart and temporarily disable traffic

Trust: 1.98

sources: NVD: CVE-2019-6592 // JVNDB: JVNDB-2019-002024 // BID: 107176 // VULHUB: VHN-158027

AFFECTED PRODUCTS

vendor:f5model:big-ip webacceleratorscope:lteversion:14.1.0.1

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:lteversion:14.1.0.1

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:lteversion:14.1.0.1

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:lteversion:14.1.0.1

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:lteversion:14.1.0.1

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:lteversion:14.1.0.1

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:lteversion:14.1.0.1

Trust: 1.0

vendor:f5model:big-ip application security managerscope:lteversion:14.1.0.1

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:lteversion:14.1.0.1

Trust: 1.0

vendor:f5model:big-ip analyticsscope:lteversion:14.1.0.1

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:lteversion:14.1.0.1

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:lteversion:14.1.0.1

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip advanced firewall managerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip analyticsscope: - version: -

Trust: 0.8

vendor:f5model:big-ip application security managerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip domain name systemscope: - version: -

Trust: 0.8

vendor:f5model:big-ip edge gatewayscope: - version: -

Trust: 0.8

vendor:f5model:big-ip fraud protection servicescope: - version: -

Trust: 0.8

vendor:f5model:big-ip global traffic managerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip link controllerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip local traffic managerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip webacceleratorscope:eqversion:14.1

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:14.1.0.1

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:14.1

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:14.1.0.1

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:14.1

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:14.1.0.1

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:14.1

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:14.1.0.1

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:14.1

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:14.1.0.1

Trust: 0.3

vendor:f5model:big-ip fpsscope:eqversion:14.1

Trust: 0.3

vendor:f5model:big-ip fpsscope:eqversion:14.1.0.1

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:14.1

Trust: 0.3

vendor:f5model:big-ip dnsscope:eqversion:14.1

Trust: 0.3

vendor:f5model:big-ip dnsscope:eqversion:14.1.0.1

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:14.1

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:14.1.0.1

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:14.1

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:14.1.0.1

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:14.1

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:14.1.0.1

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:14.1

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:14.1.0.1

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:14.1

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:14.1.0.1

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:neversion:14.1.0.2

Trust: 0.3

vendor:f5model:big-ip pemscope:neversion:14.1.0.2

Trust: 0.3

vendor:f5model:big-ip ltmscope:neversion:14.1.0.2

Trust: 0.3

vendor:f5model:big-ip link controllerscope:neversion:14.1.0.2

Trust: 0.3

vendor:f5model:big-ip gtmscope:neversion:14.1.0.2

Trust: 0.3

vendor:f5model:big-ip fpsscope:neversion:14.1.0.2

Trust: 0.3

vendor:f5model:big-ip dnsscope:neversion:14.1.0.2

Trust: 0.3

vendor:f5model:big-ip asmscope:neversion:14.1.0.2

Trust: 0.3

vendor:f5model:big-ip apmscope:neversion:14.1.0.2

Trust: 0.3

vendor:f5model:big-ip analyticsscope:neversion:14.1.0.2

Trust: 0.3

vendor:f5model:big-ip afmscope:neversion:14.1.0.2

Trust: 0.3

vendor:f5model:big-ip aamscope:neversion:14.1.0.2

Trust: 0.3

sources: BID: 107176 // JVNDB: JVNDB-2019-002024 // NVD: CVE-2019-6592

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-6592
value: CRITICAL

Trust: 1.0

NVD: CVE-2019-6592
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-201902-947
value: CRITICAL

Trust: 0.6

VULHUB: VHN-158027
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2019-6592
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-158027
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-6592
baseSeverity: CRITICAL
baseScore: 9.1
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.2
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-158027 // JVNDB: JVNDB-2019-002024 // CNNVD: CNNVD-201902-947 // NVD: CVE-2019-6592

PROBLEMTYPE DATA

problemtype:CWE-295

Trust: 1.9

sources: VULHUB: VHN-158027 // JVNDB: JVNDB-2019-002024 // NVD: CVE-2019-6592

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201902-947

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201902-947

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-002024

PATCH

title:K54167061url:https://support.f5.com/csp/article/K54167061

Trust: 0.8

title:F5 BIG-IP Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=89665

Trust: 0.6

sources: JVNDB: JVNDB-2019-002024 // CNNVD: CNNVD-201902-947

EXTERNAL IDS

db:NVDid:CVE-2019-6592

Trust: 2.8

db:BIDid:107176

Trust: 2.0

db:JVNDBid:JVNDB-2019-002024

Trust: 0.8

db:CNNVDid:CNNVD-201902-947

Trust: 0.7

db:NSFOCUSid:42837

Trust: 0.6

db:VULHUBid:VHN-158027

Trust: 0.1

sources: VULHUB: VHN-158027 // BID: 107176 // JVNDB: JVNDB-2019-002024 // CNNVD: CNNVD-201902-947 // NVD: CVE-2019-6592

REFERENCES

url:https://support.f5.com/csp/article/k54167061

Trust: 2.0

url:http://www.securityfocus.com/bid/107176

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2019-6592

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6592

Trust: 0.8

url:http://www.nsfocus.net/vulndb/42837

Trust: 0.6

url:https://vigilance.fr/vulnerability/f5-big-ip-denial-of-service-via-ssl-certificates-28607

Trust: 0.6

url:http://www.f5.com/products/big-ip/

Trust: 0.3

sources: VULHUB: VHN-158027 // BID: 107176 // JVNDB: JVNDB-2019-002024 // CNNVD: CNNVD-201902-947 // NVD: CVE-2019-6592

CREDITS

The vendor reported the issue.,vendor ?? ??

Trust: 0.6

sources: CNNVD: CNNVD-201902-947

SOURCES

db:VULHUBid:VHN-158027
db:BIDid:107176
db:JVNDBid:JVNDB-2019-002024
db:CNNVDid:CNNVD-201902-947
db:NVDid:CVE-2019-6592

LAST UPDATE DATE

2024-11-23T22:06:20.637000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-158027date:2019-02-28T00:00:00
db:BIDid:107176date:2019-02-26T00:00:00
db:JVNDBid:JVNDB-2019-002024date:2019-04-01T00:00:00
db:CNNVDid:CNNVD-201902-947date:2019-03-04T00:00:00
db:NVDid:CVE-2019-6592date:2024-11-21T04:46:45.910

SOURCES RELEASE DATE

db:VULHUBid:VHN-158027date:2019-02-26T00:00:00
db:BIDid:107176date:2019-02-26T00:00:00
db:JVNDBid:JVNDB-2019-002024date:2019-04-01T00:00:00
db:CNNVDid:CNNVD-201902-947date:2019-02-26T00:00:00
db:NVDid:CVE-2019-6592date:2019-02-26T15:29:00.247