ID

VAR-201902-0141


CVE

CVE-2019-6593


TITLE

plural BIG-IP Cryptographic vulnerabilities in products

Trust: 0.8

sources: JVNDB: JVNDB-2019-002025

DESCRIPTION

On BIG-IP 11.5.1-11.5.4, 11.6.1, and 12.1.0, a virtual server configured with a Client SSL profile may be vulnerable to a chosen ciphertext attack against CBC ciphers. When exploited, this may result in plaintext recovery of encrypted messages through a man-in-the-middle (MITM) attack, despite the attacker not having gained access to the server's private key itself. (CVE-2019-6593 also known as Zombie POODLE and GOLDENDOODLE.). plural BIG-IP The product contains cryptographic vulnerabilities.Information may be obtained. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. Virtual server is one of the virtual servers

Trust: 1.8

sources: NVD: CVE-2019-6593 // JVNDB: JVNDB-2019-002025 // VULHUB: VHN-158028 // VULMON: CVE-2019-6593

AFFECTED PRODUCTS

vendor:f5model:big-ip webacceleratorscope:eqversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:lteversion:11.5.4

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:eqversion:11.6.1

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:eqversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:11.5.1

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:11.5.1

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:eqversion:11.6.1

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:eqversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:lteversion:11.5.4

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:lteversion:11.5.4

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:11.5.1

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:eqversion:11.6.1

Trust: 1.0

vendor:f5model:big-ip link controllerscope:lteversion:11.5.4

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:lteversion:11.5.4

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:eqversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:eqversion:11.6.1

Trust: 1.0

vendor:f5model:big-ip analyticsscope:eqversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:11.5.1

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:11.5.1

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:11.5.1

Trust: 1.0

vendor:f5model:big-ip analyticsscope:lteversion:11.5.4

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:eqversion:11.6.1

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:eqversion:11.6.1

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:lteversion:11.5.4

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:11.5.1

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:eqversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:eqversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:11.5.1

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:11.5.1

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:lteversion:11.5.4

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:eqversion:11.6.1

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:eqversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:eqversion:11.6.1

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:eqversion:11.6.1

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:11.5.1

Trust: 1.0

vendor:f5model:big-ip application security managerscope:eqversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:eqversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:eqversion:11.6.1

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:lteversion:11.5.4

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:lteversion:11.5.4

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:11.5.1

Trust: 1.0

vendor:f5model:big-ip link controllerscope:eqversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:eqversion:11.6.1

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:eqversion:11.6.1

Trust: 1.0

vendor:f5model:big-ip application security managerscope:lteversion:11.5.4

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:eqversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:11.5.1

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:lteversion:11.5.4

Trust: 1.0

vendor:f5model:big-ip access policy managerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip advanced firewall managerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip analyticsscope: - version: -

Trust: 0.8

vendor:f5model:big-ip application security managerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip domain name systemscope: - version: -

Trust: 0.8

vendor:f5model:big-ip edge gatewayscope: - version: -

Trust: 0.8

vendor:f5model:big-ip fraud protection servicescope: - version: -

Trust: 0.8

vendor:f5model:big-ip global traffic managerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip link controllerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip local traffic managerscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2019-002025 // NVD: CVE-2019-6593

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-6593
value: MEDIUM

Trust: 1.0

NVD: CVE-2019-6593
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201902-941
value: MEDIUM

Trust: 0.6

VULHUB: VHN-158028
value: MEDIUM

Trust: 0.1

VULMON: CVE-2019-6593
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2019-6593
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-158028
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-6593
baseSeverity: MEDIUM
baseScore: 5.9
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.2
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-158028 // VULMON: CVE-2019-6593 // JVNDB: JVNDB-2019-002025 // CNNVD: CNNVD-201902-941 // NVD: CVE-2019-6593

PROBLEMTYPE DATA

problemtype:CWE-327

Trust: 1.0

problemtype:CWE-310

Trust: 0.9

sources: VULHUB: VHN-158028 // JVNDB: JVNDB-2019-002025 // NVD: CVE-2019-6593

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201902-941

TYPE

encryption problem

Trust: 0.6

sources: CNNVD: CNNVD-201902-941

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-002025

PATCH

title:K10065173url:https://support.f5.com/csp/article/K10065173

Trust: 0.8

title:F5 BIG-IP virtual server Fixes for encryption problem vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=89660

Trust: 0.6

title: - url:https://github.com/tls-attacker/TLS-Padding-Oracles

Trust: 0.1

title:TLS-Padding-Oraclesurl:https://github.com/RUB-NDS/TLS-Padding-Oracles

Trust: 0.1

sources: VULMON: CVE-2019-6593 // JVNDB: JVNDB-2019-002025 // CNNVD: CNNVD-201902-941

EXTERNAL IDS

db:NVDid:CVE-2019-6593

Trust: 2.6

db:JVNDBid:JVNDB-2019-002025

Trust: 0.8

db:CNNVDid:CNNVD-201902-941

Trust: 0.7

db:AUSCERTid:ESB-2020.3561

Trust: 0.6

db:AUSCERTid:ESB-2019.0584

Trust: 0.6

db:VULHUBid:VHN-158028

Trust: 0.1

db:VULMONid:CVE-2019-6593

Trust: 0.1

sources: VULHUB: VHN-158028 // VULMON: CVE-2019-6593 // JVNDB: JVNDB-2019-002025 // CNNVD: CNNVD-201902-941 // NVD: CVE-2019-6593

REFERENCES

url:https://support.f5.com/csp/article/k10065173

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-6593

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6593

Trust: 0.8

url:https://vigilance.fr/vulnerability/f5-big-ip-information-disclosure-via-tmm-tls-virtual-server-28604

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.3561/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/76086

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/327.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/tls-attacker/tls-padding-oracles

Trust: 0.1

url:https://github.com/rub-nds/tls-padding-oracles

Trust: 0.1

sources: VULHUB: VHN-158028 // VULMON: CVE-2019-6593 // JVNDB: JVNDB-2019-002025 // CNNVD: CNNVD-201902-941 // NVD: CVE-2019-6593

SOURCES

db:VULHUBid:VHN-158028
db:VULMONid:CVE-2019-6593
db:JVNDBid:JVNDB-2019-002025
db:CNNVDid:CNNVD-201902-941
db:NVDid:CVE-2019-6593

LAST UPDATE DATE

2024-11-23T22:41:36.777000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-158028date:2019-02-26T00:00:00
db:VULMONid:CVE-2019-6593date:2021-07-21T00:00:00
db:JVNDBid:JVNDB-2019-002025date:2019-04-01T00:00:00
db:CNNVDid:CNNVD-201902-941date:2020-10-16T00:00:00
db:NVDid:CVE-2019-6593date:2024-11-21T04:46:46.027

SOURCES RELEASE DATE

db:VULHUBid:VHN-158028date:2019-02-26T00:00:00
db:VULMONid:CVE-2019-6593date:2019-02-26T00:00:00
db:JVNDBid:JVNDB-2019-002025date:2019-04-01T00:00:00
db:CNNVDid:CNNVD-201902-941date:2019-02-26T00:00:00
db:NVDid:CVE-2019-6593date:2019-02-26T15:29:00.293