ID

VAR-201907-0132


CVE

CVE-2019-6627


TITLE

F5 SSL Orchestrator Race condition vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2019-006170

DESCRIPTION

On F5 SSL Orchestrator 14.1.0-14.1.0.5, on rare occasions, specific to a certain race condition, TMM may restart when SSL Forward Proxy enforces the bypass action for an SSL Orchestrator transparent virtual server with SNAT enabled. F5 SSL Orchestrator is an all-in-one device solution designed for SSL infrastructure by F5 Corporation of the United States. This product provides policy-based dynamic decryption, encryption, and flow control functions. A security vulnerability exists in F5 SSL Orchestrator version 14.1.0. An attacker can exploit this vulnerability to restart the TMM, causing traffic interruption or failover

Trust: 1.71

sources: NVD: CVE-2019-6627 // JVNDB: JVNDB-2019-006170 // VULHUB: VHN-158062

AFFECTED PRODUCTS

vendor:f5model:ssl orchestratorscope:ltversion:14.1.0.6

Trust: 1.0

vendor:f5model:ssl orchestratorscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:ssl orchestratorscope:eqversion:14.1.0 to 14.1.0.5

Trust: 0.8

sources: JVNDB: JVNDB-2019-006170 // NVD: CVE-2019-6627

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-6627
value: MEDIUM

Trust: 1.0

NVD: CVE-2019-6627
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201907-058
value: MEDIUM

Trust: 0.6

VULHUB: VHN-158062
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2019-6627
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-158062
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-6627
baseSeverity: MEDIUM
baseScore: 5.9
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.2
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-158062 // JVNDB: JVNDB-2019-006170 // CNNVD: CNNVD-201907-058 // NVD: CVE-2019-6627

PROBLEMTYPE DATA

problemtype:CWE-362

Trust: 1.9

sources: VULHUB: VHN-158062 // JVNDB: JVNDB-2019-006170 // NVD: CVE-2019-6627

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201907-058

TYPE

competition condition problem

Trust: 0.6

sources: CNNVD: CNNVD-201907-058

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-006170

PATCH

title:K36320691url:https://support.f5.com/csp/article/K36320691

Trust: 0.8

title:F5 BIG-IP Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=94294

Trust: 0.6

sources: JVNDB: JVNDB-2019-006170 // CNNVD: CNNVD-201907-058

EXTERNAL IDS

db:NVDid:CVE-2019-6627

Trust: 2.5

db:JVNDBid:JVNDB-2019-006170

Trust: 0.8

db:CNNVDid:CNNVD-201907-058

Trust: 0.7

db:AUSCERTid:ESB-2019.2409

Trust: 0.6

db:VULHUBid:VHN-158062

Trust: 0.1

sources: VULHUB: VHN-158062 // JVNDB: JVNDB-2019-006170 // CNNVD: CNNVD-201907-058 // NVD: CVE-2019-6627

REFERENCES

url:https://support.f5.com/csp/article/k36320691

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2019-6627

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6627

Trust: 0.8

url:https://support.f5.com/csp/article/k33444350

Trust: 0.6

url:https://vigilance.fr/vulnerability/f5-big-ip-multiple-vulnerabilities-29665

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.2409/

Trust: 0.6

sources: VULHUB: VHN-158062 // JVNDB: JVNDB-2019-006170 // CNNVD: CNNVD-201907-058 // NVD: CVE-2019-6627

SOURCES

db:VULHUBid:VHN-158062
db:JVNDBid:JVNDB-2019-006170
db:CNNVDid:CNNVD-201907-058
db:NVDid:CVE-2019-6627

LAST UPDATE DATE

2024-11-23T21:59:50.413000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-158062date:2019-07-10T00:00:00
db:JVNDBid:JVNDB-2019-006170date:2019-07-11T00:00:00
db:CNNVDid:CNNVD-201907-058date:2019-07-11T00:00:00
db:NVDid:CVE-2019-6627date:2024-11-21T04:46:50.230

SOURCES RELEASE DATE

db:VULHUBid:VHN-158062date:2019-07-03T00:00:00
db:JVNDBid:JVNDB-2019-006170date:2019-07-11T00:00:00
db:CNNVDid:CNNVD-201907-058date:2019-07-02T00:00:00
db:NVDid:CVE-2019-6627date:2019-07-03T18:15:10.693