CVE Vulnerabilities

CVE-2019-6673

Published: Nov 27, 2019 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

On versions 15.0.0-15.0.1 and 14.0.0-14.1.2, when the BIG-IP is configured in HTTP/2 Full Proxy mode, specifically crafted requests may cause a disruption of service provided by the Traffic Management Microkernel (TMM).

Affected Software

NameVendorStart VersionEnd Version
Big-ip_access_policy_managerF514.0.0 (including)14.1.2 (including)
Big-ip_access_policy_managerF515.0.0 (including)15.0.1 (including)
Big-ip_advanced_firewall_managerF514.0.0 (including)14.1.2 (including)
Big-ip_advanced_firewall_managerF515.0.0 (including)15.0.1 (including)
Big-ip_application_acceleration_managerF514.0.0 (including)14.1.2 (including)
Big-ip_application_acceleration_managerF515.0.0 (including)15.0.1 (including)
Big-ip_application_security_managerF514.0.0 (including)14.1.2 (including)
Big-ip_application_security_managerF515.0.0 (including)15.0.1 (including)
Big-ip_fraud_protection_serviceF514.0.0 (including)14.1.2 (including)
Big-ip_fraud_protection_serviceF515.0.0 (including)15.0.1 (including)
Big-ip_link_controllerF514.0.0 (including)14.1.2 (including)
Big-ip_link_controllerF515.0.0 (including)15.0.1 (including)
Big-ip_local_traffic_managerF514.0.0 (including)14.1.2 (including)
Big-ip_local_traffic_managerF515.0.0 (including)15.0.1 (including)
Big-ip_policy_enforcement_managerF514.0.0 (including)14.1.2 (including)
Big-ip_policy_enforcement_managerF515.0.0 (including)15.0.1 (including)

References