CVE Vulnerabilities

CVE-2019-6673

Published: Nov 27, 2019 | Modified: Aug 24, 2020
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
Ubuntu

On versions 15.0.0-15.0.1 and 14.0.0-14.1.2, when the BIG-IP is configured in HTTP/2 Full Proxy mode, specifically crafted requests may cause a disruption of service provided by the Traffic Management Microkernel (TMM).

Affected Software

Name Vendor Start Version End Version
Big-ip_access_policy_manager F5 14.0.0 (including) 14.1.2 (including)
Big-ip_access_policy_manager F5 15.0.0 (including) 15.0.1 (including)
Big-ip_advanced_firewall_manager F5 14.0.0 (including) 14.1.2 (including)
Big-ip_advanced_firewall_manager F5 15.0.0 (including) 15.0.1 (including)
Big-ip_application_acceleration_manager F5 14.0.0 (including) 14.1.2 (including)
Big-ip_application_acceleration_manager F5 15.0.0 (including) 15.0.1 (including)
Big-ip_application_security_manager F5 14.0.0 (including) 14.1.2 (including)
Big-ip_application_security_manager F5 15.0.0 (including) 15.0.1 (including)
Big-ip_fraud_protection_service F5 14.0.0 (including) 14.1.2 (including)
Big-ip_fraud_protection_service F5 15.0.0 (including) 15.0.1 (including)
Big-ip_link_controller F5 14.0.0 (including) 14.1.2 (including)
Big-ip_link_controller F5 15.0.0 (including) 15.0.1 (including)
Big-ip_local_traffic_manager F5 14.0.0 (including) 14.1.2 (including)
Big-ip_local_traffic_manager F5 15.0.0 (including) 15.0.1 (including)
Big-ip_policy_enforcement_manager F5 14.0.0 (including) 14.1.2 (including)
Big-ip_policy_enforcement_manager F5 15.0.0 (including) 15.0.1 (including)

References