Lucene search

K
cveF5CVE-2019-6684
HistoryDec 23, 2019 - 6:15 p.m.

CVE-2019-6684

2019-12-2318:15:11
f5
web.nvd.nist.gov
41
cve-2019-6684
big-ip
vcmp
vulnerability
security
fragmentation-based attack

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

42.5%

On versions 15.0.0-15.0.1.1, 14.0.0-14.1.2.2, 13.1.0-13.1.3.1, 12.1.0-12.1.5, and 11.5.2-11.6.5.1, under certain conditions, a multi-bladed BIG-IP Virtual Clustered Multiprocessing (vCMP) may drop broadcast packets when they are rebroadcast to the vCMP guest secondary blades. An attacker can leverage the fragmented broadcast IP packets to perform any type of fragmentation-based attack.

Affected configurations

Nvd
Node
f5big-ip_access_policy_managerRange11.5.211.6.5
OR
f5big-ip_access_policy_managerRange12.1.012.1.5
OR
f5big-ip_access_policy_managerRange13.0.013.1.3.2
OR
f5big-ip_access_policy_managerRange14.0.014.1.2.3
OR
f5big-ip_access_policy_managerRange15.0.015.1.0
OR
f5big-ip_advanced_firewall_managerRange11.5.211.6.5
OR
f5big-ip_advanced_firewall_managerRange12.1.012.1.5
OR
f5big-ip_advanced_firewall_managerRange13.0.013.1.3.2
OR
f5big-ip_advanced_firewall_managerRange14.0.014.1.2.3
OR
f5big-ip_advanced_firewall_managerRange15.0.015.1.0
OR
f5big-ip_analyticsRange11.5.211.6.5
OR
f5big-ip_analyticsRange12.1.012.1.5
OR
f5big-ip_analyticsRange13.0.013.1.3.2
OR
f5big-ip_analyticsRange14.0.014.1.2.3
OR
f5big-ip_analyticsRange15.0.015.1.0
OR
f5big-ip_application_acceleration_managerRange11.5.211.6.5
OR
f5big-ip_application_acceleration_managerRange12.1.012.1.5
OR
f5big-ip_application_acceleration_managerRange13.0.013.1.3.2
OR
f5big-ip_application_acceleration_managerRange14.0.014.1.2.3
OR
f5big-ip_application_acceleration_managerRange15.0.015.1.0
OR
f5big-ip_application_security_managerRange11.5.211.6.5
OR
f5big-ip_application_security_managerRange12.1.012.1.5
OR
f5big-ip_application_security_managerRange13.0.013.1.3.2
OR
f5big-ip_application_security_managerRange14.0.014.1.2.3
OR
f5big-ip_application_security_managerRange15.0.015.1.0
OR
f5big-ip_domain_name_systemRange11.5.211.6.5
OR
f5big-ip_domain_name_systemRange12.1.012.1.5
OR
f5big-ip_domain_name_systemRange13.0.013.1.3.2
OR
f5big-ip_domain_name_systemRange14.0.014.1.2.3
OR
f5big-ip_domain_name_systemRange15.0.015.1.0
OR
f5big-ip_fraud_protection_serviceRange11.5.211.6.5
OR
f5big-ip_fraud_protection_serviceRange12.1.012.1.5
OR
f5big-ip_fraud_protection_serviceRange13.0.013.1.3.2
OR
f5big-ip_fraud_protection_serviceRange14.0.014.1.2.3
OR
f5big-ip_fraud_protection_serviceRange15.0.015.1.0
OR
f5big-ip_global_traffic_managerRange11.5.211.6.5
OR
f5big-ip_global_traffic_managerRange12.1.012.1.5
OR
f5big-ip_global_traffic_managerRange13.0.013.1.3.2
OR
f5big-ip_global_traffic_managerRange14.0.014.1.2.3
OR
f5big-ip_global_traffic_managerRange15.0.015.1.0
OR
f5big-ip_link_controllerRange11.5.211.6.5
OR
f5big-ip_link_controllerRange12.1.012.1.5
OR
f5big-ip_link_controllerRange13.0.013.1.3.2
OR
f5big-ip_link_controllerRange14.0.014.1.2.3
OR
f5big-ip_link_controllerRange15.0.015.1.0
OR
f5big-ip_local_traffic_managerRange11.5.211.6.5
OR
f5big-ip_local_traffic_managerRange12.1.012.1.5
OR
f5big-ip_local_traffic_managerRange13.0.013.1.3.2
OR
f5big-ip_local_traffic_managerRange14.0.014.1.2.3
OR
f5big-ip_local_traffic_managerRange15.0.015.1.0
OR
f5big-ip_policy_enforcement_managerRange11.5.211.6.5
OR
f5big-ip_policy_enforcement_managerRange12.1.012.1.5
OR
f5big-ip_policy_enforcement_managerRange13.0.013.1.3.2
OR
f5big-ip_policy_enforcement_managerRange14.0.014.1.2.3
OR
f5big-ip_policy_enforcement_managerRange15.0.015.1.0
VendorProductVersionCPE
f5big-ip_access_policy_manager*cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
f5big-ip_advanced_firewall_manager*cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*
f5big-ip_analytics*cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*
f5big-ip_application_acceleration_manager*cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*
f5big-ip_application_security_manager*cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*
f5big-ip_domain_name_system*cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*
f5big-ip_fraud_protection_service*cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*
f5big-ip_global_traffic_manager*cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*
f5big-ip_link_controller*cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*
f5big-ip_local_traffic_manager*cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*
Rows per page:
1-10 of 111

CNA Affected

[
  {
    "product": "BIG-IP",
    "vendor": "F5",
    "versions": [
      {
        "status": "affected",
        "version": "15.0.0-15.0.1.1"
      },
      {
        "status": "affected",
        "version": "14.0.0-14.1.2.2"
      },
      {
        "status": "affected",
        "version": "13.1.0-13.1.3.1"
      },
      {
        "status": "affected",
        "version": "12.1.0-12.1.5"
      },
      {
        "status": "affected",
        "version": "11.5.2-11.6.5.1"
      }
    ]
  }
]

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

42.5%

Related for CVE-2019-6684