Intel processors vulnerability CVE-2019-14607

2020-02-18T15:37:00
ID F5:K29100014
Type f5
Reporter f5
Modified 2021-01-22T02:02:00

Description

Improper conditions check in multiple Intel® Processors may allow an authenticated user to potentially enable partial escalation of privilege, denial of service and/or information disclosure via local access. (CVE-2019-14607)

Impact

While certain F5 hardware platforms contain the affected processor, such as the C109, C113, D110, C115, C117, and C120 platforms, only deployments running a Virtual Clustered Multiprocessing (vCMP) configuration are vulnerable. Deployments without vCMP are not vulnerable, as the issue is limited to virtualized environments that share a physical CPU.

All versions of BIG-IP Virtual Edition (VE) are potentially impacted if the processor underlying the BIG-IP VE installation is affected. Microcode updates from Intel are available to address this issue, but must be applied at the hardware level, which is outside the scope of the ability of F5 to support or patch.

This hardware issue impacts all platforms using the following Intel processor families

  • Datacenter Microprocessors
  • Client and Xeon E3 Microprocessors
  • Intel Xeon Processor E3 v5 & v6 Family
  • Intel Xeon E Processor
  • Intel Xeon D, W Processor
  • Intel Core i9 8th & 9th Generation

BIG-IP

The following BIG-IP platforms contain the affected Intel processors:

  • C113 BIG-IP 4000s - 4200v
    • All 4000s - 4200v do not support vCMP
  • C109 BIG-IP 5000s - 5250v
    • 5000s do not support vCMP
    • 5200v and 5250v support vCMP
  • D110 BIG-IP 7000s - 7250v
    • 7000s do not support vCMP
    • 7200v, 7250v, and 7255v support vCMP
  • C115 (BIG-IP i4600)
  • C117 (BIG-IP i2600)
  • C120 (HERCULON i2800)

Traffix

Only HPE Gen10 servers are vulnerable.