MEDIUM · 6.5

CVE-2019-6614

On BIG-IP 14.0.0-14.1.0.1, 13.0.0-13.1.1.4, and 12.1.0-12.1.4, internal methods used to prevent arbitrary file overwrites in Appliance Mode were not fully effective. An authenticated attacker with a h...

Vulnerability Description

On BIG-IP 14.0.0-14.1.0.1, 13.0.0-13.1.1.4, and 12.1.0-12.1.4, internal methods used to prevent arbitrary file overwrites in Appliance Mode were not fully effective. An authenticated attacker with a high privilege level may be able to bypass protections implemented in appliance mode to overwrite arbitrary system files.

CVSS Score

6.5

MEDIUM

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
F5Big-Ip Access Policy Manager>= 12.1.0, < 12.1.4.1
F5Big-Ip Advanced Firewall Manager>= 12.1.0, < 12.1.4.1
F5Big-Ip Application Acceleration Manager>= 12.1.0, < 12.1.4.1
F5Big-Ip Link Controller>= 12.1.0, < 12.1.4.1
F5Big-Ip Policy Enforcement Manager>= 12.1.0, < 12.1.4.1
F5Big-Ip Webaccelerator>= 12.1.0, < 12.1.4.1
F5Big-Ip Application Security Manager>= 12.1.0, < 12.1.4.1
F5Big-Ip Local Traffic Manager>= 12.1.0, < 12.1.4.1
F5Big-Ip Fraud Protection Service>= 12.1.0, < 12.1.4.1
F5Big-Ip Global Traffic Manager>= 12.1.0, < 12.1.4.1
F5Big-Ip Analytics>= 12.1.0, < 12.1.4.1
F5Big-Ip Edge Gateway>= 12.1.0, < 12.1.4.1
F5Big-Ip Domain Name System>= 12.1.0, < 12.1.4.1

References

FAQ

What is CVE-2019-6614?

CVE-2019-6614 is a vulnerability with a CVSS score of 6.5 (MEDIUM). On BIG-IP 14.0.0-14.1.0.1, 13.0.0-13.1.1.4, and 12.1.0-12.1.4, internal methods used to prevent arbitrary file overwrites in Appliance Mode were not fully effective. An authenticated attacker with a h...

How severe is CVE-2019-6614?

CVE-2019-6614 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2019-6614?

Check the references section above for vendor advisories and patch information. Affected products include: F5 Big-Ip Access Policy Manager, F5 Big-Ip Advanced Firewall Manager, F5 Big-Ip Application Acceleration Manager, F5 Big-Ip Link Controller, F5 Big-Ip Policy Enforcement Manager.