MEDIUM · 4.4

CVE-2019-6635

On BIG-IP 14.1.0-14.1.0.5, 14.0.0-14.0.0.4, 13.0.0-13.1.1.4, 12.1.0-12.1.4, 11.6.1-11.6.3.4, and 11.5.1-11.5.8, when the BIG-IP system is licensed for Appliance mode, a user with either the Administra...

Vulnerability Description

On BIG-IP 14.1.0-14.1.0.5, 14.0.0-14.0.0.4, 13.0.0-13.1.1.4, 12.1.0-12.1.4, 11.6.1-11.6.3.4, and 11.5.1-11.5.8, when the BIG-IP system is licensed for Appliance mode, a user with either the Administrator or the Resource Administrator role can bypass Appliance mode restrictions.

CVSS Score

4.4

MEDIUM

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
HIGH
Availability
NONE

Affected Products

VendorProductVersions
F5Big-Ip Local Traffic Manager>= 11.5.2, < 11.5.9
F5Big-Ip Application Acceleration Manager>= 11.5.2, < 11.5.9
F5Big-Ip Advanced Firewall Manager>= 11.5.2, < 11.5.9
F5Big-Ip Analytics>= 11.5.2, < 11.5.9
F5Big-Ip Access Policy Manager>= 11.5.2, < 11.5.9
F5Big-Ip Application Security Manager>= 11.5.2, < 11.5.9
F5Big-Ip Domain Name System>= 11.5.2, < 11.5.9
F5Big-Ip Edge Gateway>= 11.5.2, < 11.5.9
F5Big-Ip Global Traffic Manager>= 11.5.2, < 11.5.9
F5Big-Ip Link Controller>= 11.5.2, < 11.5.9
F5Big-Ip Policy Enforcement Manager>= 11.5.2, < 11.5.9
F5Big-Ip Webaccelerator>= 11.5.2, < 11.5.9
F5Big-Ip Fraud Protection Service>= 11.5.2, < 11.5.9

References

FAQ

What is CVE-2019-6635?

CVE-2019-6635 is a vulnerability with a CVSS score of 4.4 (MEDIUM). On BIG-IP 14.1.0-14.1.0.5, 14.0.0-14.0.0.4, 13.0.0-13.1.1.4, 12.1.0-12.1.4, 11.6.1-11.6.3.4, and 11.5.1-11.5.8, when the BIG-IP system is licensed for Appliance mode, a user with either the Administra...

How severe is CVE-2019-6635?

CVE-2019-6635 has been rated MEDIUM with a CVSS base score of 4.4/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2019-6635?

Check the references section above for vendor advisories and patch information. Affected products include: F5 Big-Ip Local Traffic Manager, F5 Big-Ip Application Acceleration Manager, F5 Big-Ip Advanced Firewall Manager, F5 Big-Ip Analytics, F5 Big-Ip Access Policy Manager.