HIGH · 7.5

CVE-2019-6684

On versions 15.0.0-15.0.1.1, 14.0.0-14.1.2.2, 13.1.0-13.1.3.1, 12.1.0-12.1.5, and 11.5.2-11.6.5.1, under certain conditions, a multi-bladed BIG-IP Virtual Clustered Multiprocessing (vCMP) may drop bro...

Vulnerability Description

On versions 15.0.0-15.0.1.1, 14.0.0-14.1.2.2, 13.1.0-13.1.3.1, 12.1.0-12.1.5, and 11.5.2-11.6.5.1, under certain conditions, a multi-bladed BIG-IP Virtual Clustered Multiprocessing (vCMP) may drop broadcast packets when they are rebroadcast to the vCMP guest secondary blades. An attacker can leverage the fragmented broadcast IP packets to perform any type of fragmentation-based attack.

CVSS Score

7.5

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
F5Big-Ip Access Policy Manager>= 11.5.2, <= 11.6.5
F5Big-Ip Advanced Firewall Manager>= 11.5.2, <= 11.6.5
F5Big-Ip Analytics>= 11.5.2, <= 11.6.5
F5Big-Ip Application Acceleration Manager>= 11.5.2, <= 11.6.5
F5Big-Ip Application Security Manager>= 11.5.2, <= 11.6.5
F5Big-Ip Domain Name System>= 11.5.2, <= 11.6.5
F5Big-Ip Fraud Protection Service>= 11.5.2, <= 11.6.5
F5Big-Ip Global Traffic Manager>= 11.5.2, <= 11.6.5
F5Big-Ip Link Controller>= 11.5.2, <= 11.6.5
F5Big-Ip Local Traffic Manager>= 11.5.2, <= 11.6.5
F5Big-Ip Policy Enforcement Manager>= 11.5.2, <= 11.6.5

References

FAQ

What is CVE-2019-6684?

CVE-2019-6684 is a vulnerability with a CVSS score of 7.5 (HIGH). On versions 15.0.0-15.0.1.1, 14.0.0-14.1.2.2, 13.1.0-13.1.3.1, 12.1.0-12.1.5, and 11.5.2-11.6.5.1, under certain conditions, a multi-bladed BIG-IP Virtual Clustered Multiprocessing (vCMP) may drop bro...

How severe is CVE-2019-6684?

CVE-2019-6684 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2019-6684?

Check the references section above for vendor advisories and patch information. Affected products include: F5 Big-Ip Access Policy Manager, F5 Big-Ip Advanced Firewall Manager, F5 Big-Ip Analytics, F5 Big-Ip Application Acceleration Manager, F5 Big-Ip Application Security Manager.