First published: Wed Mar 13 2019(Updated: )
In BIG-IP 14.0.0-14.0.0.2, 13.0.0-13.1.0.7, 12.1.0-12.1.3.5, 11.6.1-11.6.3.2, or 11.5.1-11.5.8 or Enterprise Manager 3.1.1, malformed requests to the Traffic Management User Interface (TMUI), also referred to as the BIG-IP Configuration utility, may lead to disruption of TMUI services. This attack requires an authenticated user with any role (other than the No Access role). The No Access user role cannot login and does not have the access level to perform the attack.
Credit: f5sirt@f5.com f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
Riverbed SteelApp Traffic Manager | >=11.5.1<=11.5.8 | |
Riverbed SteelApp Traffic Manager | >=11.6.1<=11.6.3.2 | |
Riverbed SteelApp Traffic Manager | >=12.1.0<=12.1.3.5 | |
Riverbed SteelApp Traffic Manager | >=13.0.0<=13.1.0.7 | |
Riverbed SteelApp Traffic Manager | >=14.0.0<=14.0.0.2 | |
F5 BIG-IP Application Acceleration Manager | >=11.5.1<=11.5.8 | |
F5 BIG-IP Application Acceleration Manager | >=11.6.1<=11.6.3.2 | |
F5 BIG-IP Application Acceleration Manager | >=12.1.0<=12.1.3.5 | |
F5 BIG-IP Application Acceleration Manager | >=13.0.0<=13.1.0.7 | |
F5 BIG-IP Application Acceleration Manager | >=14.0.0<=14.0.0.2 | |
F5 BIG-IP Advanced Firewall Manager | >=11.5.1<=11.5.8 | |
F5 BIG-IP Advanced Firewall Manager | >=11.6.1<=11.6.3.2 | |
F5 BIG-IP Advanced Firewall Manager | >=12.1.0<=12.1.3.5 | |
F5 BIG-IP Advanced Firewall Manager | >=13.0.0<=13.1.0.7 | |
F5 BIG-IP Advanced Firewall Manager | >=14.0.0<=14.0.0.2 | |
F5 BIG-IP Analytics | >=11.5.1<=11.5.8 | |
F5 BIG-IP Analytics | >=11.6.1<=11.6.3.2 | |
F5 BIG-IP Analytics | >=12.1.0<=12.1.3.5 | |
F5 BIG-IP Analytics | >=13.0.0<=13.1.0.7 | |
F5 BIG-IP Analytics | >=14.0.0<=14.0.0.2 | |
F5 Access Policy Manager | >=11.5.1<=11.5.8 | |
F5 Access Policy Manager | >=11.6.1<=11.6.3.2 | |
F5 Access Policy Manager | >=12.1.0<=12.1.3.5 | |
F5 Access Policy Manager | >=13.0.0<=13.1.0.7 | |
F5 Access Policy Manager | >=14.0.0<=14.0.0.2 | |
F5 Application Security Manager | >=11.5.1<=11.5.8 | |
F5 Application Security Manager | >=11.6.1<=11.6.3.2 | |
F5 Application Security Manager | >=12.1.0<=12.1.3.5 | |
F5 Application Security Manager | >=13.0.0<=13.1.0.7 | |
F5 Application Security Manager | >=14.0.0<=14.0.0.2 | |
F5 BIG-IP | >=11.5.1<=11.5.8 | |
F5 BIG-IP | >=11.6.1<=11.6.3.2 | |
F5 BIG-IP | >=12.1.0<=12.1.3.5 | |
F5 BIG-IP | >=13.0.0<=13.1.0.7 | |
F5 BIG-IP | >=14.0.0<=14.0.0.2 | |
F5 BIG-IP Edge Gateway | >=11.5.1<=11.5.8 | |
F5 BIG-IP Edge Gateway | >=11.6.1<=11.6.3.2 | |
F5 BIG-IP Edge Gateway | >=12.1.0<=12.1.3.5 | |
F5 BIG-IP Edge Gateway | >=13.0.0<=13.1.0.7 | |
F5 BIG-IP Edge Gateway | >=14.0.0<=14.0.0.2 | |
F5 BIG-IP Fraud Protection Service | >=11.5.1<=11.5.8 | |
F5 BIG-IP Fraud Protection Service | >=11.6.1<=11.6.3.2 | |
F5 BIG-IP Fraud Protection Service | >=12.1.0<=12.1.3.5 | |
F5 BIG-IP Fraud Protection Service | >=13.0.0<=13.1.0.7 | |
F5 BIG-IP Fraud Protection Service | >=14.0.0<=14.0.0.2 | |
Riverbed SteelApp Traffic Manager | >=11.5.1<=11.5.8 | |
Riverbed SteelApp Traffic Manager | >=11.6.1<=11.6.3.2 | |
Riverbed SteelApp Traffic Manager | >=12.1.0<=12.1.3.5 | |
Riverbed SteelApp Traffic Manager | >=13.0.0<=13.1.0.7 | |
Riverbed SteelApp Traffic Manager | >=14.0.0<=14.0.0.2 | |
F5 BIG-IP Link Controller | >=11.5.1<=11.5.8 | |
F5 BIG-IP Link Controller | >=11.6.1<=11.6.3.2 | |
F5 BIG-IP Link Controller | >=12.1.0<=12.1.3.5 | |
F5 BIG-IP Link Controller | >=13.0.0<=13.1.0.7 | |
F5 BIG-IP Link Controller | >=14.0.0<=14.0.0.2 | |
F5 BIG-IP Policy Enforcement Manager | >=11.5.1<=11.5.8 | |
F5 BIG-IP Policy Enforcement Manager | >=11.6.1<=11.6.3.2 | |
F5 BIG-IP Policy Enforcement Manager | >=12.1.0<=12.1.3.5 | |
F5 BIG-IP Policy Enforcement Manager | >=13.0.0<=13.1.0.7 | |
F5 BIG-IP Policy Enforcement Manager | >=14.0.0<=14.0.0.2 | |
F5 BIG-IP WebAccelerator | >=11.5.1<=11.5.8 | |
F5 BIG-IP WebAccelerator | >=11.6.1<=11.6.3.2 | |
F5 BIG-IP WebAccelerator | >=12.1.0<=12.1.3.5 | |
F5 BIG-IP WebAccelerator | >=13.0.0<=13.1.0.7 | |
F5 BIG-IP WebAccelerator | >=14.0.0<=14.0.0.2 | |
F5 Enterprise Manager | =3.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-6598 has been rated as a high severity vulnerability due to its potential to disrupt services.
To fix CVE-2019-6598, it's recommended to upgrade to a patched version of the affected F5 BIG-IP software.
CVE-2019-6598 affects various versions of F5 BIG-IP Local Traffic Manager, Application Acceleration Manager, and other associated modules.
Exploitation of CVE-2019-6598 can lead to a denial-of-service condition impacting the Traffic Management User Interface.
While specific exploit reports for CVE-2019-6598 are not publicly available, it is always recommended to address known vulnerabilities promptly.