First published: Mon Mar 11 2019(Updated: )
In BIG-IP 14.0.0-14.0.0.2, 13.0.0-13.1.1.3, 12.1.0-12.1.3.7, 11.6.1-11.6.3.2, or 11.5.1-11.5.8, when remote authentication is enabled for administrative users and all external users are granted the "guest" role, unsanitized values can be reflected to the client via the login page. This can lead to a cross-site scripting attack against unauthenticated clients.
Credit: f5sirt@f5.com f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
Riverbed SteelApp Traffic Manager | >=11.5.1<=11.5.8 | |
Riverbed SteelApp Traffic Manager | >=11.6.1<=11.6.3.2 | |
Riverbed SteelApp Traffic Manager | >=12.1.0<=12.1.3.7 | |
Riverbed SteelApp Traffic Manager | >=13.0.0<=13.1.1.3 | |
Riverbed SteelApp Traffic Manager | >=14.0.0<=14.0.0.2 | |
F5 BIG-IP Application Acceleration Manager | >=11.5.1<=11.5.8 | |
F5 BIG-IP Application Acceleration Manager | >=11.6.1<=11.6.3.2 | |
F5 BIG-IP Application Acceleration Manager | >=12.1.0<=12.1.3.7 | |
F5 BIG-IP Application Acceleration Manager | >=13.0.0<=13.1.1.3 | |
F5 BIG-IP Application Acceleration Manager | >=14.0.0<=14.0.0.2 | |
F5 BIG-IP Advanced Firewall Manager | >=11.5.1<=11.5.8 | |
F5 BIG-IP Advanced Firewall Manager | >=11.6.1<=11.6.3.2 | |
F5 BIG-IP Advanced Firewall Manager | >=12.1.0<=12.1.3.7 | |
F5 BIG-IP Advanced Firewall Manager | >=13.0.0<=13.1.1.3 | |
F5 BIG-IP Advanced Firewall Manager | >=14.0.0<=14.0.0.2 | |
F5 BIG-IP Analytics | >=11.5.1<=11.5.8 | |
F5 BIG-IP Analytics | >=11.6.1<=11.6.3.2 | |
F5 BIG-IP Analytics | >=12.1.0<=12.1.3.7 | |
F5 BIG-IP Analytics | >=13.0.0<=13.1.1.3 | |
F5 BIG-IP Analytics | >=14.0.0<=14.0.0.2 | |
F5 Access Policy Manager | >=11.5.1<=11.5.8 | |
F5 Access Policy Manager | >=11.6.1<=11.6.3.2 | |
F5 Access Policy Manager | >=12.1.0<=12.1.3.7 | |
F5 Access Policy Manager | >=13.0.0<=13.1.1.3 | |
F5 Access Policy Manager | >=14.0.0<=14.0.0.2 | |
F5 Application Security Manager | >=11.5.1<=11.5.8 | |
F5 Application Security Manager | >=11.6.1<=11.6.3.2 | |
F5 Application Security Manager | >=12.1.0<=12.1.3.7 | |
F5 Application Security Manager | >=13.0.0<=13.1.1.3 | |
F5 Application Security Manager | >=14.0.0<=14.0.0.2 | |
F5 BIG-IP | >=11.5.1<=11.5.8 | |
F5 BIG-IP | >=11.6.1<=11.6.3.2 | |
F5 BIG-IP | >=12.1.0<=12.1.3.7 | |
F5 BIG-IP | >=13.0.0<=13.1.1.3 | |
F5 BIG-IP | >=14.0.0<=14.0.0.2 | |
F5 BIG-IP Edge Gateway | >=11.5.1<=11.5.8 | |
F5 BIG-IP Edge Gateway | >=11.6.1<=11.6.3.2 | |
F5 BIG-IP Edge Gateway | >=12.1.0<=12.1.3.7 | |
F5 BIG-IP Edge Gateway | >=13.0.0<=13.1.1.3 | |
F5 BIG-IP Edge Gateway | >=14.0.0<=14.0.0.2 | |
F5 BIG-IP Fraud Protection Service | >=11.5.1<=11.5.8 | |
F5 BIG-IP Fraud Protection Service | >=11.6.1<=11.6.3.2 | |
F5 BIG-IP Fraud Protection Service | >=12.1.0<=12.1.3.7 | |
F5 BIG-IP Fraud Protection Service | >=13.0.0<=13.1.1.3 | |
F5 BIG-IP Fraud Protection Service | >=14.0.0<=14.0.0.2 | |
Riverbed SteelApp Traffic Manager | >=11.5.1<=11.5.8 | |
Riverbed SteelApp Traffic Manager | >=11.6.1<=11.6.3.2 | |
Riverbed SteelApp Traffic Manager | >=12.1.0<=12.1.3.7 | |
Riverbed SteelApp Traffic Manager | >=13.0.0<=13.1.1.3 | |
Riverbed SteelApp Traffic Manager | >=14.0.0<=14.0.0.2 | |
F5 BIG-IP Link Controller | >=11.5.1<=11.5.8 | |
F5 BIG-IP Link Controller | >=11.6.1<=11.6.3.2 | |
F5 BIG-IP Link Controller | >=12.1.0<=12.1.3.7 | |
F5 BIG-IP Link Controller | >=13.0.0<=13.1.1.3 | |
F5 BIG-IP Link Controller | >=14.0.0<=14.0.0.2 | |
F5 BIG-IP Policy Enforcement Manager | >=11.5.1<=11.5.8 | |
F5 BIG-IP Policy Enforcement Manager | >=11.6.1<=11.6.3.2 | |
F5 BIG-IP Policy Enforcement Manager | >=12.1.0<=12.1.3.7 | |
F5 BIG-IP Policy Enforcement Manager | >=13.0.0<=13.1.1.3 | |
F5 BIG-IP Policy Enforcement Manager | >=14.0.0<=14.0.0.2 | |
F5 BIG-IP WebAccelerator | >=11.5.1<=11.5.8 | |
F5 BIG-IP WebAccelerator | >=11.6.1<=11.6.3.2 | |
F5 BIG-IP WebAccelerator | >=12.1.0<=12.1.3.7 | |
F5 BIG-IP WebAccelerator | >=13.0.0<=13.1.1.3 | |
F5 BIG-IP WebAccelerator | >=14.0.0<=14.0.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-6600 is rated as critical due to its potential for unauthorized access and data exposure.
To fix CVE-2019-6600, upgrade to the patched versions of F5 BIG-IP software as outlined in the security advisories.
CVE-2019-6600 affects various versions of F5 BIG-IP products, including versions 11.5.1 to 14.0.0-2.
CVE-2019-6600 exploits unsanitized values in the login page when remote authentication for administrative users is enabled.
CVE-2019-6600 can lead to authentication bypass and potential remote code execution, compromising system security.