First published: Thu Mar 28 2019(Updated: )
On BIG-IP 11.5.1-11.5.8, 11.6.1-11.6.3, 12.1.0-12.1.3.6, 13.0.0-13.1.1.1, and 14.0.0-14.0.0.2, under certain conditions, hardware systems with a High-Speed Bridge and using non-default Layer 2 forwarding configurations may experience a lockup of the High-Speed Bridge.
Credit: f5sirt@f5.com f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 Access Policy Manager | >=11.2.1<=11.5.8 | |
F5 Access Policy Manager | >=11.6.0<=11.6.3 | |
F5 Access Policy Manager | >=12.1.0<=12.1.3 | |
F5 Access Policy Manager | >=13.0.0<=13.1.1 | |
F5 Access Policy Manager | =14.0.0 | |
F5 BIG-IP Advanced Firewall Manager | >=11.2.1<=11.5.8 | |
F5 BIG-IP Advanced Firewall Manager | >=11.6.0<=11.6.3 | |
F5 BIG-IP Advanced Firewall Manager | >=12.1.0<=12.1.3 | |
F5 BIG-IP Advanced Firewall Manager | >=13.0.0<=13.1.1 | |
F5 BIG-IP Advanced Firewall Manager | =14.0.0 | |
F5 BIG-IP Application Acceleration Manager | >=11.2.1<=11.5.8 | |
F5 BIG-IP Application Acceleration Manager | >=11.6.0<=11.6.3 | |
F5 BIG-IP Application Acceleration Manager | >=12.1.0<=12.1.3 | |
F5 BIG-IP Application Acceleration Manager | >=13.0.0<=13.1.1 | |
F5 BIG-IP Application Acceleration Manager | =14.0.0 | |
F5 BIG-IP Edge Gateway | >=11.2.1<=11.5.8 | |
F5 BIG-IP Edge Gateway | >=11.6.0<=11.6.3 | |
F5 BIG-IP Edge Gateway | >=12.1.0<=12.1.3 | |
F5 BIG-IP Edge Gateway | >=13.0.0<=13.1.1 | |
F5 BIG-IP Edge Gateway | =14.0.0 | |
F5 BIG-IP Fraud Protection Service | >=11.2.1<=11.5.8 | |
F5 BIG-IP Fraud Protection Service | >=11.6.0<=11.6.3 | |
F5 BIG-IP Fraud Protection Service | >=12.1.0<=12.1.3 | |
F5 BIG-IP Fraud Protection Service | >=13.0.0<=13.1.1 | |
F5 BIG-IP Fraud Protection Service | =14.0.0 | |
Riverbed SteelApp Traffic Manager | >=11.2.1<=11.5.8 | |
Riverbed SteelApp Traffic Manager | >=11.6.0<=11.6.3 | |
Riverbed SteelApp Traffic Manager | >=12.1.0<=12.1.3 | |
Riverbed SteelApp Traffic Manager | >=13.0.0<=13.1.1 | |
Riverbed SteelApp Traffic Manager | =14.0.0 | |
F5 BIG-IP Link Controller | >=11.2.1<=11.5.8 | |
F5 BIG-IP Link Controller | >=11.6.0<=11.6.3 | |
F5 BIG-IP Link Controller | >=12.1.0<=12.1.3 | |
F5 BIG-IP Link Controller | >=13.0.0<=13.1.1 | |
F5 BIG-IP Link Controller | =14.0.0 | |
Riverbed SteelApp Traffic Manager | >=11.2.1<=11.5.8 | |
Riverbed SteelApp Traffic Manager | >=11.6.0<=11.6.3 | |
Riverbed SteelApp Traffic Manager | >=12.1.0<=12.1.3 | |
Riverbed SteelApp Traffic Manager | >=13.0.0<=13.1.1 | |
Riverbed SteelApp Traffic Manager | =14.0.0 | |
F5 BIG-IP Policy Enforcement Manager | >=11.2.1<=11.5.8 | |
F5 BIG-IP Policy Enforcement Manager | >=11.6.0<=11.6.3 | |
F5 BIG-IP Policy Enforcement Manager | >=12.1.0<=12.1.3 | |
F5 BIG-IP Policy Enforcement Manager | >=13.0.0<=13.1.1 | |
F5 BIG-IP Policy Enforcement Manager | =14.0.0 | |
F5 BIG-IP Protocol Security Manager | >=11.2.1<=11.5.8 | |
F5 BIG-IP Protocol Security Manager | >=11.6.0<=11.6.3 | |
F5 BIG-IP Protocol Security Manager | >=12.1.0<=12.1.3 | |
F5 BIG-IP Protocol Security Manager | >=13.0.0<=13.1.1 | |
F5 BIG-IP Protocol Security Manager | =14.0.0 | |
F5 BIG-IP WebAccelerator | <=14.0.0 | |
F5 BIG-IP WebAccelerator | >=11.2.1<=11.5.8 | |
F5 BIG-IP WebAccelerator | >=11.6.0<=11.6.3 | |
F5 BIG-IP WebAccelerator | >=12.0.0<=12.1.3 | |
F5 BIG-IP WebAccelerator | >=13.0.0<=13.1.1 | |
F5 BIG-IP Analytics | >=11.2.1<=11.5.8 | |
F5 BIG-IP Analytics | >=11.6.0<=11.6.3 | |
F5 BIG-IP Analytics | >=12.1.0<=12.1.3 | |
F5 BIG-IP Analytics | >=13.0.0<=13.1.1 | |
F5 BIG-IP Analytics | =14.0.0 | |
F5 Application Security Manager | >=11.2.1<=11.5.8 | |
F5 Application Security Manager | >=11.6.0<=11.6.3 | |
F5 Application Security Manager | >=12.1.0<=12.1.3 | |
F5 Application Security Manager | >=13.0.0<=13.1.1 | |
F5 Application Security Manager | =14.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-6604 has a medium severity rating due to potential hardware lockup in affected systems.
CVE-2019-6604 affects F5 BIG-IP versions 11.5.1 to 14.0.0.2 under specific conditions.
To mitigate CVE-2019-6604, you should upgrade to a patched version of F5 BIG-IP that is not affected by this vulnerability.
CVE-2019-6604 impacts multiple F5 BIG-IP products, including Access Policy Manager, Advanced Firewall Manager, and Application Security Manager, among others.
CVE-2019-6604 can occur under specific conditions involving hardware systems with a High-Speed Bridge configured for non-default Layer 2 forwarding.