First published: Mon Dec 23 2019(Updated: )
On BIG-IP versions 15.0.0-15.0.1, 14.1.0-14.1.2.2, 14.0.0-14.0.1, and 13.1.0-13.1.3.1, the TMM process may restart when the packet filter feature is enabled.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Access Policy Manager | >=13.1.0<13.1.3.2 | |
F5 BIG-IP Access Policy Manager | >=14.0.0<14.0.1.1 | |
F5 BIG-IP Access Policy Manager | >=14.1.0<14.1.2.3 | |
F5 BIG-IP Access Policy Manager | >=15.0.0<15.0.1.1 | |
F5 BIG-IP Advanced Firewall Manager | >=13.1.0<13.1.3.2 | |
F5 BIG-IP Advanced Firewall Manager | >=14.0.0<14.0.1.1 | |
F5 BIG-IP Advanced Firewall Manager | >=14.1.0<14.1.2.3 | |
F5 BIG-IP Advanced Firewall Manager | >=15.0.0<15.0.1.1 | |
F5 BIG-IP Analytics | >=13.1.0<13.1.3.2 | |
F5 BIG-IP Analytics | >=14.0.0<14.0.1.1 | |
F5 BIG-IP Analytics | >=14.1.0<14.1.2.3 | |
F5 BIG-IP Analytics | >=15.0.0<15.0.1.1 | |
f5 big-ip application acceleration manager | >=13.1.0<13.1.3.2 | |
f5 big-ip application acceleration manager | >=14.0.0<14.0.1.1 | |
f5 big-ip application acceleration manager | >=14.1.0<14.1.2.3 | |
f5 big-ip application acceleration manager | >=15.0.0<15.0.1.1 | |
F5 BIG-IP Application Security Manager | >=13.1.0<13.1.3.2 | |
F5 BIG-IP Application Security Manager | >=14.0.0<14.0.1.1 | |
F5 BIG-IP Application Security Manager | >=14.1.0<14.1.2.3 | |
F5 BIG-IP Application Security Manager | >=15.0.0<15.0.1.1 | |
f5 big-ip domain name system | >=13.1.0<13.1.3.2 | |
f5 big-ip domain name system | >=14.0.0<14.0.1.1 | |
f5 big-ip domain name system | >=14.1.0<14.1.2.3 | |
f5 big-ip domain name system | >=15.0.0<15.0.1.1 | |
F5 BIG-IP Edge Gateway | >=13.1.0<13.1.3.2 | |
F5 BIG-IP Edge Gateway | >=14.0.0<14.0.1.1 | |
F5 BIG-IP Edge Gateway | >=14.1.0<14.1.2.3 | |
F5 BIG-IP Edge Gateway | >=15.0.0<15.0.1.1 | |
f5 big-ip fraud protection service | >=13.1.0<13.1.3.2 | |
f5 big-ip fraud protection service | >=14.0.0<14.0.1.1 | |
f5 big-ip fraud protection service | >=14.1.0<14.1.2.3 | |
f5 big-ip fraud protection service | >=15.0.0<15.0.1.1 | |
F5 BIG-IP Global Traffic Manager | >=13.1.0<13.1.3.2 | |
F5 BIG-IP Global Traffic Manager | >=14.0.0<14.0.1.1 | |
F5 BIG-IP Global Traffic Manager | >=14.1.0<14.1.2.3 | |
F5 BIG-IP Global Traffic Manager | >=15.0.0<15.0.1.1 | |
f5 big-ip link controller | >=13.1.0<13.1.3.2 | |
f5 big-ip link controller | >=14.0.0<14.0.1.1 | |
f5 big-ip link controller | >=14.1.0<14.1.2.3 | |
f5 big-ip link controller | >=15.0.0<15.0.1.1 | |
F5 BIG-IP Local Traffic Manager | >=13.1.0<13.1.3.2 | |
F5 BIG-IP Local Traffic Manager | >=14.0.0<14.0.1.1 | |
F5 BIG-IP Local Traffic Manager | >=14.1.0<14.1.2.3 | |
F5 BIG-IP Local Traffic Manager | >=15.0.0<15.0.1.1 | |
F5 BIG-IP Policy Enforcement Manager | >=13.1.0<13.1.3.2 | |
F5 BIG-IP Policy Enforcement Manager | >=14.0.0<14.0.1.1 | |
F5 BIG-IP Policy Enforcement Manager | >=14.1.0<14.1.2.3 | |
F5 BIG-IP Policy Enforcement Manager | >=15.0.0<15.0.1.1 | |
F5 BIG-IP WebAccelerator | >=13.1.0<13.1.3.2 | |
F5 BIG-IP WebAccelerator | >=14.0.0<14.0.1.1 | |
F5 BIG-IP WebAccelerator | >=14.1.0<14.1.2.3 | |
F5 BIG-IP WebAccelerator | >=15.0.0<15.0.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-6678 has been classified with a high severity due to the potential for service interruption in affected BIG-IP versions.
To mitigate CVE-2019-6678, users should update their BIG-IP systems to versions beyond those specified in the vulnerability report.
Affected versions include BIG-IP 15.0.0-15.0.1, 14.1.0-14.1.2.2, 14.0.0-14.0.1, and 13.1.0-13.1.3.1.
CVE-2019-6678 specifically impacts the TMM process of BIG-IP when the packet filter feature is enabled.
There are no specific workarounds for CVE-2019-6678; the best action is to upgrade to a non-vulnerable version.