First published: Mon Dec 23 2019(Updated: )
On BIG-IP versions 15.0.0-15.0.1, 14.1.0.2-14.1.2.2, 14.0.0.5-14.0.1, 13.1.1.5-13.1.3.1, 12.1.4.1-12.1.5, 11.6.4-11.6.5, and 11.5.9-11.5.10, the access controls implemented by scp.whitelist and scp.blacklist are not properly enforced for paths that are symlinks. This allows authenticated users with SCP access to overwrite certain configuration files that would otherwise be restricted.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Access Policy Manager | >=11.5.9<=11.5.10 | |
F5 BIG-IP Access Policy Manager | >=11.6.4<11.6.5.1 | |
F5 BIG-IP Access Policy Manager | >=12.1.4.1<=12.1.5 | |
F5 BIG-IP Access Policy Manager | >=13.1.1.5<13.1.3.2 | |
F5 BIG-IP Access Policy Manager | >=14.0.0.5<14.0.1.1 | |
F5 BIG-IP Access Policy Manager | >=14.1.0.2<14.1.2.3 | |
F5 BIG-IP Access Policy Manager | >=15.0.0<15.0.1.1 | |
F5 BIG-IP Advanced Firewall Manager | >=11.5.9<=11.5.10 | |
F5 BIG-IP Advanced Firewall Manager | >=11.6.4<11.6.5.1 | |
F5 BIG-IP Advanced Firewall Manager | >=12.1.4.1<=12.1.5 | |
F5 BIG-IP Advanced Firewall Manager | >=13.1.1.5<13.1.3.2 | |
F5 BIG-IP Advanced Firewall Manager | >=14.0.0.5<14.0.1.1 | |
F5 BIG-IP Advanced Firewall Manager | >=14.1.0.2<14.1.2.3 | |
F5 BIG-IP Advanced Firewall Manager | >=15.0.0<15.0.1.1 | |
F5 BIG-IP Analytics | >=11.5.9<=11.5.10 | |
F5 BIG-IP Analytics | >=11.6.4<11.6.5.1 | |
F5 BIG-IP Analytics | >=12.1.4.1<=12.1.5 | |
F5 BIG-IP Analytics | >=13.1.1.5<13.1.3.2 | |
F5 BIG-IP Analytics | >=14.0.0.5<14.0.1.1 | |
F5 BIG-IP Analytics | >=14.1.0.2<14.1.2.3 | |
F5 BIG-IP Analytics | >=15.0.0<15.0.1.1 | |
f5 big-ip application acceleration manager | >=11.5.9<=11.5.10 | |
f5 big-ip application acceleration manager | >=11.6.4<11.6.5.1 | |
f5 big-ip application acceleration manager | >=12.1.4.1<=12.1.5 | |
f5 big-ip application acceleration manager | >=13.1.1.5<13.1.3.2 | |
f5 big-ip application acceleration manager | >=14.0.0.5<14.0.1.1 | |
f5 big-ip application acceleration manager | >=14.1.0.2<14.1.2.3 | |
f5 big-ip application acceleration manager | >=15.0.0<15.0.1.1 | |
F5 BIG-IP Application Security Manager | >=11.5.9<=11.5.10 | |
F5 BIG-IP Application Security Manager | >=11.6.4<11.6.5.1 | |
F5 BIG-IP Application Security Manager | >=12.1.4.1<=12.1.5 | |
F5 BIG-IP Application Security Manager | >=13.1.1.5<13.1.3.2 | |
F5 BIG-IP Application Security Manager | >=14.0.0.5<14.0.1.1 | |
F5 BIG-IP Application Security Manager | >=14.1.0.2<14.1.2.3 | |
F5 BIG-IP Application Security Manager | >=15.0.0<15.0.1.1 | |
f5 big-ip domain name system | >=11.5.9<=11.5.10 | |
f5 big-ip domain name system | >=11.6.4<11.6.5.1 | |
f5 big-ip domain name system | >=12.1.4.1<=12.1.5 | |
f5 big-ip domain name system | >=13.1.1.5<13.1.3.2 | |
f5 big-ip domain name system | >=14.0.0.5<14.0.1.1 | |
f5 big-ip domain name system | >=14.1.0.2<14.1.2.3 | |
f5 big-ip domain name system | >=15.0.0<15.0.1.1 | |
F5 BIG-IP Edge Gateway | >=11.5.9<=11.5.10 | |
F5 BIG-IP Edge Gateway | >=11.6.4<11.6.5.1 | |
F5 BIG-IP Edge Gateway | >=12.1.4.1<=12.1.5 | |
F5 BIG-IP Edge Gateway | >=13.1.1.5<13.1.3.2 | |
F5 BIG-IP Edge Gateway | >=14.0.0.5<14.0.1.1 | |
F5 BIG-IP Edge Gateway | >=14.1.0.2<14.1.2.3 | |
F5 BIG-IP Edge Gateway | >=15.0.0<15.0.1.1 | |
f5 big-ip fraud protection service | >=11.5.9<=11.5.10 | |
f5 big-ip fraud protection service | >=11.6.4<11.6.5.1 | |
f5 big-ip fraud protection service | >=12.1.4.1<=12.1.5 | |
f5 big-ip fraud protection service | >=13.1.1.5<13.1.3.2 | |
f5 big-ip fraud protection service | >=14.0.0.5<14.0.1.1 | |
f5 big-ip fraud protection service | >=14.1.0.2<14.1.2.3 | |
f5 big-ip fraud protection service | >=15.0.0<15.0.1.1 | |
F5 BIG-IP Global Traffic Manager | >=11.5.9<=11.5.10 | |
F5 BIG-IP Global Traffic Manager | >=11.6.4<11.6.5.1 | |
F5 BIG-IP Global Traffic Manager | >=12.1.4.1<=12.1.5 | |
F5 BIG-IP Global Traffic Manager | >=13.1.1.5<13.1.3.2 | |
F5 BIG-IP Global Traffic Manager | >=14.0.0.5<14.0.1.1 | |
F5 BIG-IP Global Traffic Manager | >=14.1.0.2<14.1.2.3 | |
F5 BIG-IP Global Traffic Manager | >=15.0.0<15.0.1.1 | |
f5 big-ip link controller | >=11.5.9<=11.5.10 | |
f5 big-ip link controller | >=11.6.4<11.6.5.1 | |
f5 big-ip link controller | >=12.1.4.1<=12.1.5 | |
f5 big-ip link controller | >=13.1.1.5<13.1.3.2 | |
f5 big-ip link controller | >=14.0.0.5<14.0.1.1 | |
f5 big-ip link controller | >=14.1.0.2<14.1.2.3 | |
f5 big-ip link controller | >=15.0.0<15.0.1.1 | |
F5 BIG-IP Local Traffic Manager | >=11.5.9<=11.5.10 | |
F5 BIG-IP Local Traffic Manager | >=11.6.4<11.6.5.1 | |
F5 BIG-IP Local Traffic Manager | >=12.1.4.1<=12.1.5 | |
F5 BIG-IP Local Traffic Manager | >=13.1.1.5<13.1.3.2 | |
F5 BIG-IP Local Traffic Manager | >=14.0.0.5<14.0.1.1 | |
F5 BIG-IP Local Traffic Manager | >=14.1.0.2<14.1.2.3 | |
F5 BIG-IP Local Traffic Manager | >=15.0.0<15.0.1.1 | |
F5 BIG-IP Policy Enforcement Manager | >=11.5.9<=11.5.10 | |
F5 BIG-IP Policy Enforcement Manager | >=11.6.4<11.6.5.1 | |
F5 BIG-IP Policy Enforcement Manager | >=12.1.4.1<=12.1.5 | |
F5 BIG-IP Policy Enforcement Manager | >=13.1.1.5<13.1.3.2 | |
F5 BIG-IP Policy Enforcement Manager | >=14.0.0.5<14.0.1.1 | |
F5 BIG-IP Policy Enforcement Manager | >=14.1.0.2<14.1.2.3 | |
F5 BIG-IP Policy Enforcement Manager | >=15.0.0<15.0.1.1 | |
F5 BIG-IP WebAccelerator | >=11.5.9<=11.5.10 | |
F5 BIG-IP WebAccelerator | >=11.6.4<11.6.5.1 | |
F5 BIG-IP WebAccelerator | >=12.1.4.1<=12.1.5 | |
F5 BIG-IP WebAccelerator | >=13.1.1.5<13.1.3.2 | |
F5 BIG-IP WebAccelerator | >=14.0.0.5<14.0.1.1 | |
F5 BIG-IP WebAccelerator | >=14.1.0.2<14.1.2.3 | |
F5 BIG-IP WebAccelerator | >=15.0.0<15.0.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-6679 has been classified as a critical vulnerability due to improper access control mechanisms.
To fix CVE-2019-6679, upgrade your affected F5 BIG-IP software to a version that is not vulnerable, such as 15.0.1 or later.
If upgrading is not an option, consider implementing additional access controls to limit user permissions until a proper upgrade can be performed.
F5 BIG-IP versions 11.5.9 through 15.0.1, including various intermediate versions, are affected by CVE-2019-6679.
The vulnerability could allow authenticated users to bypass intended restrictions and gain unauthorized access to sensitive information or functionalities.