First published: Mon Dec 23 2019(Updated: )
On BIG-IP versions 15.0.0-15.0.1, 14.1.0-14.1.2, 14.0.0-14.0.1, 13.1.0-13.1.3.2, 12.1.0-12.1.5, and 11.5.2-11.6.5, while processing traffic through a standard virtual server that targets a FastL4 virtual server (VIP on VIP), hardware appliances may stop responding.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 Access Policy Manager | >=11.5.2<11.6.5.1 | |
F5 Access Policy Manager | >=12.1.0<=12.1.5 | |
F5 Access Policy Manager | >=13.1.0<=13.1.3 | |
F5 Access Policy Manager | >=14.0.0<14.0.1.1 | |
F5 Access Policy Manager | >=14.1.0<14.1.2.1 | |
F5 Access Policy Manager | >=15.0.0<15.0.1.1 | |
F5 BIG-IP Advanced Firewall Manager | >=11.5.2<11.6.5.1 | |
F5 BIG-IP Advanced Firewall Manager | >=12.1.0<=12.1.5 | |
F5 BIG-IP Advanced Firewall Manager | >=13.1.0<=13.1.3 | |
F5 BIG-IP Advanced Firewall Manager | >=14.0.0<14.0.1.1 | |
F5 BIG-IP Advanced Firewall Manager | >=14.1.0<14.1.2.1 | |
F5 BIG-IP Advanced Firewall Manager | >=15.0.0<15.0.1.1 | |
F5 BIG-IP Analytics | >=11.5.2<11.6.5.1 | |
F5 BIG-IP Analytics | >=12.1.0<=12.1.5 | |
F5 BIG-IP Analytics | >=13.1.0<=13.1.3 | |
F5 BIG-IP Analytics | >=14.0.0<14.0.1.1 | |
F5 BIG-IP Analytics | >=14.1.0<14.1.2.1 | |
F5 BIG-IP Analytics | >=15.0.0<15.0.1.1 | |
F5 BIG-IP Application Acceleration Manager | >=11.5.2<11.6.5.1 | |
F5 BIG-IP Application Acceleration Manager | >=12.1.0<=12.1.5 | |
F5 BIG-IP Application Acceleration Manager | >=13.1.0<=13.1.3 | |
F5 BIG-IP Application Acceleration Manager | >=14.0.0<14.0.1.1 | |
F5 BIG-IP Application Acceleration Manager | >=14.1.0<14.1.2.1 | |
F5 BIG-IP Application Acceleration Manager | >=15.0.0<15.0.1.1 | |
F5 Application Security Manager | >=11.5.2<11.6.5.1 | |
F5 Application Security Manager | >=12.1.0<=12.1.5 | |
F5 Application Security Manager | >=13.1.0<=13.1.3 | |
F5 Application Security Manager | >=14.0.0<14.0.1.1 | |
F5 Application Security Manager | >=14.1.0<14.1.2.1 | |
F5 Application Security Manager | >=15.0.0<15.0.1.1 | |
F5 BIG-IP | >=11.5.2<11.6.5.1 | |
F5 BIG-IP | >=12.1.0<=12.1.5 | |
F5 BIG-IP | >=13.1.0<=13.1.3 | |
F5 BIG-IP | >=14.0.0<14.0.1.1 | |
F5 BIG-IP | >=14.1.0<14.1.2.1 | |
F5 BIG-IP | >=15.0.0<15.0.1.1 | |
F5 BIG-IP Fraud Protection Service | >=11.5.2<11.6.5.1 | |
F5 BIG-IP Fraud Protection Service | >=12.1.0<=12.1.5 | |
F5 BIG-IP Fraud Protection Service | >=13.1.0<=13.1.3 | |
F5 BIG-IP Fraud Protection Service | >=14.0.0<14.0.1.1 | |
F5 BIG-IP Fraud Protection Service | >=14.1.0<14.1.2.1 | |
F5 BIG-IP Fraud Protection Service | >=15.0.0<15.0.1.1 | |
Riverbed SteelApp Traffic Manager | >=11.5.2<11.6.5.1 | |
Riverbed SteelApp Traffic Manager | >=12.1.0<=12.1.5 | |
Riverbed SteelApp Traffic Manager | >=13.1.0<=13.1.3 | |
Riverbed SteelApp Traffic Manager | >=14.0.0<14.0.1.1 | |
Riverbed SteelApp Traffic Manager | >=14.1.0<14.1.2.1 | |
Riverbed SteelApp Traffic Manager | >=15.0.0<15.0.1.1 | |
F5 BIG-IP Link Controller | >=11.5.2<11.6.5.1 | |
F5 BIG-IP Link Controller | >=12.1.0<=12.1.5 | |
F5 BIG-IP Link Controller | >=13.1.0<=13.1.3 | |
F5 BIG-IP Link Controller | >=14.0.0<14.0.1.1 | |
F5 BIG-IP Link Controller | >=14.1.0<14.1.2.1 | |
F5 BIG-IP Link Controller | >=15.0.0<15.0.1.1 | |
Riverbed SteelApp Traffic Manager | >=11.5.2<11.6.5.1 | |
Riverbed SteelApp Traffic Manager | >=12.1.0<=12.1.5 | |
Riverbed SteelApp Traffic Manager | >=13.1.0<=13.1.3 | |
Riverbed SteelApp Traffic Manager | >=14.0.0<14.0.1.1 | |
Riverbed SteelApp Traffic Manager | >=14.1.0<14.1.2.1 | |
Riverbed SteelApp Traffic Manager | >=15.0.0<15.0.1.1 | |
F5 BIG-IP Policy Enforcement Manager | >=11.5.2<11.6.5.1 | |
F5 BIG-IP Policy Enforcement Manager | >=12.1.0<=12.1.5 | |
F5 BIG-IP Policy Enforcement Manager | >=13.1.0<=13.1.3 | |
F5 BIG-IP Policy Enforcement Manager | >=14.0.0<14.0.1.1 | |
F5 BIG-IP Policy Enforcement Manager | >=14.1.0<14.1.2.1 | |
F5 BIG-IP Policy Enforcement Manager | >=15.0.0<15.0.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-6680 has a high severity rating due to the potential for service disruption on hardware appliances.
To fix CVE-2019-6680, you should upgrade to a patched version of BIG-IP that is not affected by this vulnerability.
CVE-2019-6680 affects BIG-IP versions 15.0.0-15.0.1, 14.1.0-14.1.2, 14.0.0-14.0.1, 13.1.0-13.1.3.2, 12.1.0-12.1.5, and 11.5.2-11.6.5.
CVE-2019-6680 can cause hardware appliances to stop responding when processing traffic through specific virtual servers.
Currently, the recommended approach is to apply the security updates to mitigate the effects of CVE-2019-6680.