First published: Mon Dec 23 2019(Updated: )
On versions 15.0.0-15.0.1.1, 14.0.0-14.1.2.2, 13.1.0-13.1.3.1, 12.1.0-12.1.5, and 11.5.2-11.6.5.1, the BIG-IP ASM system may consume excessive resources when processing certain types of HTTP responses from the origin web server. This vulnerability is only known to affect resource-constrained systems in which the security policy is configured with response-side features, such as Data Guard or response-side learning.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Application Security Manager | >=11.5.2<=11.6.5 | |
F5 BIG-IP Application Security Manager | >=12.1.0<=12.1.5 | |
F5 BIG-IP Application Security Manager | >=13.1.0<13.1.3.2 | |
F5 BIG-IP Application Security Manager | >=14.1.0<14.1.2.3 | |
F5 BIG-IP Application Security Manager | >=15.0.0<15.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-6682 has a moderate severity rating due to the potential for resource exhaustion on affected BIG-IP ASM systems.
To fix CVE-2019-6682, you should upgrade your F5 BIG-IP Application Security Manager to a version that is not affected by this vulnerability.
CVE-2019-6682 affects F5 BIG-IP Application Security Manager versions 11.5.2 to 11.6.5.1, 12.1.0 to 12.1.5, 13.1.0 to 13.1.3.1, 14.0.0 to 14.1.2.2, and 15.0.0 to 15.0.1.1.
CVE-2019-6682 impacts resource-constrained systems running affected versions of F5 BIG-IP ASM.
Yes, CVE-2019-6682 can lead to service disruption by consuming excessive resources when processing specific HTTP responses.