First published: Mon Dec 23 2019(Updated: )
On BIG-IP versions 15.0.0-15.0.1.1, 14.1.0-14.1.2, 14.0.0-14.0.1, 13.1.0-13.1.3.1, the Traffic Management Microkernel (TMM) might stop responding after the total number of diameter connections and pending messages on a single virtual server has reached 32K.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
Riverbed SteelApp Traffic Manager | >=13.1.0<13.1.3.2 | |
Riverbed SteelApp Traffic Manager | >=14.0.0<14.0.1.1 | |
Riverbed SteelApp Traffic Manager | >=14.1.0<14.1.2.1 | |
Riverbed SteelApp Traffic Manager | >=15.0.0<15.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-6686 has a critical severity rating due to the potential denial of service caused by the Traffic Management Microkernel becoming unresponsive.
CVE-2019-6686 affects F5 BIG-IP Local Traffic Manager versions 15.0.0 to 15.0.1.1, 14.1.0 to 14.1.2, 14.0.0 to 14.0.1, and 13.1.0 to 13.1.3.1.
To remediate CVE-2019-6686, upgrade the affected F5 BIG-IP Local Traffic Manager to a version that is not within the specified ranges.
CVE-2019-6686 can lead to service disruption as the Traffic Management Microkernel may stop responding when the limit of connections is exceeded.
There are no documented workarounds for CVE-2019-6686, so upgrading to a patched version is recommended.