First published: Mon Dec 23 2019(Updated: )
On BIG-IP versions 15.0.0-15.0.1.1, 14.1.0-14.1.2.2, 14.0.0-14.0.1, 13.1.0-13.1.3.1, 12.1.0-12.1.5, and 11.5.2-11.6.5 and BIG-IQ versions 6.0.0-6.1.0 and 5.2.0-5.4.0, a user is able to obtain the secret that was being used to encrypt a BIG-IP UCS backup file while sending SNMP query to the BIG-IP or BIG-IQ system, however the user can not access to the UCS files.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP and BIG-IQ Centralized Management | >=5.2.0<=5.4.0 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=6.0.0<=6.1.0 | |
F5 Access Policy Manager | >=11.5.2<11.6.5.1 | |
F5 Access Policy Manager | >=12.1.0<=12.1.5 | |
F5 Access Policy Manager | >=13.1.0<13.1.3.2 | |
F5 Access Policy Manager | >=14.0.0<14.0.1.1 | |
F5 Access Policy Manager | >=14.1.0<14.1.2.3 | |
F5 Access Policy Manager | >=15.0.0<15.1.0 | |
F5 BIG-IP Advanced Firewall Manager | >=11.5.2<11.6.5.1 | |
F5 BIG-IP Advanced Firewall Manager | >=12.1.0<=12.1.5 | |
F5 BIG-IP Advanced Firewall Manager | >=13.1.0<13.1.3.2 | |
F5 BIG-IP Advanced Firewall Manager | >=14.0.0<14.0.1.1 | |
F5 BIG-IP Advanced Firewall Manager | >=14.1.0<14.1.2.3 | |
F5 BIG-IP Advanced Firewall Manager | >=15.0.0<15.1.0 | |
F5 BIG-IP Analytics | >=11.5.2<11.6.5.1 | |
F5 BIG-IP Analytics | >=12.1.0<=12.1.5 | |
F5 BIG-IP Analytics | >=13.1.0<13.1.3.2 | |
F5 BIG-IP Analytics | >=14.0.0<14.0.1.1 | |
F5 BIG-IP Analytics | >=14.1.0<14.1.2.3 | |
F5 BIG-IP Analytics | >=15.0.0<15.1.0 | |
F5 BIG-IP Application Acceleration Manager | >=11.5.2<11.6.5.1 | |
F5 BIG-IP Application Acceleration Manager | >=12.1.0<=12.1.5 | |
F5 BIG-IP Application Acceleration Manager | >=13.1.0<13.1.3.2 | |
F5 BIG-IP Application Acceleration Manager | >=14.0.0<14.0.1.1 | |
F5 BIG-IP Application Acceleration Manager | >=14.1.0<14.1.2.3 | |
F5 BIG-IP Application Acceleration Manager | >=15.0.0<15.1.0 | |
F5 Application Security Manager | >=11.5.2<11.6.5.1 | |
F5 Application Security Manager | >=12.1.0<=12.1.5 | |
F5 Application Security Manager | >=13.1.0<13.1.3.2 | |
F5 Application Security Manager | >=14.0.0<14.0.1.1 | |
F5 Application Security Manager | >=14.1.0<14.1.2.3 | |
F5 Application Security Manager | >=15.0.0<15.1.0 | |
F5 BIG-IP | >=11.5.2<11.6.5.1 | |
F5 BIG-IP | >=12.1.0<=12.1.5 | |
F5 BIG-IP | >=13.1.0<13.1.3.2 | |
F5 BIG-IP | >=14.0.0<14.0.1.1 | |
F5 BIG-IP | >=14.1.0<14.1.2.3 | |
F5 BIG-IP | >=15.0.0<15.1.0 | |
F5 BIG-IP Edge Gateway | >=11.5.2<11.6.5.1 | |
F5 BIG-IP Edge Gateway | >=12.1.0<=12.1.5 | |
F5 BIG-IP Edge Gateway | >=13.1.0<13.1.3.2 | |
F5 BIG-IP Edge Gateway | >=14.0.0<14.0.1.1 | |
F5 BIG-IP Edge Gateway | >=14.1.0<14.1.2.3 | |
F5 BIG-IP Edge Gateway | >=15.0.0<15.1.0 | |
F5 BIG-IP Fraud Protection Service | >=11.5.2<11.6.5.1 | |
F5 BIG-IP Fraud Protection Service | >=12.1.0<=12.1.5 | |
F5 BIG-IP Fraud Protection Service | >=13.1.0<13.1.3.2 | |
F5 BIG-IP Fraud Protection Service | >=14.0.0<14.0.1.1 | |
F5 BIG-IP Fraud Protection Service | >=14.1.0<14.1.2.3 | |
F5 BIG-IP Fraud Protection Service | >=15.0.0<15.1.0 | |
Riverbed SteelApp Traffic Manager | >=11.5.2<11.6.5.1 | |
Riverbed SteelApp Traffic Manager | >=12.1.0<=12.1.5 | |
Riverbed SteelApp Traffic Manager | >=13.1.0<13.1.3.2 | |
Riverbed SteelApp Traffic Manager | >=14.0.0<14.0.1.1 | |
Riverbed SteelApp Traffic Manager | >=14.1.0<14.1.2.3 | |
Riverbed SteelApp Traffic Manager | >=15.0.0<15.1.0 | |
F5 BIG-IP Link Controller | >=11.5.2<11.6.5.1 | |
F5 BIG-IP Link Controller | >=12.1.0<=12.1.5 | |
F5 BIG-IP Link Controller | >=13.1.0<13.1.3.2 | |
F5 BIG-IP Link Controller | >=14.0.0<14.0.1.1 | |
F5 BIG-IP Link Controller | >=14.1.0<14.1.2.3 | |
F5 BIG-IP Link Controller | >=15.0.0<15.1.0 | |
Riverbed SteelApp Traffic Manager | >=11.5.2<11.6.5.1 | |
Riverbed SteelApp Traffic Manager | >=12.1.0<=12.1.5 | |
Riverbed SteelApp Traffic Manager | >=13.1.0<13.1.3.2 | |
Riverbed SteelApp Traffic Manager | >=14.0.0<14.0.1.1 | |
Riverbed SteelApp Traffic Manager | >=14.1.0<14.1.2.3 | |
Riverbed SteelApp Traffic Manager | >=15.0.0<15.1.0 | |
F5 BIG-IP Policy Enforcement Manager | >=11.5.2<11.6.5.1 | |
F5 BIG-IP Policy Enforcement Manager | >=12.1.0<=12.1.5 | |
F5 BIG-IP Policy Enforcement Manager | >=13.1.0<13.1.3.2 | |
F5 BIG-IP Policy Enforcement Manager | >=14.0.0<14.0.1.1 | |
F5 BIG-IP Policy Enforcement Manager | >=14.1.0<14.1.2.3 | |
F5 BIG-IP Policy Enforcement Manager | >=15.0.0<15.1.0 | |
F5 BIG-IP WebAccelerator | >=11.5.2<11.6.5.1 | |
F5 BIG-IP WebAccelerator | >=12.1.0<=12.1.5 | |
F5 BIG-IP WebAccelerator | >=13.1.0<13.1.3.2 | |
F5 BIG-IP WebAccelerator | >=14.0.0<14.0.1.1 | |
F5 BIG-IP WebAccelerator | >=14.1.0<14.1.2.3 | |
F5 BIG-IP WebAccelerator | >=15.0.0<15.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-6688 has been classified as a critical severity vulnerability.
To fix CVE-2019-6688, you should upgrade your BIG-IP or BIG-IQ software to the latest patched version.
CVE-2019-6688 affects F5 BIG-IP and BIG-IQ versions 15.0.0-15.0.1.1, 14.1.0-14.1.2.2, 14.0.0-14.0.1, 13.1.0-13.1.3.1, 12.1.0-12.1.5, and 11.5.2-11.6.5.
Exploitation of CVE-2019-6688 allows an attacker to obtain sensitive information used in the encryption of backup files.
Currently, the recommended solution is to upgrade to fixed software versions, as no official workaround has been provided.