CVE-2019-6602
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
28/03/2019
Last modified:
24/08/2020
Description
In BIG-IP 11.5.1-11.5.8 and 11.6.1-11.6.3, the Configuration Utility login page may not follow best security practices when handling a malicious request.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* | 11.5.1 (including) | 11.5.8 (including) |
cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* | 11.6.1 (including) | 11.6.3 (including) |
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* | 11.5.1 (including) | 11.5.8 (including) |
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* | 11.6.1 (including) | 11.6.3 (including) |
cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* | 11.5.1 (including) | 11.5.8 (including) |
cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* | 11.6.1 (including) | 11.6.3 (including) |
cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* | 11.5.1 (including) | 11.5.8 (including) |
cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* | 11.6.1 (including) | 11.6.3 (including) |
cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* | 11.5.1 (including) | 11.5.8 (including) |
cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* | 11.6.1 (including) | 11.6.3 (including) |
cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* | 11.5.1 (including) | 11.5.8 (including) |
cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* | 11.6.1 (including) | 11.6.3 (including) |
cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* | 11.5.1 (including) | 11.5.8 (including) |
cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* | 11.6.1 (including) | 11.6.3 (including) |
cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* | 11.5.1 (including) | 11.5.8 (including) |
To consult the complete list of CPE names with products and versions, see this page