CVE-2019-6603

In BIG-IP 11.5.1-11.5.8, 11.6.1-11.6.3, 12.1.0-12.1.3, and 13.0.0-13.0.1, malformed TCP packets sent to a self IP address or a FastL4 virtual server may cause an interruption of service. The control plane is not exposed to this issue. This issue impacts the data plane virtual servers and self IPs.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
f5CNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 72%
VendorProductVersion
f5big-ip_access_policy_manager
11.5.1 ≤
𝑥
≤ 11.5.8
f5big-ip_access_policy_manager
11.6.1 ≤
𝑥
≤ 11.6.3
f5big-ip_access_policy_manager
12.1.0 ≤
𝑥
≤ 12.1.3
f5big-ip_access_policy_manager
13.0.0 ≤
𝑥
≤ 13.0.1
f5big-ip_advanced_firewall_manager
11.5.1 ≤
𝑥
≤ 11.5.8
f5big-ip_advanced_firewall_manager
11.6.1 ≤
𝑥
≤ 11.6.3
f5big-ip_advanced_firewall_manager
12.1.0 ≤
𝑥
≤ 12.1.3
f5big-ip_advanced_firewall_manager
13.0.0 ≤
𝑥
≤ 13.0.1
f5big-ip_application_acceleration_manager
11.5.1 ≤
𝑥
≤ 11.5.8
f5big-ip_application_acceleration_manager
11.6.1 ≤
𝑥
≤ 11.6.3
f5big-ip_application_acceleration_manager
12.1.0 ≤
𝑥
≤ 12.1.3
f5big-ip_application_acceleration_manager
13.0.0 ≤
𝑥
≤ 13.0.1
f5big-ip_edge_gateway
11.5.1 ≤
𝑥
≤ 11.5.8
f5big-ip_edge_gateway
11.6.1 ≤
𝑥
≤ 11.6.3
f5big-ip_edge_gateway
12.1.0 ≤
𝑥
≤ 12.1.3
f5big-ip_edge_gateway
13.0.0 ≤
𝑥
≤ 13.0.1
f5big-ip_fraud_protection_service
11.5.1 ≤
𝑥
≤ 11.5.8
f5big-ip_fraud_protection_service
11.6.1 ≤
𝑥
≤ 11.6.3
f5big-ip_fraud_protection_service
12.1.0 ≤
𝑥
≤ 12.1.3
f5big-ip_fraud_protection_service
13.0.0 ≤
𝑥
≤ 13.0.1
f5big-ip_global_traffic_manager
11.5.1 ≤
𝑥
≤ 11.5.8
f5big-ip_global_traffic_manager
11.6.1 ≤
𝑥
≤ 11.6.3
f5big-ip_global_traffic_manager
12.1.0 ≤
𝑥
≤ 12.1.3
f5big-ip_global_traffic_manager
13.0.0 ≤
𝑥
≤ 13.0.1
f5big-ip_link_controller
11.5.1 ≤
𝑥
≤ 11.5.8
f5big-ip_link_controller
11.6.1 ≤
𝑥
≤ 11.6.3
f5big-ip_link_controller
12.1.0 ≤
𝑥
≤ 12.1.3
f5big-ip_link_controller
13.0.0 ≤
𝑥
≤ 13.0.1
f5big-ip_local_traffic_manager
11.5.1 ≤
𝑥
≤ 11.5.8
f5big-ip_local_traffic_manager
11.6.1 ≤
𝑥
≤ 11.6.3
f5big-ip_local_traffic_manager
12.1.0 ≤
𝑥
≤ 12.1.3
f5big-ip_local_traffic_manager
13.0.0 ≤
𝑥
≤ 13.0.1
f5big-ip_policy_enforcement_manager
11.5.1 ≤
𝑥
≤ 11.5.8
f5big-ip_policy_enforcement_manager
11.6.1 ≤
𝑥
≤ 11.6.3
f5big-ip_policy_enforcement_manager
12.1.0 ≤
𝑥
≤ 12.1.3
f5big-ip_policy_enforcement_manager
13.0.0 ≤
𝑥
≤ 13.0.1
f5big-ip_protocol_security_manager
11.5.1 ≤
𝑥
≤ 11.5.8
f5big-ip_protocol_security_manager
11.6.1 ≤
𝑥
≤ 11.6.3
f5big-ip_protocol_security_manager
12.1.0 ≤
𝑥
≤ 12.1.3
f5big-ip_protocol_security_manager
13.0.0 ≤
𝑥
≤ 13.0.1
f5big-ip_webaccelerator
11.5.1 ≤
𝑥
≤ 11.5.8
f5big-ip_webaccelerator
11.6.1 ≤
𝑥
≤ 11.6.3
f5big-ip_webaccelerator
12.0.0 ≤
𝑥
≤ 12.1.3
f5big-ip_webaccelerator
13.0.0 ≤
𝑥
≤ 13.0.1
f5big-ip_analytics
11.5.1 ≤
𝑥
≤ 11.5.8
f5big-ip_analytics
11.6.1 ≤
𝑥
≤ 11.6.3
f5big-ip_analytics
12.1.0 ≤
𝑥
≤ 12.1.3
f5big-ip_analytics
13.0.0 ≤
𝑥
≤ 13.0.1
f5big-ip_application_security_manager
11.5.1 ≤
𝑥
≤ 11.5.8
f5big-ip_application_security_manager
11.6.1 ≤
𝑥
≤ 11.6.3
f5big-ip_application_security_manager
12.1.0 ≤
𝑥
≤ 12.1.3
f5big-ip_application_security_manager
13.0.0 ≤
𝑥
≤ 13.0.1
𝑥
= Vulnerable software versions