Chosen Ciphertext Attack Vulnerability in BIG-IP by F5 Networks
CVE-2019-6593
5.9MEDIUM
Key Information:
- Vendor
- F5
- Vendor
- CVE Published:
- 26 February 2019
Summary
On specific versions of BIG-IP by F5 Networks, a virtual server set up with a Client SSL profile is exposed to a vulnerability that allows an attacker to conduct a chosen ciphertext attack against CBC ciphers. This flaw can enable an attacker to recover plaintext from encrypted messages through a man-in-the-middle (MITM) attack, all without needing access to the server's private key. The affected versions include BIG-IP 11.5.1 to 11.5.4, 11.6.1, and 12.1.0, raising serious concerns regarding data confidentiality and integrity.
Affected Version(s)
BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, FPS, GTM, Link Controller, PEM, WebAccelerator) 11.5.1-11.5.4, 11.6.1, 12.1.0
References
CVSS V3.1
Score:
5.9
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved