Chosen Ciphertext Attack Vulnerability in BIG-IP by F5 Networks
CVE-2019-6593

5.9MEDIUM

Summary

On specific versions of BIG-IP by F5 Networks, a virtual server set up with a Client SSL profile is exposed to a vulnerability that allows an attacker to conduct a chosen ciphertext attack against CBC ciphers. This flaw can enable an attacker to recover plaintext from encrypted messages through a man-in-the-middle (MITM) attack, all without needing access to the server's private key. The affected versions include BIG-IP 11.5.1 to 11.5.4, 11.6.1, and 12.1.0, raising serious concerns regarding data confidentiality and integrity.

Affected Version(s)

BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, FPS, GTM, Link Controller, PEM, WebAccelerator) 11.5.1-11.5.4, 11.6.1, 12.1.0

References

CVSS V3.1

Score:
5.9
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.