Access Control Bypass in BIG-IP by F5 Networks
CVE-2019-6615

4.9MEDIUM

Summary

A vulnerability exists in F5 Networks' BIG-IP systems, where the Administrator and Resource Administrator roles can exploit TMSH access. This flaw allows for bypassing restrictions imposed by Appliance Mode in specific versions of BIG-IP. Administrators must ensure that systems are adequately secured to prevent unauthorized access through this vulnerability.

Affected Version(s)

BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, WebAccelerator, WebSafe) 14.0.0-14.1.0.1

BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, WebAccelerator, WebSafe) 13.0.0-13.1.1.4

BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, WebAccelerator, WebSafe) 12.1.0-12.1.4

References

CVSS V3.1

Score:
4.9
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.