Vulnerabilities > CVE-2019-6590 - Unspecified vulnerability in F5 Big-Ip Local Traffic Manager

047910
CVSS 5.9 - MEDIUM
Attack vector
NETWORK
Attack complexity
HIGH
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
HIGH
network
high complexity
f5
nessus

Summary

On BIG-IP LTM 13.0.0 to 13.0.1 and 12.1.0 to 12.1.3.6, under certain conditions, the TMM may consume excessive resources when processing SSL Session ID Persistence traffic.

Nessus

NASL familyF5 Networks Local Security Checks
NASL idF5_BIGIP_SOL55101404.NASL
descriptionUnder certain conditions, the TMM may consume excessive resources when processing SSL Session ID Persistence traffic. (CVE-2019-6590) Impact BIG-IP This vulnerability may result as a denial-of-service (DOS) attack on the affected BIG-IP systemwhen the systemconsumes excessive memory resources. This issue affects only BIG-IP systems provisioned with the LTM module.The affected BIG-IP system temporarily fails to process traffic as it recovers from a Traffic Management Microkernel (TMM) restart, and devices configured in a device group may fail over. Enterprise Manager / BIG-IQ / iWorkflow / Traffix SDC There is no impact for theseF5 products as theyare not affected by this vulnerability.
last seen2020-03-17
modified2019-01-30
plugin id121441
published2019-01-30
reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/121441
titleF5 Networks BIG-IP : TMM vulnerability (K55101404)