Vulnerabilities > CVE-2019-6673 - Unspecified vulnerability in F5 products
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
HIGH Summary
On versions 15.0.0-15.0.1 and 14.0.0-14.1.2, when the BIG-IP is configured in HTTP/2 Full Proxy mode, specifically crafted requests may cause a disruption of service provided by the Traffic Management Microkernel (TMM).
Vulnerable Configurations
Nessus
NASL family | F5 Networks Local Security Checks |
NASL id | F5_BIGIP_SOL81557381.NASL |
description | When the BIG-IP system is configured in HTTP/2 full proxy mode, specifically crafted requests may cause a disruption of service provided by the Traffic Management Microkernel (TMM). (CVE-2019-6673) Impact An attacker may be able to use a specifically crafted request to cause a disruption of service. The data plane is impacted and exposed only when a virtual server is configured with an associated HTTP profile, HTTP/2 client and server profile, and the HTTP MRF Router option is enabled (HTTP/2 full proxy mode). |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 132576 |
published | 2019-12-31 |
reporter | This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/132576 |
title | F5 Networks BIG-IP : BIG-IP HTTP/2 vulnerability (K81557381) |