Vulnerabilities > CVE-2019-6673 - Unspecified vulnerability in F5 products

047910
CVSS 4.3 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
f5
nessus

Summary

On versions 15.0.0-15.0.1 and 14.0.0-14.1.2, when the BIG-IP is configured in HTTP/2 Full Proxy mode, specifically crafted requests may cause a disruption of service provided by the Traffic Management Microkernel (TMM).

Vulnerable Configurations

Part Description Count
Application
F5
211

Nessus

NASL familyF5 Networks Local Security Checks
NASL idF5_BIGIP_SOL81557381.NASL
descriptionWhen the BIG-IP system is configured in HTTP/2 full proxy mode, specifically crafted requests may cause a disruption of service provided by the Traffic Management Microkernel (TMM). (CVE-2019-6673) Impact An attacker may be able to use a specifically crafted request to cause a disruption of service. The data plane is impacted and exposed only when a virtual server is configured with an associated HTTP profile, HTTP/2 client and server profile, and the HTTP MRF Router option is enabled (HTTP/2 full proxy mode).
last seen2020-06-01
modified2020-06-02
plugin id132576
published2019-12-31
reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/132576
titleF5 Networks BIG-IP : BIG-IP HTTP/2 vulnerability (K81557381)