Vulnerabilities > CVE-2019-6677 - Unspecified vulnerability in F5 products
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
HIGH Summary
On BIG-IP versions 15.0.0-15.0.1, 14.1.0-14.1.2, 14.0.0-14.0.1, 13.1.0-13.1.3.1, and 12.1.0-12.1.5, under certain conditions when using custom TCP congestion control settings in a TCP profile, TMM stops processing traffic when processed by an iRule.
Vulnerable Configurations
Nessus
NASL family | F5 Networks Local Security Checks |
NASL id | F5_BIGIP_SOL06747393.NASL |
description | Under certain conditions, when using custom TCP congestion control settings in a TCP profile, TMM stops processingtraffic when processed by an iRule. (CVE-2019-6677) Impact The Traffic Management Microkernel (TMM) may generate a core file and restart, causing a traffic disruption or failover event.This only impacts the data plane under specific, non-default configurations. There is no control plane exposure. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 132553 |
published | 2019-12-31 |
reporter | This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/132553 |
title | F5 Networks BIG-IP : TMM vulnerability (K06747393) |