Vulnerabilities > CVE-2019-6686 - Unspecified vulnerability in F5 Big-Ip Local Traffic Manager

047910
CVSS 5.3 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
LOW
network
low complexity
f5
nessus

Summary

On BIG-IP versions 15.0.0-15.0.1.1, 14.1.0-14.1.2, 14.0.0-14.0.1, 13.1.0-13.1.3.1, the Traffic Management Microkernel (TMM) might stop responding after the total number of diameter connections and pending messages on a single virtual server has reached 32K.

Vulnerable Configurations

Part Description Count
Application
F5
57

Nessus

NASL familyF5 Networks Local Security Checks
NASL idF5_BIGIP_SOL55812535.NASL
descriptionTheTraffic Management Microkernel (TMM) might stop responding after the total number of diameter connections and pending messages on a single virtual server has reached 32K. (CVE-2019-6686) Impact BIG-IP This vulnerability affects only virtual servers associated with the message routing diameter profile. When the vulnerability is exploited, the Traffic Management Microkernel (TMM) creates a core file and restarts. As a result, the BIG-IP system fails to process traffic and fails over to its high availability (HA) peer, if configured. BIG-IQ / Enterprise Manager / Traffix SDC There is no impact; these F5 products are not affected by this vulnerability.
last seen2020-06-01
modified2020-06-02
plugin id132571
published2019-12-31
reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/132571
titleF5 Networks BIG-IP : BIG-IP MRF Diameter vulnerability (K55812535)