Vulnerabilities > CVE-2019-6686 - Unspecified vulnerability in F5 Big-Ip Local Traffic Manager
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
LOW Summary
On BIG-IP versions 15.0.0-15.0.1.1, 14.1.0-14.1.2, 14.0.0-14.0.1, 13.1.0-13.1.3.1, the Traffic Management Microkernel (TMM) might stop responding after the total number of diameter connections and pending messages on a single virtual server has reached 32K.
Vulnerable Configurations
Nessus
NASL family | F5 Networks Local Security Checks |
NASL id | F5_BIGIP_SOL55812535.NASL |
description | TheTraffic Management Microkernel (TMM) might stop responding after the total number of diameter connections and pending messages on a single virtual server has reached 32K. (CVE-2019-6686) Impact BIG-IP This vulnerability affects only virtual servers associated with the message routing diameter profile. When the vulnerability is exploited, the Traffic Management Microkernel (TMM) creates a core file and restarts. As a result, the BIG-IP system fails to process traffic and fails over to its high availability (HA) peer, if configured. BIG-IQ / Enterprise Manager / Traffix SDC There is no impact; these F5 products are not affected by this vulnerability. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 132571 |
published | 2019-12-31 |
reporter | This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/132571 |
title | F5 Networks BIG-IP : BIG-IP MRF Diameter vulnerability (K55812535) |