// For flags

CVE-2019-6637

 

Severity Score

6.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

On BIG-IP (ASM) 14.1.0-14.1.0.5, 14.0.0-14.0.0.4, 13.0.0-13.1.1.4, and 12.1.0-12.1.4, Application logic abuse of ASM REST endpoints can lead to instability of BIG-IP system. Exploitation of this issue causes excessive memory consumption which results in the Linux kernel triggering OOM killer on arbitrary processes. The attack requires an authenticated user with role of "Guest" or greater privilege. Note: "No Access" cannot login so technically it's a role but a user with this access role cannot perform the attack.

En BIG-IP (ASM) 14.1.0-14.1.0.5, 14.0.0-14.0.0.4, 13.0.0-13.1.1.4 y 12.1.0-12.1.4, el abuso de la lógica de la aplicación de los puntos finales ASM REST puede llevar a Inestabilidad del sistema BIG-IP. La operación de este problema provoca un consumo excesivo de memoria, lo que provoca que el kernel de Linux active el asesino OOM en procesos arbitrarios. El ataque requiere un usuario identificado con el rol de "Invitado" o un privilegio mayor. Nota: "Sin acceso" no puede iniciar sesión, por lo que técnicamente es un rol, pero un usuario con este rol de acceso no puede realizar el ataque.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-01-22 CVE Reserved
  • 2019-07-03 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-04 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
References (2)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
F5
Search vendor "F5"
Big-ip Application Security Manager
Search vendor "F5" for product "Big-ip Application Security Manager"
>= 12.1.0 < 12.1.4.1
Search vendor "F5" for product "Big-ip Application Security Manager" and version " >= 12.1.0 < 12.1.4.1"
-
Affected
F5
Search vendor "F5"
Big-ip Application Security Manager
Search vendor "F5" for product "Big-ip Application Security Manager"
>= 13.0.0 < 13.1.1.5
Search vendor "F5" for product "Big-ip Application Security Manager" and version " >= 13.0.0 < 13.1.1.5"
-
Affected
F5
Search vendor "F5"
Big-ip Application Security Manager
Search vendor "F5" for product "Big-ip Application Security Manager"
>= 14.0.0 < 14.0.0.5
Search vendor "F5" for product "Big-ip Application Security Manager" and version " >= 14.0.0 < 14.0.0.5"
-
Affected
F5
Search vendor "F5"
Big-ip Application Security Manager
Search vendor "F5" for product "Big-ip Application Security Manager"
>= 14.1.0 < 14.1.0.6
Search vendor "F5" for product "Big-ip Application Security Manager" and version " >= 14.1.0 < 14.1.0.6"
-
Affected