Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2019-6637


On BIG-IP (ASM) 14.1.0-14.1.0.5, 14.0.0-14.0.0.4, 13.0.0-13.1.1.4, and 12.1.0-12.1.4, Application logic abuse of ASM REST endpoints can lead to instability of BIG-IP system. Exploitation of this issue causes excessive memory consumption which results in the Linux kernel triggering OOM killer on arbitrary processes. The attack requires an authenticated user with role of "Guest" or greater privilege. Note: "No Access" cannot login so technically it's a role but a user with this access role cannot perform the attack.


Published

2019-07-03T19:15:13.220

Last Modified

2024-11-21T04:46:51.433

Status

Modified

Source

[email protected]

Severity

CVSSv3.0: 6.5 (MEDIUM)

CVSSv2 Vector

AV:N/AC:L/Au:S/C:N/I:N/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: PARTIAL
Exploitability Score

8.0

Impact Score

2.9

Weaknesses
  • Type: Primary
    NVD-CWE-noinfo

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application f5 big-ip_application_security_manager < 12.1.4.1 Yes
Application f5 big-ip_application_security_manager < 13.1.1.5 Yes
Application f5 big-ip_application_security_manager < 14.0.0.5 Yes
Application f5 big-ip_application_security_manager < 14.1.0.6 Yes

References