CVE-2019-6594
Vulnerability from cvelistv5
Published
2019-02-26 15:00
Modified
2024-09-17 01:31
Severity ?
Summary
On BIG-IP 11.5.1-11.6.3.2, 12.1.3.4-12.1.3.7, 13.0.0 HF1-13.1.1.1, and 14.0.0-14.0.0.2, Multi-Path TCP (MPTCP) does not protect against multiple zero length DATA_FINs in the reassembly queue, which can lead to an infinite loop in some circumstances.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T20:23:22.071Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.f5.com/csp/article/K91026261"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, FPS, GTM, Link Controller, PEM, WebAccelerator)",
          "vendor": "F5 Networks, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "11.5.1-11.6.3.2, 12.1.3.4-12.1.3.7, 13.0.0 HF1-13.1.1.1, 14.0.0-14.0.0.2"
            }
          ]
        }
      ],
      "datePublic": "2019-02-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "On BIG-IP 11.5.1-11.6.3.2, 12.1.3.4-12.1.3.7, 13.0.0 HF1-13.1.1.1, and 14.0.0-14.0.0.2, Multi-Path TCP (MPTCP) does not protect against multiple zero length DATA_FINs in the reassembly queue, which can lead to an infinite loop in some circumstances."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "DoS",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-02-26T14:57:01",
        "orgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab",
        "shortName": "f5"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.f5.com/csp/article/K91026261"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "f5sirt@f5.com",
          "DATE_PUBLIC": "2019-02-26T00:00:00",
          "ID": "CVE-2019-6594",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, FPS, GTM, Link Controller, PEM, WebAccelerator)",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "11.5.1-11.6.3.2, 12.1.3.4-12.1.3.7, 13.0.0 HF1-13.1.1.1, 14.0.0-14.0.0.2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "F5 Networks, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "On BIG-IP 11.5.1-11.6.3.2, 12.1.3.4-12.1.3.7, 13.0.0 HF1-13.1.1.1, and 14.0.0-14.0.0.2, Multi-Path TCP (MPTCP) does not protect against multiple zero length DATA_FINs in the reassembly queue, which can lead to an infinite loop in some circumstances."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "DoS"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.f5.com/csp/article/K91026261",
              "refsource": "CONFIRM",
              "url": "https://support.f5.com/csp/article/K91026261"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab",
    "assignerShortName": "f5",
    "cveId": "CVE-2019-6594",
    "datePublished": "2019-02-26T15:00:00Z",
    "dateReserved": "2019-01-22T00:00:00",
    "dateUpdated": "2024-09-17T01:31:29.003Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.5.3\", \"versionEndIncluding\": \"11.6.3.2\", \"matchCriteriaId\": \"4309DD94-5A77-4EA5-8274-8B3A40EA988C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12.1.3.4\", \"versionEndIncluding\": \"12.1.3.7\", \"matchCriteriaId\": \"5D00A37D-91A8-4E53-ABDE-4974A35D7086\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.0.1\", \"versionEndIncluding\": \"13.1.1.1\", \"matchCriteriaId\": \"7F9121E6-F95C-4769-80BA-B7E4D9CB0003\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"14.0.0\", \"versionEndIncluding\": \"14.0.0.2\", \"matchCriteriaId\": \"E021297A-FD19-446B-B526-7516503B6D24\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.0:hf1:*:*:*:*:*:*\", \"matchCriteriaId\": \"BFC27A9D-8CB6-4F0C-99DD-B3E6AF50988C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.0:hf2:*:*:*:*:*:*\", \"matchCriteriaId\": \"CAA88743-F96D-4847-8DE4-3AF021717F05\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.0:hf3:*:*:*:*:*:*\", \"matchCriteriaId\": \"FCC68160-D34C-4F0C-8BC6-5573DE3A6540\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.5.1\", \"versionEndIncluding\": \"11.6.3.2\", \"matchCriteriaId\": \"436A8B39-E1D3-404F-832C-8436C931CD50\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12.1.3.4\", \"versionEndIncluding\": \"12.1.3.7\", \"matchCriteriaId\": \"5D304C74-1F9B-4AD9-9FE9-89E98A12C220\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.0.1\", \"versionEndIncluding\": \"13.1.1.1\", \"matchCriteriaId\": \"774E9A46-F20E-499B-9FE3-F75D2F6CFF41\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"14.0.0\", \"versionEndIncluding\": \"14.0.0.2\", \"matchCriteriaId\": \"B3A526B1-EB66-497F-B8B5-45205781B323\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_local_traffic_manager:13.0.0:hf1:*:*:*:*:*:*\", \"matchCriteriaId\": \"5440C4FC-B9A1-4744-B4C8-92F66DCCAC49\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_local_traffic_manager:13.0.0:hf2:*:*:*:*:*:*\", \"matchCriteriaId\": \"69F38B91-D03F-47BC-9BFF-D4298856D843\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_local_traffic_manager:13.0.0:hf3:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F45771D-8B62-40E8-B83F-A0F46B04A18D\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.5.1\", \"versionEndIncluding\": \"11.6.3.2\", \"matchCriteriaId\": \"2F71DF92-DDF3-4E39-85CE-D364C0C2AA8B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12.1.3.4\", \"versionEndIncluding\": \"12.1.3.7\", \"matchCriteriaId\": \"A8520B2C-8220-41D6-B61D-30F32468388A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.0.1\", \"versionEndIncluding\": \"13.1.1.1\", \"matchCriteriaId\": \"12EB0BB9-FC16-4B27-B30D-3D9A8492A319\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"14.0.0\", \"versionEndIncluding\": \"14.0.0.2\", \"matchCriteriaId\": \"9032E773-CAB2-4108-A86B-04A8383663BE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.0.0:hf1:*:*:*:*:*:*\", \"matchCriteriaId\": \"018F7F5E-FE99-4981-9269-4D68FD405F20\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.0.0:hf2:*:*:*:*:*:*\", \"matchCriteriaId\": \"CED0E0B4-4D66-4393-8189-24A6A9F0E08D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.0.0:hf3:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F54D389-CFFB-42F4-B8C6-FE3BB4888DA4\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.5.1\", \"versionEndIncluding\": \"11.6.3.2\", \"matchCriteriaId\": \"9F66CAC0-20E9-48FB-A818-024D609F35AF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12.1.3.4\", \"versionEndIncluding\": \"12.1.3.7\", \"matchCriteriaId\": \"F504BF44-EC6D-4FFD-A530-61052E2365A7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.0.1\", \"versionEndIncluding\": \"13.1.1.1\", \"matchCriteriaId\": \"204F9C52-757E-4094-AA29-A80B218AD6AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"14.0.0\", \"versionEndIncluding\": \"14.0.0.2\", \"matchCriteriaId\": \"224F2348-19DC-4242-8A1E-5F5BDCB86B9C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_analytics:13.0.0:hf1:*:*:*:*:*:*\", \"matchCriteriaId\": \"80111371-B4E7-4D23-9818-0E2CC4C0F263\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_analytics:13.0.0:hf2:*:*:*:*:*:*\", \"matchCriteriaId\": \"53A3F28E-E10C-40B2-8285-BAE28375DFB8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_analytics:13.0.0:hf3:*:*:*:*:*:*\", \"matchCriteriaId\": \"110FBBEB-33E3-4A77-9EBF-86C9B45B864D\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.5.1\", \"versionEndIncluding\": \"11.6.3.2\", \"matchCriteriaId\": \"B011EE60-2B1C-4901-BF9B-13AFB7DAE1A6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12.1.3.4\", \"versionEndIncluding\": \"12.1.3.7\", \"matchCriteriaId\": \"5D00A37D-91A8-4E53-ABDE-4974A35D7086\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.0.0.1\", \"versionEndIncluding\": \"13.1.1.1\", \"matchCriteriaId\": \"7B4AB82F-D598-41CB-95A1-9D4CA445E806\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"14.0.0\", \"versionEndIncluding\": \"14.0.0.2\", \"matchCriteriaId\": \"E021297A-FD19-446B-B526-7516503B6D24\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.0:hf1:*:*:*:*:*:*\", \"matchCriteriaId\": \"BFC27A9D-8CB6-4F0C-99DD-B3E6AF50988C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.0:hf2:*:*:*:*:*:*\", \"matchCriteriaId\": \"CAA88743-F96D-4847-8DE4-3AF021717F05\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.0:hf3:*:*:*:*:*:*\", \"matchCriteriaId\": \"FCC68160-D34C-4F0C-8BC6-5573DE3A6540\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.5.1\", \"versionEndIncluding\": \"11.6.3.2\", \"matchCriteriaId\": \"FC94D1AE-7664-4C83-A84F-34CF5E0CA15F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12.1.3.4\", \"versionEndIncluding\": \"12.1.3.7\", \"matchCriteriaId\": \"BF3398F2-F6EC-497E-AC76-3C5F4C3607CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.0.1\", \"versionEndIncluding\": \"13.1.1.1\", \"matchCriteriaId\": \"DCB18ED4-C6D5-4821-A1BA-ADE51B33A3D8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"14.0.0\", \"versionEndIncluding\": \"14.0.0.2\", \"matchCriteriaId\": \"B4D3A77A-89E0-44DF-AA5B-EDEBCBB63060\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_application_security_manager:13.0.0:hf1:*:*:*:*:*:*\", \"matchCriteriaId\": \"7686C88A-9520-4C4A-A602-BDE1F4F72048\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_application_security_manager:13.0.0:hf2:*:*:*:*:*:*\", \"matchCriteriaId\": \"5AC91766-79AD-4A8F-BCF2-5D252FC375D4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_application_security_manager:13.0.0:hf3:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B3E1662-39AF-42C0-A6E6-2C9579B7EEE6\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.5.1\", \"versionEndIncluding\": \"11.6.3.2\", \"matchCriteriaId\": \"DA8A7544-B6DB-4CD8-8C49-CF16B3526682\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12.1.3.4\", \"versionEndIncluding\": \"12.1.3.7\", \"matchCriteriaId\": \"1ACE2C94-6D93-4245-9BDF-237AC74C669D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.0.1\", \"versionEndIncluding\": \"13.1.1.1\", \"matchCriteriaId\": \"CAD7E2CC-977C-4C63-AC72-78C7F4D7EF40\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"14.0.0\", \"versionEndIncluding\": \"14.0.0.2\", \"matchCriteriaId\": \"9D11EBE7-741F-4585-962F-99EAA29C1F0E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_domain_name_system:13.0.0:hf1:*:*:*:*:*:*\", \"matchCriteriaId\": \"01581EF5-A132-427B-A6A5-42A4BE28BE06\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_domain_name_system:13.0.0:hf2:*:*:*:*:*:*\", \"matchCriteriaId\": \"B59BFDDD-52DE-4062-B18E-F55B1C1A55D5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_domain_name_system:13.0.0:hf3:*:*:*:*:*:*\", \"matchCriteriaId\": \"6180B193-3D37-448E-B3A5-A2DA35D7E931\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.5.1\", \"versionEndIncluding\": \"11.6.3.2\", \"matchCriteriaId\": \"EF6F1F33-2617-4AB5-B269-DCB5B322CC08\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12.1.3.4\", \"versionEndIncluding\": \"12.1.3.7\", \"matchCriteriaId\": \"4BC587AF-FB81-444D-A0FE-55070F9463DF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.0.1\", \"versionEndIncluding\": \"13.1.1.1\", \"matchCriteriaId\": \"19D44FD4-D7A0-42AA-86B5-DB371BD31EFB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"14.0.0\", \"versionEndIncluding\": \"14.0.0.2\", \"matchCriteriaId\": \"57F6C963-A1BF-4579-9345-D0207269577A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_edge_gateway:13.0.0:hf1:*:*:*:*:*:*\", \"matchCriteriaId\": \"F9B29141-C15B-4BCD-897B-91944D36BDBA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_edge_gateway:13.0.0:hf2:*:*:*:*:*:*\", \"matchCriteriaId\": \"718C5B91-72D2-46A0-A1F6-CF9E0F48D440\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_edge_gateway:13.0.0:hf3:*:*:*:*:*:*\", \"matchCriteriaId\": \"3747014F-F4DE-4D6E-80C7-C0C609D07D60\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.5.1\", \"versionEndIncluding\": \"11.6.3.2\", \"matchCriteriaId\": \"B9C58E9E-8937-4657-A69E-A63CBE423CC7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12.1.3.4\", \"versionEndIncluding\": \"12.1.3.7\", \"matchCriteriaId\": \"146A0E0F-B2F2-4362-9CBD-8183977883B2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.0.1\", \"versionEndIncluding\": \"13.1.1.1\", \"matchCriteriaId\": \"F941BFBA-7961-4F5D-B6CF-7DAE8B1B3AAA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"14.0.0\", \"versionEndIncluding\": \"14.0.0.2\", \"matchCriteriaId\": \"DC6B989A-BA55-47F5-8269-D9FA435ECC29\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_fraud_protection_service:13.0.0:hf1:*:*:*:*:*:*\", \"matchCriteriaId\": \"059B6601-24F0-4212-907B-D9CD7331BDFE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_fraud_protection_service:13.0.0:hf2:*:*:*:*:*:*\", \"matchCriteriaId\": \"93526E30-BEB1-40E3-A99D-ABDBA9AD7B92\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_fraud_protection_service:13.0.0:hf3:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C363226-7034-435E-B5A3-E00924C4CA8F\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.5.1\", \"versionEndIncluding\": \"11.6.3.2\", \"matchCriteriaId\": \"2B74523D-BC99-47F0-8C5F-8C56DF55504C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12.1.3.4\", \"versionEndIncluding\": \"12.1.3.7\", \"matchCriteriaId\": \"B6E96D0D-2C7D-4357-AE91-9B00FF7D2D0B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.0.1\", \"versionEndIncluding\": \"13.1.1.1\", \"matchCriteriaId\": \"39EAE8EF-4426-4584-8877-EC94C3923A97\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"14.0.0\", \"versionEndIncluding\": \"14.0.0.2\", \"matchCriteriaId\": \"F534EADF-DA49-4EDD-97F8-C4046E890D8B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_global_traffic_manager:13.0.0:hf1:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB56A3A2-4985-4A68-A6BD-4ACDD6FA7B88\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_global_traffic_manager:13.0.0:hf2:*:*:*:*:*:*\", \"matchCriteriaId\": \"1EAF1DB5-52DD-47DF-A281-A338F989735E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_global_traffic_manager:13.0.0:hf3:*:*:*:*:*:*\", \"matchCriteriaId\": \"2045D85E-2BAF-4777-8957-6CBB0C48AF51\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.5.1\", \"versionEndIncluding\": \"11.6.3.2\", \"matchCriteriaId\": \"FDEA48C9-68B1-430A-A319-F38002098B9A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12.1.3.4\", \"versionEndIncluding\": \"12.1.3.7\", \"matchCriteriaId\": \"49B3D9A1-B592-4C82-8A7E-D6496A2A153F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.0.1\", \"versionEndIncluding\": \"13.1.1.1\", \"matchCriteriaId\": \"FE834D83-C9A9-43D5-80F3-6DA2CA922751\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"14.0.0\", \"versionEndIncluding\": \"14.0.0.2\", \"matchCriteriaId\": \"D0233F1B-2DDB-4B01-A549-E76C18BBC3F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_link_controller:13.0.0:hf1:*:*:*:*:*:*\", \"matchCriteriaId\": \"1AEE107A-9863-4143-A2B5-0DD773C08BEF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_link_controller:13.0.0:hf2:*:*:*:*:*:*\", \"matchCriteriaId\": \"58B46D9A-38A0-4923-A44E-A89223B996CD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_link_controller:13.0.0:hf3:*:*:*:*:*:*\", \"matchCriteriaId\": \"0DA447DF-9298-4BE2-92CE-228640DC0815\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.5.1\", \"versionEndIncluding\": \"11.6.3.2\", \"matchCriteriaId\": \"82811221-46E5-419A-A6BC-E9DA655DCC70\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12.1.3.4\", \"versionEndIncluding\": \"12.1.3.7\", \"matchCriteriaId\": \"16AF7AF3-F7CB-4BAA-A0D0-179714D094BF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.0.1\", \"versionEndIncluding\": \"13.1.1.1\", \"matchCriteriaId\": \"0B115D7E-C099-493C-8753-8CBC3823F5B9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"14.0.0\", \"versionEndIncluding\": \"14.0.0.2\", \"matchCriteriaId\": \"90DBE74F-6E43-448F-9479-8FD75D5DCC22\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.0.0:hf1:*:*:*:*:*:*\", \"matchCriteriaId\": \"60DC4E85-BC88-499F-B1C2-E2572784294C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.0.0:hf2:*:*:*:*:*:*\", \"matchCriteriaId\": \"F4E706BC-8474-49DF-B44F-4480128FDFE1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.0.0:hf3:*:*:*:*:*:*\", \"matchCriteriaId\": \"674D7BB1-C6F0-4D35-BFDF-D02F7167A0A2\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.5.1\", \"versionEndIncluding\": \"11.6.3.2\", \"matchCriteriaId\": \"4F787946-AEDC-47A4-9DA0-5947992EEC16\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12.1.3.4\", \"versionEndIncluding\": \"12.1.3.7\", \"matchCriteriaId\": \"CA5624FE-69E7-41C3-9F84-07827D590A52\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.0.1\", \"versionEndIncluding\": \"13.1.1.1\", \"matchCriteriaId\": \"AD9DACFB-B553-498E-A6C1-37CBFE5746B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"14.0.0\", \"versionEndIncluding\": \"14.0.0.2\", \"matchCriteriaId\": \"E6ADE585-616C-4B40-A40C-EE97A8FAC653\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_webaccelerator:13.0.0:hf1:*:*:*:*:*:*\", \"matchCriteriaId\": \"1544EB26-7E41-44D1-A6E5-444B29E1A17C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_webaccelerator:13.0.0:hf2:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A83FBD1-675E-42F4-BBD2-47AD962D8587\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:f5:big-ip_webaccelerator:13.0.0:hf3:*:*:*:*:*:*\", \"matchCriteriaId\": \"B02A0DEF-BAD9-402B-85D9-451A4A708B48\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"On BIG-IP 11.5.1-11.6.3.2, 12.1.3.4-12.1.3.7, 13.0.0 HF1-13.1.1.1, and 14.0.0-14.0.0.2, Multi-Path TCP (MPTCP) does not protect against multiple zero length DATA_FINs in the reassembly queue, which can lead to an infinite loop in some circumstances.\"}, {\"lang\": \"es\", \"value\": \"BIG-IP, en sus versiones 11.5.1-11.6.3.2, 12.1.3.4-12.1.3.7, 13.0.0 HF1-13.1.1.1 y 14.0.0-14.0.0.2, Multi-Path TCP (MPTCP), no protege contra manera correcta contra m\\u00faltiples DATA_FIN de longitud cero en la cola de reensamblado, lo que podr\\u00eda conducir a un bucle infinito en algunas circunstancias.\"}]",
      "id": "CVE-2019-6594",
      "lastModified": "2024-11-21T04:46:46.163",
      "metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 5.9, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.2, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:N/A:P\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2019-02-26T15:29:00.323",
      "references": "[{\"url\": \"https://support.f5.com/csp/article/K91026261\", \"source\": \"f5sirt@f5.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://support.f5.com/csp/article/K91026261\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "f5sirt@f5.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-835\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2019-6594\",\"sourceIdentifier\":\"f5sirt@f5.com\",\"published\":\"2019-02-26T15:29:00.323\",\"lastModified\":\"2024-11-21T04:46:46.163\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"On BIG-IP 11.5.1-11.6.3.2, 12.1.3.4-12.1.3.7, 13.0.0 HF1-13.1.1.1, and 14.0.0-14.0.0.2, Multi-Path TCP (MPTCP) does not protect against multiple zero length DATA_FINs in the reassembly queue, which can lead to an infinite loop in some circumstances.\"},{\"lang\":\"es\",\"value\":\"BIG-IP, en sus versiones 11.5.1-11.6.3.2, 12.1.3.4-12.1.3.7, 13.0.0 HF1-13.1.1.1 y 14.0.0-14.0.0.2, Multi-Path TCP (MPTCP), no protege contra manera correcta contra m\u00faltiples DATA_FIN de longitud cero en la cola de reensamblado, lo que podr\u00eda conducir a un bucle infinito en algunas circunstancias.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-835\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.3\",\"versionEndIncluding\":\"11.6.3.2\",\"matchCriteriaId\":\"4309DD94-5A77-4EA5-8274-8B3A40EA988C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.3.4\",\"versionEndIncluding\":\"12.1.3.7\",\"matchCriteriaId\":\"5D00A37D-91A8-4E53-ABDE-4974A35D7086\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.1\",\"versionEndIncluding\":\"13.1.1.1\",\"matchCriteriaId\":\"7F9121E6-F95C-4769-80BA-B7E4D9CB0003\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.0.0\",\"versionEndIncluding\":\"14.0.0.2\",\"matchCriteriaId\":\"E021297A-FD19-446B-B526-7516503B6D24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.0:hf1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFC27A9D-8CB6-4F0C-99DD-B3E6AF50988C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.0:hf2:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAA88743-F96D-4847-8DE4-3AF021717F05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.0:hf3:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCC68160-D34C-4F0C-8BC6-5573DE3A6540\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.6.3.2\",\"matchCriteriaId\":\"436A8B39-E1D3-404F-832C-8436C931CD50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.3.4\",\"versionEndIncluding\":\"12.1.3.7\",\"matchCriteriaId\":\"5D304C74-1F9B-4AD9-9FE9-89E98A12C220\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.1\",\"versionEndIncluding\":\"13.1.1.1\",\"matchCriteriaId\":\"774E9A46-F20E-499B-9FE3-F75D2F6CFF41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.0.0\",\"versionEndIncluding\":\"14.0.0.2\",\"matchCriteriaId\":\"B3A526B1-EB66-497F-B8B5-45205781B323\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:13.0.0:hf1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5440C4FC-B9A1-4744-B4C8-92F66DCCAC49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:13.0.0:hf2:*:*:*:*:*:*\",\"matchCriteriaId\":\"69F38B91-D03F-47BC-9BFF-D4298856D843\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:13.0.0:hf3:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F45771D-8B62-40E8-B83F-A0F46B04A18D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.6.3.2\",\"matchCriteriaId\":\"2F71DF92-DDF3-4E39-85CE-D364C0C2AA8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.3.4\",\"versionEndIncluding\":\"12.1.3.7\",\"matchCriteriaId\":\"A8520B2C-8220-41D6-B61D-30F32468388A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.1\",\"versionEndIncluding\":\"13.1.1.1\",\"matchCriteriaId\":\"12EB0BB9-FC16-4B27-B30D-3D9A8492A319\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.0.0\",\"versionEndIncluding\":\"14.0.0.2\",\"matchCriteriaId\":\"9032E773-CAB2-4108-A86B-04A8383663BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.0.0:hf1:*:*:*:*:*:*\",\"matchCriteriaId\":\"018F7F5E-FE99-4981-9269-4D68FD405F20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.0.0:hf2:*:*:*:*:*:*\",\"matchCriteriaId\":\"CED0E0B4-4D66-4393-8189-24A6A9F0E08D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.0.0:hf3:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F54D389-CFFB-42F4-B8C6-FE3BB4888DA4\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.6.3.2\",\"matchCriteriaId\":\"9F66CAC0-20E9-48FB-A818-024D609F35AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.3.4\",\"versionEndIncluding\":\"12.1.3.7\",\"matchCriteriaId\":\"F504BF44-EC6D-4FFD-A530-61052E2365A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.1\",\"versionEndIncluding\":\"13.1.1.1\",\"matchCriteriaId\":\"204F9C52-757E-4094-AA29-A80B218AD6AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.0.0\",\"versionEndIncluding\":\"14.0.0.2\",\"matchCriteriaId\":\"224F2348-19DC-4242-8A1E-5F5BDCB86B9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:13.0.0:hf1:*:*:*:*:*:*\",\"matchCriteriaId\":\"80111371-B4E7-4D23-9818-0E2CC4C0F263\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:13.0.0:hf2:*:*:*:*:*:*\",\"matchCriteriaId\":\"53A3F28E-E10C-40B2-8285-BAE28375DFB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:13.0.0:hf3:*:*:*:*:*:*\",\"matchCriteriaId\":\"110FBBEB-33E3-4A77-9EBF-86C9B45B864D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.6.3.2\",\"matchCriteriaId\":\"B011EE60-2B1C-4901-BF9B-13AFB7DAE1A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.3.4\",\"versionEndIncluding\":\"12.1.3.7\",\"matchCriteriaId\":\"5D00A37D-91A8-4E53-ABDE-4974A35D7086\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.0.1\",\"versionEndIncluding\":\"13.1.1.1\",\"matchCriteriaId\":\"7B4AB82F-D598-41CB-95A1-9D4CA445E806\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.0.0\",\"versionEndIncluding\":\"14.0.0.2\",\"matchCriteriaId\":\"E021297A-FD19-446B-B526-7516503B6D24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.0:hf1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFC27A9D-8CB6-4F0C-99DD-B3E6AF50988C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.0:hf2:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAA88743-F96D-4847-8DE4-3AF021717F05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.0:hf3:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCC68160-D34C-4F0C-8BC6-5573DE3A6540\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.6.3.2\",\"matchCriteriaId\":\"FC94D1AE-7664-4C83-A84F-34CF5E0CA15F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.3.4\",\"versionEndIncluding\":\"12.1.3.7\",\"matchCriteriaId\":\"BF3398F2-F6EC-497E-AC76-3C5F4C3607CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.1\",\"versionEndIncluding\":\"13.1.1.1\",\"matchCriteriaId\":\"DCB18ED4-C6D5-4821-A1BA-ADE51B33A3D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.0.0\",\"versionEndIncluding\":\"14.0.0.2\",\"matchCriteriaId\":\"B4D3A77A-89E0-44DF-AA5B-EDEBCBB63060\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:13.0.0:hf1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7686C88A-9520-4C4A-A602-BDE1F4F72048\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:13.0.0:hf2:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AC91766-79AD-4A8F-BCF2-5D252FC375D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:13.0.0:hf3:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B3E1662-39AF-42C0-A6E6-2C9579B7EEE6\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.6.3.2\",\"matchCriteriaId\":\"DA8A7544-B6DB-4CD8-8C49-CF16B3526682\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.3.4\",\"versionEndIncluding\":\"12.1.3.7\",\"matchCriteriaId\":\"1ACE2C94-6D93-4245-9BDF-237AC74C669D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.1\",\"versionEndIncluding\":\"13.1.1.1\",\"matchCriteriaId\":\"CAD7E2CC-977C-4C63-AC72-78C7F4D7EF40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.0.0\",\"versionEndIncluding\":\"14.0.0.2\",\"matchCriteriaId\":\"9D11EBE7-741F-4585-962F-99EAA29C1F0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:13.0.0:hf1:*:*:*:*:*:*\",\"matchCriteriaId\":\"01581EF5-A132-427B-A6A5-42A4BE28BE06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:13.0.0:hf2:*:*:*:*:*:*\",\"matchCriteriaId\":\"B59BFDDD-52DE-4062-B18E-F55B1C1A55D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:13.0.0:hf3:*:*:*:*:*:*\",\"matchCriteriaId\":\"6180B193-3D37-448E-B3A5-A2DA35D7E931\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.6.3.2\",\"matchCriteriaId\":\"EF6F1F33-2617-4AB5-B269-DCB5B322CC08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.3.4\",\"versionEndIncluding\":\"12.1.3.7\",\"matchCriteriaId\":\"4BC587AF-FB81-444D-A0FE-55070F9463DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.1\",\"versionEndIncluding\":\"13.1.1.1\",\"matchCriteriaId\":\"19D44FD4-D7A0-42AA-86B5-DB371BD31EFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.0.0\",\"versionEndIncluding\":\"14.0.0.2\",\"matchCriteriaId\":\"57F6C963-A1BF-4579-9345-D0207269577A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_edge_gateway:13.0.0:hf1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9B29141-C15B-4BCD-897B-91944D36BDBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_edge_gateway:13.0.0:hf2:*:*:*:*:*:*\",\"matchCriteriaId\":\"718C5B91-72D2-46A0-A1F6-CF9E0F48D440\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_edge_gateway:13.0.0:hf3:*:*:*:*:*:*\",\"matchCriteriaId\":\"3747014F-F4DE-4D6E-80C7-C0C609D07D60\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.6.3.2\",\"matchCriteriaId\":\"B9C58E9E-8937-4657-A69E-A63CBE423CC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.3.4\",\"versionEndIncluding\":\"12.1.3.7\",\"matchCriteriaId\":\"146A0E0F-B2F2-4362-9CBD-8183977883B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.1\",\"versionEndIncluding\":\"13.1.1.1\",\"matchCriteriaId\":\"F941BFBA-7961-4F5D-B6CF-7DAE8B1B3AAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.0.0\",\"versionEndIncluding\":\"14.0.0.2\",\"matchCriteriaId\":\"DC6B989A-BA55-47F5-8269-D9FA435ECC29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:13.0.0:hf1:*:*:*:*:*:*\",\"matchCriteriaId\":\"059B6601-24F0-4212-907B-D9CD7331BDFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:13.0.0:hf2:*:*:*:*:*:*\",\"matchCriteriaId\":\"93526E30-BEB1-40E3-A99D-ABDBA9AD7B92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:13.0.0:hf3:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C363226-7034-435E-B5A3-E00924C4CA8F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.6.3.2\",\"matchCriteriaId\":\"2B74523D-BC99-47F0-8C5F-8C56DF55504C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.3.4\",\"versionEndIncluding\":\"12.1.3.7\",\"matchCriteriaId\":\"B6E96D0D-2C7D-4357-AE91-9B00FF7D2D0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.1\",\"versionEndIncluding\":\"13.1.1.1\",\"matchCriteriaId\":\"39EAE8EF-4426-4584-8877-EC94C3923A97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.0.0\",\"versionEndIncluding\":\"14.0.0.2\",\"matchCriteriaId\":\"F534EADF-DA49-4EDD-97F8-C4046E890D8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:13.0.0:hf1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB56A3A2-4985-4A68-A6BD-4ACDD6FA7B88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:13.0.0:hf2:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EAF1DB5-52DD-47DF-A281-A338F989735E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:13.0.0:hf3:*:*:*:*:*:*\",\"matchCriteriaId\":\"2045D85E-2BAF-4777-8957-6CBB0C48AF51\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.6.3.2\",\"matchCriteriaId\":\"FDEA48C9-68B1-430A-A319-F38002098B9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.3.4\",\"versionEndIncluding\":\"12.1.3.7\",\"matchCriteriaId\":\"49B3D9A1-B592-4C82-8A7E-D6496A2A153F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.1\",\"versionEndIncluding\":\"13.1.1.1\",\"matchCriteriaId\":\"FE834D83-C9A9-43D5-80F3-6DA2CA922751\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.0.0\",\"versionEndIncluding\":\"14.0.0.2\",\"matchCriteriaId\":\"D0233F1B-2DDB-4B01-A549-E76C18BBC3F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:13.0.0:hf1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AEE107A-9863-4143-A2B5-0DD773C08BEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:13.0.0:hf2:*:*:*:*:*:*\",\"matchCriteriaId\":\"58B46D9A-38A0-4923-A44E-A89223B996CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:13.0.0:hf3:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DA447DF-9298-4BE2-92CE-228640DC0815\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.6.3.2\",\"matchCriteriaId\":\"82811221-46E5-419A-A6BC-E9DA655DCC70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.3.4\",\"versionEndIncluding\":\"12.1.3.7\",\"matchCriteriaId\":\"16AF7AF3-F7CB-4BAA-A0D0-179714D094BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.1\",\"versionEndIncluding\":\"13.1.1.1\",\"matchCriteriaId\":\"0B115D7E-C099-493C-8753-8CBC3823F5B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.0.0\",\"versionEndIncluding\":\"14.0.0.2\",\"matchCriteriaId\":\"90DBE74F-6E43-448F-9479-8FD75D5DCC22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.0.0:hf1:*:*:*:*:*:*\",\"matchCriteriaId\":\"60DC4E85-BC88-499F-B1C2-E2572784294C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.0.0:hf2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4E706BC-8474-49DF-B44F-4480128FDFE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.0.0:hf3:*:*:*:*:*:*\",\"matchCriteriaId\":\"674D7BB1-C6F0-4D35-BFDF-D02F7167A0A2\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.6.3.2\",\"matchCriteriaId\":\"4F787946-AEDC-47A4-9DA0-5947992EEC16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.3.4\",\"versionEndIncluding\":\"12.1.3.7\",\"matchCriteriaId\":\"CA5624FE-69E7-41C3-9F84-07827D590A52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.1\",\"versionEndIncluding\":\"13.1.1.1\",\"matchCriteriaId\":\"AD9DACFB-B553-498E-A6C1-37CBFE5746B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.0.0\",\"versionEndIncluding\":\"14.0.0.2\",\"matchCriteriaId\":\"E6ADE585-616C-4B40-A40C-EE97A8FAC653\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_webaccelerator:13.0.0:hf1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1544EB26-7E41-44D1-A6E5-444B29E1A17C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_webaccelerator:13.0.0:hf2:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A83FBD1-675E-42F4-BBD2-47AD962D8587\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_webaccelerator:13.0.0:hf3:*:*:*:*:*:*\",\"matchCriteriaId\":\"B02A0DEF-BAD9-402B-85D9-451A4A708B48\"}]}]}],\"references\":[{\"url\":\"https://support.f5.com/csp/article/K91026261\",\"source\":\"f5sirt@f5.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K91026261\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.