6.5
CVSSv2

CVE-2019-6646

Published: 04/09/2019 Updated: 24/08/2020
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

On BIG-IP 11.5.2-11.6.4 and Enterprise Manager 3.1.1, REST users with guest privileges may be able to escalate their privileges and run commands with admin privileges.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

f5 big-ip local traffic manager 12.0.0

f5 big-ip policy enforcement manager 12.0.0

f5 big-ip application acceleration manager 12.0.0

f5 big-ip access policy manager 12.0.0

f5 big-ip analytics 12.0.0

f5 big-ip advanced firewall manager 12.0.0

f5 big-ip domain name system 12.0.0

f5 big-ip application security manager 12.0.0

f5 big-ip link controller 12.0.0

f5 enterprise manager 3.1.1

f5 big-ip global traffic manager 12.0.0

f5 big-ip edge gateway 12.0.0

f5 big-ip webaccelerator 12.0.0

f5 big-ip advanced firewall manager

f5 big-ip access policy manager

f5 big-ip application acceleration manager

f5 big-ip link controller

f5 big-ip policy enforcement manager

f5 big-ip webaccelerator

f5 big-ip application security manager

f5 big-ip local traffic manager

f5 big-ip fraud protection service

f5 big-ip global traffic manager

f5 big-ip analytics

f5 big-ip edge gateway

f5 big-ip domain name system

f5 big-ip fraud protection service 12.0.0