Vulnerability Details CVE-2019-6665
On BIG-IP ASM 15.0.0-15.0.1, 14.1.0-14.1.2, 14.0.0-14.0.1, and 13.1.0-13.1.3.1, BIG-IQ 6.0.0 and 5.2.0-5.4.0, iWorkflow 2.3.0, and Enterprise Manager 3.1.1, an attacker with access to the device communication between the BIG-IP ASM Central Policy Builder and the BIG-IQ/Enterprise Manager/F5 iWorkflow will be able to set up the proxy the same way and intercept the traffic.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.008
EPSS Ranking 73.6%
CVSS Severity
CVSS v3 Score 9.4
CVSS v2 Score 7.5
Products affected by CVE-2019-6665
-
cpe:2.3:a:f5:big-ip_application_security_manager:13.1.0
-
cpe:2.3:a:f5:big-ip_application_security_manager:13.1.0.0
-
cpe:2.3:a:f5:big-ip_application_security_manager:13.1.0.1
-
cpe:2.3:a:f5:big-ip_application_security_manager:13.1.0.2
-
cpe:2.3:a:f5:big-ip_application_security_manager:13.1.0.3
-
cpe:2.3:a:f5:big-ip_application_security_manager:13.1.0.4
-
cpe:2.3:a:f5:big-ip_application_security_manager:13.1.0.5
-
cpe:2.3:a:f5:big-ip_application_security_manager:13.1.0.6
-
cpe:2.3:a:f5:big-ip_application_security_manager:13.1.0.7
-
cpe:2.3:a:f5:big-ip_application_security_manager:13.1.0.8
-
cpe:2.3:a:f5:big-ip_application_security_manager:13.1.1
-
cpe:2.3:a:f5:big-ip_application_security_manager:13.1.1.1
-
cpe:2.3:a:f5:big-ip_application_security_manager:13.1.1.2
-
cpe:2.3:a:f5:big-ip_application_security_manager:13.1.1.3
-
cpe:2.3:a:f5:big-ip_application_security_manager:13.1.1.4
-
cpe:2.3:a:f5:big-ip_application_security_manager:13.1.1.5
-
cpe:2.3:a:f5:big-ip_application_security_manager:13.1.2
-
cpe:2.3:a:f5:big-ip_application_security_manager:13.1.3
-
cpe:2.3:a:f5:big-ip_application_security_manager:13.1.3.1
-
cpe:2.3:a:f5:big-ip_application_security_manager:14.0.0
-
cpe:2.3:a:f5:big-ip_application_security_manager:14.0.0.1
-
cpe:2.3:a:f5:big-ip_application_security_manager:14.0.0.2
-
cpe:2.3:a:f5:big-ip_application_security_manager:14.0.0.3
-
cpe:2.3:a:f5:big-ip_application_security_manager:14.0.0.4
-
cpe:2.3:a:f5:big-ip_application_security_manager:14.0.0.5
-
cpe:2.3:a:f5:big-ip_application_security_manager:14.0.1
-
cpe:2.3:a:f5:big-ip_application_security_manager:14.1.0
-
cpe:2.3:a:f5:big-ip_application_security_manager:14.1.0.1
-
cpe:2.3:a:f5:big-ip_application_security_manager:14.1.0.2
-
cpe:2.3:a:f5:big-ip_application_security_manager:14.1.0.2.0.45.4
-
cpe:2.3:a:f5:big-ip_application_security_manager:14.1.0.2.0.62.4
-
cpe:2.3:a:f5:big-ip_application_security_manager:14.1.0.3
-
cpe:2.3:a:f5:big-ip_application_security_manager:14.1.0.3.0.79.6
-
cpe:2.3:a:f5:big-ip_application_security_manager:14.1.0.3.0.97.6
-
cpe:2.3:a:f5:big-ip_application_security_manager:14.1.0.3.0.99.6
-
cpe:2.3:a:f5:big-ip_application_security_manager:14.1.0.5
-
cpe:2.3:a:f5:big-ip_application_security_manager:14.1.0.5.0.15.5
-
cpe:2.3:a:f5:big-ip_application_security_manager:14.1.0.5.0.36.5
-
cpe:2.3:a:f5:big-ip_application_security_manager:14.1.0.5.0.40.5
-
cpe:2.3:a:f5:big-ip_application_security_manager:14.1.0.6
-
cpe:2.3:a:f5:big-ip_application_security_manager:14.1.0.6.0.11.9
-
cpe:2.3:a:f5:big-ip_application_security_manager:14.1.0.6.0.14.9
-
cpe:2.3:a:f5:big-ip_application_security_manager:14.1.0.6.0.68.9
-
cpe:2.3:a:f5:big-ip_application_security_manager:14.1.0.6.0.70.9
-
cpe:2.3:a:f5:big-ip_application_security_manager:14.1.2
-
cpe:2.3:a:f5:big-ip_application_security_manager:15.0.0
-
cpe:2.3:a:f5:big-ip_application_security_manager:15.0.1
-
cpe:2.3:a:f5:big-iq_centralized_management:5.2.0
-
cpe:2.3:a:f5:big-iq_centralized_management:5.3.0
-
cpe:2.3:a:f5:big-iq_centralized_management:5.4.0
-
cpe:2.3:a:f5:big-iq_centralized_management:6.0.0
-
cpe:2.3:a:f5:enterprise_manager:3.1.1
-
cpe:2.3:a:f5:iworkflow:2.3.0