Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2019-6593 : Security Advisory and Response

Learn about CVE-2019-6593 affecting BIG-IP versions 11.5.1-11.5.4, 11.6.1, and 12.1.0. Discover how this vulnerability allows plaintext recovery of encrypted messages and how to mitigate it.

A vulnerability on BIG-IP versions 11.5.1-11.5.4, 11.6.1, and 12.1.0 could lead to plaintext recovery of encrypted messages through a chosen ciphertext attack on CBC ciphers.

Understanding CVE-2019-6593

This CVE refers to a security vulnerability affecting F5 Networks, Inc.'s BIG-IP products, potentially allowing attackers to recover encrypted messages in plaintext.

What is CVE-2019-6593?

The vulnerability in BIG-IP versions 11.5.1-11.5.4, 11.6.1, and 12.1.0 enables a chosen ciphertext attack on CBC ciphers, leading to potential plaintext recovery of encrypted messages.

The Impact of CVE-2019-6593

Exploiting this vulnerability could result in the recovery of encrypted messages in plaintext, even without access to the server's private key. It is also known as Zombie POODLE and GOLDENDOODLE.

Technical Details of CVE-2019-6593

This section provides more technical insights into the vulnerability.

Vulnerability Description

A virtual server configured with a Client SSL profile on BIG-IP versions mentioned is susceptible to a chosen ciphertext attack against CBC ciphers, potentially leading to plaintext recovery of encrypted messages.

Affected Systems and Versions

        Product: BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, FPS, GTM, Link Controller, PEM, WebAccelerator)
        Versions: 11.5.1-11.5.4, 11.6.1, 12.1.0

Exploitation Mechanism

The vulnerability allows attackers to exploit a chosen ciphertext attack on CBC ciphers, enabling them to recover encrypted messages in plaintext.

Mitigation and Prevention

Protecting systems from CVE-2019-6593 is crucial to maintaining security.

Immediate Steps to Take

        Apply vendor-provided patches promptly.
        Monitor for any unusual activities on the network.
        Implement strong encryption protocols and configurations.

Long-Term Security Practices

        Regularly update and patch systems to address vulnerabilities.
        Conduct security assessments and audits to identify and mitigate risks.
        Educate users and administrators on secure practices.

Patching and Updates

Ensure that all affected systems are updated with the latest patches to mitigate the CVE-2019-6593 vulnerability.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now