Learn about CVE-2019-6596 affecting BIG-IP systems, leading to memory corruption and potential crashes when processing fragmented ClientHello messages in a DTLS session. Find mitigation steps and updates.
Systems running versions BIG-IP 14.0.0-14.0.0.2, 13.0.0-13.1.1.1, 12.1.0-12.1.3.6, 11.6.1-11.6.3.2, or 11.5.1-11.5.8 are at risk of memory corruption and potential crashing when processing fragmented ClientHello messages in a DTLS session. This vulnerability only affects systems that provide DTLS connections through APM.
Understanding CVE-2019-6596
In BIG-IP 14.0.0-14.0.0.2, 13.0.0-13.1.1.1, 12.1.0-12.1.3.6, 11.6.1-11.6.3.2, or 11.5.1-11.5.8, when processing fragmented ClientHello messages in a DTLS session TMM may corrupt memory eventually leading to a crash. Only systems offering DTLS connections via APM are impacted.
What is CVE-2019-6596?
The Impact of CVE-2019-6596
Technical Details of CVE-2019-6596
This section provides detailed technical information about the vulnerability.
Vulnerability Description
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
Protect your systems from CVE-2019-6596 with the following steps:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates