{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T18:41:10.630","vulnerabilities":[{"cve":{"id":"CVE-2019-6593","sourceIdentifier":"f5sirt@f5.com","published":"2019-02-26T15:29:00.293","lastModified":"2024-11-21T04:46:46.027","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"On BIG-IP 11.5.1-11.5.4, 11.6.1, and 12.1.0, a virtual server configured with a Client SSL profile may be vulnerable to a chosen ciphertext attack against CBC ciphers. When exploited, this may result in plaintext recovery of encrypted messages through a man-in-the-middle (MITM) attack, despite the attacker not having gained access to the server's private key itself. (CVE-2019-6593 also known as Zombie POODLE and GOLDENDOODLE.)"},{"lang":"es","value":"En BIG-IP 11.5.1-11.5.4, 11.6.1 y 12.1.0, un servidor virtual que está configurado con un perfil SSL del cliente podría ser vulnerable a un ataque de texto cifrado escogido contra cifrados CBC. Su explotación puede conducir a la recuperación en texto plano de mensajes cifrados mediante un ataque Man-in-the-Middle (MitM), a pesar de que el atacante no haya obtenido acceso a la clave privada del servidor.  (CVE-2019-6593 también conocido como Zombie POODLE y GOLDENDOODLE.)"}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:N/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-327"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.1","versionEndIncluding":"11.5.4","matchCriteriaId":"9B4B2EF2-2D4E-4EF6-B005-8EB318EA87DD"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:11.6.1:*:*:*:*:*:*:*","matchCriteriaId":"E33BCA5B-CE91-451C-9821-2023A9E461C1"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:12.1.0:*:*:*:*:*:*:*","matchCriteriaId":"FCD2044C-AC6F-4145-B1A0-8EB26DCF1F8C"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.1","versionEndIncluding":"11.5.4","matchCriteriaId":"4663779D-B659-487D-813A-1A4E0F92D231"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_local_traffic_manager:11.6.1:*:*:*:*:*:*:*","matchCriteriaId":"A2B502F2-404C-463B-B6BE-87489DC881F9"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_local_traffic_manager:12.1.0:*:*:*:*:*:*:*","matchCriteriaId":"A82C7B1C-E195-4D94-B604-78FB464C4F81"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.1","versionEndIncluding":"11.5.4","matchCriteriaId":"89AADD07-A4FE-4BD9-8D36-7E6AC6D9ACD3"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.6.1:*:*:*:*:*:*:*","matchCriteriaId":"CBAB92C5-2D50-49CC-AECA-0D16BC44A788"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.1.0:*:*:*:*:*:*:*","matchCriteriaId":"BC827031-CA39-4081-8CE0-30EAC78DF756"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.1","versionEndIncluding":"11.5.4","matchCriteriaId":"6D6D4C8D-26C0-4636-8B3A-6A8D3FF9EFCD"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_analytics:11.6.1:*:*:*:*:*:*:*","matchCriteriaId":"2A065BC0-56BD-4665-A860-EBA37F1A4D8C"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_analytics:12.1.0:*:*:*:*:*:*:*","matchCriteriaId":"77192AFB-B612-4BAA-916C-3DF8E851CC2B"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.1","versionEndIncluding":"11.5.4","matchCriteriaId":"9B4B2EF2-2D4E-4EF6-B005-8EB318EA87DD"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:11.6.1:*:*:*:*:*:*:*","matchCriteriaId":"E33BCA5B-CE91-451C-9821-2023A9E461C1"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:12.1.0:*:*:*:*:*:*:*","matchCriteriaId":"FCD2044C-AC6F-4145-B1A0-8EB26DCF1F8C"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.1","versionEndIncluding":"11.5.4","matchCriteriaId":"6CCE70E9-B646-49CF-B530-560B2D446241"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_security_manager:11.6.1:*:*:*:*:*:*:*","matchCriteriaId":"94DBCD7A-E4DA-4C08-87A4-960CF53A83E6"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_security_manager:12.1.0:*:*:*:*:*:*:*","matchCriteriaId":"2DB2118A-0F9C-4273-BB07-85FEA32C785B"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.1","versionEndIncluding":"11.5.4","matchCriteriaId":"ACBA3CCC-8DE9-41F2-AAEC-0EC16AA1D785"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_domain_name_system:11.6.1:*:*:*:*:*:*:*","matchCriteriaId":"26E6EC85-AEDB-41DB-95A9-5514980C2C67"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_domain_name_system:12.1.0:*:*:*:*:*:*:*","matchCriteriaId":"55DD7394-BD0A-42FD-A367-827F35397A20"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.1","versionEndIncluding":"11.5.4","matchCriteriaId":"5001D508-122D-4C60-BD54-EF184CA1B933"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_edge_gateway:11.6.1:*:*:*:*:*:*:*","matchCriteriaId":"86BA400B-F025-4DB9-BA37-53D7A393994D"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_edge_gateway:12.1.0:*:*:*:*:*:*:*","matchCriteriaId":"54E320DA-476A-4C16-B970-A2619E9848EC"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.1","versionEndIncluding":"11.5.4","matchCriteriaId":"FFA9E4D5-5CAE-40BB-B915-FA6F13B705EE"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_fraud_protection_service:11.6.1:*:*:*:*:*:*:*","matchCriteriaId":"161BF669-A4E7-4B2E-98EA-8D7A8DDDE52D"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_fraud_protection_service:12.1.0:*:*:*:*:*:*:*","matchCriteriaId":"D8B6B050-CB8B-496A-A015-265B9D02D0E5"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.1","versionEndIncluding":"11.5.4","matchCriteriaId":"B54AD8F2-80A8-4023-B301-B89CC43E53C6"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_global_traffic_manager:11.6.1:*:*:*:*:*:*:*","matchCriteriaId":"911BB6DB-B2D1-4855-A65C-F0799E034358"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_global_traffic_manager:12.1.0:*:*:*:*:*:*:*","matchCriteriaId":"06E2C448-F279-476E-9F54-185582BEE9E5"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.1","versionEndIncluding":"11.5.4","matchCriteriaId":"C7092498-F7E8-4D65-AC09-76C448A78811"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_link_controller:11.6.1:*:*:*:*:*:*:*","matchCriteriaId":"8C641B4F-DCFF-4A1B-9E00-EDF18A270241"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_link_controller:12.1.0:*:*:*:*:*:*:*","matchCriteriaId":"BBBB6E7C-DA1A-479F-9DD2-DE0C3CA82E92"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.1","versionEndIncluding":"11.5.4","matchCriteriaId":"A0EBB0AF-3BD2-4BE4-B6AB-5E054A0A5309"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.6.1:*:*:*:*:*:*:*","matchCriteriaId":"C1EA4F45-35F7-4687-8D1A-A5ACD846500A"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.1.0:*:*:*:*:*:*:*","matchCriteriaId":"64273A2C-E5A1-4605-92DD-EBECC7F051D5"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.1","versionEndIncluding":"11.5.4","matchCriteriaId":"1BB24325-5EA0-4D6B-980F-140FF1BBE8DC"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_webaccelerator:11.6.1:*:*:*:*:*:*:*","matchCriteriaId":"8894E5E8-FC08-48E5-BF06-6F5AC814CBF5"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_webaccelerator:12.1.0:*:*:*:*:*:*:*","matchCriteriaId":"A5E10E98-9010-45A6-B8B0-23654951105D"}]}]}],"references":[{"url":"https://support.f5.com/csp/article/K10065173","source":"f5sirt@f5.com","tags":["Vendor Advisory"]},{"url":"https://support.f5.com/csp/article/K10065173","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}