{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T00:22:07.381","vulnerabilities":[{"cve":{"id":"CVE-2019-6646","sourceIdentifier":"f5sirt@f5.com","published":"2019-09-04T18:15:11.077","lastModified":"2024-11-21T04:46:52.517","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"On BIG-IP 11.5.2-11.6.4 and Enterprise Manager 3.1.1, REST users with guest privileges may be able to escalate their privileges and run commands with admin privileges."},{"lang":"es","value":"En BIG-IP versiones 11.5.2 hasta 11.6.4 y Enterprise Manager versión 3.1.1, los usuarios de REST con privilegios de invitado pueden escalar sus privilegios y ejecutar comandos con privilegios de administrador."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","baseScore":6.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.2","versionEndIncluding":"11.6.4","matchCriteriaId":"A057B236-8B7C-430D-B107-8FF96D132E73"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:12.0.0:*:*:*:*:*:*:*","matchCriteriaId":"3B62FEC0-EE22-46E6-B811-8AB0EE4C3E2E"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.2","versionEndIncluding":"11.6.4","matchCriteriaId":"33AF102E-2851-45B5-8C71-B393F34D4591"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.0.0:*:*:*:*:*:*:*","matchCriteriaId":"532AAF54-64EF-4852-B4F1-D5E660463704"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.2","versionEndIncluding":"11.6.4","matchCriteriaId":"7865E258-CDA0-43A5-9945-81E07BF11A82"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_analytics:12.0.0:*:*:*:*:*:*:*","matchCriteriaId":"D0EDB8E9-E6FB-406E-B1D3-C620F114804C"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.2","versionEndIncluding":"11.6.4","matchCriteriaId":"66FC8C37-629D-4FBA-9C79-615BDDCF7837"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.0.0:*:*:*:*:*:*:*","matchCriteriaId":"3CA2FA6B-3930-432F-8FB5-E73604CEFE42"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.2","versionEndIncluding":"11.6.4","matchCriteriaId":"8E4A258E-4F20-4C3C-8269-CD7554539EC6"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_security_manager:12.0.0:*:*:*:*:*:*:*","matchCriteriaId":"62B0A70A-D101-443E-A543-5EC35E23D66F"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.2","versionEndIncluding":"11.6.4","matchCriteriaId":"19428E8B-18C2-413A-A3C0-AC6AB9F952F2"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_domain_name_system:12.0.0:*:*:*:*:*:*:*","matchCriteriaId":"524B2D05-508C-47FF-94A0-6CC42060E638"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.2","versionEndIncluding":"11.6.4","matchCriteriaId":"B572C267-AF06-4270-8FDC-18EBDDED7879"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_edge_gateway:12.0.0:*:*:*:*:*:*:*","matchCriteriaId":"9C88F1A8-9396-4439-B4DA-C04A31C4ADF3"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.2","versionEndIncluding":"11.6.4","matchCriteriaId":"24904D5C-58FF-49B0-B598-F798BAD110E6"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_fraud_protection_service:12.0.0:*:*:*:*:*:*:*","matchCriteriaId":"AAF4FF6E-B5A3-4423-AAD6-7121D1E7258C"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.2","versionEndIncluding":"11.6.4","matchCriteriaId":"DB112ABE-C07E-480F-8042-6321E602183D"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_global_traffic_manager:12.0.0:*:*:*:*:*:*:*","matchCriteriaId":"44D161F9-D198-4DA0-BF95-19472A0495A8"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.2","versionEndIncluding":"11.6.4","matchCriteriaId":"42EBAE78-C03E-42C9-AC2D-D654A8DF8516"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_link_controller:12.0.0:*:*:*:*:*:*:*","matchCriteriaId":"E90C12AF-44BA-44A2-89ED-0C2497EEC8A6"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.2","versionEndIncluding":"11.6.4","matchCriteriaId":"1DA668DC-EFB6-44C3-8521-47BB9F474DD1"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_local_traffic_manager:12.0.0:*:*:*:*:*:*:*","matchCriteriaId":"44F1E5E0-BD63-4A4A-BC4E-A1D5495F8B5C"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.2","versionEndIncluding":"11.6.4","matchCriteriaId":"255D11E3-F502-45CD-8958-5989F179574E"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.0.0:*:*:*:*:*:*:*","matchCriteriaId":"23FF9627-E561-4CF7-A685-6E33D2F6C98C"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.2","versionEndIncluding":"11.6.4","matchCriteriaId":"10A57948-C53A-4CD0-801B-7E801D08E112"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_webaccelerator:12.0.0:*:*:*:*:*:*:*","matchCriteriaId":"EB00BC5F-0456-4B65-8CD4-DB4529038824"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:enterprise_manager:3.1.1:*:*:*:*:*:*:*","matchCriteriaId":"D5F5FEE7-059A-4A9B-BCCD-18F0AA435040"}]}]}],"references":[{"url":"https://support.f5.com/csp/article/K53990093","source":"f5sirt@f5.com","tags":["Vendor Advisory"]},{"url":"https://support.f5.com/csp/article/K53990093","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}