{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-16T16:44:52.843","vulnerabilities":[{"cve":{"id":"CVE-2019-6684","sourceIdentifier":"f5sirt@f5.com","published":"2019-12-23T18:15:11.440","lastModified":"2024-11-21T04:46:57.120","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"On versions 15.0.0-15.0.1.1, 14.0.0-14.1.2.2, 13.1.0-13.1.3.1, 12.1.0-12.1.5, and 11.5.2-11.6.5.1, under certain conditions, a multi-bladed BIG-IP Virtual Clustered Multiprocessing (vCMP) may drop broadcast packets when they are rebroadcast to the vCMP guest secondary blades. An attacker can leverage the fragmented broadcast IP packets to perform any type of fragmentation-based attack."},{"lang":"es","value":"En las versiones 15.0.0 hasta 15.0.1.1, 14.0.0 hasta 14.1.2.2, 13.1.0 hasta 13.1.3.1, 12.1.0 hasta 12.1.5 y 11.5.2 hasta 11.6.5.1, bajo determinadas condiciones, un BIG-IP Virtual Clustered Multiprocessing (vCMP) multi-blade puede descartar los paquetes de difusión cuando son retransmitidos a los blades secundarios invitados de vCMP. Un atacante puede aprovechar los paquetes IP de difusión fragmentados para realizar cualquier tipo de ataque basado en fragmentación."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.2","versionEndIncluding":"11.6.5","matchCriteriaId":"85EE39BF-86AA-498B-BF51-EDCD7BD01376"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.0","versionEndIncluding":"12.1.5","matchCriteriaId":"6C3B5688-0235-4D4F-A26C-440FF24A1B43"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"13.0.0","versionEndExcluding":"13.1.3.2","matchCriteriaId":"BEE55663-119A-4ECD-9840-55E5B1AF1543"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"14.0.0","versionEndExcluding":"14.1.2.3","matchCriteriaId":"7565495E-8A30-496B-A530-88E3670C9221"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0.0","versionEndExcluding":"15.1.0","matchCriteriaId":"FC5CA1E2-341C-42A9-88AC-E6C83DED0B9D"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.2","versionEndIncluding":"11.6.5","matchCriteriaId":"C6917369-D3C2-42EB-B73B-F86CE2F17401"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.0","versionEndIncluding":"12.1.5","matchCriteriaId":"151ED6D1-AA85-4213-8F3A-8167CBEC4721"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"13.0.0","versionEndExcluding":"13.1.3.2","matchCriteriaId":"E33E01AD-3FBE-44E5-B5DA-3724DC397F0F"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"14.0.0","versionEndExcluding":"14.1.2.3","matchCriteriaId":"425D822A-5277-4CC0-83A4-FBA3C1355D1C"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0.0","versionEndExcluding":"15.1.0","matchCriteriaId":"16EBA08B-8FBD-47BE-A5BE-F5145788E8CB"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.2","versionEndIncluding":"11.6.5","matchCriteriaId":"596A35D8-3644-4C45-99AC-4D201F170B83"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.0","versionEndIncluding":"12.1.5","matchCriteriaId":"5D5AA99B-08E7-4959-A3B4-41AA527B4B22"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*","versionStartIncluding":"13.0.0","versionEndExcluding":"13.1.3.2","matchCriteriaId":"B1B7AC96-67B2-4F45-8868-DAF22B9CA236"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*","versionStartIncluding":"14.0.0","versionEndExcluding":"14.1.2.3","matchCriteriaId":"826F77E7-6533-4859-81BA-15311A4B3E32"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0.0","versionEndExcluding":"15.1.0","matchCriteriaId":"9228FA0A-8745-4731-A214-5A8AC0AA902A"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.2","versionEndIncluding":"11.6.5","matchCriteriaId":"AB5A624E-40A1-4F75-8B9A-FA56510C19EE"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.0","versionEndIncluding":"12.1.5","matchCriteriaId":"9DC86A5F-C793-4848-901F-04BFB57A07F6"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"13.0.0","versionEndExcluding":"13.1.3.2","matchCriteriaId":"D9700A47-7ABC-4689-B37A-5EA0D47687A6"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"14.0.0","versionEndExcluding":"14.1.2.3","matchCriteriaId":"C71174B7-5E6A-406F-B6CB-F088FA443894"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0.0","versionEndExcluding":"15.1.0","matchCriteriaId":"8BC7ABB7-2FA9-42CA-9BEF-241A91F317FF"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.2","versionEndIncluding":"11.6.5","matchCriteriaId":"9BD61B6A-4E98-4D2C-92BC-FED15CEE39A6"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.0","versionEndIncluding":"12.1.5","matchCriteriaId":"2E5552A3-91CD-4B97-AD33-4F1FB4C8827A"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"13.0.0","versionEndExcluding":"13.1.3.2","matchCriteriaId":"C899F8D8-B09E-4C9A-B117-30F37B240176"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"14.0.0","versionEndExcluding":"14.1.2.3","matchCriteriaId":"25931BA1-4B8D-4AB2-B2F5-9F464876E987"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0.0","versionEndExcluding":"15.1.0","matchCriteriaId":"E08E3F72-4CEF-4607-8B27-515E6471B9D1"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.2","versionEndIncluding":"11.6.5","matchCriteriaId":"A9A8A5C3-0C38-4F46-8F98-DC3B9C58D660"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.0","versionEndIncluding":"12.1.5","matchCriteriaId":"55C2EC23-E78F-4447-BACF-21FC36ABF155"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*","versionStartIncluding":"13.0.0","versionEndExcluding":"13.1.3.2","matchCriteriaId":"8321C9B2-1719-4E88-863A-25C26EB8AE2B"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*","versionStartIncluding":"14.0.0","versionEndExcluding":"14.1.2.3","matchCriteriaId":"71F878DB-6904-44C4-95EA-E48FB788D848"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0.0","versionEndExcluding":"15.1.0","matchCriteriaId":"9BE59364-3DB3-4528-AFC4-D3A39872514D"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.2","versionEndIncluding":"11.6.5","matchCriteriaId":"96E945EE-A623-4775-83B9-4CF81B7EA70F"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.0","versionEndIncluding":"12.1.5","matchCriteriaId":"945A19E8-51EB-42FE-9BF1-12DAC78B5286"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*","versionStartIncluding":"13.0.0","versionEndExcluding":"13.1.3.2","matchCriteriaId":"3E7882F6-4422-4ACF-9733-0A83B16A3D7F"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*","versionStartIncluding":"14.0.0","versionEndExcluding":"14.1.2.3","matchCriteriaId":"BE5866C2-9FED-4607-A04E-10F573801E5F"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0.0","versionEndExcluding":"15.1.0","matchCriteriaId":"F14F10D9-4F2D-4C6D-8B0C-9775ED35DFEF"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.2","versionEndIncluding":"11.6.5","matchCriteriaId":"92484170-2E91-45F6-9789-B0DF3F5E6260"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.0","versionEndIncluding":"12.1.5","matchCriteriaId":"EB5007D0-BBDB-4D74-9C88-98FBA74757D1"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"13.0.0","versionEndExcluding":"13.1.3.2","matchCriteriaId":"B13D00AE-06F4-4060-99E0-79EC1856193B"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"14.0.0","versionEndExcluding":"14.1.2.3","matchCriteriaId":"EC3698C3-EB59-4F77-BD04-9E08121853F9"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0.0","versionEndExcluding":"15.1.0","matchCriteriaId":"14CEF743-6C3B-4D90-99BF-6A27B37ADAEA"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.2","versionEndIncluding":"11.6.5","matchCriteriaId":"0A16FE69-A466-4FA6-BDDA-794C9F2B36FD"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.0","versionEndIncluding":"12.1.5","matchCriteriaId":"B7725810-66D2-4460-A174-9F3BFAD966F2"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*","versionStartIncluding":"13.0.0","versionEndExcluding":"13.1.3.2","matchCriteriaId":"053C2F66-07EF-43F2-9813-283B79443161"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*","versionStartIncluding":"14.0.0","versionEndExcluding":"14.1.2.3","matchCriteriaId":"2BDEE68D-F6D1-43D3-9825-F2DC191EF5D0"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0.0","versionEndExcluding":"15.1.0","matchCriteriaId":"542EB351-79B1-4A9D-A5A1-2F3E0E88963C"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.2","versionEndIncluding":"11.6.5","matchCriteriaId":"039E73A1-9F90-46A4-BFEE-5E97BAF3FAA6"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.0","versionEndIncluding":"12.1.5","matchCriteriaId":"EFD760FE-4347-4D36-B5C6-4009398060F2"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"13.0.0","versionEndExcluding":"13.1.3.2","matchCriteriaId":"4DAA4CCA-7332-43FC-B956-F180C2F86835"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"14.0.0","versionEndExcluding":"14.1.2.3","matchCriteriaId":"5A6142A7-11D8-429F-A75F-76E59768B1DB"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0.0","versionEndExcluding":"15.1.0","matchCriteriaId":"895E610D-52F6-45CA-B205-D110A1DC6BEC"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.2","versionEndIncluding":"11.6.5","matchCriteriaId":"43581457-5C55-4B31-BEFA-4B59B2744BB8"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.0","versionEndIncluding":"12.1.5","matchCriteriaId":"65B76F53-7D8B-477E-8B6E-91AC0A9009FF"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"13.0.0","versionEndExcluding":"13.1.3.2","matchCriteriaId":"9A8E7A7E-30AE-4D47-9854-7EAA2C28036D"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"14.0.0","versionEndExcluding":"14.1.2.3","matchCriteriaId":"9D5DB4D3-8069-43C6-923E-6BF94C6536C5"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0.0","versionEndExcluding":"15.1.0","matchCriteriaId":"4B114C6C-E950-4B75-B341-022799ABBACF"}]}]}],"references":[{"url":"https://support.f5.com/csp/article/K95117754","source":"f5sirt@f5.com","tags":["Vendor Advisory"]},{"url":"https://support.f5.com/csp/article/K95117754","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}