### [CVE-2019-6593](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6593) ![](https://img.shields.io/static/v1?label=Product&message=BIG-IP%20(LTM%2C%20AAM%2C%20AFM%2C%20Analytics%2C%20APM%2C%20ASM%2C%20DNS%2C%20Edge%20Gateway%2C%20FPS%2C%20GTM%2C%20Link%20Controller%2C%20PEM%2C%20WebAccelerator)&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=11.5.1-11.5.4%2C%2011.6.1%2C%2012.1.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20leakage&color=brightgreen) ### Description On BIG-IP 11.5.1-11.5.4, 11.6.1, and 12.1.0, a virtual server configured with a Client SSL profile may be vulnerable to a chosen ciphertext attack against CBC ciphers. When exploited, this may result in plaintext recovery of encrypted messages through a man-in-the-middle (MITM) attack, despite the attacker not having gained access to the server's private key itself. (CVE-2019-6593 also known as Zombie POODLE and GOLDENDOODLE.) ### POC #### Reference No PoCs from references. #### Github - https://github.com/tls-attacker/TLS-Padding-Oracles