mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
76 lines
2.6 KiB
JSON
76 lines
2.6 KiB
JSON
{
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"data_version": "4.0",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2019-6632",
|
|
"ASSIGNER": "f5sirt@f5.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "F5",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "BIG-IP",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "BIG-IP 14.1.0-14.1.0.5"
|
|
},
|
|
{
|
|
"version_value": "14.0.0-14.0.0.4"
|
|
},
|
|
{
|
|
"version_value": "13.0.0-13.1.1.4"
|
|
},
|
|
{
|
|
"version_value": "12.1.0-12.1.4"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Information disclosure"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"refsource": "CONFIRM",
|
|
"name": "https://support.f5.com/csp/article/K01413496",
|
|
"url": "https://support.f5.com/csp/article/K01413496"
|
|
},
|
|
{
|
|
"refsource": "BID",
|
|
"name": "109112",
|
|
"url": "http://www.securityfocus.com/bid/109112"
|
|
}
|
|
]
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "On BIG-IP 14.1.0-14.1.0.5, 14.0.0-14.0.0.4, 13.0.0-13.1.1.4, and 12.1.0-12.1.4, under certain circumstances, attackers can decrypt configuration items that are encrypted because the vCMP configuration unit key is generated with insufficient randomness. The attack prerequisite is direct access to encrypted configuration and/or UCS files."
|
|
}
|
|
]
|
|
}
|
|
} |