F5 TMOS vulnerability [CVE-2019-6664]

CVE number – CVE-2019-6664

On BIG-IP 15.0.0 and 14.1.0-, under certain conditions, network protections on the management port do not follow current best practices.


The default management port firewall rules are not reliably reinstalled after first boot. As a result, the management port may be exposed to traffic on unauthorized ports.

BIG-IQ, Enterprise Manager, F5 iWorkflow, and Traffix SDC

There is no impact; these F5 products are not affected by this vulnerability.


To mitigate this vulnerability, you can trigger a configuration update to force the system to reinstall the default management port firewall rules. Alternatively, you can manually run the confpp script on the system command line to reinstall the default firewall rules. To do so, perform the following procedure:

Impact of action: Performing the following procedure should not have a negative impact on your system.

  1. Log in to the command line of the affected system.
  2. Run the confpp script by entering the following command: confpp

Further information – https://support.f5.com/csp/article/K03126093

Jason Davies

UK based technology professional, with an interest in computer security and telecoms.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: