QID 376319
QID 376319: F5 BIG-IP Application Security Manager (ASM), Local Traffic Manager (LTM), Access Policy Manager (APM) Traffic Management Microkernel (TMM) Vulnerability (K57111075)
When any of the following configurations are configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate: HTTP redirect rule in an LTM policy, BIG-IP APM Access Profile, and Explicit HTTP Proxy in HTTP Profile.CVE-2022-23021
Vulnerable Component: BIG-IP ASM,LTM,APM
Affected Versions:
16.1.0 - 16.1.1
QID Detection Logic(Authenticated):
This QID checks for the vulnerable versions of F5 BIG-IP devices using the tmsh command.
Traffic is disrupted while the TMM process restarts. This vulnerability allows a remote unauthenticated attacker to cause a denial-of-service (DoS) on the BIG-IP system. There is no control plane exposure; this is a data plane issue only.
Solution
The vendor has released patch, for more information please visit: K57111075
Vendor References
- K57111075 -
support.f5.com/csp/article/K57111075
CVEs related to QID 376319
Software Advisories
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| K57111075 |
|