QID 376323
QID 376323: F5 BIG-IP Application Security Manager (ASM), Local Traffic Manager (LTM), Access Policy Manager (APM) BIG-IP Traffic Management Microkernel (TMM) Vulnerability (K17514331)
When the 'Respond on Error' setting is enabled on the Request Logging profile and configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate.CVE-2022-23020
Vulnerable Component: BIG-IP ASM,LTM,APM
Affected Versions:
16.1.0 - 16.1.1
QID Detection Logic(Authenticated):
This QID checks for the vulnerable versions of F5 BIG-IP devices using the tmsh command.
Traffic is disrupted while the TMM process restarts. This vulnerability allows a remote unauthenticated attacker to cause a denial-of-service (DoS) on the BIG-IP system. There is no control plane exposure; this is a data plane issue only. The Respond On Error setting is disabled by default on the Request Logging profile.
Solution
The vendor has released patch, for more information please visit: K17514331
Vendor References
- K17514331 -
support.f5.com/csp/article/K17514331
CVEs related to QID 376323
Software Advisories
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| K17514331 |
|