QID 376360

Date Published: 2022-01-26

QID 376360: F5 BIG-IP Application Security Manager (ASM), Local Traffic Manager (LTM), Access Policy Manager (APM) BIG-IP Traffic Management Microkernel (TMM) Vulnerability (K17514331)

When the 'Respond on Error' setting is enabled on the Request Logging profile and configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate.CVE-2022-23020

Vulnerable Component: BIG-IP ASM,LTM,APM

Affected Versions:
16.1.0 - 16.1.1

QID Detection Logic(Authenticated):
This QID checks for the vulnerable versions of F5 BIG-IP devices using the tmsh command.

Traffic is disrupted while the TMM process restarts. This vulnerability allows a remote unauthenticated attacker to cause a denial-of-service (DoS) on the BIG-IP system. There is no control plane exposure; this is a data plane issue only. The Respond On Error setting is disabled by default on the Request Logging profile.

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as High - 7.1 severity.
  • Solution
    The vendor has released patch, for more information please visit: K17514331
    Vendor References

    CVEs related to QID 376360

    Software Advisories
    Advisory ID Software Component Link
    K17514331 URL Logo support.f5.com/csp/article/K17514331