First published: Wed Mar 31 2021(Updated: )
On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, and 11.6.x before 11.6.5.3, SYN flood protection thresholds are not enforced in secure network address translation (SNAT) listeners. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 Access Policy Manager | >=11.6.1<11.6.5.3 | |
F5 Access Policy Manager | >=12.1.0<12.1.5.3 | |
F5 Access Policy Manager | >=13.1.0<13.1.3.6 | |
F5 Access Policy Manager | >=14.1.0<14.1.4 | |
F5 Access Policy Manager | >=15.1.0<15.1.2.1 | |
F5 Access Policy Manager | >=16.0.0<16.0.1.1 | |
F5 BIG-IP Advanced Firewall Manager | >=11.6.1<11.6.5.3 | |
F5 BIG-IP Advanced Firewall Manager | >=12.1.0<12.1.5.3 | |
F5 BIG-IP Advanced Firewall Manager | >=13.1.0<13.1.3.6 | |
F5 BIG-IP Advanced Firewall Manager | >=14.1.0<14.1.4 | |
F5 BIG-IP Advanced Firewall Manager | >=15.1.0<15.1.2.1 | |
F5 BIG-IP Advanced Firewall Manager | >=16.0.0<16.0.1.1 | |
F5 BIG-IP Advanced WAF/ASM | >=11.6.1<11.6.5.3 | |
F5 BIG-IP Advanced WAF/ASM | >=12.1.0<12.1.5.3 | |
F5 BIG-IP Advanced WAF/ASM | >=13.1.0<13.1.3.6 | |
F5 BIG-IP Advanced WAF/ASM | >=14.1.0<14.1.4 | |
F5 BIG-IP Advanced WAF/ASM | >=15.1.0<15.1.2.1 | |
F5 BIG-IP Advanced WAF/ASM | >=16.0.0<16.0.1.1 | |
F5 BIG-IP Analytics | >=11.6.1<11.6.5.3 | |
F5 BIG-IP Analytics | >=12.1.0<12.1.5.3 | |
F5 BIG-IP Analytics | >=13.1.0<13.1.3.6 | |
F5 BIG-IP Analytics | >=14.1.0<14.1.4 | |
F5 BIG-IP Analytics | >=15.1.0<15.1.2.1 | |
F5 BIG-IP Analytics | >=16.0.0<16.0.1.1 | |
F5 BIG-IP Application Acceleration Manager | >=11.6.1<11.6.5.3 | |
F5 BIG-IP Application Acceleration Manager | >=12.1.0<12.1.5.3 | |
F5 BIG-IP Application Acceleration Manager | >=13.1.0<13.1.3.6 | |
F5 BIG-IP Application Acceleration Manager | >=14.1.0<14.1.4 | |
F5 BIG-IP Application Acceleration Manager | >=15.1.0<15.1.2.1 | |
F5 BIG-IP Application Acceleration Manager | >=16.0.0<16.0.1.1 | |
F5 Application Security Manager | >=11.6.1<11.6.5.3 | |
F5 Application Security Manager | >=12.1.0<12.1.5.3 | |
F5 Application Security Manager | >=13.1.0<13.1.3.6 | |
F5 Application Security Manager | >=14.1.0<14.1.4 | |
F5 Application Security Manager | >=15.1.0<15.1.2.1 | |
F5 Application Security Manager | >=16.0.0<16.0.1.1 | |
F5 BIG-IP DDoS Hybrid Defender | >=11.6.1<11.6.5.3 | |
F5 BIG-IP DDoS Hybrid Defender | >=12.1.0<12.1.5.3 | |
F5 BIG-IP DDoS Hybrid Defender | >=13.1.0<13.1.3.6 | |
F5 BIG-IP DDoS Hybrid Defender | >=14.1.0<14.1.4 | |
F5 BIG-IP DDoS Hybrid Defender | >=15.1.0<15.1.2.1 | |
F5 BIG-IP DDoS Hybrid Defender | >=16.0.0<16.0.1.1 | |
F5 BIG-IP | >=11.6.1<11.6.5.3 | |
F5 BIG-IP | >=12.1.0<12.1.5.3 | |
F5 BIG-IP | >=13.1.0<13.1.3.6 | |
F5 BIG-IP | >=14.1.0<14.1.4 | |
F5 BIG-IP | >=15.1.0<15.1.2.1 | |
F5 BIG-IP | >=16.0.0<16.0.1.1 | |
F5 BIG-IP Fraud Protection Service | >=11.6.1<11.6.5.3 | |
F5 BIG-IP Fraud Protection Service | >=12.1.0<12.1.5.3 | |
F5 BIG-IP Fraud Protection Service | >=13.1.0<13.1.3.6 | |
F5 BIG-IP Fraud Protection Service | >=14.1.0<14.1.4 | |
F5 BIG-IP Fraud Protection Service | >=15.1.0<15.1.2.1 | |
F5 BIG-IP Fraud Protection Service | >=16.0.0<16.0.1.1 | |
Riverbed SteelApp Traffic Manager | >=11.6.1<11.6.5.3 | |
Riverbed SteelApp Traffic Manager | >=12.1.0<12.1.5.3 | |
Riverbed SteelApp Traffic Manager | >=13.1.0<13.1.3.6 | |
Riverbed SteelApp Traffic Manager | >=14.1.0<14.1.4 | |
Riverbed SteelApp Traffic Manager | >=15.1.0<15.1.2.1 | |
Riverbed SteelApp Traffic Manager | >=16.0.0<16.0.1.1 | |
F5 BIG-IP Link Controller | >=11.6.1<11.6.5.3 | |
F5 BIG-IP Link Controller | >=12.1.0<12.1.5.3 | |
F5 BIG-IP Link Controller | >=13.1.0<13.1.3.6 | |
F5 BIG-IP Link Controller | >=14.1.0<14.1.4 | |
F5 BIG-IP Link Controller | >=15.1.0<15.1.2.1 | |
F5 BIG-IP Link Controller | >=16.0.0<16.0.1.1 | |
Riverbed SteelApp Traffic Manager | >=11.6.1<11.6.5.3 | |
Riverbed SteelApp Traffic Manager | >=12.1.0<12.1.5.3 | |
Riverbed SteelApp Traffic Manager | >=13.1.0<13.1.3.6 | |
Riverbed SteelApp Traffic Manager | >=14.1.0<14.1.4 | |
Riverbed SteelApp Traffic Manager | >=15.1.0<15.1.2.1 | |
Riverbed SteelApp Traffic Manager | >=16.0.0<16.0.1.1 | |
F5 BIG-IP Policy Enforcement Manager | >=11.6.1<11.6.5.3 | |
F5 BIG-IP Policy Enforcement Manager | >=12.1.0<12.1.5.3 | |
F5 BIG-IP Policy Enforcement Manager | >=13.1.0<13.1.3.6 | |
F5 BIG-IP Policy Enforcement Manager | >=14.1.0<14.1.4 | |
F5 BIG-IP Policy Enforcement Manager | >=15.1.0<15.1.2.1 | |
F5 BIG-IP Policy Enforcement Manager | >=16.0.0<16.0.1.1 | |
F5 BIG-IP SSL Orchestrator | >=11.6.1<11.6.5.3 | |
F5 BIG-IP SSL Orchestrator | >=12.1.0<12.1.5.3 | |
F5 BIG-IP SSL Orchestrator | >=13.1.0<13.1.3.6 | |
F5 BIG-IP SSL Orchestrator | >=14.1.0<14.1.4 | |
F5 BIG-IP SSL Orchestrator | >=15.1.0<15.1.2.1 | |
F5 BIG-IP SSL Orchestrator | >=16.0.0<16.0.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22998 has been rated as a critical severity vulnerability due to its impact on SYN flood protection in secure network address translation (SNAT) listeners.
To fix CVE-2021-22998, upgrade to F5 BIG-IP versions 16.0.1.1, 15.1.2.1, 14.1.4, 13.1.3.6, 12.1.5.3, or 11.6.5.3 or later.
CVE-2021-22998 affects various F5 BIG-IP products including the Access Policy Manager, Advanced Firewall Manager, and Local Traffic Manager across specified versions.
Yes, CVE-2021-22998 can allow attackers to perform denial-of-service attacks by bypassing SYN flood protection thresholds.
There is no official workaround for CVE-2021-22998; updating to a patched version is the recommended mitigation.