First published: Wed Mar 31 2021(Updated: )
On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2, 14.1.x before 14.1.3.1, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, and 11.6.x before 11.6.5.3, Multipath TCP (MPTCP) forwarding flows may be created on standard virtual servers without MPTCP enabled in the applied TCP profile. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 Access Policy Manager | >=11.6.1<11.6.5.3 | |
F5 Access Policy Manager | >=12.1.0<12.1.5.3 | |
F5 Access Policy Manager | >=13.1.0<13.1.3.6 | |
F5 Access Policy Manager | >=14.1.0<14.1.4 | |
F5 Access Policy Manager | >=15.1.0<15.1.2.1 | |
F5 Access Policy Manager | >=16.0.0<16.0.1.1 | |
F5 BIG-IP Advanced Firewall Manager | >=11.6.1<11.6.5.3 | |
F5 BIG-IP Advanced Firewall Manager | >=12.1.0<12.1.5.3 | |
F5 BIG-IP Advanced Firewall Manager | >=13.1.0<13.1.3.6 | |
F5 BIG-IP Advanced Firewall Manager | >=14.1.0<14.1.4 | |
F5 BIG-IP Advanced Firewall Manager | >=15.1.0<15.1.2.1 | |
F5 BIG-IP Advanced Firewall Manager | >=16.0.0<16.0.1.1 | |
F5 BIG-IP Advanced WAF/ASM | >=11.6.1<11.6.5.3 | |
F5 BIG-IP Advanced WAF/ASM | >=12.1.0<12.1.5.3 | |
F5 BIG-IP Advanced WAF/ASM | >=13.1.0<13.1.3.6 | |
F5 BIG-IP Advanced WAF/ASM | >=14.1.0<14.1.4 | |
F5 BIG-IP Advanced WAF/ASM | >=15.1.0<15.1.2.1 | |
F5 BIG-IP Advanced WAF/ASM | >=16.0.0<16.0.1.1 | |
F5 BIG-IP Analytics | >=11.6.1<11.6.5.3 | |
F5 BIG-IP Analytics | >=12.1.0<12.1.5.3 | |
F5 BIG-IP Analytics | >=13.1.0<13.1.3.6 | |
F5 BIG-IP Analytics | >=14.1.0<14.1.4 | |
F5 BIG-IP Analytics | >=15.1.0<15.1.2.1 | |
F5 BIG-IP Analytics | >=16.0.0<16.0.1.1 | |
F5 BIG-IP Application Acceleration Manager | >=11.6.1<11.6.5.3 | |
F5 BIG-IP Application Acceleration Manager | >=12.1.0<12.1.5.3 | |
F5 BIG-IP Application Acceleration Manager | >=13.1.0<13.1.3.6 | |
F5 BIG-IP Application Acceleration Manager | >=14.1.0<14.1.4 | |
F5 BIG-IP Application Acceleration Manager | >=15.1.0<15.1.2.1 | |
F5 BIG-IP Application Acceleration Manager | >=16.0.0<16.0.1.1 | |
F5 Application Security Manager | >=11.6.1<11.6.5.3 | |
F5 Application Security Manager | >=12.1.0<12.1.5.3 | |
F5 Application Security Manager | >=13.1.0<13.1.3.6 | |
F5 Application Security Manager | >=14.1.0<14.1.4 | |
F5 Application Security Manager | >=15.1.0<15.1.2.1 | |
F5 Application Security Manager | >=16.0.0<16.0.1.1 | |
F5 BIG-IP DDoS Hybrid Defender | >=11.6.1<11.6.5.3 | |
F5 BIG-IP DDoS Hybrid Defender | >=12.1.0<12.1.5.3 | |
F5 BIG-IP DDoS Hybrid Defender | >=13.1.0<13.1.3.6 | |
F5 BIG-IP DDoS Hybrid Defender | >=14.1.0<14.1.4 | |
F5 BIG-IP DDoS Hybrid Defender | >=15.1.0<15.1.2.1 | |
F5 BIG-IP DDoS Hybrid Defender | >=16.0.0<16.0.1.1 | |
F5 BIG-IP | >=11.6.1<11.6.5.3 | |
F5 BIG-IP | >=12.1.0<12.1.5.3 | |
F5 BIG-IP | >=13.1.0<13.1.3.6 | |
F5 BIG-IP | >=14.1.0<14.1.4 | |
F5 BIG-IP | >=15.1.0<15.1.2.1 | |
F5 BIG-IP | >=16.0.0<16.0.1.1 | |
F5 BIG-IP Fraud Protection Service | >=11.6.1<11.6.5.3 | |
F5 BIG-IP Fraud Protection Service | >=12.1.0<12.1.5.3 | |
F5 BIG-IP Fraud Protection Service | >=13.1.0<13.1.3.6 | |
F5 BIG-IP Fraud Protection Service | >=14.1.0<14.1.4 | |
F5 BIG-IP Fraud Protection Service | >=15.1.0<15.1.2.1 | |
F5 BIG-IP Fraud Protection Service | >=16.0.0<16.0.1.1 | |
Riverbed SteelApp Traffic Manager | >=11.6.1<11.6.5.3 | |
Riverbed SteelApp Traffic Manager | >=12.1.0<12.1.5.3 | |
Riverbed SteelApp Traffic Manager | >=13.1.0<13.1.3.6 | |
Riverbed SteelApp Traffic Manager | >=14.1.0<14.1.4 | |
Riverbed SteelApp Traffic Manager | >=15.1.0<15.1.2.1 | |
Riverbed SteelApp Traffic Manager | >=16.0.0<16.0.1.1 | |
F5 BIG-IP Link Controller | >=11.6.1<11.6.5.3 | |
F5 BIG-IP Link Controller | >=12.1.0<12.1.5.3 | |
F5 BIG-IP Link Controller | >=13.1.0<13.1.3.6 | |
F5 BIG-IP Link Controller | >=14.1.0<14.1.4 | |
F5 BIG-IP Link Controller | >=15.1.0<15.1.2.1 | |
F5 BIG-IP Link Controller | >=16.0.0<16.0.1.1 | |
Riverbed SteelApp Traffic Manager | >=11.6.1<11.6.5.3 | |
Riverbed SteelApp Traffic Manager | >=12.1.0<12.1.5.3 | |
Riverbed SteelApp Traffic Manager | >=13.1.0<13.1.3.6 | |
Riverbed SteelApp Traffic Manager | >=14.1.0<14.1.4 | |
Riverbed SteelApp Traffic Manager | >=15.1.0<15.1.2.1 | |
Riverbed SteelApp Traffic Manager | >=16.0.0<16.0.1.1 | |
F5 BIG-IP Policy Enforcement Manager | >=11.6.1<11.6.5.3 | |
F5 BIG-IP Policy Enforcement Manager | >=12.1.0<12.1.5.3 | |
F5 BIG-IP Policy Enforcement Manager | >=13.1.0<13.1.3.6 | |
F5 BIG-IP Policy Enforcement Manager | >=14.1.0<14.1.4 | |
F5 BIG-IP Policy Enforcement Manager | >=15.1.0<15.1.2.1 | |
F5 BIG-IP Policy Enforcement Manager | >=16.0.0<16.0.1.1 | |
F5 BIG-IP SSL Orchestrator | >=11.6.1<11.6.5.3 | |
F5 BIG-IP SSL Orchestrator | >=12.1.0<12.1.5.3 | |
F5 BIG-IP SSL Orchestrator | >=13.1.0<13.1.3.6 | |
F5 BIG-IP SSL Orchestrator | >=14.1.0<14.1.4 | |
F5 BIG-IP SSL Orchestrator | >=15.1.0<15.1.2.1 | |
F5 BIG-IP SSL Orchestrator | >=16.0.0<16.0.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-23004 has a severity rating that indicates potential impact on the confidentiality, integrity, or availability of affected systems.
To fix CVE-2021-23004, upgrade your BIG-IP version to 16.0.1.1, 15.1.2, 14.1.3.1, 13.1.3.6, 12.1.5.3, or 11.6.5.3 or later.
CVE-2021-23004 affects multiple versions of F5 BIG-IP products including the Access Policy Manager, Advanced Firewall Manager, and others.
An attacker could exploit CVE-2021-23004 to create unintended Multipath TCP forwarding flows on virtual servers not configured for MPTCP.
Exploitation of CVE-2021-23004 can occur without authentication, increasing the potential risk to users.