First published: Tue Sep 14 2021(Updated: )
On version 16.x before 16.1.0, 15.1.x before 15.1.3.1, 14.1.x before 14.1.4.4, and all versions of 13.1.x and 12.1.x, when a BIG-IP DNS system is configured with non-default Wide IP and pool settings, undisclosed DNS responses can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 Big-ip Domain Name System | >=12.1.0<=12.1.6 | |
F5 Big-ip Domain Name System | >=13.1.0<=13.1.4 | |
F5 Big-ip Domain Name System | >=14.1.0<14.1.4.4 | |
F5 Big-ip Domain Name System | >=15.1.0<15.1.3.1 | |
F5 Big-ip Domain Name System | >=16.0.0<16.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-23032 has a CVSS score indicating a medium severity vulnerability that affects F5 BIG-IP DNS systems.
To fix CVE-2021-23032, upgrade your F5 BIG-IP DNS to the latest version that is not affected.
CVE-2021-23032 affects versions 12.1.x to 12.1.6, 13.1.x, 14.1.x up to 14.1.4.4, 15.1.x up to 15.1.3.1, and 16.0.x up to 16.1.0.
The impact of CVE-2021-23032 can cause the Traffic Management Microkernel (TMM) to terminate, disrupting DNS service.
Network administrators using F5 BIG-IP DNS with non-default Wide IP and pool settings are affected by CVE-2021-23032.