First published: Tue Jan 25 2022(Updated: )
On BIG-IP version 16.1.x before 16.1.2, when any of the following configurations are configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate: HTTP redirect rule in an LTM policy, BIG-IP APM Access Profile, and Explicit HTTP Proxy in HTTP Profile. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Access Policy Manager | >=16.1.0<16.1.2 | |
F5 BIG-IP Advanced Firewall Manager | >=16.1.0<16.1.2 | |
F5 BIG-IP Analytics | >=16.1.0<16.1.2 | |
F5 Big-ip Application Acceleration Manager | >=16.1.0<16.1.2 | |
F5 BIG-IP Application Security Manager | >=16.1.0<16.1.2 | |
F5 Big-ip Domain Name System | >=16.1.0<16.1.2 | |
F5 Big-ip Fraud Protection Service | >=16.1.0<16.1.2 | |
F5 Big-ip Global Traffic Manager | >=16.1.0<16.1.2 | |
F5 Big-ip Link Controller | >=16.1.0<16.1.2 | |
F5 Big-ip Local Traffic Manager | >=16.1.0<16.1.2 | |
F5 Big-ip Policy Enforcement Manager | >=16.1.0<16.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-23021 is high with a severity value of 7.5.
CVE-2022-23021 affects BIG-IP versions 16.1.x before 16.1.2.
CVE-2022-23021 can be exploited by sending undisclosed requests to a virtual server with specific configurations.
The Traffic Management Microkernel (TMM) can terminate in CVE-2022-23021 if any of the following configurations are configured on a virtual server: HTTP redirect rule in an LTM policy, BIG-IP APM Access Profile, and Explicit HTTP Proxy in HTTP P.
Yes, a fix for CVE-2022-23021 is available in BIG-IP version 16.1.2.