First published: Wed Oct 19 2022(Updated: )
In BIG-IP versions 17.0.x before 17.0.0.1, 16.1.x before 16.1.3.1, 15.1.x before 15.1.6.1, 14.1.x before 14.1.5.1, and 13.1.x before 13.1.5.1, when DNS profile is configured on a virtual server with DNS Express enabled, undisclosed DNS queries with DNSSEC can cause TMM to terminate.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
f5 big-ip domain name system | >=13.1.0<13.1.5.1 | |
f5 big-ip domain name system | >=14.1.0<14.1.5.1 | |
f5 big-ip domain name system | >=15.1.0<15.1.6.1 | |
f5 big-ip domain name system | >=16.1.0<16.1.3.1 | |
f5 big-ip domain name system | >=17.0.0<17.0.0.1 | |
F5 BIG-IP Local Traffic Manager | >=13.1.0<13.1.5.1 | |
F5 BIG-IP Local Traffic Manager | >=14.1.0<14.1.5.1 | |
F5 BIG-IP Local Traffic Manager | >=15.1.0<15.1.6.1 | |
F5 BIG-IP Local Traffic Manager | >=16.1.0<16.1.3.1 | |
F5 BIG-IP Local Traffic Manager | >=17.0.0<17.0.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41787 is a vulnerability in F5 Big-IP versions 17.0.x before 17.0.0.1, 16.1.x before 16.1.3.1, 15.1.x before 15.1.6.1, 14.1.x before 14.1.5.1, and 13.1.x before 13.1.5.1 that can cause TMM to terminate when DNS profile is configured on a virtual server with DNS Express enabled.
The severity of CVE-2022-41787 is high, with a CVSS score of 7.5.
The affected software for CVE-2022-41787 includes F5 Big-IP Domain Name System and F5 Big-IP Local Traffic Manager versions 13.1.x, 14.1.x, 15.1.x, 16.1.x, and 17.0.x.
To fix CVE-2022-41787, update your F5 Big-IP software to version 17.0.0.1, 16.1.3.1, 15.1.6.1, 14.1.5.1, or 13.1.5.1.
You can find more information about CVE-2022-41787 in the F5 BIG-IP Security Advisory article: https://support.f5.com/csp/article/K70569537