First published: Wed Oct 19 2022(Updated: )
In all BIG-IP 13.1.x versions, when an iRule containing the HTTP::collect command is configured on a virtual server, undisclosed requests can cause Traffic Management Microkernel (TMM) to terminate.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Access Policy Manager | >=13.1.0<=13.1.5 | |
F5 BIG-IP Advanced Firewall Manager | >=13.1.0<=13.1.5 | |
F5 BIG-IP Analytics | >=13.1.0<=13.1.5 | |
F5 Big-ip Application Acceleration Manager | >=13.1.0<=13.1.5 | |
F5 BIG-IP Application Security Manager | >=13.1.0<=13.1.5 | |
F5 Big-ip Domain Name System | >=13.1.0<=13.1.5 | |
F5 Big-ip Fraud Protection Service | >=13.1.0<=13.1.5 | |
F5 Big-ip Global Traffic Manager | >=13.1.0<=13.1.5 | |
F5 Big-ip Link Controller | >=13.1.0<=13.1.5 | |
F5 Big-ip Local Traffic Manager | >=13.1.0<=13.1.5 | |
F5 Big-ip Policy Enforcement Manager | >=13.1.0<=13.1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41833 is a vulnerability found in all BIG-IP 13.1.x versions that can cause Traffic Management Microkernel (TMM) to terminate when an iRule containing the HTTP::collect command is configured on a virtual server.
CVE-2022-41833 affects all BIG-IP 13.1.x versions between 13.1.0 and 13.1.5, including F5 BIG-IP Access Policy Manager, Advanced Firewall Manager, Analytics, Application Acceleration Manager, Application Security Manager, Domain Name System, Fraud Protection Service, Global Traffic Manager, Link Controller, Local Traffic Manager, and Policy Enforcement Manager.
CVE-2022-41833 has a severity rating of 7.5 (High).
The Common Weakness Enumeration (CWE) ID for CVE-2022-41833 is 400.
To fix CVE-2022-41833, upgrade to a version of BIG-IP that is not affected by this vulnerability or apply the necessary patches provided by F5 Networks.