First published: Mon Jan 09 2023(Updated: )
In BIG-IP versions 17.0.x before 17.0.0.2, and 16.1.x beginning in 16.1.2.2 to before 16.1.3.3, when an HTTP profile is configured on a virtual server and conditions beyond the attacker’s control exist on the target pool member, undisclosed requests sent to the BIG-IP system can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Access Policy Manager | >=16.1.2.2<16.1.3.3 | |
F5 BIG-IP Access Policy Manager | >=17.0.0<17.0.0.2 | |
F5 BIG-IP Advanced Firewall Manager | >=16.1.2.2<16.1.3.3 | |
F5 BIG-IP Advanced Firewall Manager | >=17.0.0<17.0.0.2 | |
F5 BIG-IP Analytics | >=16.1.2.2<16.1.3.3 | |
F5 BIG-IP Analytics | >=17.0.0<17.0.0.2 | |
F5 Big-ip Application Acceleration Manager | >=16.1.2.2<16.1.3.3 | |
F5 Big-ip Application Acceleration Manager | >=17.0.0<17.0.0.2 | |
F5 BIG-IP Application Security Manager | >=16.1.2.2<16.1.3.3 | |
F5 BIG-IP Application Security Manager | >=17.0.0<17.0.0.2 | |
F5 Big-ip Ddos Hybrid Defender | >=16.1.2.2<16.1.3.3 | |
F5 Big-ip Ddos Hybrid Defender | >=17.0.0<17.0.0.2 | |
F5 Big-ip Domain Name System | >=16.1.2.2<16.1.3.3 | |
F5 Big-ip Domain Name System | >=17.0.0<17.0.0.2 | |
F5 Big-ip Fraud Protection Service | >=16.1.2.2<16.1.3.3 | |
F5 Big-ip Fraud Protection Service | >=17.0.0<17.0.0.2 | |
F5 Big-ip Link Controller | >=16.1.2.2<16.1.3.3 | |
F5 Big-ip Link Controller | >=17.0.0<17.0.0.2 | |
F5 Big-ip Local Traffic Manager | >=16.1.2.2<16.1.3.3 | |
F5 Big-ip Local Traffic Manager | >=17.0.0<17.0.0.2 | |
F5 Big-ip Policy Enforcement Manager | >=16.1.2.2<16.1.3.3 | |
F5 Big-ip Policy Enforcement Manager | >=17.0.0<17.0.0.2 | |
F5 Big-ip Ssl Orchestrator | >=16.1.2.2<16.1.3.3 | |
F5 Big-ip Ssl Orchestrator | >=17.0.0<17.0.0.2 | |
F5 BIG-IP | =17.0.0 | 17.1.0 |
F5 BIG-IP | >=16.1.2.2<=16.1.3 | 16.1.3.3 |
F5 BIG-IP |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2023-22302.
The severity of CVE-2023-22302 is medium with a CVSS score of 5.9.
The affected software versions are F5 Big-ip Access Policy Manager, F5 Big-ip Advanced Firewall Manager, F5 BIG-IP Analytics, F5 Big-ip Application Acceleration Manager, F5 BIG-IP Application Security Manager, F5 Big-ip Ddos Hybrid Defender, F5 Big-ip Domain Name System, F5 Big-ip Fraud Protection Service, F5 Big-ip Link Controller, F5 Big-ip Local Traffic Manager, F5 Big-ip Policy Enforcement Manager, and F5 Big-ip Ssl Orchestrator.
An attacker can exploit CVE-2023-22302 by sending undisclosed requests to the BIG-IP system when an HTTP profile is configured on a virtual server and conditions beyond the attacker's control exist on the target pool member.
You can find more information about CVE-2023-22302 at the following link: [https://my.f5.com/manage/s/article/K58550078](https://my.f5.com/manage/s/article/K58550078)