First published: Wed Feb 01 2023(Updated: )
On BIG-IP versions 17.0.x before 17.0.0.2 and 16.1.x before 16.1.3.3, when a HTTP profile with the non-default Enforcement options of Enforce HTTP Compliance and Unknown Methods: Reject are configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP and BIG-IQ Centralized Management | =17.0.0 | 17.1.0 |
F5 BIG-IP and BIG-IQ Centralized Management | >=16.1.0<=16.1.3 | 16.1.3.3 |
F5 BIG-IP and BIG-IQ Centralized Management | ||
F5 Access Policy Manager | >=16.1.0<16.1.3.3 | |
F5 Access Policy Manager | >=17.0.0<17.0.0.2 | |
F5 BIG-IP Advanced Firewall Manager | >=16.1.0<16.1.3.3 | |
F5 BIG-IP Advanced Firewall Manager | >=17.0.0<17.0.0.2 | |
F5 BIG-IP Analytics | >=16.1.0<16.1.3.3 | |
F5 BIG-IP Analytics | >=17.0.0<17.0.0.2 | |
F5 BIG-IP Application Acceleration Manager | >=16.1.0<16.1.3.3 | |
F5 BIG-IP Application Acceleration Manager | >=17.0.0<17.0.0.2 | |
F5 Application Security Manager | >=16.1.0<16.1.3.3 | |
F5 Application Security Manager | >=17.0.0<17.0.0.2 | |
F5 BIG-IP DDoS Hybrid Defender | >=16.1.0<16.1.3.3 | |
F5 BIG-IP DDoS Hybrid Defender | >=17.0.0<17.0.0.2 | |
F5 BIG-IP | >=16.1.0<16.1.3.3 | |
F5 BIG-IP | >=17.0.0<17.0.0.2 | |
F5 BIG-IP Fraud Protection Service | >=16.1.0<16.1.3.3 | |
F5 BIG-IP Fraud Protection Service | >=17.0.0<17.0.0.2 | |
F5 BIG-IP Link Controller | >=16.1.0<16.1.3.3 | |
F5 BIG-IP Link Controller | >=17.0.0<17.0.0.2 | |
Riverbed SteelApp Traffic Manager | >=16.1.0<16.1.3.3 | |
Riverbed SteelApp Traffic Manager | >=17.0.0<17.0.0.2 | |
F5 BIG-IP Policy Enforcement Manager | >=16.1.0<16.1.3.3 | |
F5 BIG-IP Policy Enforcement Manager | >=17.0.0<17.0.0.2 | |
F5 BIG-IP SSL Orchestrator | >=16.1.0<16.1.3.3 | |
F5 BIG-IP SSL Orchestrator | >=17.0.0<17.0.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2023-22422.
The severity level of CVE-2023-22422 is high.
BIG-IP versions 17.0.x before 17.0.0.2 and 16.1.x before 16.1.3.3 are affected by CVE-2023-22422.
The affected software and their versions for CVE-2023-22422 include F5 Big-ip Access Policy Manager, Big-ip Advanced Firewall Manager, F5 BIG-IP Analytics, F5 Big-ip Application Acceleration Manager, F5 BIG-IP Application Security Manager, F5 Big-ip Ddos Hybrid Defender, F5 Big-ip Domain Name System, F5 Big-ip Fraud Protection Service, F5 Big-ip Link Controller, F5 Big-ip Local Traffic Manager, F5 Big-ip Policy Enforcement Manager, and F5 Big-ip Ssl Orchestrator.
To fix CVE-2023-22422, you should update to BIG-IP versions 17.0.0.2 or later for 17.0.x and 16.1.3.3 or later for 16.1.x.