First published: Wed Feb 01 2023(Updated: )
On BIG-IP Virtual Edition versions 15.1x beginning in 15.1.4 to before 15.1.8 and 14.1.x beginning in 14.1.5 to before 14.1.5.3, and BIG-IP SPK beginning in 1.5.0 to before 1.6.0, when FastL4 profile is configured on a virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP and BIG-IQ Centralized Management | ||
F5 BIG-IP and BIG-IQ Centralized Management | >=15.1.4<=15.1.7 | 15.1.8 |
F5 BIG-IP and BIG-IQ Centralized Management | =14.1.5 | 14.1.5.3 |
F5 BIG-IP Service Proxy for Kubernetes | =1.5 | 1.6 |
F5 Access Policy Manager | >=14.1.5<14.1.5.3 | |
F5 Access Policy Manager | >=15.1.4<15.1.8 | |
F5 BIG-IP Advanced Firewall Manager | >=14.1.5<14.1.5.3 | |
F5 BIG-IP Advanced Firewall Manager | >=15.1.0<15.1.8 | |
F5 BIG-IP Analytics | >=14.1.5<14.1.5.3 | |
F5 BIG-IP Analytics | >=15.1.4<15.1.8 | |
F5 BIG-IP Application Acceleration Manager | >=14.1.5<14.1.5.3 | |
F5 BIG-IP Application Acceleration Manager | >=15.1.4<15.1.8 | |
F5 Application Security Manager | >=14.1.5<14.1.5.3 | |
F5 Application Security Manager | >=15.1.4<15.1.8 | |
F5 BIG-IP DDoS Hybrid Defender | >=14.1.5<14.1.5.3 | |
F5 BIG-IP DDoS Hybrid Defender | >=15.1.4<15.1.8 | |
F5 BIG-IP | >=14.1.5<14.1.5.3 | |
F5 BIG-IP | >=15.1.4<15.1.8 | |
F5 BIG-IP Fraud Protection Service | >=14.1.5<14.1.5.3 | |
F5 BIG-IP Fraud Protection Service | >=15.1.4<15.1.8 | |
F5 BIG-IP Link Controller | >=14.1.5<14.1.5.3 | |
F5 BIG-IP Link Controller | >=15.1.4<15.1.8 | |
Riverbed SteelApp Traffic Manager | >=14.1.5<14.1.5.3 | |
Riverbed SteelApp Traffic Manager | >=15.1.4<15.1.8 | |
F5 BIG-IP Policy Enforcement Manager | >=14.1.5<14.1.5.3 | |
F5 BIG-IP Policy Enforcement Manager | >=15.1.4<15.1.8 | |
F5 BIG-IP SSL Orchestrator | >=14.1.5<14.1.5.3 | |
F5 BIG-IP SSL Orchestrator | >=15.1.4<15.1.8 | |
F5 BIG-IP Service Proxy for Kubernetes | >=1.5.0<1.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-23555 is high with a severity value of 7.5.
CVE-2023-23555 affects F5 Big-ip Access Policy Manager versions 14.1.5 to before 14.1.5.3.
CVE-2023-23555 allows undisclosed traffic to cause the Traffic Management Microkernel to fail, causing a denial of service.
To fix CVE-2023-23555, users should upgrade their affected software to version 14.1.5.3 or later.
More information about CVE-2023-23555 can be found at the F5 support website: https://my.f5.com/manage/s/article/K24572686