First published: Wed Feb 14 2024(Updated: )
When a BIG-IP PEM classification profile is configured on a UDP virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. This issue affects classification engines using signatures released between 09-08-2022 and 02-16-2023. See the table in the F5 Security Advisory for a complete list of affected classification signature files. NOTE: Software versions which have reached End of Technical Support (EoTS) are not evaluated
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Policy Enforcement Manager | >=15.1.0<=15.1.10 | |
F5 BIG-IP Policy Enforcement Manager | >=16.1.0<=16.1.4 | |
F5 BIG-IP Policy Enforcement Manager | >=17.1.0<=17.1.1 | |
F5 BIG-IP Policy Enforcement Manager | >=17.1.0<=17.1.1=3 | 3 |
F5 BIG-IP Policy Enforcement Manager | >=16.1.0<=16.1.4=3 | 3 |
F5 BIG-IP Policy Enforcement Manager | >=15.1.0<=15.1.10=3 | 3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23982 is considered a high severity vulnerability that can cause Traffic Management Microkernel (TMM) to terminate.
To fix CVE-2024-23982, update your F5 BIG-IP Policy Enforcement Manager to a version higher than 17.1.1, 16.1.4, or 15.1.10.
CVE-2024-23982 affects versions of F5 BIG-IP Policy Enforcement Manager from 15.1.0 to 15.1.10, 16.1.0 to 16.1.4, and 17.1.0 to 17.1.1.
The impact of CVE-2024-23982 includes potential termination of the Traffic Management Microkernel, affecting network traffic management.
CVE-2024-23982 can be triggered by undisclosed requests when a BIG-IP PEM classification profile is configured on a UDP virtual server.