First published: Wed Feb 14 2024(Updated: )
When HTTP/2 is configured on BIG-IP or BIG-IP Next SPK systems, undisclosed responses can cause the Traffic Management Microkernel (TMM) to terminate.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Next | >=1.5.0<=1.8.0 | 1.8.1 |
F5 BIG-IP and BIG-IQ Centralized Management | =17.1.0 | 17.1.1 |
F5 BIG-IP and BIG-IQ Centralized Management | >=16.1.0<=16.1.3 | 16.1.4 |
F5 BIG-IP and BIG-IQ Centralized Management | >=15.1.0<=15.1.8 | 15.1.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
F5-K000137675 has a critical severity rating due to the potential for the Traffic Management Microkernel (TMM) to terminate unexpectedly.
To fix F5-K000137675, upgrade your F5 BIG-IP or BIG-IP Next SPK system to the respective remedial versions specified in the advisory.
F5-K000137675 affects F5 BIG-IP versions from 15.1.0 to 15.1.8, 16.1.0 to 16.1.3, 17.1.0, and F5 BIG-IP Next SPK versions from 1.5.0 to 1.8.0.
F5-K000137675 is caused by undisclosed HTTP/2 responses that lead to the Traffic Management Microkernel (TMM) terminating.
As of now, there is no public information indicating that F5-K000137675 is actively being exploited in the wild.