First published: Wed Feb 01 2023(Updated: )
When a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP (DNS, LTM enabled with DNS Services license) | =17.0.0 | 17.1.0 |
F5 BIG-IP (DNS, LTM enabled with DNS Services license) | >=16.1.0<=16.1.3 | 16.1.3.3 |
F5 BIG-IP (DNS, LTM enabled with DNS Services license) | >=15.1.0<=15.1.8 | 15.1.8.1 |
F5 BIG-IP (DNS, LTM enabled with DNS Services license) | >=14.1.0<=14.1.5 | 14.1.5.3 |
F5 BIG-IP (DNS, LTM enabled with DNS Services license) | >=13.1.0<=13.1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
F5-K37708118 is classified as a significant vulnerability due to the potential for termination of the Traffic Management Microkernel.
The vulnerability affects F5 BIG-IP products with DNS and LTM enabled that are configured with hardware SYN cookies and Rapid Response Mode.
To resolve F5-K37708118, upgrade to the recommended versions: 17.1.0, 16.1.3.3, 15.1.8.1, 14.1.5.3, or perform necessary patches.
The vulnerability is triggered by undisclosed requests to a DNS profile with Rapid Response Mode enabled.
Affected versions include ranges from 13.1.0 to 13.1.5, 14.1.0 to 14.1.5, 15.1.0 to 15.1.8, 16.1.0 to 16.1.3, and specifically 17.1.0.