All the vulnerabilites related to f5 - r10900
Vulnerability from fkie_nvd
Published
2023-02-01 18:15
Modified
2024-11-21 07:45
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
References
▼ | URL | Tags | |
---|---|---|---|
f5sirt@f5.com | https://my.f5.com/manage/s/article/K37708118 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://my.f5.com/manage/s/article/K37708118 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "08B25AAB-A98C-4F89-9131-29E3A8C0ED23", "versionEndIncluding": "13.1.5", "versionStartIncluding": "13.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "7DBB52D1-4FB8-4A71-8F83-02D7DDB99F60", "versionEndExcluding": "14.1.5.3", "versionStartIncluding": "14.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "313014B4-8033-4B57-B838-66EE163E86D4", "versionEndExcluding": "15.1.7", "versionStartIncluding": "15.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "203B2B00-7DA5-443D-B4AA-DE0814D7E04D", "versionEndExcluding": "16.1.3.3", "versionStartIncluding": "16.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "93721140-2035-4431-BF5F-CA0C78BBFE53", "versionEndExcluding": "17.0.0.2", "versionStartIncluding": "17.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "0360F76D-E75E-4B05-A294-B47012323ED9", "versionEndIncluding": "13.1.5", "versionStartIncluding": "13.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE9B290B-21D9-40B0-8A6D-36F2C310C71A", "versionEndExcluding": "14.1.5.3", "versionStartIncluding": "14.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "E25D2597-32D7-4676-9A0C-FCAD8D8900A9", "versionEndExcluding": "15.1.7", "versionStartIncluding": "15.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "F11221E1-8354-4854-A75D-060721E9671F", "versionEndExcluding": "16.1.3.3", "versionStartIncluding": "16.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "5FAB540A-6082-4F6E-9CDE-0AB719B1001F", "versionEndExcluding": "17.0.0.2", "versionStartIncluding": "17.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_10000s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F510CA2D-E049-4884-AB80-EC03560556EF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_10000s:-:*:*:*:*:*:*:*", "matchCriteriaId": "4718F6EA-3955-44A1-98E7-CBEFA4E9C2C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_10200v_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D59AA4F5-B072-4866-9912-FCBB5F77F8EA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_10200v:-:*:*:*:*:*:*:*", "matchCriteriaId": "755CF51B-61AD-4C1E-9954-C44EC30E4339", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_10200v-ssl_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C37E575D-5674-4BD6-9C24-D318A905FD4E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_10200v-ssl:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BE455B9-7497-42EE-A6D2-EFEB0E9B5589", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_12000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5E0FBD3-584B-4E20-A664-AFC8B224466C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_12000:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BF87EE2-1A8A-4050-8168-C4C8A1E49AD7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_5000s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FA594DF-0441-4761-80AD-C3C64BD1BA59", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_5000s:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EF35744-F9B6-43FD-804D-955EC5AC7360", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_5200v_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EA95257-25F5-483A-BBE5-F906EAF2BCF9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_5200v:-:*:*:*:*:*:*:*", "matchCriteriaId": "86E943FF-3EE2-4F87-B005-80432EB4FB67", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_5200v-ssl_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD50226B-5D1A-44A0-B530-BBDB50CDC30F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_5200v-ssl:-:*:*:*:*:*:*:*", "matchCriteriaId": "BAF21909-A75A-42ED-AAF4-3BC3EE412BA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_7000s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B405FC13-0B14-4497-8BE8-E09CE5369DE3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_7000s:-:*:*:*:*:*:*:*", "matchCriteriaId": "046B8D26-64B8-46C4-921A-983E0AE82752", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_7200v_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B1685A2-60F2-4B06-A68E-FC2E18CF3BEE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_7200v:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F5FE621-B69A-4E93-B5FB-AC7C47A73766", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_7200v-ssl_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC83C650-6120-4FD8-85FC-131B7E78F9FB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_7200v-ssl:-:*:*:*:*:*:*:*", "matchCriteriaId": "4928A6CA-6FD3-405F-878F-12A199C54C03", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_i10600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1196C9FB-33CF-493C-8FCB-9FDFBD7A4CEB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", "matchCriteriaId": "F768A343-E31B-4A0B-A1CE-B884BCF8DE96", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_i10800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E48A49B-586A-4585-8952-EBF30E8C726C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", "matchCriteriaId": "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_i11600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4214D3DE-B42C-43A9-81CE-AB14FEA1E9B0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*", "matchCriteriaId": "906F880E-4C8D-49B7-8C61-2C22348373CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_i11800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "33F03D79-CEC3-4EB0-8105-78AD07DDC8C3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*", "matchCriteriaId": "A67973F6-506B-43EC-94A5-9EBCBD5131FE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_i15600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA9A1D2B-33AA-4691-9891-4360B9B026EC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*", "matchCriteriaId": "B37E2A71-1BDC-4556-8204-2A3140EA2923", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_i15800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C63DD90F-58DA-4FCF-BDD8-48A29D41AE8F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*", "matchCriteriaId": "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_i5600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "21BD097C-73F2-4EB7-9024-3DC63EC419D3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_i5800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A81F6A51-9AEF-4502-B19C-449CC9FA7154", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", "matchCriteriaId": "16C46A4D-3773-4EB4-B397-D02694FC65BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_i7600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "33D524EE-B941-4D73-A83F-02C3253492D1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", "matchCriteriaId": "842E7F16-4CB8-450F-BF18-829BAEFAF6CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:big-ip_i7800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C53B31C-E56F-4FD4-9B51-A741DA8FE479", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7569487-6D88-46CC-9B70-59D56DB0CE35", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:r10600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EDC8F7B-D052-4DAB-B572-17241E02DC01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:r10600:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B494DEE-B373-4B3F-95C1-2E0997F32B6E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:r10800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D400BBB2-399D-41C9-B73B-BDC280B5A51E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:r10800:-:*:*:*:*:*:*:*", "matchCriteriaId": "5BC625D5-C59F-4D20-BA92-0EC85DAB8AFA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:r10900_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B5D6038-EB49-47DE-BC4A-8E9888F217DB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:r10900:-:*:*:*:*:*:*:*", "matchCriteriaId": "4233544A-999C-42CD-9B61-E639AAA460B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:r5600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "43CDBB9F-B6BD-4103-82E8-D66E067704C2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:r5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "24DA75BA-A4B7-46BD-887D-03CDFAF22791", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:r5800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "612904C3-0EA5-4F56-BDFE-1A2114C28EEE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:r5800:-:*:*:*:*:*:*:*", "matchCriteriaId": "52B4EBB6-BEEB-42DA-A146-10E401226BED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:r5900_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AF08F72-E905-48C4-9339-0F23EE462CC5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:r5900:-:*:*:*:*:*:*:*", "matchCriteriaId": "55433400-8996-44B8-94D7-81690145EF94", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:velos_bx110_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8AB5834-CB4C-46AD-A0C6-E3800DE89453", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:velos_bx110:-:*:*:*:*:*:*:*", "matchCriteriaId": "5918B702-39A4-48F5-B381-7FFF0ABE4920", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:viprion_b2100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "19F04564-25E9-4962-949D-6C810091464D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:viprion_b2100:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE3FCE60-4F2F-48FA-A0AC-89DE82118411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:viprion_b2150_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BBFBFFE7-EA68-46E0-A172-FABDD99D7D8D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:viprion_b2150:-:*:*:*:*:*:*:*", "matchCriteriaId": "9940F471-FA88-49FB-B1BD-752366F9A15C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:viprion_b2250_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B58A0DEB-F0C7-40BD-ACE3-49F0CD5663D9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:viprion_b2250:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD814768-9507-4C58-9398-6898C3F49272", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:viprion_b4300_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "83532FB3-30DE-44B9-A1B7-551F91E61C9F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:viprion_b4300:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C0B96E2-7E5D-4C82-B4C5-3F35CD650962", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:f5:viprion_b4450_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3DD6188-94B2-43BE-93C8-F2493E2C2C23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:f5:viprion_b4450:-:*:*:*:*:*:*:*", "matchCriteriaId": "776A5309-2A92-462B-9CAB-067F5E522386", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n" } ], "id": "CVE-2023-22839", "lastModified": "2024-11-21T07:45:29.820", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "f5sirt@f5.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-02-01T18:15:11.750", "references": [ { "source": "f5sirt@f5.com", "tags": [ "Vendor Advisory" ], "url": "https://my.f5.com/manage/s/article/K37708118" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://my.f5.com/manage/s/article/K37708118" } ], "sourceIdentifier": "f5sirt@f5.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "f5sirt@f5.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
var-202302-0011
Vulnerability from variot
On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. BIG-IP for, NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0011", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "big-ip domain name system", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "13.1.5" }, { "model": "big-ip local traffic manager", "scope": "lt", "trust": 1.0, "vendor": "f5", "version": "17.0.0.2" }, { "model": "big-ip i10600", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": null }, { "model": "big-ip domain name system", "scope": "lt", "trust": 1.0, "vendor": "f5", "version": "15.1.7" }, { "model": "big-ip local traffic manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "14.1.0" }, { "model": "big-ip 10200v", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": null }, { "model": "big-ip local traffic manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "17.0.0" }, { "model": "big-ip 7000s", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": null }, { "model": "big-ip i5600", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": null }, { "model": "big-ip domain name system", "scope": "lt", "trust": 1.0, "vendor": "f5", "version": "17.0.0.2" }, { "model": "big-ip domain name system", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "13.1.0" }, { "model": "big-ip 10200v-ssl", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": null }, { "model": "r10600", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": null }, { "model": "big-ip i5800", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": null }, { "model": "viprion b2150", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": null }, { "model": "r10900", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": null }, { "model": "r5600", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": null }, { "model": "big-ip i11600", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": null }, { "model": "big-ip i15800", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": null }, { "model": "velos bx110", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": null }, { "model": "big-ip 7200v-ssl", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": null }, { "model": "r5800", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": null }, { "model": "big-ip domain name system", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "17.0.0" }, { "model": "big-ip local traffic manager", "scope": "lt", "trust": 1.0, "vendor": "f5", "version": "14.1.5.3" }, { "model": "big-ip 5200v", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": null }, { "model": "big-ip domain name system", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "14.1.0" }, { "model": "big-ip local traffic manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "15.1.0" }, { "model": "big-ip 5000s", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": null }, { "model": "big-ip i15600", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": null }, { "model": "big-ip domain name system", "scope": "lt", "trust": 1.0, "vendor": "f5", "version": "14.1.5.3" }, { "model": "big-ip i7600", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": null }, { "model": "big-ip i11800", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": null }, { "model": "viprion b2100", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": null }, { "model": "big-ip local traffic manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "16.1.0" }, { "model": "big-ip local traffic manager", "scope": "lt", "trust": 1.0, "vendor": "f5", "version": "16.1.3.3" }, { "model": "big-ip 7200v", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": null }, { "model": "big-ip local traffic manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "13.1.5" }, { "model": "big-ip domain name system", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "15.1.0" }, { "model": "big-ip i7800", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": null }, { "model": "r10800", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": null }, { "model": "viprion b2250", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": null }, { "model": "big-ip 10000s", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": null }, { "model": "big-ip domain name system", "scope": "lt", "trust": 1.0, "vendor": "f5", "version": "16.1.3.3" }, { "model": "viprion b4450", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": null }, { "model": "r5900", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": null }, { "model": "big-ip 12000", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": null }, { "model": "big-ip local traffic manager", "scope": "lt", "trust": 1.0, "vendor": "f5", "version": "15.1.7" }, { "model": "big-ip local traffic manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "13.1.0" }, { "model": "big-ip i10800", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": null }, { "model": "big-ip domain name system", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "16.1.0" }, { "model": "big-ip 5200v-ssl", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": null }, { "model": "viprion b4300", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": null }, { "model": "big-ip 10000s", "scope": null, "trust": 0.8, "vendor": "f5", "version": null }, { "model": "big-ip 5200v-ssl", "scope": null, "trust": 0.8, "vendor": "f5", "version": null }, { "model": "big-ip domain name system", "scope": null, "trust": 0.8, "vendor": "f5", "version": null }, { "model": "big-ip 10200v", "scope": null, "trust": 0.8, "vendor": "f5", "version": null }, { "model": "big-ip 7000s", "scope": null, "trust": 0.8, "vendor": "f5", "version": null }, { "model": "big-ip 7200v", "scope": null, "trust": 0.8, "vendor": "f5", "version": null }, { "model": "big-ip 5000s", "scope": null, "trust": 0.8, "vendor": "f5", "version": null }, { "model": "big-ip local traffic manager", "scope": null, "trust": 0.8, "vendor": "f5", "version": null }, { "model": "big-ip 12000", "scope": null, "trust": 0.8, "vendor": "f5", "version": null }, { "model": "big-ip 5200v", "scope": null, "trust": 0.8, "vendor": "f5", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003158" }, { "db": "NVD", "id": "CVE-2023-22839" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "13.1.5", "versionStartIncluding": "13.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "13.1.5", "versionStartIncluding": "13.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "15.1.7", "versionStartIncluding": "15.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "15.1.7", "versionStartIncluding": "15.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "17.0.0.2", "versionStartIncluding": "17.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "17.0.0.2", "versionStartIncluding": "17.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "14.1.5.3", "versionStartIncluding": "14.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "14.1.5.3", "versionStartIncluding": "14.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "16.1.3.3", "versionStartIncluding": "16.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "16.1.3.3", "versionStartIncluding": "16.1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:f5:big-ip_10000s_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:f5:big-ip_10000s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:f5:big-ip_10200v_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:f5:big-ip_10200v:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:f5:big-ip_10200v-ssl_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:f5:big-ip_10200v-ssl:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:f5:big-ip_12000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:f5:big-ip_12000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:f5:big-ip_5000s_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:f5:big-ip_5000s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:f5:big-ip_5200v_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:f5:big-ip_5200v:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:f5:big-ip_5200v-ssl_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:f5:big-ip_5200v-ssl:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:f5:big-ip_7000s_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:f5:big-ip_7000s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:f5:big-ip_7200v_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:f5:big-ip_7200v:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:f5:big-ip_7200v-ssl_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:f5:big-ip_7200v-ssl:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:f5:big-ip_i10600_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:f5:big-ip_i10800_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:f5:big-ip_i11600_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:f5:big-ip_i11800_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:f5:big-ip_i15600_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:f5:big-ip_i15800_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:f5:big-ip_i5600_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:f5:big-ip_i5800_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:f5:big-ip_i7600_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:f5:big-ip_i7800_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:f5:r10600_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:f5:r10600:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:f5:r10800_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:f5:r10800:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:f5:r10900_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:f5:r10900:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:f5:r5600_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:f5:r5600:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:f5:r5800_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:f5:r5800:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:f5:r5900_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:f5:r5900:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:f5:velos_bx110_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:f5:velos_bx110:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:f5:viprion_b2100_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:f5:viprion_b2100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:f5:viprion_b2150_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:f5:viprion_b2150:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:f5:viprion_b2250_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:f5:viprion_b2250:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:f5:viprion_b4300_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:f5:viprion_b4300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:f5:viprion_b4450_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:f5:viprion_b4450:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2023-22839" } ] }, "cve": "CVE-2023-22839", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "OTHER", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2023-003158", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2023-22839", "trust": 1.0, "value": "HIGH" }, { "author": "f5sirt@f5.com", "id": "CVE-2023-22839", "trust": 1.0, "value": "HIGH" }, { "author": "OTHER", "id": "JVNDB-2023-003158", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202302-087", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003158" }, { "db": "NVD", "id": "CVE-2023-22839" }, { "db": "NVD", "id": "CVE-2023-22839" }, { "db": "CNNVD", "id": "CNNVD-202302-087" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. BIG-IP for, NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2023-22839" }, { "db": "JVNDB", "id": "JVNDB-2023-003158" }, { "db": "VULHUB", "id": "VHN-451928" }, { "db": "VULMON", "id": "CVE-2023-22839" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2023-22839", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003158", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-087", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-451928", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2023-22839", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-451928" }, { "db": "VULMON", "id": "CVE-2023-22839" }, { "db": "JVNDB", "id": "JVNDB-2023-003158" }, { "db": "NVD", "id": "CVE-2023-22839" }, { "db": "CNNVD", "id": "CNNVD-202302-087" } ] }, "id": "VAR-202302-0011", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-451928" } ], "trust": 0.5615448 }, "last_update_date": "2023-12-18T12:34:00.669000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "K37708118", "trust": 0.8, "url": "https://my.f5.com/manage/s/article/k37708118" }, { "title": "F5 BIG-IP Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=224787" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003158" }, { "db": "CNNVD", "id": "CNNVD-202302-087" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-451928" }, { "db": "JVNDB", "id": "JVNDB-2023-003158" }, { "db": "NVD", "id": "CVE-2023-22839" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://my.f5.com/manage/s/article/k37708118" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2023-22839" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2023-22839/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-451928" }, { "db": "VULMON", "id": "CVE-2023-22839" }, { "db": "JVNDB", "id": "JVNDB-2023-003158" }, { "db": "NVD", "id": "CVE-2023-22839" }, { "db": "CNNVD", "id": "CNNVD-202302-087" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-451928" }, { "db": "VULMON", "id": "CVE-2023-22839" }, { "db": "JVNDB", "id": "JVNDB-2023-003158" }, { "db": "NVD", "id": "CVE-2023-22839" }, { "db": "CNNVD", "id": "CNNVD-202302-087" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-01T00:00:00", "db": "VULHUB", "id": "VHN-451928" }, { "date": "2023-02-01T00:00:00", "db": "VULMON", "id": "CVE-2023-22839" }, { "date": "2023-09-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003158" }, { "date": "2023-02-01T18:15:11.750000", "db": "NVD", "id": "CVE-2023-22839" }, { "date": "2023-02-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-087" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-10T00:00:00", "db": "VULHUB", "id": "VHN-451928" }, { "date": "2023-02-01T00:00:00", "db": "VULMON", "id": "CVE-2023-22839" }, { "date": "2023-09-01T07:36:00", "db": "JVNDB", "id": "JVNDB-2023-003158" }, { "date": "2023-11-07T04:07:27.390000", "db": "NVD", "id": "CVE-2023-22839" }, { "date": "2023-02-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-087" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-087" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "BIG-IP\u00a0 In \u00a0NULL\u00a0 Pointer dereference vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003158" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-087" } ], "trust": 0.6 } }
cve-2023-22839
Vulnerability from cvelistv5
Published
2023-02-01 17:56
Modified
2024-08-02 10:20
Severity ?
EPSS score ?
Summary
On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:20:31.223Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://my.f5.com/manage/s/article/K37708118" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "modules": [ "DNS", "LTM enabled with DNS Services license" ], "product": "BIG-IP", "vendor": "F5", "versions": [ { "lessThan": "17.0.0.2", "status": "affected", "version": "17.0.0", "versionType": "semver" }, { "lessThan": "16.1.3.3", "status": "affected", "version": "16.1.0", "versionType": "semver" }, { "lessThan": "15.1.8.1", "status": "affected", "version": "15.1.0", "versionType": "semver" }, { "lessThan": "14.1.5.3", "status": "affected", "version": "14.1.0", "versionType": "semver" }, { "lessThan": "*", "status": "affected", "version": "13.1.0", "versionType": "semver" } ] } ], "datePublic": "2023-02-01T15:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\u003cbr\u003e" } ], "value": "On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-01T17:56:26.064Z", "orgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "shortName": "f5" }, "references": [ { "url": "https://my.f5.com/manage/s/article/K37708118" } ], "source": { "discovery": "INTERNAL" }, "title": "BIG-IP DNS profile vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab", "assignerShortName": "f5", "cveId": "CVE-2023-22839", "datePublished": "2023-02-01T17:56:26.064Z", "dateReserved": "2023-01-13T06:43:46.141Z", "dateUpdated": "2024-08-02T10:20:31.223Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }