All the vulnerabilites related to f5 - r5900_firmware
Vulnerability from fkie_nvd
Published
2023-02-01 18:15
Modified
2024-11-21 07:45
Summary
On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Impacted products
Vendor Product Version
f5 big-ip_domain_name_system *
f5 big-ip_domain_name_system *
f5 big-ip_domain_name_system *
f5 big-ip_domain_name_system *
f5 big-ip_domain_name_system *
f5 big-ip_local_traffic_manager *
f5 big-ip_local_traffic_manager *
f5 big-ip_local_traffic_manager *
f5 big-ip_local_traffic_manager *
f5 big-ip_local_traffic_manager *
f5 big-ip_10000s_firmware -
f5 big-ip_10000s -
f5 big-ip_10200v_firmware -
f5 big-ip_10200v -
f5 big-ip_10200v-ssl_firmware -
f5 big-ip_10200v-ssl -
f5 big-ip_12000_firmware -
f5 big-ip_12000 -
f5 big-ip_5000s_firmware -
f5 big-ip_5000s -
f5 big-ip_5200v_firmware -
f5 big-ip_5200v -
f5 big-ip_5200v-ssl_firmware -
f5 big-ip_5200v-ssl -
f5 big-ip_7000s_firmware -
f5 big-ip_7000s -
f5 big-ip_7200v_firmware -
f5 big-ip_7200v -
f5 big-ip_7200v-ssl_firmware -
f5 big-ip_7200v-ssl -
f5 big-ip_i10600_firmware -
f5 big-ip_i10600 -
f5 big-ip_i10800_firmware -
f5 big-ip_i10800 -
f5 big-ip_i11600_firmware -
f5 big-ip_i11600 -
f5 big-ip_i11800_firmware -
f5 big-ip_i11800 -
f5 big-ip_i15600_firmware -
f5 big-ip_i15600 -
f5 big-ip_i15800_firmware -
f5 big-ip_i15800 -
f5 big-ip_i5600_firmware -
f5 big-ip_i5600 -
f5 big-ip_i5800_firmware -
f5 big-ip_i5800 -
f5 big-ip_i7600_firmware -
f5 big-ip_i7600 -
f5 big-ip_i7800_firmware -
f5 big-ip_i7800 -
f5 r10600_firmware -
f5 r10600 -
f5 r10800_firmware -
f5 r10800 -
f5 r10900_firmware -
f5 r10900 -
f5 r5600_firmware -
f5 r5600 -
f5 r5800_firmware -
f5 r5800 -
f5 r5900_firmware -
f5 r5900 -
f5 velos_bx110_firmware -
f5 velos_bx110 -
f5 viprion_b2100_firmware -
f5 viprion_b2100 -
f5 viprion_b2150_firmware -
f5 viprion_b2150 -
f5 viprion_b2250_firmware -
f5 viprion_b2250 -
f5 viprion_b4300_firmware -
f5 viprion_b4300 -
f5 viprion_b4450_firmware -
f5 viprion_b4450 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "08B25AAB-A98C-4F89-9131-29E3A8C0ED23",
              "versionEndIncluding": "13.1.5",
              "versionStartIncluding": "13.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DBB52D1-4FB8-4A71-8F83-02D7DDB99F60",
              "versionEndExcluding": "14.1.5.3",
              "versionStartIncluding": "14.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "313014B4-8033-4B57-B838-66EE163E86D4",
              "versionEndExcluding": "15.1.7",
              "versionStartIncluding": "15.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "203B2B00-7DA5-443D-B4AA-DE0814D7E04D",
              "versionEndExcluding": "16.1.3.3",
              "versionStartIncluding": "16.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "93721140-2035-4431-BF5F-CA0C78BBFE53",
              "versionEndExcluding": "17.0.0.2",
              "versionStartIncluding": "17.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0360F76D-E75E-4B05-A294-B47012323ED9",
              "versionEndIncluding": "13.1.5",
              "versionStartIncluding": "13.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE9B290B-21D9-40B0-8A6D-36F2C310C71A",
              "versionEndExcluding": "14.1.5.3",
              "versionStartIncluding": "14.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E25D2597-32D7-4676-9A0C-FCAD8D8900A9",
              "versionEndExcluding": "15.1.7",
              "versionStartIncluding": "15.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F11221E1-8354-4854-A75D-060721E9671F",
              "versionEndExcluding": "16.1.3.3",
              "versionStartIncluding": "16.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FAB540A-6082-4F6E-9CDE-0AB719B1001F",
              "versionEndExcluding": "17.0.0.2",
              "versionStartIncluding": "17.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:f5:big-ip_10000s_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F510CA2D-E049-4884-AB80-EC03560556EF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:f5:big-ip_10000s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4718F6EA-3955-44A1-98E7-CBEFA4E9C2C8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:f5:big-ip_10200v_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D59AA4F5-B072-4866-9912-FCBB5F77F8EA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:f5:big-ip_10200v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "755CF51B-61AD-4C1E-9954-C44EC30E4339",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:f5:big-ip_10200v-ssl_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C37E575D-5674-4BD6-9C24-D318A905FD4E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:f5:big-ip_10200v-ssl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BE455B9-7497-42EE-A6D2-EFEB0E9B5589",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:f5:big-ip_12000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5E0FBD3-584B-4E20-A664-AFC8B224466C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:f5:big-ip_12000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BF87EE2-1A8A-4050-8168-C4C8A1E49AD7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:f5:big-ip_5000s_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FA594DF-0441-4761-80AD-C3C64BD1BA59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:f5:big-ip_5000s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF35744-F9B6-43FD-804D-955EC5AC7360",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:f5:big-ip_5200v_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EA95257-25F5-483A-BBE5-F906EAF2BCF9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:f5:big-ip_5200v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86E943FF-3EE2-4F87-B005-80432EB4FB67",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:f5:big-ip_5200v-ssl_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD50226B-5D1A-44A0-B530-BBDB50CDC30F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:f5:big-ip_5200v-ssl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAF21909-A75A-42ED-AAF4-3BC3EE412BA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:f5:big-ip_7000s_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B405FC13-0B14-4497-8BE8-E09CE5369DE3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:f5:big-ip_7000s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "046B8D26-64B8-46C4-921A-983E0AE82752",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:f5:big-ip_7200v_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B1685A2-60F2-4B06-A68E-FC2E18CF3BEE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:f5:big-ip_7200v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F5FE621-B69A-4E93-B5FB-AC7C47A73766",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:f5:big-ip_7200v-ssl_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC83C650-6120-4FD8-85FC-131B7E78F9FB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:f5:big-ip_7200v-ssl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4928A6CA-6FD3-405F-878F-12A199C54C03",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:f5:big-ip_i10600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1196C9FB-33CF-493C-8FCB-9FDFBD7A4CEB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F768A343-E31B-4A0B-A1CE-B884BCF8DE96",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:f5:big-ip_i10800_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E48A49B-586A-4585-8952-EBF30E8C726C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25711D89-A9A6-41E8-8DAB-FBFA9CADB69B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:f5:big-ip_i11600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4214D3DE-B42C-43A9-81CE-AB14FEA1E9B0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "906F880E-4C8D-49B7-8C61-2C22348373CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:f5:big-ip_i11800_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33F03D79-CEC3-4EB0-8105-78AD07DDC8C3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A67973F6-506B-43EC-94A5-9EBCBD5131FE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:f5:big-ip_i15600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA9A1D2B-33AA-4691-9891-4360B9B026EC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B37E2A71-1BDC-4556-8204-2A3140EA2923",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:f5:big-ip_i15800_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C63DD90F-58DA-4FCF-BDD8-48A29D41AE8F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "323F3F62-98B5-4FE4-8FFA-F20AF5F1745F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:f5:big-ip_i5600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21BD097C-73F2-4EB7-9024-3DC63EC419D3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D848D43B-F994-45CF-AA53-ED0D4ACEDE8C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:f5:big-ip_i5800_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A81F6A51-9AEF-4502-B19C-449CC9FA7154",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16C46A4D-3773-4EB4-B397-D02694FC65BD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:f5:big-ip_i7600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33D524EE-B941-4D73-A83F-02C3253492D1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "842E7F16-4CB8-450F-BF18-829BAEFAF6CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:f5:big-ip_i7800_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C53B31C-E56F-4FD4-9B51-A741DA8FE479",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7569487-6D88-46CC-9B70-59D56DB0CE35",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:f5:r10600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EDC8F7B-D052-4DAB-B572-17241E02DC01",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:f5:r10600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B494DEE-B373-4B3F-95C1-2E0997F32B6E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:f5:r10800_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D400BBB2-399D-41C9-B73B-BDC280B5A51E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:f5:r10800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BC625D5-C59F-4D20-BA92-0EC85DAB8AFA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:f5:r10900_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B5D6038-EB49-47DE-BC4A-8E9888F217DB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:f5:r10900:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4233544A-999C-42CD-9B61-E639AAA460B9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:f5:r5600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43CDBB9F-B6BD-4103-82E8-D66E067704C2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:f5:r5600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24DA75BA-A4B7-46BD-887D-03CDFAF22791",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:f5:r5800_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "612904C3-0EA5-4F56-BDFE-1A2114C28EEE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:f5:r5800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52B4EBB6-BEEB-42DA-A146-10E401226BED",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:f5:r5900_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AF08F72-E905-48C4-9339-0F23EE462CC5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:f5:r5900:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "55433400-8996-44B8-94D7-81690145EF94",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:f5:velos_bx110_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8AB5834-CB4C-46AD-A0C6-E3800DE89453",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:f5:velos_bx110:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5918B702-39A4-48F5-B381-7FFF0ABE4920",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:f5:viprion_b2100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19F04564-25E9-4962-949D-6C810091464D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:f5:viprion_b2100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE3FCE60-4F2F-48FA-A0AC-89DE82118411",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:f5:viprion_b2150_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBFBFFE7-EA68-46E0-A172-FABDD99D7D8D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:f5:viprion_b2150:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9940F471-FA88-49FB-B1BD-752366F9A15C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:f5:viprion_b2250_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B58A0DEB-F0C7-40BD-ACE3-49F0CD5663D9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:f5:viprion_b2250:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD814768-9507-4C58-9398-6898C3F49272",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:f5:viprion_b4300_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "83532FB3-30DE-44B9-A1B7-551F91E61C9F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:f5:viprion_b4300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C0B96E2-7E5D-4C82-B4C5-3F35CD650962",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:f5:viprion_b4450_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3DD6188-94B2-43BE-93C8-F2493E2C2C23",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:f5:viprion_b4450:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "776A5309-2A92-462B-9CAB-067F5E522386",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n"
    }
  ],
  "id": "CVE-2023-22839",
  "lastModified": "2024-11-21T07:45:29.820",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "f5sirt@f5.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-02-01T18:15:11.750",
  "references": [
    {
      "source": "f5sirt@f5.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://my.f5.com/manage/s/article/K37708118"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://my.f5.com/manage/s/article/K37708118"
    }
  ],
  "sourceIdentifier": "f5sirt@f5.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "f5sirt@f5.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2023-22839
Vulnerability from cvelistv5
Published
2023-02-01 17:56
Modified
2024-08-02 10:20
Summary
On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T10:20:31.223Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://my.f5.com/manage/s/article/K37708118"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "modules": [
            "DNS",
            "LTM enabled with DNS Services license"
          ],
          "product": "BIG-IP",
          "vendor": "F5",
          "versions": [
            {
              "lessThan": "17.0.0.2",
              "status": "affected",
              "version": "17.0.0",
              "versionType": "semver"
            },
            {
              "lessThan": "16.1.3.3",
              "status": "affected",
              "version": "16.1.0",
              "versionType": "semver"
            },
            {
              "lessThan": "15.1.8.1",
              "status": "affected",
              "version": "15.1.0",
              "versionType": "semver"
            },
            {
              "lessThan": "14.1.5.3",
              "status": "affected",
              "version": "14.1.0",
              "versionType": "semver"
            },
            {
              "lessThan": "*",
              "status": "affected",
              "version": "13.1.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "datePublic": "2023-02-01T15:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\u003cbr\u003e"
            }
          ],
          "value": "On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-476",
              "description": "CWE-476 NULL Pointer Dereference",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-02-01T17:56:26.064Z",
        "orgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab",
        "shortName": "f5"
      },
      "references": [
        {
          "url": "https://my.f5.com/manage/s/article/K37708118"
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      },
      "title": "BIG-IP DNS profile vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "9dacffd4-cb11-413f-8451-fbbfd4ddc0ab",
    "assignerShortName": "f5",
    "cveId": "CVE-2023-22839",
    "datePublished": "2023-02-01T17:56:26.064Z",
    "dateReserved": "2023-01-13T06:43:46.141Z",
    "dateUpdated": "2024-08-02T10:20:31.223Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}