CVE-2021-22977F5 Big-ip Access Policy Manager vulnerability

4 documents4 sources
Severity
7.5HIGHNVD
EPSS
0.6%
top 29.22%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 12
Latest updateMay 24

Description

On BIG-IP version 16.0.0-16.0.1 and 14.1.2.4-14.1.3, cooperation between malicious HTTP client code and a malicious server may cause TMM to restart and generate a core file. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages15 packages

NVDf5/big-ip_analytics14.1.014.1.3.1+1
NVDf5/big-ip_link_controller14.1.014.1.3.1+1
NVDf5/big-ip_ssl_orchestrator14.1.014.1.3.1+1
NVDf5/big-ip_domain_name_system14.1.014.1.3.1+1
NVDf5/big-ip_ddos_hybrid_defender14.1.014.1.3.1+1

🔴Vulnerability Details

2
GHSA
GHSA-ch8w-w4pc-hwjx: On BIG-IP version 162022-05-24
CVEList
CVE-2021-22977: On BIG-IP version 162021-02-12

📋Vendor Advisories

1
F5
CVE-2021-22977: On BIG-IP version 162021-02-12
CVE-2021-22977 — F5 vulnerability | cvebase