CVE-2021-23039Improper Input Validation in F5 Big-ip Application Security Manager

Severity
7.5HIGHNVD
EPSS
0.6%
top 31.22%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 14
Latest updateMay 24

Description

On version 16.0.x before 16.0.1.2, 15.1.x before 15.1.3, 14.1.x before 14.1.2.8, and all versions of 13.1.x and 12.1.x, when IPSec is configured on a BIG-IP system, undisclosed requests from an authorized remote (IPSec) peer, which already has a negotiated Security Association, can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages12 packages

NVDf5/big-ip_domain_name_system14.1.014.1.2.8+4
NVDf5/big-ip_local_traffic_manager14.1.014.1.2.8+4
NVDf5/big-ip_global_traffic_manager14.1.014.1.2.8+4
NVDf5/big-ip_application_security_manager14.1.014.1.2.8+4
NVDf5/big-ip_analytics14.1.014.1.2.8+4

🔴Vulnerability Details

2
GHSA
GHSA-x4g6-37v9-377w: On version 162022-05-24
CVEList
CVE-2021-23039: On version 162021-09-14

📋Vendor Advisories

1
F5
CVE-2021-23039: On version 162021-09-14
CVE-2021-23039 — Improper Input Validation in F5 | cvebase