9.8
CVE-2021-22991
- EPSS 70.78%
- Published 31.03.2021 18:15:14
- Last modified 02.04.2025 19:09:27
- Source f5sirt@f5.com
- Teams watchlist Login
- Open Login
On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, and 12.1.x before 12.1.5.3, undisclosed requests to a virtual server may be incorrectly handled by the Traffic Management Microkernel (TMM) URI normalization, which may trigger a buffer overflow, resulting in a DoS attack. In certain situations, it may theoretically allow bypass of URL based access control or remote code execution (RCE). Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.
Data is provided by the National Vulnerability Database (NVD)
F5 ≫ Big-ip Access Policy Manager Version >= 12.1.0 < 12.1.5.3
F5 ≫ Big-ip Access Policy Manager Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Access Policy Manager Version >= 14.1.0 < 14.1.4
F5 ≫ Big-ip Access Policy Manager Version >= 15.1.0 < 15.1.2.1
F5 ≫ Big-ip Access Policy Manager Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Advanced Firewall Manager Version >= 12.1.0 < 12.1.5.3
F5 ≫ Big-ip Advanced Firewall Manager Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Advanced Firewall Manager Version >= 14.1.0 < 14.1.4
F5 ≫ Big-ip Advanced Firewall Manager Version >= 15.1.0 < 15.1.2.1
F5 ≫ Big-ip Advanced Firewall Manager Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Advanced Web Application Firewall Version >= 12.1.0 < 12.1.5.3
F5 ≫ Big-ip Advanced Web Application Firewall Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Advanced Web Application Firewall Version >= 14.1.0 < 14.1.4
F5 ≫ Big-ip Advanced Web Application Firewall Version >= 15.1.0 < 15.1.2.1
F5 ≫ Big-ip Advanced Web Application Firewall Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Analytics Version >= 12.1.0 < 12.1.5.3
F5 ≫ Big-ip Analytics Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Analytics Version >= 14.1.0 < 14.1.4
F5 ≫ Big-ip Analytics Version >= 15.1.0 < 15.1.2.1
F5 ≫ Big-ip Analytics Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Application Acceleration Manager Version >= 12.1.0 < 12.1.5.3
F5 ≫ Big-ip Application Acceleration Manager Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Application Acceleration Manager Version >= 14.1.0 < 14.1.4
F5 ≫ Big-ip Application Acceleration Manager Version >= 15.1.0 < 15.1.2.1
F5 ≫ Big-ip Application Acceleration Manager Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Application Security Manager Version >= 12.1.0 < 12.1.5.3
F5 ≫ Big-ip Application Security Manager Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Application Security Manager Version >= 14.1.0 < 14.1.4
F5 ≫ Big-ip Application Security Manager Version >= 15.1.0 < 15.1.2.1
F5 ≫ Big-ip Application Security Manager Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Ddos Hybrid Defender Version >= 12.1.0 < 12.1.5.3
F5 ≫ Big-ip Ddos Hybrid Defender Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Ddos Hybrid Defender Version >= 14.1.0 < 14.1.4
F5 ≫ Big-ip Ddos Hybrid Defender Version >= 15.1.0 < 15.1.2.1
F5 ≫ Big-ip Ddos Hybrid Defender Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Domain Name System Version >= 12.1.0 < 12.1.5.3
F5 ≫ Big-ip Domain Name System Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Domain Name System Version >= 14.1.0 < 14.1.4
F5 ≫ Big-ip Domain Name System Version >= 15.1.0 < 15.1.2.1
F5 ≫ Big-ip Domain Name System Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Fraud Protection Service Version >= 12.1.0 < 12.1.5.3
F5 ≫ Big-ip Fraud Protection Service Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Fraud Protection Service Version >= 14.1.0 < 14.1.4
F5 ≫ Big-ip Fraud Protection Service Version >= 15.1.0 < 15.1.2.1
F5 ≫ Big-ip Fraud Protection Service Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Global Traffic Manager Version >= 12.1.0 < 12.1.5.3
F5 ≫ Big-ip Global Traffic Manager Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Global Traffic Manager Version >= 14.1.0 < 14.1.4
F5 ≫ Big-ip Global Traffic Manager Version >= 15.1.0 < 15.1.2.1
F5 ≫ Big-ip Global Traffic Manager Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Link Controller Version >= 12.1.0 < 12.1.5.3
F5 ≫ Big-ip Link Controller Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Link Controller Version >= 14.1.0 < 14.1.4
F5 ≫ Big-ip Link Controller Version >= 15.1.0 < 15.1.2.1
F5 ≫ Big-ip Link Controller Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Local Traffic Manager Version >= 12.1.0 < 12.1.5.3
F5 ≫ Big-ip Local Traffic Manager Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Local Traffic Manager Version >= 14.1.0 < 14.1.4
F5 ≫ Big-ip Local Traffic Manager Version >= 15.1.0 < 15.1.2.1
F5 ≫ Big-ip Local Traffic Manager Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Policy Enforcement Manager Version >= 12.1.0 < 12.1.5.3
F5 ≫ Big-ip Policy Enforcement Manager Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Policy Enforcement Manager Version >= 14.1.0 < 14.1.4
F5 ≫ Big-ip Policy Enforcement Manager Version >= 15.1.0 < 15.1.2.1
F5 ≫ Big-ip Policy Enforcement Manager Version >= 16.0.0 < 16.0.1.1
F5 ≫ Ssl Orchestrator Version >= 12.1.0 < 12.1.5.3
F5 ≫ Ssl Orchestrator Version >= 13.1.0 < 13.1.3.6
F5 ≫ Ssl Orchestrator Version >= 14.1.0 < 14.1.4
F5 ≫ Ssl Orchestrator Version >= 15.1.0 < 15.1.2.1
F5 ≫ Ssl Orchestrator Version >= 16.0.0 < 16.0.1.1
18.01.2022: CISA Known Exploited Vulnerabilities (KEV) Catalog
F5 BIG-IP Traffic Management Microkernel Buffer Overflow
VulnerabilityThe Traffic Management Microkernel of BIG-IP ASM Risk Engine has a buffer overflow vulnerability, leading to a bypassing of URL-based access controls.
DescriptionApply updates per vendor instructions.
Required actionsType | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 70.78% | 0.986 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 6.8 | 8.6 | 6.4 |
AV:N/AC:M/Au:N/C:P/I:P/A:P
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.