9.8
CVE-2021-22991
- EPSS 70.78%
- Veröffentlicht 31.03.2021 18:15:14
- Zuletzt bearbeitet 02.04.2025 19:09:27
- Quelle f5sirt@f5.com
- Teams Watchlist Login
- Unerledigt Login
On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, and 12.1.x before 12.1.5.3, undisclosed requests to a virtual server may be incorrectly handled by the Traffic Management Microkernel (TMM) URI normalization, which may trigger a buffer overflow, resulting in a DoS attack. In certain situations, it may theoretically allow bypass of URL based access control or remote code execution (RCE). Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
F5 ≫ Big-ip Access Policy Manager Version >= 12.1.0 < 12.1.5.3
F5 ≫ Big-ip Access Policy Manager Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Access Policy Manager Version >= 14.1.0 < 14.1.4
F5 ≫ Big-ip Access Policy Manager Version >= 15.1.0 < 15.1.2.1
F5 ≫ Big-ip Access Policy Manager Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Advanced Firewall Manager Version >= 12.1.0 < 12.1.5.3
F5 ≫ Big-ip Advanced Firewall Manager Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Advanced Firewall Manager Version >= 14.1.0 < 14.1.4
F5 ≫ Big-ip Advanced Firewall Manager Version >= 15.1.0 < 15.1.2.1
F5 ≫ Big-ip Advanced Firewall Manager Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Advanced Web Application Firewall Version >= 12.1.0 < 12.1.5.3
F5 ≫ Big-ip Advanced Web Application Firewall Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Advanced Web Application Firewall Version >= 14.1.0 < 14.1.4
F5 ≫ Big-ip Advanced Web Application Firewall Version >= 15.1.0 < 15.1.2.1
F5 ≫ Big-ip Advanced Web Application Firewall Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Analytics Version >= 12.1.0 < 12.1.5.3
F5 ≫ Big-ip Analytics Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Analytics Version >= 14.1.0 < 14.1.4
F5 ≫ Big-ip Analytics Version >= 15.1.0 < 15.1.2.1
F5 ≫ Big-ip Analytics Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Application Acceleration Manager Version >= 12.1.0 < 12.1.5.3
F5 ≫ Big-ip Application Acceleration Manager Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Application Acceleration Manager Version >= 14.1.0 < 14.1.4
F5 ≫ Big-ip Application Acceleration Manager Version >= 15.1.0 < 15.1.2.1
F5 ≫ Big-ip Application Acceleration Manager Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Application Security Manager Version >= 12.1.0 < 12.1.5.3
F5 ≫ Big-ip Application Security Manager Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Application Security Manager Version >= 14.1.0 < 14.1.4
F5 ≫ Big-ip Application Security Manager Version >= 15.1.0 < 15.1.2.1
F5 ≫ Big-ip Application Security Manager Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Ddos Hybrid Defender Version >= 12.1.0 < 12.1.5.3
F5 ≫ Big-ip Ddos Hybrid Defender Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Ddos Hybrid Defender Version >= 14.1.0 < 14.1.4
F5 ≫ Big-ip Ddos Hybrid Defender Version >= 15.1.0 < 15.1.2.1
F5 ≫ Big-ip Ddos Hybrid Defender Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Domain Name System Version >= 12.1.0 < 12.1.5.3
F5 ≫ Big-ip Domain Name System Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Domain Name System Version >= 14.1.0 < 14.1.4
F5 ≫ Big-ip Domain Name System Version >= 15.1.0 < 15.1.2.1
F5 ≫ Big-ip Domain Name System Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Fraud Protection Service Version >= 12.1.0 < 12.1.5.3
F5 ≫ Big-ip Fraud Protection Service Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Fraud Protection Service Version >= 14.1.0 < 14.1.4
F5 ≫ Big-ip Fraud Protection Service Version >= 15.1.0 < 15.1.2.1
F5 ≫ Big-ip Fraud Protection Service Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Global Traffic Manager Version >= 12.1.0 < 12.1.5.3
F5 ≫ Big-ip Global Traffic Manager Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Global Traffic Manager Version >= 14.1.0 < 14.1.4
F5 ≫ Big-ip Global Traffic Manager Version >= 15.1.0 < 15.1.2.1
F5 ≫ Big-ip Global Traffic Manager Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Link Controller Version >= 12.1.0 < 12.1.5.3
F5 ≫ Big-ip Link Controller Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Link Controller Version >= 14.1.0 < 14.1.4
F5 ≫ Big-ip Link Controller Version >= 15.1.0 < 15.1.2.1
F5 ≫ Big-ip Link Controller Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Local Traffic Manager Version >= 12.1.0 < 12.1.5.3
F5 ≫ Big-ip Local Traffic Manager Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Local Traffic Manager Version >= 14.1.0 < 14.1.4
F5 ≫ Big-ip Local Traffic Manager Version >= 15.1.0 < 15.1.2.1
F5 ≫ Big-ip Local Traffic Manager Version >= 16.0.0 < 16.0.1.1
F5 ≫ Big-ip Policy Enforcement Manager Version >= 12.1.0 < 12.1.5.3
F5 ≫ Big-ip Policy Enforcement Manager Version >= 13.1.0 < 13.1.3.6
F5 ≫ Big-ip Policy Enforcement Manager Version >= 14.1.0 < 14.1.4
F5 ≫ Big-ip Policy Enforcement Manager Version >= 15.1.0 < 15.1.2.1
F5 ≫ Big-ip Policy Enforcement Manager Version >= 16.0.0 < 16.0.1.1
F5 ≫ Ssl Orchestrator Version >= 12.1.0 < 12.1.5.3
F5 ≫ Ssl Orchestrator Version >= 13.1.0 < 13.1.3.6
F5 ≫ Ssl Orchestrator Version >= 14.1.0 < 14.1.4
F5 ≫ Ssl Orchestrator Version >= 15.1.0 < 15.1.2.1
F5 ≫ Ssl Orchestrator Version >= 16.0.0 < 16.0.1.1
18.01.2022: CISA Known Exploited Vulnerabilities (KEV) Catalog
F5 BIG-IP Traffic Management Microkernel Buffer Overflow
SchwachstelleThe Traffic Management Microkernel of BIG-IP ASM Risk Engine has a buffer overflow vulnerability, leading to a bypassing of URL-based access controls.
BeschreibungApply updates per vendor instructions.
Erforderliche MaßnahmenTyp | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 70.78% | 0.986 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 6.8 | 8.6 | 6.4 |
AV:N/AC:M/Au:N/C:P/I:P/A:P
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.