5.3

CVE-2021-23007

Exploit

On BIG-IP versions 14.1.4 and 16.0.1.1, when the Traffic Management Microkernel (TMM) process handles certain undisclosed traffic, it may start dropping all fragmented IP traffic. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
F5Big-ip Access Policy Manager Version14.1.4
F5Big-ip Access Policy Manager Version16.0.1.1
F5Big-ip Advanced Firewall Manager Version16.0.1.1
F5Big-ip Analytics Version14.1.4
F5Big-ip Analytics Version16.0.1.1
F5Big-ip Ddos Hybrid Defender Version14.1.4
F5Big-ip Ddos Hybrid Defender Version16.0.1.1
F5Big-ip Domain Name System Version14.1.4
F5Big-ip Domain Name System Version16.0.1.1
F5Big-ip Edge Gateway Version14.1.4
F5Big-ip Edge Gateway Version16.0.1.1
F5Big-ip Fraud Protection Service Version16.0.1.1
F5Big-ip Global Traffic Manager Version14.1.4
F5Big-ip Global Traffic Manager Version16.0.1.1
F5Big-ip Link Controller Version14.1.4
F5Big-ip Link Controller Version16.0.1.1
F5Big-ip Local Traffic Manager Version14.1.4
F5Big-ip Local Traffic Manager Version16.0.1.1
F5Big-ip Ssl Orchestrator Version14.1.4
F5Big-ip Ssl Orchestrator Version16.0.1.1
F5Big-ip Webaccelerator Version14.1.4
F5Big-ip Webaccelerator Version16.0.1.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.73% 0.704
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 5.3 3.9 1.4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:N/I:N/A:P