CVE-2021-22991
CRITICAL KEVBIG-IP <16.0.1.1, <15.1.2.1, <14.1.4, <13.1.3.6, <12.1.5.3 - DoS/RCE
Title source: llmDescription
On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, and 12.1.x before 12.1.5.3, undisclosed requests to a virtual server may be incorrectly handled by the Traffic Management Microkernel (TMM) URI normalization, which may trigger a buffer overflow, resulting in a DoS attack. In certain situations, it may theoretically allow bypass of URL based access control or remote code execution (RCE). Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.
Scores
CVSS v3
9.8
EPSS
0.7309
EPSS Percentile
98.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CISA KEV
2022-01-18
VulnCheck KEV
2021-06-01
InTheWild.io
2021-07-01
ENISA EUVD
EUVD-2021-10109
CWE
CWE-119
Status
published
Products (14)
f5/big-ip_access_policy_manager
12.1.0 - 12.1.5.3
f5/big-ip_advanced_firewall_manager
12.1.0 - 12.1.5.3
f5/big-ip_advanced_web_application_firewall
12.1.0 - 12.1.5.3
f5/big-ip_analytics
12.1.0 - 12.1.5.3
f5/big-ip_application_acceleration_manager
12.1.0 - 12.1.5.3
f5/big-ip_application_security_manager
12.1.0 - 12.1.5.3
f5/big-ip_ddos_hybrid_defender
12.1.0 - 12.1.5.3
f5/big-ip_domain_name_system
12.1.0 - 12.1.5.3
f5/big-ip_fraud_protection_service
12.1.0 - 12.1.5.3
f5/big-ip_global_traffic_manager
12.1.0 - 12.1.5.3
... and 4 more
Published
Mar 31, 2021
KEV Added
Jan 18, 2022
Tracked Since
Feb 18, 2026