CVE-2022-26071
HIGHF5 BIG-IP <16.1.2.2, <15.1.5.1, <14.1.4.6, <13.1.5, <=11.6.x - DoS
Title source: llmDescription
On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all versions of 12.1.x and 11.6.x, a flaw in the way reply ICMP packets are limited in the Traffic Management Microkernel (TMM) allows an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
Scores
CVSS v3
7.4
EPSS
0.0148
EPSS Percentile
81.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Details
CWE
CWE-330
Status
published
Products (50)
f5/big-ip_access_policy_manager
11.6.1
f5/big-ip_access_policy_manager
11.6.2
f5/big-ip_access_policy_manager
11.6.3
f5/big-ip_access_policy_manager
11.6.4
f5/big-ip_access_policy_manager
11.6.5
f5/big-ip_access_policy_manager
12.1.0
f5/big-ip_access_policy_manager
12.1.1
f5/big-ip_access_policy_manager
12.1.2
f5/big-ip_access_policy_manager
12.1.3
f5/big-ip_access_policy_manager
12.1.4
... and 40 more
Published
May 05, 2022
Tracked Since
Feb 18, 2026