CVE-2022-26071

HIGH

F5 BIG-IP <16.1.2.2, <15.1.5.1, <14.1.4.6, <13.1.5, <=11.6.x - DoS

Title source: llm
STIX 2.1

Description

On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all versions of 12.1.x and 11.6.x, a flaw in the way reply ICMP packets are limited in the Traffic Management Microkernel (TMM) allows an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated

Scores

CVSS v3 7.4
EPSS 0.0148
EPSS Percentile 81.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

Details

CWE
CWE-330
Status published
Products (50)
f5/big-ip_access_policy_manager 11.6.1
f5/big-ip_access_policy_manager 11.6.2
f5/big-ip_access_policy_manager 11.6.3
f5/big-ip_access_policy_manager 11.6.4
f5/big-ip_access_policy_manager 11.6.5
f5/big-ip_access_policy_manager 12.1.0
f5/big-ip_access_policy_manager 12.1.1
f5/big-ip_access_policy_manager 12.1.2
f5/big-ip_access_policy_manager 12.1.3
f5/big-ip_access_policy_manager 12.1.4
... and 40 more
Published May 05, 2022
Tracked Since Feb 18, 2026