CVE-2023-22422

HIGH

BIG-IP <17.0.0.2 & <16.1.3.3 - DoS

Title source: llm
STIX 2.1

Description

On BIG-IP versions 17.0.x before 17.0.0.2 and 16.1.x before 16.1.3.3, when a HTTP profile with the non-default Enforcement options of Enforce HTTP Compliance and Unknown Methods: Reject are configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

References (1)

Core 1
Core References

Scores

CVSS v3 7.5
EPSS 0.0089
EPSS Percentile 75.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact partial

Details

CWE
CWE-120
Status published
Products (12)
f5/big-ip_access_policy_manager 16.1.0 - 16.1.3.3
f5/big-ip_advanced_firewall_manager 16.1.0 - 16.1.3.3
f5/big-ip_analytics 16.1.0 - 16.1.3.3
f5/big-ip_application_acceleration_manager 16.1.0 - 16.1.3.3
f5/big-ip_application_security_manager 16.1.0 - 16.1.3.3
f5/big-ip_ddos_hybrid_defender 16.1.0 - 16.1.3.3
f5/big-ip_domain_name_system 16.1.0 - 16.1.3.3
f5/big-ip_fraud_protection_service 16.1.0 - 16.1.3.3
f5/big-ip_link_controller 16.1.0 - 16.1.3.3
f5/big-ip_local_traffic_manager 16.1.0 - 16.1.3.3
... and 2 more
Published Feb 01, 2023
Tracked Since Feb 18, 2026