BIG-IQ high availability (HA) when using a Quorum device for automatic failover does not implement any form of authentication with the Corosync daemon. (CVE-2021-22995)
Impact
There are iptables firewall rules in place which prevent arbitrary attackers from connecting directly, but because the protocol uses User Datagram Protocol (UDP), spoofed datagrams may be able to bypass the firewall ruleset if they can spoof the IP address of a trusted, preconfigured peer.