Lucene search

K
f5F5F5:K37708118
HistoryFeb 01, 2023 - 12:00 a.m.

K37708118 : BIG-IP DNS profile vulnerability CVE-2023-22839

2023-02-0100:00:00
my.f5.com
8
big-ip
dns profile
vulnerability
cve-2023-22839
traffic disruption
dos
tmm process
remote unauthenticated attacker
data plane issue
f5 rseries
f5 velos bx110
viprion b2100/2150
viprion b2250
viprion b4300
viprion b4450

6.9 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

33.8%

Security Advisory Description

When a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. (CVE-2023-22839)

Impact

Traffic is disrupted while the TMM process restarts. This vulnerability allows a remote unauthenticated attacker to cause a denial-of-service (DoS) on the BIG-IP system. There is no control plane exposure; this is a data plane issue only.

  • BIG-IP
    • BIG-IP 5000 series (C109)
      BIG-IP 7000 series (D110)
      BIG-IP 10000 series (D113)
      BIG-IP 12000 series (D111)
  • BIG-IP iSeries
    • BIG-IP i5600, i5800 (C119)
      BIG-IP i7600, i7800 (C118)
      BIG-IP i10600, i10800 (C116)
      BIG-IP i11600, i11800 (C123)
      BIG-IP i15600, i15800 (D116)
  • F5 rSeries
    • r5000
    • r10000
  • F5 VELOS BX110 blade
  • VIPRION B2100/2150 blade (A109, A113)
  • VIPRION B2250 blade (A112)
  • VIPRION B4300 series blade (A108, A110)
  • VIPRION B4450 series blade

6.9 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

33.8%