Lucene search

K
f5F5F5:K52340447
HistoryMay 04, 2022 - 12:00 a.m.

K52340447 : F5 ePVA vulnerability CVE-2022-28705

2022-05-0400:00:00
my.f5.com
91

7.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

38.6%

Security Advisory Description

On platforms with an ePVA and the pva.fwdaccel BigDB variable enabled, undisclosed requests to a virtual server with a FastL4 profile that has ePVA acceleration enabled can cause the Traffic Management Microkernel (TMM) process to terminate. (CVE-2022-28705)

Impact

Traffic is disrupted while the Traffic Management Microkernel (TMM) process restarts. This vulnerability allows a remote attacker to cause a denial-of-service (DoS) on the BIG-IP system. There is no control plane exposure; this is a data plane issue only. CGNAT deployments are more likely to be affected. VCMP guests running on embedded Packet Velocity Acceleration (ePVA) platforms provisioned with only 2 CPU cores are not vulnerable.

The following conditions must be met to expose this issue:

  • The platform must have an ePVA. For further information, refer to: K12837: Overview of the ePVA feature.
  • The virtual server has a FastL4 profile with ePVA acceleration enabled.
  • The pva.fwdaccel BigDB variable has been enabled. This variable is not enabled in default configurations.

7.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

38.6%