CVE-2023-22302
moderate-risk
Published 2023-02-01
In BIG-IP versions 17.0.x before 17.0.0.2, and 16.1.x beginning in 16.1.2.2 to before 16.1.3.3, when an HTTP profile is configured on a virtual server and conditions beyond the attacker’s control exist on the target pool member, undisclosed requests sent to the BIG-IP system can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Do I need to act?
-
0.89% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.9/10
Medium
NETWORK
/ HIGH complexity
Affected Products (12)
Affected Vendors
References (2)
Vendor Advisory
https://my.f5.com/manage/s/article/K58550078
Vendor Advisory
https://my.f5.com/manage/s/article/K58550078
38
/ 100
moderate-risk
Severity
18/34 · Moderate
Exploitability
3/34 · Minimal
Exposure
17/34 · Moderate