CVE-2023-22839

high-risk
Published 2023-02-01

On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Do I need to act?

~
1.0% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10 High
NETWORK / LOW complexity

Affected Products (20)

Big-Ip 10000S Firmware
Big-Ip 10200V Firmware
Big-Ip 10200V-Ssl Firmware
Big-Ip 12000 Firmware
Big-Ip 5000S Firmware
Big-Ip 5200V Firmware
Big-Ip 5200V-Ssl Firmware
Big-Ip 7000S Firmware
Big-Ip 7200V Firmware
Big-Ip 7200V-Ssl Firmware
Big-Ip I10600 Firmware
Big-Ip I10800 Firmware
Big-Ip I11600 Firmware
Big-Ip I11800 Firmware
Big-Ip I15600 Firmware
Big-Ip I15800 Firmware
Big-Ip I5600 Firmware
Big-Ip I5800 Firmware

Affected Vendors

F5
52
/ 100
high-risk
Severity 26/34 · High
Exploitability 3/34 · Minimal
Exposure 23/34 · High