CVE-2023-40534
high-risk
Published 2023-10-10
When a client-side HTTP/2 profile and the HTTP MRF Router option are enabled for a virtual server, and an iRule using the HTTP_REQUEST event or Local Traffic Policy are associated with the virtual server, undisclosed requests can cause TMM to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Do I need to act?
-
0.57% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (20)
Affected Vendors
References (2)
Vendor Advisory
https://my.f5.com/manage/s/article/K000133467
Vendor Advisory
https://my.f5.com/manage/s/article/K000133467
52
/ 100
high-risk
Severity
26/34 · High
Exploitability
2/34 · Minimal
Exposure
24/34 · High