Vulnerability Details : CVE-2023-22839
On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Products affected by CVE-2023-22839
- F5 » Big-ip Local Traffic ManagerVersions from including (>=) 13.1.0 and up to, including, (<=) 13.1.5cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*
- F5 » Big-ip Domain Name SystemVersions from including (>=) 13.1.0 and up to, including, (<=) 13.1.5cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*
- cpe:2.3:o:f5:big-ip_10000s_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:f5:big-ip_i5600_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:f5:big-ip_i5800_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:f5:big-ip_i7600_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:f5:big-ip_i7800_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:f5:big-ip_i10600_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:f5:big-ip_i10800_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:f5:big-ip_i11600_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:f5:big-ip_i11800_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:f5:big-ip_i15600_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:f5:big-ip_i15800_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:f5:big-ip_10200v_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:f5:big-ip_10200v-ssl_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:f5:big-ip_12000_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:f5:big-ip_5000s_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:f5:big-ip_5200v_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:f5:big-ip_5200v-ssl_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:f5:big-ip_7000s_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:f5:big-ip_7200v_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:f5:big-ip_7200v-ssl_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:f5:r10600_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:f5:r10800_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:f5:r10900_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:f5:r5600_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:f5:r5800_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:f5:r5900_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:f5:velos_bx110_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:f5:viprion_b2100_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:f5:viprion_b2150_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:f5:viprion_b2250_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:f5:viprion_b4300_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:f5:viprion_b4450_firmware:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-22839
0.27%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 48 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-22839
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
F5 Networks | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2023-22839
-
The product dereferences a pointer that it expects to be valid but is NULL.Assigned by:
- f5sirt@f5.com (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2023-22839
-
https://my.f5.com/manage/s/article/K37708118
BIG-IP DNS profile vulnerability CVE-2023-22839Vendor Advisory
Jump to