CVE-2023-22839

On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
References
Link Resource
https://my.f5.com/manage/s/article/K37708118 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:f5:big-ip_10000s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:big-ip_10000s:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:f5:big-ip_10200v_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:big-ip_10200v:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:f5:big-ip_10200v-ssl_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:big-ip_10200v-ssl:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:f5:big-ip_12000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:big-ip_12000:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:f5:big-ip_5000s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:big-ip_5000s:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:f5:big-ip_5200v_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:big-ip_5200v:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:f5:big-ip_5200v-ssl_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:big-ip_5200v-ssl:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:f5:big-ip_7000s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:big-ip_7000s:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:f5:big-ip_7200v_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:big-ip_7200v:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:f5:big-ip_7200v-ssl_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:big-ip_7200v-ssl:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:f5:big-ip_i10600_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:f5:big-ip_i10800_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
cpe:2.3:o:f5:big-ip_i11600_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:big-ip_i11600:-:*:*:*:*:*:*:*

Configuration 15 (hide)

AND
cpe:2.3:o:f5:big-ip_i11800_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:big-ip_i11800:-:*:*:*:*:*:*:*

Configuration 16 (hide)

AND
cpe:2.3:o:f5:big-ip_i15600_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:big-ip_i15600:-:*:*:*:*:*:*:*

Configuration 17 (hide)

AND
cpe:2.3:o:f5:big-ip_i15800_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:big-ip_i15800:-:*:*:*:*:*:*:*

Configuration 18 (hide)

AND
cpe:2.3:o:f5:big-ip_i5600_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*

Configuration 19 (hide)

AND
cpe:2.3:o:f5:big-ip_i5800_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*

Configuration 20 (hide)

AND
cpe:2.3:o:f5:big-ip_i7600_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*

Configuration 21 (hide)

AND
cpe:2.3:o:f5:big-ip_i7800_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*

Configuration 22 (hide)

AND
cpe:2.3:o:f5:r10600_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:r10600:-:*:*:*:*:*:*:*

Configuration 23 (hide)

AND
cpe:2.3:o:f5:r10800_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:r10800:-:*:*:*:*:*:*:*

Configuration 24 (hide)

AND
cpe:2.3:o:f5:r10900_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:r10900:-:*:*:*:*:*:*:*

Configuration 25 (hide)

AND
cpe:2.3:o:f5:r5600_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:r5600:-:*:*:*:*:*:*:*

Configuration 26 (hide)

AND
cpe:2.3:o:f5:r5800_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:r5800:-:*:*:*:*:*:*:*

Configuration 27 (hide)

AND
cpe:2.3:o:f5:r5900_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:r5900:-:*:*:*:*:*:*:*

Configuration 28 (hide)

AND
cpe:2.3:o:f5:velos_bx110_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:velos_bx110:-:*:*:*:*:*:*:*

Configuration 29 (hide)

AND
cpe:2.3:o:f5:viprion_b2100_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:viprion_b2100:-:*:*:*:*:*:*:*

Configuration 30 (hide)

AND
cpe:2.3:o:f5:viprion_b2150_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:viprion_b2150:-:*:*:*:*:*:*:*

Configuration 31 (hide)

AND
cpe:2.3:o:f5:viprion_b2250_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:viprion_b2250:-:*:*:*:*:*:*:*

Configuration 32 (hide)

AND
cpe:2.3:o:f5:viprion_b4300_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:viprion_b4300:-:*:*:*:*:*:*:*

Configuration 33 (hide)

AND
cpe:2.3:o:f5:viprion_b4450_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:viprion_b4450:-:*:*:*:*:*:*:*

History

07 Nov 2023, 04:07

Type Values Removed Values Added
Summary On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Information

Published : 2023-02-01 18:15

Updated : 2024-02-28 19:51


NVD link : CVE-2023-22839

Mitre link : CVE-2023-22839

CVE.ORG link : CVE-2023-22839


JSON object : View

Products Affected

f5

  • velos_bx110_firmware
  • big-ip_domain_name_system
  • r10800
  • big-ip_5000s_firmware
  • big-ip_5200v-ssl
  • r5900
  • big-ip_10200v-ssl
  • big-ip_7200v
  • r5800_firmware
  • big-ip_12000
  • viprion_b2100_firmware
  • big-ip_5200v_firmware
  • big-ip_7000s
  • big-ip_7200v_firmware
  • big-ip_i11600_firmware
  • big-ip_5000s
  • big-ip_i5800
  • big-ip_i15800_firmware
  • r5900_firmware
  • big-ip_7200v-ssl
  • viprion_b4450_firmware
  • big-ip_i10800
  • big-ip_i5800_firmware
  • big-ip_7000s_firmware
  • r10800_firmware
  • viprion_b2250
  • big-ip_i7600_firmware
  • viprion_b4300_firmware
  • big-ip_10200v_firmware
  • big-ip_i15800
  • big-ip_i5600
  • big-ip_10000s_firmware
  • big-ip_i11800
  • r10900_firmware
  • big-ip_7200v-ssl_firmware
  • big-ip_10200v
  • big-ip_i10800_firmware
  • r10600_firmware
  • big-ip_5200v-ssl_firmware
  • big-ip_i10600
  • big-ip_5200v
  • r5800
  • viprion_b2150
  • viprion_b2250_firmware
  • big-ip_i15600_firmware
  • big-ip_10200v-ssl_firmware
  • big-ip_i15600
  • viprion_b2100
  • viprion_b4450
  • big-ip_10000s
  • r5600
  • big-ip_i7800
  • big-ip_i11800_firmware
  • big-ip_i10600_firmware
  • r10600
  • r10900
  • big-ip_i7600
  • viprion_b2150_firmware
  • r5600_firmware
  • big-ip_12000_firmware
  • big-ip_i11600
  • big-ip_i7800_firmware
  • big-ip_local_traffic_manager
  • big-ip_i5600_firmware
  • velos_bx110
  • viprion_b4300
CWE
CWE-476

NULL Pointer Dereference