383
VMScore

CVE-2021-23000

Published: 31/03/2021 Updated: 05/04/2021
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

On BIG-IP versions 13.1.3.4-13.1.3.6 and 12.1.5.2, if the tmm.http.rfc.enforcement BigDB key is enabled in a BIG-IP system, or the Bad host header value is checked in the AFM HTTP security profile associated with a virtual server, in rare instances, a specific sequence of malicious requests may cause TMM to restart. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

f5 big-ip access policy manager 12.1.5.2

f5 big-ip access policy manager

f5 big-ip advanced firewall manager 12.1.5.2

f5 big-ip advanced firewall manager

f5 big-ip advanced web application firewall 12.1.5.2

f5 big-ip advanced web application firewall

f5 big-ip analytics 12.1.5.2

f5 big-ip analytics

f5 big-ip application acceleration manager 12.1.5.2

f5 big-ip application acceleration manager

f5 big-ip application security manager 12.1.5.2

f5 big-ip application security manager

f5 big-ip ddos hybrid defender 12.1.5.2

f5 big-ip ddos hybrid defender

f5 big-ip domain name system 12.1.5.2

f5 big-ip domain name system

f5 big-ip fraud protection service 12.1.5.2

f5 big-ip fraud protection service

f5 big-ip global traffic manager 12.1.5.2

f5 big-ip global traffic manager

f5 big-ip link controller 12.1.5.2

f5 big-ip link controller

f5 big-ip local traffic manager 12.1.5.2

f5 big-ip local traffic manager

f5 big-ip policy enforcement manager 12.1.5.2

f5 big-ip policy enforcement manager

f5 ssl orchestrator 12.1.5.2

f5 ssl orchestrator