5
CVSSv2

CVE-2021-23007

Published: 31/03/2021 Updated: 06/04/2021
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 5.3 | Impact Score: 1.4 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

On BIG-IP versions 14.1.4 and 16.0.1.1, when the Traffic Management Microkernel (TMM) process handles certain undisclosed traffic, it may start dropping all fragmented IP traffic. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

f5 big-ip access policy manager 14.1.4

f5 big-ip access policy manager 16.0.1.1

f5 big-ip advanced firewall manager 14.1.4

f5 big-ip advanced firewall manager 16.0.1.1

f5 big-ip advanced web application firewall 14.1.4

f5 big-ip advanced web application firewall 16.0.1.1

f5 big-ip analytics 14.1.4

f5 big-ip analytics 16.0.1.1

f5 big-ip application acceleration manager 14.1.4

f5 big-ip application acceleration manager 16.0.1.1

f5 big-ip application security manager 14.1.4

f5 big-ip application security manager 16.0.1.1

f5 big-ip ddos hybrid defender 14.1.4

f5 big-ip ddos hybrid defender 16.0.1.1

f5 big-ip domain name system 14.1.4

f5 big-ip domain name system 16.0.1.1

f5 big-ip edge gateway 14.1.4

f5 big-ip edge gateway 16.0.1.1

f5 big-ip fraud protection service 14.1.4

f5 big-ip fraud protection service 16.0.1.1

f5 big-ip global traffic manager 14.1.4

f5 big-ip global traffic manager 16.0.1.1

f5 big-ip link controller 14.1.4

f5 big-ip link controller 16.0.1.1

f5 big-ip local traffic manager 14.1.4

f5 big-ip local traffic manager 16.0.1.1

f5 big-ip policy enforcement manager 14.1.4

f5 big-ip policy enforcement manager 16.0.1.1

f5 big-ip ssl orchestrator 14.1.4

f5 big-ip ssl orchestrator 16.0.1.1

f5 big-ip webaccelerator 14.1.4

f5 big-ip webaccelerator 16.0.1.1