7.5
CVSSv3

CVE-2023-22839

Published: 01/02/2023 Updated: 07/11/2023
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

On BIG-IP versions 17.0.x prior to 17.0.0.2, 16.1.x prior to 16.1.3.3, 15.1.x prior to 15.1.8.1, 14.1.x prior to 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

f5 big-ip local traffic manager

f5 big-ip domain name system

f5 big-ip_10000s_firmware -

f5 big-ip_10200v_firmware -

f5 big-ip_10200v-ssl_firmware -

f5 big-ip_12000_firmware -

f5 big-ip_5000s_firmware -

f5 big-ip_5200v_firmware -

f5 big-ip_5200v-ssl_firmware -

f5 big-ip_7000s_firmware -

f5 big-ip_7200v_firmware -

f5 big-ip_7200v-ssl_firmware -

f5 big-ip_i10600_firmware -

f5 big-ip_i10800_firmware -

f5 big-ip_i11600_firmware -

f5 big-ip_i11800_firmware -

f5 big-ip_i15600_firmware -

f5 big-ip_i15800_firmware -

f5 big-ip_i5600_firmware -

f5 big-ip_i5800_firmware -

f5 big-ip_i7600_firmware -

f5 big-ip_i7800_firmware -

f5 r10600_firmware -

f5 r10800_firmware -

f5 r10900_firmware -

f5 r5600_firmware -

f5 r5800_firmware -

f5 r5900_firmware -

f5 velos_bx110_firmware -

f5 viprion_b2100_firmware -

f5 viprion_b2150_firmware -

f5 viprion_b2250_firmware -

f5 viprion_b4300_firmware -

f5 viprion_b4450_firmware -