
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2021-23048 affects F5 BIG-IP systems and was disclosed on September 14, 2021. The vulnerability impacts multiple versions of BIG-IP including 16.0.x before 16.0.1.2, 15.1.x before 15.1.3.1, 14.1.x before 14.1.4.3, 13.1.x before 13.1.4.1, and all versions of 12.1.x and 11.6.x. The vulnerability is related to GPRS Tunneling Protocol (GTP) functionality (CERT-FR).
The vulnerability occurs when GPRS Tunneling Protocol (GTP) iRules commands or a GTP profile is configured on a virtual server. Under these conditions, undisclosed GTP messages can cause the Traffic Management Microkernel (TMM) to terminate (CERT-FR).
When successfully exploited, this vulnerability can lead to a denial of service condition through the termination of the Traffic Management Microkernel (TMM), which is a critical component of the BIG-IP system (CERT-FR).
F5 has released patched versions to address this vulnerability. Users should upgrade to version 16.0.1.2, 15.1.3.1, 14.1.4.3, or 13.1.4.1 depending on their current version track. Note that software versions which have reached End of Technical Support (EoTS) are not evaluated (CERT-FR).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."