CVE-2021-22985

7.5 HIGH

📋 TL;DR

This vulnerability allows authenticated VPN users on BIG-IP APM to cause excessive memory consumption in the Traffic Management Microkernel (TMM), potentially leading to a denial-of-service condition. It affects BIG-IP APM version 16.0.x before 16.0.1.1. Systems with VPN configurations using APM are vulnerable when processing VPN traffic under certain conditions.

💻 Affected Systems

Products:
  • F5 BIG-IP APM
Versions: 16.0.x before 16.0.1.1
Operating Systems: F5 TMOS
Default Config Vulnerable: ✅ No
Notes: Only affects systems with APM configured for VPN traffic processing. Systems without VPN configurations or with APM disabled are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete denial of service for APM services, disrupting VPN connectivity and potentially affecting other BIG-IP services due to memory exhaustion.

🟠

Likely Case

Degraded APM performance and intermittent VPN connectivity issues due to memory pressure on the TMM process.

🟢

If Mitigated

Minimal impact with proper access controls and monitoring in place to detect and block malicious VPN sessions.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated VPN access and specific conditions when processing VPN traffic. The vulnerability is triggered under certain memory handling conditions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 16.0.1.1 or later

Vendor Advisory: https://support.f5.com/csp/article/K88162221

Restart Required: Yes

Instructions:

1. Download the appropriate hotfix from F5 Downloads. 2. Upload the hotfix to the BIG-IP system. 3. Install the hotfix using the WebUI or CLI. 4. Reboot the system to complete the installation.

🔧 Temporary Workarounds

Restrict VPN Access

all

Limit VPN access to trusted users only and implement strict authentication controls.

Monitor TMM Memory Usage

linux

Implement monitoring for TMM process memory consumption and alert on abnormal patterns.

tmsh show sys proc-info tmm.0 | grep -i memory

🧯 If You Can't Patch

  • Implement strict VPN user access controls and monitoring
  • Consider disabling VPN functionality if not essential

🔍 How to Verify

Check if Vulnerable:

Check BIG-IP version with 'tmsh show sys version' and verify if running 16.0.x before 16.0.1.1 with APM enabled.

Check Version:

tmsh show sys version

Verify Fix Applied:

Verify version is 16.0.1.1 or later with 'tmsh show sys version' and check APM configuration status.

📡 Detection & Monitoring

Log Indicators:

  • High TMM memory usage in /var/log/ltm
  • APM VPN session anomalies in /var/log/apm

Network Indicators:

  • Unusual VPN traffic patterns
  • Increased connection timeouts for VPN users

SIEM Query:

source="bigip" ("TMM" AND "memory") OR ("APM" AND "VPN" AND "error")

🔗 References

📤 Share & Export