CVE-2021-23009
📋 TL;DR
This vulnerability in F5 BIG-IP allows attackers to cause a denial of service by sending malformed HTTP/2 requests that trigger an infinite loop in the Traffic Management Microkernel (TMM). Only BIG-IP versions 16.0.x before 16.0.1.1 and 15.1.x before 15.1.3 are affected, and the impact is limited to data plane traffic.
💻 Affected Systems
- F5 BIG-IP
📦 What is this software?
Big Ip Advanced Web Application Firewall by F5
View all CVEs affecting Big Ip Advanced Web Application Firewall →
Big Ip Advanced Web Application Firewall by F5
View all CVEs affecting Big Ip Advanced Web Application Firewall →
Big Ip Application Acceleration Manager by F5
View all CVEs affecting Big Ip Application Acceleration Manager →
Big Ip Application Acceleration Manager by F5
View all CVEs affecting Big Ip Application Acceleration Manager →
Big Ip Application Security Manager by F5
View all CVEs affecting Big Ip Application Security Manager →
⚠️ Risk & Real-World Impact
Worst Case
Complete denial of service for all data plane traffic, forcing TMM process abortion and triggering configured high-availability failover actions.
Likely Case
Service disruption for HTTP/2 traffic, potentially causing application downtime until TMM restarts or failover completes.
If Mitigated
Minimal impact if systems are patched or workarounds are implemented; temporary service interruption during failover events.
🎯 Exploit Status
Exploitation requires sending malformed HTTP/2 requests to vulnerable BIG-IP systems.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 16.0.1.1 or 15.1.3
Vendor Advisory: https://support.f5.com/csp/article/K90603426
Restart Required: Yes
Instructions:
1. Download appropriate patch from F5 Downloads. 2. Backup configuration. 3. Apply patch following F5 upgrade procedures. 4. Restart TMM services.
🔧 Temporary Workarounds
Disable HTTP/2
allDisable HTTP/2 protocol support to prevent exploitation via malformed HTTP/2 requests.
tmsh modify /ltm profile http http2 disabled
🧯 If You Can't Patch
- Implement network filtering to block malformed HTTP/2 requests using WAF or IPS.
- Monitor TMM process health and implement automated restart scripts for recovery.
🔍 How to Verify
Check if Vulnerable:
Check BIG-IP version with 'tmsh show sys version' and compare against affected versions.
Check Version:
tmsh show sys version
Verify Fix Applied:
Verify version is 16.0.1.1 or higher for 16.0.x, or 15.1.3 or higher for 15.1.x.
📡 Detection & Monitoring
Log Indicators:
- TMM process crashes or restarts in /var/log/ltm
- High CPU usage patterns from TMM processes
- HA failover events in system logs
Network Indicators:
- Unusual HTTP/2 traffic patterns
- Malformed HTTP/2 request attempts
SIEM Query:
source="*/var/log/ltm*" AND ("TMM" AND ("crash" OR "restart" OR "abort"))