CVE-2021-23033

7.5 HIGH

📋 TL;DR

This vulnerability in F5 BIG-IP Advanced WAF and ASM allows attackers to cause denial of service by sending specific requests to systems with WebSocket profiles configured. The bd process terminates, disrupting traffic processing. Affected are BIG-IP Advanced WAF and ASM versions 12.1.x through 16.x before patched versions.

💻 Affected Systems

Products:
  • F5 BIG-IP Advanced WAF
  • F5 BIG-IP ASM
Versions: 16.x before 16.1.0, 15.1.x before 15.1.3.1, 14.1.x before 14.1.4.3, 13.1.x before 13.1.4.1, all 12.1.x versions
Operating Systems: F5 TMOS
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when WebSocket profile is configured on a virtual server. Versions that have reached End of Technical Support (EoTS) are not evaluated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service outage for affected virtual servers, causing extended downtime until manual intervention restarts services.

🟠

Likely Case

Intermittent service disruptions affecting WebSocket traffic, requiring process restarts and causing availability issues.

🟢

If Mitigated

Minimal impact with proper monitoring and automated recovery mechanisms in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Undisclosed request types can trigger the vulnerability. No public exploit details available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 16.1.0, 15.1.3.1, 14.1.4.3, 13.1.4.1

Vendor Advisory: https://support.f5.com/csp/article/K05314769

Restart Required: Yes

Instructions:

1. Download appropriate patch version from F5 Downloads. 2. Upload to BIG-IP system. 3. Install using tmsh commands: 'tmsh install sys software image <filename>'. 4. Reboot system after installation completes.

🔧 Temporary Workarounds

Disable WebSocket Profiles

all

Remove WebSocket profiles from vulnerable virtual servers to eliminate attack vector

tmsh modify ltm virtual <virtual_server_name> profiles delete { <websocket_profile_name> }

Restrict Access

all

Implement network ACLs to limit access to WebSocket-enabled virtual servers

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable systems
  • Deploy additional monitoring and alerting for bd process crashes

🔍 How to Verify

Check if Vulnerable:

Check if WebSocket profile is configured on any virtual server and verify BIG-IP version is in affected range

Check Version:

tmsh show sys version

Verify Fix Applied:

Verify installed version is patched and test WebSocket functionality

📡 Detection & Monitoring

Log Indicators:

  • bd process termination logs in /var/log/ltm
  • WebSocket connection errors
  • Increased process restart events

Network Indicators:

  • Unusual WebSocket traffic patterns
  • Sudden service interruptions on WebSocket ports

SIEM Query:

source="*/var/log/ltm*" AND "bd terminated" OR "process crash"

🔗 References

📤 Share & Export