CVE-2021-23035

7.5 HIGH

📋 TL;DR

This vulnerability in F5 BIG-IP systems allows remote attackers to cause denial of service by sending specially crafted chunked HTTP responses. When exploited, it causes the Traffic Management Microkernel (TMM) to terminate, disrupting traffic management services. Affected systems are BIG-IP versions 14.1.x before 14.1.4.4 with HTTP profiles configured on virtual servers.

💻 Affected Systems

Products:
  • F5 BIG-IP
Versions: 14.1.x before 14.1.4.4
Operating Systems: F5 TMOS
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when HTTP profile is configured on a virtual server. Versions that have reached End of Technical Support (EoTS) are not evaluated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption with TMM termination, causing all traffic management functions to fail on affected virtual servers.

🟠

Likely Case

Intermittent service outages and performance degradation as TMM restarts after termination.

🟢

If Mitigated

Minimal impact with proper network segmentation and monitoring to detect and respond to TMM restarts.

🌐 Internet-Facing: HIGH - HTTP profiles on internet-facing virtual servers are directly exposed to attack.
🏢 Internal Only: MEDIUM - Internal systems with HTTP profiles are vulnerable but require internal network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires specific sequence of packets to trigger the vulnerability. No public exploit code has been identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 14.1.4.4 and later

Vendor Advisory: https://support.f5.com/csp/article/K70415522

Restart Required: Yes

Instructions:

1. Download the appropriate hotfix from F5 Downloads. 2. Upload the hotfix to the BIG-IP system. 3. Install the hotfix using the WebUI or CLI. 4. Reboot the system to complete installation.

🔧 Temporary Workarounds

Disable HTTP Profile

all

Remove HTTP profile configuration from vulnerable virtual servers

tmsh modify ltm virtual <virtual_server_name> profiles delete { http }

Implement Rate Limiting

all

Configure rate limiting on virtual servers to reduce attack surface

tmsh create ltm profile rate-shaping <profile_name>

🧯 If You Can't Patch

  • Implement network segmentation to isolate vulnerable systems
  • Deploy WAF or IPS to detect and block malicious chunked responses

🔍 How to Verify

Check if Vulnerable:

Check BIG-IP version and verify if HTTP profile is configured on any virtual server: tmsh list ltm virtual one-line | grep http

Check Version:

tmsh show sys version

Verify Fix Applied:

Verify system is running version 14.1.4.4 or later: tmsh show sys version

📡 Detection & Monitoring

Log Indicators:

  • TMM termination events in /var/log/ltm
  • Unexpected TMM restarts in system logs

Network Indicators:

  • Unusual chunked HTTP response patterns
  • Sudden drops in traffic to specific virtual servers

SIEM Query:

source="*/var/log/ltm*" AND "TMM terminated" OR "TMM restart"

🔗 References

📤 Share & Export