CVE-2021-23039

7.5 HIGH

📋 TL;DR

This vulnerability allows an authorized remote IPSec peer to send specially crafted requests that cause the Traffic Management Microkernel (TMM) to terminate on affected BIG-IP systems. This results in denial of service for traffic processed by TMM. Organizations running BIG-IP with IPSec configured are affected.

💻 Affected Systems

Products:
  • F5 BIG-IP
Versions: 16.0.x before 16.0.1.2, 15.1.x before 15.1.3, 14.1.x before 14.1.2.8, all versions of 13.1.x and 12.1.x
Operating Systems: F5 TMOS
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when IPSec is configured and the system has negotiated Security Associations with remote peers. Versions 13.1.x and 12.1.x have reached End of Technical Support.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete denial of service for all traffic processed by TMM, potentially affecting multiple services and applications relying on BIG-IP functionality.

🟠

Likely Case

Service disruption for traffic flows handled by the affected TMM instance, requiring system restart to restore functionality.

🟢

If Mitigated

Limited impact if IPSec is not configured or if traffic from unauthorized peers is blocked.

🌐 Internet-Facing: MEDIUM - Requires IPSec configuration and authorized peer access, but internet-facing systems with IPSec are vulnerable.
🏢 Internal Only: MEDIUM - Internal systems with IPSec configured remain vulnerable to authorized internal peers.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authorized IPSec peer access and established Security Association. The specific request format is undisclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 16.0.1.2, 15.1.3, 14.1.2.8

Vendor Advisory: https://support.f5.com/csp/article/K66782293

Restart Required: Yes

Instructions:

1. Download appropriate patch from F5 Downloads. 2. Backup configuration. 3. Apply patch following F5 upgrade procedures. 4. Restart TMM services. 5. Verify functionality.

🔧 Temporary Workarounds

Disable IPSec

all

Remove or disable IPSec configuration if not required

# Remove IPSec configuration
# tmsh delete net ipsec <configuration-name>

Restrict IPSec Peers

all

Limit IPSec peer connections to trusted sources only

# Configure firewall rules to restrict IPSec peer access
# Example: tmsh create security firewall rule-list <name> rules add { <rule> }

🧯 If You Can't Patch

  • Disable IPSec configuration entirely if not required for operations
  • Implement network segmentation to restrict access to IPSec endpoints

🔍 How to Verify

Check if Vulnerable:

Check BIG-IP version with 'tmsh show sys version' and verify if IPSec is configured with 'tmsh list net ipsec'

Check Version:

tmsh show sys version

Verify Fix Applied:

Verify version is patched with 'tmsh show sys version' and confirm no TMM crashes occur during IPSec operations

📡 Detection & Monitoring

Log Indicators:

  • TMM termination/crash logs in /var/log/ltm
  • IPSec connection anomalies in /var/log/ipsec.log

Network Indicators:

  • Unexpected IPSec connection resets
  • Service disruption on BIG-IP managed applications

SIEM Query:

source="*/var/log/ltm*" AND "TMM terminated" OR source="*/var/log/ipsec*" AND "error"

🔗 References

📤 Share & Export