CVE-2021-23044

7.5 HIGH

📋 TL;DR

This vulnerability affects F5 BIG-IP devices using Intel QAT compression, where specific network traffic can cause the Traffic Management Microkernel (TMM) to crash, leading to denial of service. Affected systems include BIG-IP hardware and Virtual Edition platforms running vulnerable versions. The vulnerability impacts availability but does not allow code execution or data theft.

💻 Affected Systems

Products:
  • F5 BIG-IP hardware platforms
  • F5 BIG-IP Virtual Edition (VE)
Versions: 16.x before 16.1.0, 15.1.x before 15.1.3.1, 14.1.x before 14.1.4.2, 13.1.x before 13.1.4.1, all versions of 12.1.x and 11.6.x
Operating Systems: F5 TMOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using Intel QuickAssist Technology (QAT) compression driver. Software versions that have reached End of Technical Support (EoTS) are not evaluated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption as TMM terminates, causing all traffic management functions to fail until system restart.

🟠

Likely Case

Intermittent service outages when specific traffic patterns trigger the vulnerability, requiring manual intervention to restore services.

🟢

If Mitigated

Minimal impact if QAT compression is disabled or systems are patched, with potential performance degradation if compression is disabled.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specific network traffic to vulnerable systems. No authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 16.1.0, 15.1.3.1, 14.1.4.2, 13.1.4.1

Vendor Advisory: https://support.f5.com/csp/article/K35408374

Restart Required: Yes

Instructions:

1. Download appropriate patch from F5 Downloads. 2. Backup configuration. 3. Apply patch following F5 upgrade procedures. 4. Restart system to activate patch.

🔧 Temporary Workarounds

Disable QAT Compression

all

Disable Intel QuickAssist Technology compression to prevent exploitation

tmsh modify sys db qat.compression.allow value disable

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to BIG-IP management interfaces
  • Deploy intrusion prevention systems (IPS) to detect and block exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check BIG-IP version and QAT compression status: tmsh show sys version and tmsh list sys db qat.compression.allow

Check Version:

tmsh show sys version

Verify Fix Applied:

Verify version is patched: tmsh show sys version and confirm QAT compression is disabled or system is on fixed version

📡 Detection & Monitoring

Log Indicators:

  • TMM process termination logs
  • System crash dumps
  • High availability failover events

Network Indicators:

  • Unusual traffic patterns to BIG-IP devices
  • Sudden service interruptions

SIEM Query:

source="bigip" AND ("TMM terminated" OR "panic" OR "crash")

🔗 References

📤 Share & Export