CVE-2022-23015
📋 TL;DR
This vulnerability in F5 BIG-IP systems causes memory exhaustion when specific SSL configurations are enabled. Attackers can trigger resource consumption leading to denial of service. Affected are BIG-IP systems running vulnerable versions with Client Certificate Authentication and Session Ticket enabled.
💻 Affected Systems
- F5 BIG-IP
📦 What is this software?
Big Ip Application Acceleration Manager by F5
View all CVEs affecting Big Ip Application Acceleration Manager →
Big Ip Application Acceleration Manager by F5
View all CVEs affecting Big Ip Application Acceleration Manager →
Big Ip Application Acceleration Manager by F5
View all CVEs affecting Big Ip Application Acceleration Manager →
Big Ip Application Security Manager by F5
View all CVEs affecting Big Ip Application Security Manager →
Big Ip Application Security Manager by F5
View all CVEs affecting Big Ip Application Security Manager →
⚠️ Risk & Real-World Impact
Worst Case
Complete system unavailability due to memory exhaustion causing denial of service for all services on the affected BIG-IP device.
Likely Case
Degraded performance and intermittent service disruptions as memory resources become constrained.
If Mitigated
Minimal impact with proper monitoring and resource limits in place, though some performance degradation may still occur during attack.
🎯 Exploit Status
Exploitation requires sending SSL traffic to vulnerable configuration, which is straightforward for attackers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 16.1.0, 15.1.4.1, or later versions
Vendor Advisory: https://support.f5.com/csp/article/K08476614
Restart Required: Yes
Instructions:
1. Download appropriate patch from F5 Downloads. 2. Backup configuration. 3. Apply patch following F5 upgrade procedures. 4. Reboot system. 5. Verify version and configuration.
🔧 Temporary Workarounds
Disable Session Tickets
allRemove Session Ticket configuration from Client SSL profiles to mitigate vulnerability.
tmsh modify ltm profile client-ssl <profile_name> session-ticket disabled
Disable Client Certificate Authentication
allChange Client Certificate Authentication setting to 'ignore' instead of 'request' or 'require'.
tmsh modify ltm profile client-ssl <profile_name> authenticate once
🧯 If You Can't Patch
- Implement rate limiting on SSL connections to reduce impact
- Monitor memory usage and set up alerts for abnormal consumption patterns
🔍 How to Verify
Check if Vulnerable:
Check BIG-IP version with 'tmsh show sys version' and verify if Client SSL profiles have vulnerable configuration using 'tmsh list ltm profile client-ssl'.
Check Version:
tmsh show sys version | grep Version
Verify Fix Applied:
Confirm version is patched (16.1.0+, 15.1.4.1+, or outside vulnerable range) and monitor memory usage during SSL traffic.
📡 Detection & Monitoring
Log Indicators:
- High memory usage alerts in /var/log/ltm
- SSL session establishment failures
- System performance degradation logs
Network Indicators:
- Abnormal increase in SSL/TLS handshake attempts
- Sustained high-volume SSL traffic to vulnerable virtual servers
SIEM Query:
source="bigip_logs" ("memory high" OR "out of memory") AND "ssl" AND "session"