CVE-2022-23017

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to crash the Traffic Management Microkernel (TMM) on F5 BIG-IP systems by sending specially crafted DNS requests to virtual servers configured with Rapid Response Mode enabled. This causes denial of service, disrupting network traffic management. Affected users are those running vulnerable BIG-IP versions with DNS profiles using Rapid Response Mode.

💻 Affected Systems

Products:
  • F5 BIG-IP
Versions: 16.x before 16.1.0, 15.1.x before 15.1.4.1, 14.1.x before 14.1.4.5, all versions of 13.1.x
Operating Systems: F5 TMOS
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when DNS profile with Rapid Response Mode is enabled on a virtual server. Versions that have reached End of Technical Support (EoTS) are not evaluated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete denial of service for all traffic managed by the BIG-IP system, requiring manual intervention to restart TMM services and potentially causing extended network downtime.

🟠

Likely Case

Intermittent TMM crashes causing temporary service disruptions, degraded performance, and potential failover events in clustered configurations.

🟢

If Mitigated

Minimal impact if systems are patched or Rapid Response Mode is disabled; isolated DNS service issues without affecting other traffic management functions.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specific DNS requests to vulnerable configurations; no authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 16.1.0, 15.1.4.1, 14.1.4.5

Vendor Advisory: https://support.f5.com/csp/article/K28042514

Restart Required: Yes

Instructions:

1. Download appropriate patch from F5 Downloads site. 2. Backup configuration. 3. Apply patch following F5 upgrade procedures. 4. Restart TMM services. 5. Verify functionality.

🔧 Temporary Workarounds

Disable Rapid Response Mode

all

Remove or disable Rapid Response Mode setting in DNS profiles on vulnerable virtual servers

tmsh modify ltm virtual <virtual_server_name> profiles delete { dns }
tmsh modify ltm virtual <virtual_server_name> profiles add { <alternative_profile> }

🧯 If You Can't Patch

  • Disable Rapid Response Mode on all DNS profiles immediately
  • Implement network controls to restrict DNS traffic to trusted sources only

🔍 How to Verify

Check if Vulnerable:

Check BIG-IP version with 'tmsh show sys version' and verify if any virtual servers have DNS profiles with Rapid Response Mode enabled using 'tmsh list ltm virtual'

Check Version:

tmsh show sys version

Verify Fix Applied:

Confirm version is patched (16.1.0+, 15.1.4.1+, or 14.1.4.5+) and that no virtual servers have DNS profiles with Rapid Response Mode enabled

📡 Detection & Monitoring

Log Indicators:

  • TMM process crashes in /var/log/ltm
  • High frequency of DNS query errors
  • Unexpected service restarts in system logs

Network Indicators:

  • Sudden drop in DNS response rates
  • Increased TCP retransmissions
  • Unusual DNS query patterns to BIG-IP interfaces

SIEM Query:

source="*/var/log/ltm*" AND "TMM terminated" OR "segmentation fault" AND process="tmm"

🔗 References

📤 Share & Export