CVE-2023-23555
📋 TL;DR
This vulnerability affects F5 BIG-IP Virtual Edition and SPK systems with specific FastL4 profile configurations. Undisclosed network traffic can cause the Traffic Management Microkernel (TMM) to terminate, leading to denial of service. Systems running affected versions with FastL4 profiles on virtual servers are vulnerable.
💻 Affected Systems
- F5 BIG-IP Virtual Edition
- F5 BIG-IP SPK
📦 What is this software?
Big Ip Application Acceleration Manager by F5
View all CVEs affecting Big Ip Application Acceleration Manager →
Big Ip Application Acceleration Manager by F5
View all CVEs affecting Big Ip Application Acceleration Manager →
Big Ip Application Security Manager by F5
View all CVEs affecting Big Ip Application Security Manager →
⚠️ Risk & Real-World Impact
Worst Case
Complete service disruption as TMM termination causes all traffic processing to stop, potentially affecting multiple virtual servers and applications.
Likely Case
Intermittent service outages and instability as TMM restarts after crashes, causing packet loss and connection drops.
If Mitigated
Minimal impact if systems are patched or FastL4 profiles are not used on internet-facing virtual servers.
🎯 Exploit Status
Exploitation requires sending specific network traffic to vulnerable configurations. No authentication needed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: BIG-IP VE: 15.1.8+, 14.1.5.3+; BIG-IP SPK: 1.6.0+
Vendor Advisory: https://my.f5.com/manage/s/article/K24572686
Restart Required: Yes
Instructions:
1. Download appropriate patch from F5 Downloads. 2. Upload to BIG-IP system. 3. Install using WebUI or CLI. 4. Reboot system to complete installation.
🔧 Temporary Workarounds
Remove FastL4 Profile
allReplace FastL4 profiles with other profile types on vulnerable virtual servers
tmsh modify ltm virtual <virtual_server_name> profiles replace-all-with { <alternative_profile> }
Restrict Network Access
allLimit traffic to vulnerable virtual servers using firewall rules or network segmentation
🧯 If You Can't Patch
- Remove FastL4 profiles from all virtual servers and replace with alternative profiles
- Implement strict network access controls to limit traffic to vulnerable systems
🔍 How to Verify
Check if Vulnerable:
Check if running affected versions and if any virtual servers have FastL4 profiles configured: tmsh list ltm virtual one-line | grep -i fastl4
Check Version:
tmsh show sys version
Verify Fix Applied:
Verify version is patched: tmsh show sys version | grep -i version; Confirm no FastL4 profiles remain: tmsh list ltm virtual one-line | grep -i fastl4
📡 Detection & Monitoring
Log Indicators:
- TMM termination/crash logs in /var/log/ltm
- High restart frequency of TMM process
- System log entries indicating TMM failures
Network Indicators:
- Unexpected traffic patterns to FastL4 virtual servers
- Increased TCP resets or connection failures
SIEM Query:
source="*/var/log/ltm*" AND ("TMM" AND (terminated OR crashed OR restart))