CVE-2023-40534
📋 TL;DR
This vulnerability allows attackers to cause denial of service by sending specially crafted HTTP/2 requests to F5 BIG-IP systems with specific configurations. It affects F5 BIG-IP systems running vulnerable software versions with HTTP/2 profiles and HTTP MRF Router enabled on virtual servers that also have iRules or Local Traffic Policies using HTTP_REQUEST events.
💻 Affected Systems
- F5 BIG-IP
📦 What is this software?
Big Ip Advanced Web Application Firewall by F5
View all CVEs affecting Big Ip Advanced Web Application Firewall →
Big Ip Advanced Web Application Firewall by F5
View all CVEs affecting Big Ip Advanced Web Application Firewall →
Big Ip Application Acceleration Manager by F5
View all CVEs affecting Big Ip Application Acceleration Manager →
Big Ip Application Acceleration Manager by F5
View all CVEs affecting Big Ip Application Acceleration Manager →
Big Ip Application Security Manager by F5
View all CVEs affecting Big Ip Application Security Manager →
Big Ip Application Security Manager by F5
View all CVEs affecting Big Ip Application Security Manager →
Big Ip Application Visibility And Reporting by F5
View all CVEs affecting Big Ip Application Visibility And Reporting →
Big Ip Application Visibility And Reporting by F5
View all CVEs affecting Big Ip Application Visibility And Reporting →
⚠️ Risk & Real-World Impact
Worst Case
Complete denial of service for affected virtual servers, causing TMM (Traffic Management Microkernel) to terminate and potentially disrupting all traffic through the affected BIG-IP system.
Likely Case
Intermittent service disruption affecting specific virtual servers, requiring manual intervention to restart services.
If Mitigated
No impact if vulnerable configurations are not in use or proper patches/workarounds are applied.
🎯 Exploit Status
Attack requires sending specific HTTP/2 requests but no authentication needed. No public exploit code available at time of analysis.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Fixed in 17.1.0.4, 16.1.4.4, 15.1.10.3, 14.1.5.7, and 13.1.5.5
Vendor Advisory: https://my.f5.com/manage/s/article/K000133467
Restart Required: Yes
Instructions:
1. Download appropriate fixed version from F5 Downloads. 2. Backup current configuration. 3. Install update via F5 management interface. 4. Reboot system as required. 5. Verify version after reboot.
🔧 Temporary Workarounds
Disable HTTP/2 profile
allRemove HTTP/2 profile from virtual servers to prevent exploitation
tmsh modify ltm virtual <virtual_server_name> profiles delete { http2 }
Disable HTTP MRF Router
allTurn off HTTP MRF Router option on affected virtual servers
tmsh modify ltm virtual <virtual_server_name> http-mrf-router disabled
🧯 If You Can't Patch
- Apply workarounds to disable vulnerable configurations
- Implement network controls to restrict HTTP/2 traffic to trusted sources only
🔍 How to Verify
Check if Vulnerable:
Check if virtual servers have HTTP/2 profiles, HTTP MRF Router enabled, and iRules/Local Traffic Policies with HTTP_REQUEST events using: tmsh list ltm virtual <name>
Check Version:
tmsh show sys version
Verify Fix Applied:
Verify BIG-IP version is patched: tmsh show sys version | grep Version
📡 Detection & Monitoring
Log Indicators:
- TMM process termination logs
- Unexpected virtual server restarts
- HTTP/2 connection errors
Network Indicators:
- Sudden drop in HTTP/2 traffic
- Increased TCP resets on affected ports
SIEM Query:
source="bigip.log" AND ("TMM terminated" OR "http2 error" OR "virtual server restart")