CVE-2023-40542
📋 TL;DR
This vulnerability in F5 BIG-IP systems allows attackers to cause memory exhaustion through specially crafted TCP requests when TCP Verified Accept is enabled. It affects BIG-IP systems with vulnerable configurations, potentially leading to denial of service. Only systems with specific TCP profile configurations are vulnerable.
💻 Affected Systems
- F5 BIG-IP
📦 What is this software?
Big Ip Advanced Web Application Firewall by F5
View all CVEs affecting Big Ip Advanced Web Application Firewall →
Big Ip Advanced Web Application Firewall by F5
View all CVEs affecting Big Ip Advanced Web Application Firewall →
Big Ip Advanced Web Application Firewall by F5
View all CVEs affecting Big Ip Advanced Web Application Firewall →
Big Ip Advanced Web Application Firewall by F5
View all CVEs affecting Big Ip Advanced Web Application Firewall →
Big Ip Application Acceleration Manager by F5
View all CVEs affecting Big Ip Application Acceleration Manager →
Big Ip Application Acceleration Manager by F5
View all CVEs affecting Big Ip Application Acceleration Manager →
Big Ip Application Acceleration Manager by F5
View all CVEs affecting Big Ip Application Acceleration Manager →
Big Ip Application Acceleration Manager by F5
View all CVEs affecting Big Ip Application Acceleration Manager →
Big Ip Application Security Manager by F5
View all CVEs affecting Big Ip Application Security Manager →
Big Ip Application Security Manager by F5
View all CVEs affecting Big Ip Application Security Manager →
Big Ip Application Security Manager by F5
View all CVEs affecting Big Ip Application Security Manager →
Big Ip Application Security Manager by F5
View all CVEs affecting Big Ip Application Security Manager →
Big Ip Application Visibility And Reporting by F5
View all CVEs affecting Big Ip Application Visibility And Reporting →
Big Ip Application Visibility And Reporting by F5
View all CVEs affecting Big Ip Application Visibility And Reporting →
Big Ip Application Visibility And Reporting by F5
View all CVEs affecting Big Ip Application Visibility And Reporting →
⚠️ Risk & Real-World Impact
Worst Case
Complete system memory exhaustion leading to denial of service, potentially affecting all services on the affected BIG-IP device.
Likely Case
Degraded performance and intermittent service disruptions due to increased memory utilization.
If Mitigated
Minimal impact if TCP Verified Accept is disabled or proper rate limiting is in place.
🎯 Exploit Status
Exploitation requires sending specific TCP requests to vulnerable configurations. No authentication needed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to F5 advisory K000134652 for specific fixed versions
Vendor Advisory: https://my.f5.com/manage/s/article/K000134652
Restart Required: Yes
Instructions:
1. Review F5 advisory K000134652 for applicable fixed versions. 2. Download and install the appropriate patch from F5 Downloads. 3. Restart affected BIG-IP services or system as required.
🔧 Temporary Workarounds
Disable TCP Verified Accept
allDisable TCP Verified Accept on TCP profiles configured on Virtual Servers
tmsh modify ltm profile tcp <profile_name> verified-accept disabled
tmsh save sys config
Apply Rate Limiting
allImplement rate limiting on affected Virtual Servers to limit attack impact
tmsh modify ltm virtual <virtual_name> rate-limit <limit_value>
🧯 If You Can't Patch
- Disable TCP Verified Accept on all TCP profiles used by Virtual Servers
- Implement network-level rate limiting and monitoring for abnormal TCP traffic patterns
🔍 How to Verify
Check if Vulnerable:
Check if TCP Verified Accept is enabled on any TCP profile: tmsh list ltm profile tcp verified-accept
Check Version:
tmsh show sys version
Verify Fix Applied:
Verify patch installation: tmsh show sys version | grep -i version, then confirm with F5 advisory
📡 Detection & Monitoring
Log Indicators:
- Unusual memory utilization spikes in system logs
- TCP connection anomalies in traffic logs
Network Indicators:
- Abnormal TCP SYN/ACK patterns
- Increased memory-related alerts from monitoring
SIEM Query:
source="bigip_logs" ("memory high" OR "tcp verified" OR "connection flood")