cve/2021/CVE-2021-23000.md

18 lines
867 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2021-23000](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23000)
![](https://img.shields.io/static/v1?label=Product&message=BIG-IP&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=DoS&color=brighgreen)
### Description
On BIG-IP versions 13.1.3.4-13.1.3.6 and 12.1.5.2, if the tmm.http.rfc.enforcement BigDB key is enabled in a BIG-IP system, or the Bad host header value is checked in the AFM HTTP security profile associated with a virtual server, in rare instances, a specific sequence of malicious requests may cause TMM to restart. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/DNTYO/F5_Vulnerability