Lucene search

K
cve[email protected]CVE-2023-29163
HistoryMay 03, 2023 - 3:15 p.m.

CVE-2023-29163

2023-05-0315:15:13
CWE-401
web.nvd.nist.gov
15
cve-2023-29163
udp
profile
idle timeout
tmm termination
nvd
vulnerability

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

34.1%

When UDP profile with idle timeout set to immediate or the value 0 is configured on a virtual server, undisclosed traffic can cause TMM to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Affected configurations

NVD
Node
f5big-ip_access_policy_managerRange14.1.014.1.5.4
OR
f5big-ip_access_policy_managerRange15.1.015.1.8.2
OR
f5big-ip_access_policy_managerRange16.1.016.1.3.4
OR
f5big-ip_access_policy_managerMatch17.0.0
OR
f5big-ip_advanced_firewall_managerRange14.1.014.1.5.4
OR
f5big-ip_advanced_firewall_managerRange15.1.015.1.8.2
OR
f5big-ip_advanced_firewall_managerRange16.1.016.1.3.4
OR
f5big-ip_advanced_firewall_managerMatch17.0.0
OR
f5big-ip_advanced_web_application_firewallRange14.1.014.1.5.4
OR
f5big-ip_advanced_web_application_firewallRange15.1.015.1.8.2
OR
f5big-ip_advanced_web_application_firewallRange16.1.016.1.3.4
OR
f5big-ip_advanced_web_application_firewallMatch17.0.0
OR
f5big-ip_analyticsRange14.1.014.1.5.4
OR
f5big-ip_analyticsRange15.1.015.1.8.2
OR
f5big-ip_analyticsRange16.1.016.1.3.4
OR
f5big-ip_analyticsMatch17.0.0
OR
f5big-ip_application_acceleration_managerRange14.1.014.1.5.4
OR
f5big-ip_application_acceleration_managerRange15.1.015.1.8.2
OR
f5big-ip_application_acceleration_managerRange16.1.016.1.3.4
OR
f5big-ip_application_acceleration_managerMatch17.0.0
OR
f5big-ip_application_security_managerRange14.1.014.1.5.4
OR
f5big-ip_application_security_managerRange15.1.015.1.8.2
OR
f5big-ip_application_security_managerRange16.1.016.1.3.4
OR
f5big-ip_application_security_managerMatch17.0.0
OR
f5big-ip_application_visibility_and_reportingRange14.1.014.1.5.4
OR
f5big-ip_application_visibility_and_reportingRange15.1.015.1.8.2
OR
f5big-ip_application_visibility_and_reportingRange16.1.016.1.3.4
OR
f5big-ip_application_visibility_and_reportingMatch17.0.0
OR
f5big-ip_carrier-grade_natRange14.1.014.1.5.4
OR
f5big-ip_carrier-grade_natRange15.1.015.1.8.2
OR
f5big-ip_carrier-grade_natRange16.1.016.1.3.4
OR
f5big-ip_carrier-grade_natMatch17.0.0
OR
f5big-ip_ddos_hybrid_defenderRange14.1.014.1.5.4
OR
f5big-ip_ddos_hybrid_defenderRange15.1.015.1.8.2
OR
f5big-ip_ddos_hybrid_defenderRange16.1.016.1.3.4
OR
f5big-ip_ddos_hybrid_defenderMatch17.0.0
OR
f5big-ip_domain_name_systemRange14.1.014.1.5.4
OR
f5big-ip_domain_name_systemRange15.1.015.1.8.2
OR
f5big-ip_domain_name_systemRange16.1.016.1.3.4
OR
f5big-ip_domain_name_systemMatch17.0.0
OR
f5big-ip_edge_gatewayRange14.1.014.1.5.4
OR
f5big-ip_edge_gatewayRange15.1.015.1.8.2
OR
f5big-ip_edge_gatewayRange16.1.016.1.3.4
OR
f5big-ip_edge_gatewayMatch17.0.0
OR
f5big-ip_fraud_protection_serviceRange14.1.014.1.5.4
OR
f5big-ip_fraud_protection_serviceRange15.1.015.1.8.2
OR
f5big-ip_fraud_protection_serviceRange16.1.016.1.3.4
OR
f5big-ip_fraud_protection_serviceMatch17.0.0
OR
f5big-ip_global_traffic_managerRange14.1.014.1.5.4
OR
f5big-ip_global_traffic_managerRange15.1.015.1.8.2
OR
f5big-ip_global_traffic_managerRange16.1.016.1.3.4
OR
f5big-ip_global_traffic_managerMatch17.0.0
OR
f5big-ip_link_controllerRange14.1.014.1.5.4
OR
f5big-ip_link_controllerRange15.1.015.1.8.2
OR
f5big-ip_link_controllerRange16.1.016.1.3.4
OR
f5big-ip_link_controllerMatch17.0.0
OR
f5big-ip_local_traffic_managerRange14.1.014.1.5.4
OR
f5big-ip_local_traffic_managerRange15.1.015.1.8.2
OR
f5big-ip_local_traffic_managerRange16.1.016.1.3.4
OR
f5big-ip_local_traffic_managerMatch17.0.0
OR
f5big-ip_policy_enforcement_managerRange14.1.014.1.5.4
OR
f5big-ip_policy_enforcement_managerRange15.1.015.1.8.2
OR
f5big-ip_policy_enforcement_managerRange16.1.016.1.3.4
OR
f5big-ip_policy_enforcement_managerMatch17.0.0
OR
f5big-ip_ssl_orchestratorRange14.1.014.1.5.4
OR
f5big-ip_ssl_orchestratorRange15.1.015.1.8.2
OR
f5big-ip_ssl_orchestratorRange16.1.016.1.3.4
OR
f5big-ip_ssl_orchestratorMatch17.0.0
OR
f5big-ip_webacceleratorRange14.1.014.1.5.4
OR
f5big-ip_webacceleratorRange15.1.015.1.8.2
OR
f5big-ip_webacceleratorRange16.1.016.1.3.4
OR
f5big-ip_webacceleratorMatch17.0.0
OR
f5big-ip_websafeRange14.1.014.1.5.4
OR
f5big-ip_websafeRange15.1.015.1.8.2
OR
f5big-ip_websafeRange16.1.016.1.3.4
OR
f5big-ip_websafeMatch17.0.0

CNA Affected

[
  {
    "defaultStatus": "unknown",
    "modules": [
      "All Modules"
    ],
    "product": "BIG-IP",
    "vendor": "F5",
    "versions": [
      {
        "lessThan": "*",
        "status": "unaffected",
        "version": "17.1.0",
        "versionType": "semver"
      },
      {
        "lessThan": "*",
        "status": "affected",
        "version": "17.0.0",
        "versionType": "semver"
      },
      {
        "lessThan": "16.1.3.4",
        "status": "affected",
        "version": "16.1.2.2",
        "versionType": "semver"
      },
      {
        "lessThan": "15.1.8.2",
        "status": "affected",
        "version": "15.1.5.1",
        "versionType": "semver"
      },
      {
        "lessThan": "14.1.5.4",
        "status": "affected",
        "version": "14.1.4.6",
        "versionType": "semver"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

34.1%

Related for CVE-2023-29163