Lucene search

K
f5F5F5:K44553214
HistoryAug 24, 2021 - 12:00 a.m.

K44553214 : Web application firewall vulnerability CVE-2021-23050

2021-08-2400:00:00
my.f5.com
13

7.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

26.0%

Security Advisory Description

When a cross-site request forgery (CSRF)-enabled policy is configured on a virtual server, an undisclosed HTML response may cause the bd process to terminate. (CVE-2021-23050)

Impact

Traffic is disrupted until the bd process restarts. This vulnerability allows a remote attacker to cause a denial-of-service (DoS) on the web application firewall. There is no control plane exposure; this is a data plane issue only. For more information about thebd process, refer to the following articles for your web application firewall product:

Important: The AWS Container Marketplace and the F5 Docker registry (docker-registry.nginx.com) provide NGINX container images that may also include vulnerable versions of NGINX App Protect. For example, if you are using theNGINX Ingress Controller with NGINX App Protect image from the AWS Container Marketplace, you may be using a vulnerable version of NGINX App Protect. To determine the version of your NGINX products, refer to K72015934: Display the NGINX software version.

7.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

26.0%