On BIG-IP APM version 16.0.x before 16.0.1.1, under certain conditions, when processing VPN traffic with APM, TMM consumes excessive memory. A malicious, authenticated VPN user may abuse this to perform a DoS attack against the APM. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://support.f5.com/csp/article/K88162221 |
History
No history.
MITRE
Status: PUBLISHED
Assigner: f5
Published: 2021-02-12T17:48:22
Updated: 2024-08-03T18:58:26.303Z
Reserved: 2021-01-06T00:00:00
Link: CVE-2021-22985
Vulnrichment
No data.
NVD
Status : Modified
Published: 2021-02-12T18:15:12.970
Modified: 2024-11-21T05:51:04.207
Link: CVE-2021-22985
Redhat
No data.