Description
On BIG-IP APM version 16.0.x before 16.0.1.1, under certain conditions, when processing VPN traffic with APM, TMM consumes excessive memory. A malicious, authenticated VPN user may abuse this to perform a DoS attack against the APM. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-10103 | On BIG-IP APM version 16.0.x before 16.0.1.1, under certain conditions, when processing VPN traffic with APM, TMM consumes excessive memory. A malicious, authenticated VPN user may abuse this to perform a DoS attack against the APM. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated. |
References
| Link | Providers |
|---|---|
| https://support.f5.com/csp/article/K88162221 |
|
History
No history.
Status: PUBLISHED
Assigner: f5
Published:
Updated: 2024-08-03T18:58:26.303Z
Reserved: 2021-01-06T00:00:00.000Z
Link: CVE-2021-22985
No data.
Status : Modified
Published: 2021-02-12T18:15:12.970
Modified: 2024-11-21T05:51:04.207
Link: CVE-2021-22985
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD