Metrics
No CVSS v4.0
Attack Vector Network
Attack Complexity Low
Privileges Required None
Scope Unchanged
Confidentiality Impact None
Integrity Impact None
Availability Impact High
User Interaction None
No CVSS v3.0
No CVSS v2
This CVE is not in the KEV list.
The EPSS score is 0.00483.
Exploitation none
Automatable yes
Technical Impact partial
Affected Vendors & Products
| Vendors | Products |
|---|---|
|
F5
Subscribe
|
Big-ip 10000s
Subscribe
Big-ip 10000s Firmware
Subscribe
Big-ip 10200v
Subscribe
Big-ip 10200v-ssl
Subscribe
Big-ip 10200v-ssl Firmware
Subscribe
Big-ip 10200v Firmware
Subscribe
Big-ip 12000
Subscribe
Big-ip 12000 Firmware
Subscribe
Big-ip 5000s
Subscribe
Big-ip 5000s Firmware
Subscribe
Big-ip 5200v
Subscribe
Big-ip 5200v-ssl
Subscribe
Big-ip 5200v-ssl Firmware
Subscribe
Big-ip 5200v Firmware
Subscribe
Big-ip 7000s
Subscribe
Big-ip 7000s Firmware
Subscribe
Big-ip 7200v
Subscribe
Big-ip 7200v-ssl
Subscribe
Big-ip 7200v-ssl Firmware
Subscribe
Big-ip 7200v Firmware
Subscribe
Big-ip Domain Name System
Subscribe
Big-ip I10600
Subscribe
Big-ip I10600 Firmware
Subscribe
Big-ip I10800
Subscribe
Big-ip I10800 Firmware
Subscribe
Big-ip I11600
Subscribe
Big-ip I11600 Firmware
Subscribe
Big-ip I11800
Subscribe
Big-ip I11800 Firmware
Subscribe
Big-ip I15600
Subscribe
Big-ip I15600 Firmware
Subscribe
Big-ip I15800
Subscribe
Big-ip I15800 Firmware
Subscribe
Big-ip I5600
Subscribe
Big-ip I5600 Firmware
Subscribe
Big-ip I5800
Subscribe
Big-ip I5800 Firmware
Subscribe
Big-ip I7600
Subscribe
Big-ip I7600 Firmware
Subscribe
Big-ip I7800
Subscribe
Big-ip I7800 Firmware
Subscribe
Big-ip Local Traffic Manager
Subscribe
R10600
Subscribe
R10600 Firmware
Subscribe
R10800
Subscribe
R10800 Firmware
Subscribe
R10900
Subscribe
R10900 Firmware
Subscribe
R5600
Subscribe
R5600 Firmware
Subscribe
R5800
Subscribe
R5800 Firmware
Subscribe
R5900
Subscribe
R5900 Firmware
Subscribe
Velos Bx110
Subscribe
Velos Bx110 Firmware
Subscribe
Viprion B2100
Subscribe
Viprion B2100 Firmware
Subscribe
Viprion B2150
Subscribe
Viprion B2150 Firmware
Subscribe
Viprion B2250
Subscribe
Viprion B2250 Firmware
Subscribe
Viprion B4300
Subscribe
Viprion B4300 Firmware
Subscribe
Viprion B4450
Subscribe
Viprion B4450 Firmware
Subscribe
|
Configuration 1 [-]
|
Configuration 2 [-]
| AND |
|
Configuration 3 [-]
| AND |
|
Configuration 4 [-]
| AND |
|
Configuration 5 [-]
| AND |
|
Configuration 6 [-]
| AND |
|
Configuration 7 [-]
| AND |
|
Configuration 8 [-]
| AND |
|
Configuration 9 [-]
| AND |
|
Configuration 10 [-]
| AND |
|
Configuration 11 [-]
| AND |
|
Configuration 12 [-]
| AND |
|
Configuration 13 [-]
| AND |
|
Configuration 14 [-]
| AND |
|
Configuration 15 [-]
| AND |
|
Configuration 16 [-]
| AND |
|
Configuration 17 [-]
| AND |
|
Configuration 18 [-]
| AND |
|
Configuration 19 [-]
| AND |
|
Configuration 20 [-]
| AND |
|
Configuration 21 [-]
| AND |
|
Configuration 22 [-]
| AND |
|
Configuration 23 [-]
| AND |
|
Configuration 24 [-]
| AND |
|
Configuration 25 [-]
| AND |
|
Configuration 26 [-]
| AND |
|
Configuration 27 [-]
| AND |
|
Configuration 28 [-]
| AND |
|
Configuration 29 [-]
| AND |
|
Configuration 30 [-]
| AND |
|
Configuration 31 [-]
| AND |
|
Configuration 32 [-]
| AND |
|
Configuration 33 [-]
| AND |
|
No data.
No data.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-26950 | On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://my.f5.com/manage/s/article/K37708118 |
|
Wed, 26 Mar 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: f5
Published:
Updated: 2025-03-26T17:48:26.847Z
Reserved: 2023-01-13T06:43:46.141Z
Link: CVE-2023-22839
Updated: 2024-08-02T10:20:31.223Z
Status : Modified
Published: 2023-02-01T18:15:11.750
Modified: 2024-11-21T07:45:29.820
Link: CVE-2023-22839
No data.
OpenCVE Enrichment
No data.
EUVD