Impact
When a BIG‑IP DNS profile configured with DNS caching is enabled on a virtual server, traffic that is not documented or expected can trigger the Traffic Management Microkernel (TMM) to terminate. The resulting crash disables the DNS service and may impact other services that rely on DNS resolution. This is a pure denial‑of‑service vulnerability, with no known impact on confidentiality or integrity.
Affected Systems
The flaw targets F5 BIG‑IP appliances that have the DNS cache feature enabled on virtual servers. All actively supported BIG‑IP releases are vulnerable unless a vendor patch has been applied; versions that have reached End of Technical Support are excluded from the advisory.
Risk and Exploitability
The CVSS score of 8.7 indicates a high severity. The EPSS score is not available, so the current exploit probability is unknown. The vulnerability is not listed in the CISA KEV catalog, suggesting no documented public exploitation. The attack vector is inferred to be network‑based: a hostile actor or anomalous traffic sends crafted DNS requests to the BIG‑IP, causing the TMM to crash and resulting in service interruption.
OpenCVE Enrichment