Description
When BIG-IP PEM iRules are configured on a virtual server (iRules using commands starting with CLASSIFICATION::, CLASSIFY::, PEM::, PSC::, and the urlcatquery command), undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Published: 2026-05-13
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a use‑after‑free flaw triggered when specific BIG‑IP PEM iRules are configured on a virtual server, specifically those beginning with CLASSIFICATION::, CLASSIFY::, PEM::, PSC::, or using the urlcatquery command. When an attacker sends traffic that causes the Traffic Management Microkernel (TMM) to invoke these commands, memory is freed incorrectly and the TMM process terminates. The crash results in a denial‑of‑service condition that disables the affected virtual server and potentially any services routed through it.

Affected Systems

Affected systems are F5 BIG‑IP appliances that have PEM iRules configured with the vulnerable commands. No specific version numbers are listed in the advisory, and software that has reached end of technical support was explicitly excluded from evaluation. There is no evidence that only certain versions are impacted, so any BIG‑IP running these iRules may be at risk.

Risk and Exploitability

The CVSS score of 8.7 indicates high severity for a denial‑of‑service vulnerability. EPSS is unavailable and the issue is not listed in the CISA KEV catalog, suggesting no known public exploits at this time. The likely attack vector is remote: an unauthenticated client can send traffic to the virtual server that contains the malicious iRule traffic, provoking the TMM crash without needing privileged access. Because the flaw results in service interruption rather than code execution or data exfiltration, the primary risk is operational downtime; however, repeated crashes could be leveraged in a coordinated denial‑of‑service attack.

Generated by OpenCVE AI on May 13, 2026 at 16:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Evaluate the BIG‑IP configuration for iRules containing CLASSIFICATION::, CLASSIFY::, PEM::, PSC::, or urlcatquery commands on all virtual servers and remove or disable those rules.
  • Apply the latest vendor‑issued updates or patches for BIG‑IP that address the TMM crash; if no patch is available, plan an upgrade to a supported release that eliminates the vulnerable code path.
  • Set up monitoring and alerting of the Traffic Management Microkernel process to detect unexpected terminations; configure high‑availability or fail‑over mechanisms to maintain service availability during any crash events.

Generated by OpenCVE AI on May 13, 2026 at 16:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 13 May 2026 18:15:00 +0000

Type Values Removed Values Added
First Time appeared F5
F5 big-ip
Vendors & Products F5
F5 big-ip

Wed, 13 May 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 13 May 2026 15:15:00 +0000

Type Values Removed Values Added
Description When BIG-IP PEM iRules are configured on a virtual server (iRules using commands starting with CLASSIFICATION::, CLASSIFY::, PEM::, PSC::, and the urlcatquery command), undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Title BIG-IP PEM iRules vulnerability
Weaknesses CWE-416
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: f5

Published:

Updated: 2026-05-13T16:14:52.215Z

Reserved: 2026-04-30T23:02:47.670Z

Link: CVE-2026-41218

cve-icon Vulnrichment

Updated: 2026-05-13T16:14:46.553Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-13T16:16:44.473

Modified: 2026-05-13T16:27:11.127

Link: CVE-2026-41218

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-13T18:00:05Z

Weaknesses