Vulnerability Description
On F5 BIG-IP LTM, Advanced WAF, ASM, or APM 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5, 14.1.x versions prior to 14.1.4.6, and all versions of 13.1.x, 12.1.x, and 11.6.x, when a virtual server is configured with HTTP, TCP on one side (client/server), and DTLS on the other (server/client), undisclosed requests can cause the TMM process to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| F5 | Big-Ip Access Policy Manager | 11.6.1 |
| F5 | Big-Ip Advanced Web Application Firewall | 11.6.1 |
| F5 | Big-Ip Application Security Manager | 11.6.1 |
| F5 | Big-Ip Local Traffic Manager | 11.6.1 |
Related Weaknesses (CWE)
References
- https://support.f5.com/csp/article/K14229426Vendor Advisory
- https://support.f5.com/csp/article/K14229426Vendor Advisory
FAQ
What is CVE-2022-29491?
CVE-2022-29491 is a vulnerability with a CVSS score of 7.5 (HIGH). On F5 BIG-IP LTM, Advanced WAF, ASM, or APM 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5, 14.1.x versions prior to 14.1.4.6, and all versions of 13.1.x, 12.1.x, and 11.6.x, when ...
How severe is CVE-2022-29491?
CVE-2022-29491 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-29491?
Check the references section above for vendor advisories and patch information. Affected products include: F5 Big-Ip Access Policy Manager, F5 Big-Ip Advanced Web Application Firewall, F5 Big-Ip Application Security Manager, F5 Big-Ip Local Traffic Manager.