Files
CVEs-PoC/2021/CVE-2021-23000.md
2025-09-29 21:09:30 +02:00

18 lines
904 B
Markdown

### [CVE-2021-23000](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23000)
![](https://img.shields.io/static/v1?label=Product&message=BIG-IP&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=13.1.3.4-13.1.3.5%2C%2012.1.5.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=DoS&color=brightgreen)
### Description
On BIG-IP versions 13.1.3.4-13.1.3.6 and 12.1.5.2, if the tmm.http.rfc.enforcement BigDB key is enabled in a BIG-IP system, or the Bad host header value is checked in the AFM HTTP security profile associated with a virtual server, in rare instances, a specific sequence of malicious requests may cause TMM to restart. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/DNTYO/F5_Vulnerability