ID

VAR-202109-0533


CVE

CVE-2021-23035


TITLE

plural  F5 Networks  Product vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2021-012067

DESCRIPTION

On BIG-IP 14.1.x before 14.1.4.4, when an HTTP profile is configured on a virtual server, after a specific sequence of packets, chunked responses can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. plural F5 Networks There are unspecified vulnerabilities in the product.Service operation interruption (DoS) It may be in a state. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. A security vulnerability exists in the F5 BIG-IP. The vulnerability stems from the fact that an attacker can cause a fatal error through F5 BIG-IP's HTTP configuration file chunked response to trigger a denial of service

Trust: 1.8

sources: NVD: CVE-2021-23035 // JVNDB: JVNDB-2021-012067 // VULHUB: VHN-381521 // VULMON: CVE-2021-23035

AFFECTED PRODUCTS

vendor:f5model:big-ip domain name systemscope:lteversion:14.1.4.4

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:lteversion:14.1.4.4

Trust: 1.0

vendor:f5model:big-ip link controllerscope:lteversion:14.1.4.4

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:lteversion:14.1.4.4

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:lteversion:14.1.4.4

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:lteversion:14.1.4.4

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:lteversion:14.1.4.4

Trust: 1.0

vendor:f5model:big-ip application security managerscope:lteversion:14.1.4.4

Trust: 1.0

vendor:f5model:big-ip analyticsscope:lteversion:14.1.4.4

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:lteversion:14.1.4.4

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:lteversion:14.1.4.4

Trust: 1.0

vendor:f5model:big-ip application security managerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip fraud protection servicescope: - version: -

Trust: 0.8

vendor:f5model:big-ip domain name systemscope: - version: -

Trust: 0.8

vendor:f5model:big-ip global traffic managerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip local traffic managerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip link controllerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip advanced firewall managerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip analyticsscope: - version: -

Trust: 0.8

vendor:f5model:big-ip access policy managerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip policy enforcement managerscope: - version: -

Trust: 0.8

vendor:f5model:big-ip application acceleration managerscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-012067 // NVD: CVE-2021-23035

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-23035
value: HIGH

Trust: 1.0

NVD: CVE-2021-23035
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202108-1987
value: HIGH

Trust: 0.6

VULHUB: VHN-381521
value: HIGH

Trust: 0.1

VULMON: CVE-2021-23035
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2021-23035
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-381521
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-23035
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2021-23035
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-381521 // VULMON: CVE-2021-23035 // JVNDB: JVNDB-2021-012067 // CNNVD: CNNVD-202108-1987 // NVD: CVE-2021-23035

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-20

Trust: 1.0

problemtype:Lack of information (CWE-noinfo) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-012067 // NVD: CVE-2021-23035

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202108-1987

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-202108-1987

PATCH

title:K70415522url:https://support.f5.com/csp/article/K70415522

Trust: 0.8

sources: JVNDB: JVNDB-2021-012067

EXTERNAL IDS

db:NVDid:CVE-2021-23035

Trust: 3.4

db:JVNDBid:JVNDB-2021-012067

Trust: 0.8

db:CNNVDid:CNNVD-202108-1987

Trust: 0.7

db:AUSCERTid:ESB-2021.2868

Trust: 0.6

db:VULHUBid:VHN-381521

Trust: 0.1

db:VULMONid:CVE-2021-23035

Trust: 0.1

sources: VULHUB: VHN-381521 // VULMON: CVE-2021-23035 // JVNDB: JVNDB-2021-012067 // CNNVD: CNNVD-202108-1987 // NVD: CVE-2021-23035

REFERENCES

url:https://support.f5.com/csp/article/k70415522

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2021-23035

Trust: 1.4

url:https://vigilance.fr/vulnerability/f5-big-ip-denial-of-service-via-http-profile-chunked-responses-36191

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2868

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-381521 // VULMON: CVE-2021-23035 // JVNDB: JVNDB-2021-012067 // CNNVD: CNNVD-202108-1987 // NVD: CVE-2021-23035

SOURCES

db:VULHUBid:VHN-381521
db:VULMONid:CVE-2021-23035
db:JVNDBid:JVNDB-2021-012067
db:CNNVDid:CNNVD-202108-1987
db:NVDid:CVE-2021-23035

LAST UPDATE DATE

2024-08-14T12:40:16.677000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-381521date:2021-09-27T00:00:00
db:VULMONid:CVE-2021-23035date:2021-09-27T00:00:00
db:JVNDBid:JVNDB-2021-012067date:2022-08-23T05:35:00
db:CNNVDid:CNNVD-202108-1987date:2021-09-28T00:00:00
db:NVDid:CVE-2021-23035date:2021-09-27T16:09:24.503

SOURCES RELEASE DATE

db:VULHUBid:VHN-381521date:2021-09-14T00:00:00
db:VULMONid:CVE-2021-23035date:2021-09-14T00:00:00
db:JVNDBid:JVNDB-2021-012067date:2022-08-23T00:00:00
db:CNNVDid:CNNVD-202108-1987date:2021-08-24T00:00:00
db:NVDid:CVE-2021-23035date:2021-09-14T18:15:08.243