Description Preview
Overview
CVE-2021-22991 is a buffer overflow vulnerability (CWE-119) in F5 BIG-IP's Traffic Management Microkernel (TMM) URI normalization component. When a virtual server receives certain undisclosed requests, the TMM may incorrectly handle URI normalization, leading to a buffer overflow condition. The primary impact is denial of service, but under specific circumstances, it could potentially allow attackers to bypass URL-based access controls or execute arbitrary code remotely. This vulnerability affects multiple versions of F5 BIG-IP systems and is considered critical due to its potential impact on system availability and security.
Remediation
Organizations should upgrade their F5 BIG-IP systems to the following patched versions or later:
- Version 16.0.x: Upgrade to 16.0.1.1 or later
- Version 15.1.x: Upgrade to 15.1.2.1 or later
- Version 14.1.x: Upgrade to 14.1.4 or later
- Version 13.1.x: Upgrade to 13.1.3.6 or later
- Version 12.1.x: Upgrade to 12.1.5.3 or later
If immediate patching is not possible, consult the F5 support article K56715231 for potential mitigations or workarounds. It's important to note that software versions that have reached End of Software Development (EoSD) are not evaluated for this vulnerability and should be upgraded to supported versions as soon as possible.
References
- F5 Support Knowledge Base Article: https://support.f5.com/csp/article/K56715231
- Common Weakness Enumeration (CWE-119): Buffer Overflow
- CVSS Score: Not provided in the original data
- CVE ID: CVE-2021-22991
Industry ExposureMost to leastThis section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
- ManufacturingManufacturing
- Finance and InsuranceFinance and Insurance
- Management of Companies & EnterprisesManagement of Companies & Enterprises
- Professional, Scientific, & Technical ServicesProfessional, Scientific, & Technical Services
- Transportation & WarehousingTransportation & Warehousing
- Accommodation & Food ServicesAccommodation & Food Services
- Administrative, Support, Waste Management & Remediation ServicesAdministrative, Support, Waste Management & Remediation Services
- Agriculture, Forestry Fishing & HuntingAgriculture, Forestry Fishing & Hunting
- Arts, Entertainment & RecreationArts, Entertainment & Recreation
- ConstructionConstruction
- Educational ServicesEducational Services
- Health Care & Social AssistanceHealth Care & Social Assistance
- InformationInformation
- MiningMining
- Other Services (except Public Administration)Other Services (except Public Administration)
- Public AdministrationPublic Administration
- Real Estate Rental & LeasingReal Estate Rental & Leasing
- Retail TradeRetail Trade
- UtilitiesUtilities
- Wholesale TradeWholesale Trade