Vulnerability identifier: #VU66085
Vulnerability risk: Medium
Exploitation vector: Network
Exploit availability: No
Vendor: F5 Networks, Inc.
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input, when an iRule containing the HTTP::payload command is configured on a virtual server. A remote attacker can pass specially crafted input to the system and cause Traffic Management Microkernel (TMM) to terminate.
Install updates from vendor's website.
Vulnerable software versions
BIG-IP: 14.1.0 - 16.0.1
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?