Vulnerability identifier: #VU66085
Vulnerability risk: Medium
Exploitation vector: Network
Vendor: F5 Networks
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input, when an iRule containing the HTTP::payload command is configured on a virtual server. A remote attacker can pass specially crafted input to the system and cause Traffic Management Microkernel (TMM) to terminate.
Install updates from vendor's website.
Vulnerable software versions
BIG-IP: 16.0.0 - 16.0.1, 15.1.0 - 15.1.6, 14.1.0 - 22.214.171.124
Fixed software versions
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?