CVE-2022-41787: CWE-476 NULL Pointer Dereference in F5 BIG-IP DNS
In BIG-IP versions 17.0.x before 17.0.0.1, 16.1.x before 16.1.3.1, 15.1.x before 15.1.6.1, 14.1.x before 14.1.5.1, and 13.1.x before 13.1.5.1, when DNS profile is configured on a virtual server with DNS Express enabled, undisclosed DNS queries with DNSSEC can cause TMM to terminate.
AI Analysis
Technical Summary
CVE-2022-41787 is a high-severity vulnerability affecting multiple versions of F5 BIG-IP DNS, specifically versions 13.1.x through 17.0.x prior to their respective patch releases. The issue arises when a DNS profile is configured on a virtual server with DNS Express enabled. Under these conditions, specially crafted, undisclosed DNS queries that utilize DNSSEC can trigger a NULL pointer dereference (CWE-476) within the Traffic Management Microkernel (TMM) component of BIG-IP. This dereference causes the TMM process to terminate unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability does not impact confidentiality or integrity but severely affects availability by crashing the core traffic management process, which is critical for DNS resolution and load balancing functions. The CVSS v3.1 base score is 7.5 (high), reflecting network attack vector, low attack complexity, no privileges or user interaction required, and a scope limited to availability impact. No known exploits in the wild have been reported to date. The vulnerability affects a broad range of BIG-IP DNS versions, indicating that many organizations using F5 BIG-IP appliances with DNS Express enabled are potentially vulnerable if not patched. The lack of patch links in the provided data suggests that organizations should consult F5’s official advisories for updated firmware versions that address this issue.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on F5 BIG-IP DNS appliances for critical DNS resolution and traffic management services. The forced termination of the TMM process can lead to service outages, disrupting internal and external DNS queries, which may cascade into broader network availability issues. This can affect web services, cloud applications, and any infrastructure dependent on DNS resolution. Given the essential role of DNS in network operations, such outages can result in operational downtime, loss of productivity, and potential financial losses. Additionally, organizations in sectors with stringent availability requirements—such as finance, telecommunications, healthcare, and government—may face compliance and reputational risks if service disruptions occur. The vulnerability’s exploitation does not require authentication or user interaction, increasing the risk of remote exploitation by attackers scanning for vulnerable BIG-IP DNS instances. Although no exploits are currently known in the wild, the ease of triggering the DoS condition makes this a credible threat vector for denial-of-service attacks targeting European enterprises.
Mitigation Recommendations
European organizations should immediately verify if their F5 BIG-IP DNS deployments are running affected versions with DNS Express enabled on virtual servers. They should prioritize upgrading to the fixed versions released by F5: 17.0.0.1 or later, 16.1.3.1 or later, 15.1.6.1 or later, 14.1.5.1 or later, and 13.1.5.1 or later. In environments where immediate patching is not feasible, organizations should consider temporarily disabling DNS Express on vulnerable virtual servers to mitigate the risk of TMM crashes. Network-level mitigations such as rate limiting or filtering DNS queries with DNSSEC flags from untrusted sources can reduce exposure. Monitoring TMM process stability and implementing alerting for unexpected restarts can provide early detection of exploitation attempts. Additionally, organizations should review their network segmentation and access controls to limit exposure of BIG-IP DNS services to untrusted networks. Regularly consulting F5 security advisories and subscribing to vulnerability notification services will ensure timely awareness of patches and related threats.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Switzerland
CVE-2022-41787: CWE-476 NULL Pointer Dereference in F5 BIG-IP DNS
Description
In BIG-IP versions 17.0.x before 17.0.0.1, 16.1.x before 16.1.3.1, 15.1.x before 15.1.6.1, 14.1.x before 14.1.5.1, and 13.1.x before 13.1.5.1, when DNS profile is configured on a virtual server with DNS Express enabled, undisclosed DNS queries with DNSSEC can cause TMM to terminate.
AI-Powered Analysis
Technical Analysis
CVE-2022-41787 is a high-severity vulnerability affecting multiple versions of F5 BIG-IP DNS, specifically versions 13.1.x through 17.0.x prior to their respective patch releases. The issue arises when a DNS profile is configured on a virtual server with DNS Express enabled. Under these conditions, specially crafted, undisclosed DNS queries that utilize DNSSEC can trigger a NULL pointer dereference (CWE-476) within the Traffic Management Microkernel (TMM) component of BIG-IP. This dereference causes the TMM process to terminate unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability does not impact confidentiality or integrity but severely affects availability by crashing the core traffic management process, which is critical for DNS resolution and load balancing functions. The CVSS v3.1 base score is 7.5 (high), reflecting network attack vector, low attack complexity, no privileges or user interaction required, and a scope limited to availability impact. No known exploits in the wild have been reported to date. The vulnerability affects a broad range of BIG-IP DNS versions, indicating that many organizations using F5 BIG-IP appliances with DNS Express enabled are potentially vulnerable if not patched. The lack of patch links in the provided data suggests that organizations should consult F5’s official advisories for updated firmware versions that address this issue.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on F5 BIG-IP DNS appliances for critical DNS resolution and traffic management services. The forced termination of the TMM process can lead to service outages, disrupting internal and external DNS queries, which may cascade into broader network availability issues. This can affect web services, cloud applications, and any infrastructure dependent on DNS resolution. Given the essential role of DNS in network operations, such outages can result in operational downtime, loss of productivity, and potential financial losses. Additionally, organizations in sectors with stringent availability requirements—such as finance, telecommunications, healthcare, and government—may face compliance and reputational risks if service disruptions occur. The vulnerability’s exploitation does not require authentication or user interaction, increasing the risk of remote exploitation by attackers scanning for vulnerable BIG-IP DNS instances. Although no exploits are currently known in the wild, the ease of triggering the DoS condition makes this a credible threat vector for denial-of-service attacks targeting European enterprises.
Mitigation Recommendations
European organizations should immediately verify if their F5 BIG-IP DNS deployments are running affected versions with DNS Express enabled on virtual servers. They should prioritize upgrading to the fixed versions released by F5: 17.0.0.1 or later, 16.1.3.1 or later, 15.1.6.1 or later, 14.1.5.1 or later, and 13.1.5.1 or later. In environments where immediate patching is not feasible, organizations should consider temporarily disabling DNS Express on vulnerable virtual servers to mitigate the risk of TMM crashes. Network-level mitigations such as rate limiting or filtering DNS queries with DNSSEC flags from untrusted sources can reduce exposure. Monitoring TMM process stability and implementing alerting for unexpected restarts can provide early detection of exploitation attempts. Additionally, organizations should review their network segmentation and access controls to limit exposure of BIG-IP DNS services to untrusted networks. Regularly consulting F5 security advisories and subscribing to vulnerability notification services will ensure timely awareness of patches and related threats.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- f5
- Date Reserved
- 2022-09-30T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981bc4522896dcbda126
Added to database: 5/21/2025, 9:08:43 AM
Last enriched: 7/5/2025, 5:12:39 PM
Last updated: 8/12/2025, 12:03:01 AM
Views: 13
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.