Skip to main content

CVE-2022-41806: CWE-400 Uncontrolled Resource Consumption in F5 BIG-IP AFM

High
VulnerabilityCVE-2022-41806cvecve-2022-41806cwe-400
Published: Wed Oct 19 2022 (10/19/2022, 21:22:58 UTC)
Source: CVE
Vendor/Project: F5
Product: BIG-IP AFM

Description

In versions 16.1.x before 16.1.3.2 and 15.1.x before 15.1.5.1, when BIG-IP AFM Network Address Translation policy with IPv6/IPv4 translation rules is configured on a virtual server, undisclosed requests can cause an increase in memory resource utilization.

AI-Powered Analysis

AILast updated: 07/05/2025, 04:39:50 UTC

Technical Analysis

CVE-2022-41806 is a high-severity vulnerability affecting F5 BIG-IP Advanced Firewall Manager (AFM) versions 16.1.x prior to 16.1.3.2 and 15.1.x prior to 15.1.5.1. The vulnerability arises when a Network Address Translation (NAT) policy with IPv6/IPv4 translation rules is configured on a virtual server. Under these conditions, specially crafted or undisclosed requests can trigger uncontrolled resource consumption, specifically causing an increase in memory usage on the affected system. This behavior aligns with CWE-400, which pertains to uncontrolled resource consumption or resource exhaustion. The vulnerability does not impact confidentiality or integrity directly but severely impacts availability by potentially causing denial of service (DoS) conditions due to memory exhaustion. The CVSS 3.1 base score is 7.5, reflecting a high severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and an impact limited to availability (A:H). There are no known exploits in the wild as of the published date. The vulnerability is particularly relevant for organizations using F5 BIG-IP AFM with IPv6/IPv4 NAT configurations, as the memory exhaustion can degrade or disrupt firewall operations, potentially leading to service outages or degraded network security posture.

Potential Impact

For European organizations, the impact of CVE-2022-41806 can be significant, especially for those relying on F5 BIG-IP AFM devices to protect critical network infrastructure. The memory exhaustion can lead to denial of service, causing firewall failures or degraded performance, which in turn can expose networks to further attacks or disrupt business-critical services. Given the increasing adoption of IPv6 alongside IPv4 in Europe, organizations utilizing IPv6/IPv4 translation rules in their NAT policies are particularly at risk. Disruptions in firewall functionality can affect confidentiality indirectly by enabling attackers to bypass security controls during downtime. The impact is heightened for sectors with stringent availability requirements such as finance, healthcare, telecommunications, and government agencies. Additionally, the lack of required privileges or user interaction for exploitation means attackers can remotely trigger the vulnerability, increasing the risk of widespread disruption.

Mitigation Recommendations

To mitigate CVE-2022-41806, European organizations should prioritize updating affected F5 BIG-IP AFM devices to versions 16.1.3.2 or later and 15.1.5.1 or later, where the vulnerability has been addressed. Until patches are applied, organizations should review and potentially disable or limit the use of IPv6/IPv4 translation rules in NAT policies on virtual servers to reduce exposure. Network administrators should implement strict network segmentation and access controls to restrict access to management interfaces and limit exposure of vulnerable services to untrusted networks. Monitoring memory utilization and setting up alerts for abnormal resource consumption on BIG-IP devices can provide early warning signs of exploitation attempts. Additionally, deploying rate limiting or traffic filtering to block suspicious or malformed requests targeting NAT policies may reduce the risk. Regularly reviewing F5 security advisories and subscribing to vendor notifications will ensure timely awareness of updates and mitigations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
f5
Date Reserved
2022-09-30T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9818c4522896dcbd80e2

Added to database: 5/21/2025, 9:08:40 AM

Last enriched: 7/5/2025, 4:39:50 AM

Last updated: 7/29/2025, 12:57:37 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats