Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-41806: CWE-400 Uncontrolled Resource Consumption in F5 BIG-IP AFM

0
High
VulnerabilityCVE-2022-41806cvecve-2022-41806cwe-400
Published: Wed Oct 19 2022 (10/19/2022, 21:22:58 UTC)
Source: CVE
Vendor/Project: F5
Product: BIG-IP AFM

Description

In versions 16.1.x before 16.1.3.2 and 15.1.x before 15.1.5.1, when BIG-IP AFM Network Address Translation policy with IPv6/IPv4 translation rules is configured on a virtual server, undisclosed requests can cause an increase in memory resource utilization.

AI-Powered Analysis

AILast updated: 07/05/2025, 04:39:50 UTC

Technical Analysis

CVE-2022-41806 is a high-severity vulnerability affecting F5 BIG-IP Advanced Firewall Manager (AFM) versions 16.1.x prior to 16.1.3.2 and 15.1.x prior to 15.1.5.1. The vulnerability arises when a Network Address Translation (NAT) policy with IPv6/IPv4 translation rules is configured on a virtual server. Under these conditions, specially crafted or undisclosed requests can trigger uncontrolled resource consumption, specifically causing an increase in memory usage on the affected system. This behavior aligns with CWE-400, which pertains to uncontrolled resource consumption or resource exhaustion. The vulnerability does not impact confidentiality or integrity directly but severely impacts availability by potentially causing denial of service (DoS) conditions due to memory exhaustion. The CVSS 3.1 base score is 7.5, reflecting a high severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and an impact limited to availability (A:H). There are no known exploits in the wild as of the published date. The vulnerability is particularly relevant for organizations using F5 BIG-IP AFM with IPv6/IPv4 NAT configurations, as the memory exhaustion can degrade or disrupt firewall operations, potentially leading to service outages or degraded network security posture.

Potential Impact

For European organizations, the impact of CVE-2022-41806 can be significant, especially for those relying on F5 BIG-IP AFM devices to protect critical network infrastructure. The memory exhaustion can lead to denial of service, causing firewall failures or degraded performance, which in turn can expose networks to further attacks or disrupt business-critical services. Given the increasing adoption of IPv6 alongside IPv4 in Europe, organizations utilizing IPv6/IPv4 translation rules in their NAT policies are particularly at risk. Disruptions in firewall functionality can affect confidentiality indirectly by enabling attackers to bypass security controls during downtime. The impact is heightened for sectors with stringent availability requirements such as finance, healthcare, telecommunications, and government agencies. Additionally, the lack of required privileges or user interaction for exploitation means attackers can remotely trigger the vulnerability, increasing the risk of widespread disruption.

Mitigation Recommendations

To mitigate CVE-2022-41806, European organizations should prioritize updating affected F5 BIG-IP AFM devices to versions 16.1.3.2 or later and 15.1.5.1 or later, where the vulnerability has been addressed. Until patches are applied, organizations should review and potentially disable or limit the use of IPv6/IPv4 translation rules in NAT policies on virtual servers to reduce exposure. Network administrators should implement strict network segmentation and access controls to restrict access to management interfaces and limit exposure of vulnerable services to untrusted networks. Monitoring memory utilization and setting up alerts for abnormal resource consumption on BIG-IP devices can provide early warning signs of exploitation attempts. Additionally, deploying rate limiting or traffic filtering to block suspicious or malformed requests targeting NAT policies may reduce the risk. Regularly reviewing F5 security advisories and subscribing to vendor notifications will ensure timely awareness of updates and mitigations.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
f5
Date Reserved
2022-09-30T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9818c4522896dcbd80e2

Added to database: 5/21/2025, 9:08:40 AM

Last enriched: 7/5/2025, 4:39:50 AM

Last updated: 2/7/2026, 8:59:09 AM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats