Skip to main content

CVE-2022-41833: CWE-400 Uncontrolled Resource Consumption in F5 BIG-IP

High
VulnerabilityCVE-2022-41833cvecve-2022-41833cwe-400
Published: Wed Oct 19 2022 (10/19/2022, 21:24:25 UTC)
Source: CVE
Vendor/Project: F5
Product: BIG-IP

Description

In all BIG-IP 13.1.x versions, when an iRule containing the HTTP::collect command is configured on a virtual server, undisclosed requests can cause Traffic Management Microkernel (TMM) to terminate.

AI-Powered Analysis

AILast updated: 07/05/2025, 08:25:12 UTC

Technical Analysis

CVE-2022-41833 is a high-severity vulnerability affecting F5 BIG-IP devices running version 13.1.0. The vulnerability arises from uncontrolled resource consumption (CWE-400) triggered by the use of the HTTP::collect command within an iRule configured on a virtual server. Specifically, crafted or undisclosed HTTP requests can cause the Traffic Management Microkernel (TMM) component of BIG-IP to terminate unexpectedly. The TMM is critical for processing and managing network traffic, and its termination results in denial of service (DoS) conditions. This vulnerability does not require authentication or user interaction and can be exploited remotely over the network (AV:N/AC:L/PR:N/UI:N). The CVSS v3.1 base score is 7.5, reflecting high severity due to the impact on availability without compromising confidentiality or integrity. No known exploits in the wild have been reported to date. The vulnerability is limited to version 13.1.0 of BIG-IP, and no patch links were provided in the source information, indicating that mitigation may require vendor updates or configuration changes. The root cause is the improper handling of resource consumption when processing HTTP::collect commands, which can be abused to exhaust system resources and crash the TMM process, leading to service disruption.

Potential Impact

For European organizations relying on F5 BIG-IP devices, particularly version 13.1.0, this vulnerability poses a significant risk to network availability and service continuity. BIG-IP devices are widely used for load balancing, application delivery, and security functions in enterprise and service provider environments. An attacker exploiting this vulnerability can remotely cause the TMM to crash, resulting in denial of service and potential disruption of critical business applications and services. This can affect sectors such as finance, telecommunications, healthcare, and government, where uptime and network reliability are paramount. The lack of confidentiality or integrity impact reduces risk of data breach but does not diminish the operational impact. Given the remote and unauthenticated nature of the exploit, threat actors could leverage this vulnerability to cause widespread outages or as part of multi-stage attacks targeting European infrastructure. The absence of known exploits in the wild provides some temporal relief, but the high severity score and ease of exploitation necessitate prompt attention.

Mitigation Recommendations

European organizations should prioritize the following specific mitigation steps: 1) Immediately identify and inventory all F5 BIG-IP devices running version 13.1.0, especially those with iRules using the HTTP::collect command. 2) Disable or remove iRules that utilize HTTP::collect where feasible, or restrict their use to trusted traffic sources to reduce exposure. 3) Apply any available vendor patches or firmware updates from F5 addressing this vulnerability as soon as they become available. 4) Implement network-level protections such as rate limiting, web application firewalls (WAFs), or intrusion prevention systems (IPS) to detect and block suspicious HTTP requests that could trigger the vulnerability. 5) Monitor BIG-IP system logs and TMM process health closely for signs of abnormal termination or resource exhaustion. 6) Consider deploying redundant BIG-IP devices or failover configurations to maintain service availability in case of an attack. 7) Engage with F5 support for guidance and to obtain any interim mitigations or workarounds. These steps go beyond generic advice by focusing on configuration auditing, traffic filtering, and operational monitoring tailored to this specific vulnerability and product version.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
f5
Date Reserved
2022-09-30T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd8a8c

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 7/5/2025, 8:25:12 AM

Last updated: 7/29/2025, 3:24:46 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats