Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22548: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in F5 BIG-IP

0
Medium
VulnerabilityCVE-2026-22548cvecve-2026-22548cwe-362
Published: Wed Feb 04 2026 (02/04/2026, 15:02:05 UTC)
Source: CVE Database V5
Vendor/Project: F5
Product: BIG-IP

Description

When a BIG-IP Advanced WAF or ASM security policy is configured on a virtual server, undisclosed requests along with conditions beyond the attacker's control can cause the bd process to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

AI-Powered Analysis

AILast updated: 02/04/2026, 15:29:45 UTC

Technical Analysis

CVE-2026-22548 is a race condition vulnerability classified under CWE-362 affecting F5 BIG-IP version 17.1.0, specifically when an Advanced Web Application Firewall (WAF) or Application Security Manager (ASM) security policy is configured on a virtual server. The vulnerability arises from improper synchronization in the bd process, a core component responsible for handling security policy enforcement. Under certain conditions triggered by undisclosed requests and factors beyond the attacker's control, concurrent execution leads to a race condition that causes the bd process to terminate unexpectedly. This termination results in a denial of service (DoS) condition, impacting the availability of the security functions and potentially the protected applications. The CVSS v3.1 score is 5.9 (medium severity), reflecting a network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). No known exploits are currently reported in the wild, and no patches have been published at the time of this analysis. The vulnerability does not affect versions that have reached End of Technical Support (EoTS). The lack of authentication and user interaction requirements lowers the barrier for exploitation, but the high complexity and uncontrollable conditions reduce the likelihood of successful attacks. This vulnerability primarily threatens service availability by causing process crashes, which can disrupt security enforcement and potentially expose backend applications to unfiltered traffic or downtime.

Potential Impact

For European organizations, the primary impact of CVE-2026-22548 is the potential denial of service of F5 BIG-IP Advanced WAF or ASM modules, which are widely used to protect critical web applications and infrastructure. Service disruptions could lead to temporary loss of security enforcement, increasing the risk of downstream attacks or compliance violations. Organizations in sectors such as finance, telecommunications, government, and critical infrastructure that rely heavily on F5 BIG-IP for application security may face operational interruptions and reputational damage. The vulnerability does not directly compromise data confidentiality or integrity but can degrade the overall security posture by disabling protective controls. Additionally, availability issues could affect customer-facing services, leading to financial losses and regulatory scrutiny under European data protection and operational resilience frameworks. The absence of known exploits reduces immediate risk, but the medium severity and potential for denial of service necessitate proactive measures.

Mitigation Recommendations

1. Monitor bd process stability closely on all BIG-IP devices running version 17.1.0 with Advanced WAF or ASM policies configured, using system logs and health checks to detect unexpected terminations. 2. Limit exposure of vulnerable virtual servers by restricting access through network segmentation, firewall rules, or IP whitelisting to reduce attack surface. 3. Implement redundancy and failover mechanisms for BIG-IP devices to maintain availability if the bd process crashes. 4. Engage with F5 support and subscribe to security advisories to receive updates and patches promptly once available. 5. Conduct controlled testing in staging environments to understand triggering conditions and develop incident response playbooks. 6. Review and harden security policies to minimize complex or unnecessary configurations that might increase race condition risk. 7. Consider upgrading to supported versions beyond 17.1.0 if patches are unavailable or if EoTS versions are in use. 8. Employ network-level anomaly detection to identify unusual request patterns that could trigger the vulnerability. These steps go beyond generic advice by focusing on process monitoring, access control, and operational resilience tailored to the specific vulnerability characteristics.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
f5
Date Reserved
2026-01-21T21:33:16.394Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6983627ef9fa50a62f94fb95

Added to database: 2/4/2026, 3:15:10 PM

Last enriched: 2/4/2026, 3:29:45 PM

Last updated: 2/7/2026, 2:31:59 AM

Views: 84

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats