Discover details of CVE-2021-23047, affecting BIG-IP APM versions 16.x before 16.1.0, 15.1.x before 15.1.3.1, 14.1.x before 14.1.4.3 and others. Learn about impacts, exploitation, mitigation, and prevention.
This CVE pertains to a vulnerability found in BIG-IP APM versions 16.x before 16.1.0, 15.1.x before 15.1.3.1, 14.1.x before 14.1.4.3, and all versions of 13.1.x, 12.1.x and 11.6.x that may lead to an increase in memory use during Online Certificate Status Protocol (OCSP) verification of a certificate containing Authority Information Access (AIA) due to undisclosed requests.
Understanding CVE-2021-23047
This section details the impact, technical aspects, and mitigation strategies related to CVE-2021-23047.
What is CVE-2021-23047?
The vulnerability in BIG-IP APM can be exploited when verifying certificates with AIA during OCSP, potentially resulting in memory consumption rise.
The Impact of CVE-2021-23047
Unspecified operations targeting certificates with AIA could cause a surge in memory consumption during OCSP verification.
Technical Details of CVE-2021-23047
Learn about the specifics of the vulnerability and its exploitation.
Vulnerability Description
The flaw enables memory use growth in BIG-IP APM when processing AIA-containing certificates during OCSP verification.
Affected Systems and Versions
BIG-IP APM versions 16.x before 16.1.0, 15.1.x before 15.1.3.1, 14.1.x before 14.1.4.3, and all versions of 13.1.x, 12.1.x and 11.6.x are impacted.
Exploitation Mechanism
Memory consumption can increase due to undisclosed requests during OCSP verification of certificates containing AIA.
Mitigation and Prevention
Discover the steps to mitigate the vulnerability and enhance system security.
Immediate Steps to Take
Review and apply available patches provided by the vendor to address the memory consumption issue.
Long-Term Security Practices
Regularly update and monitor the BIG-IP APM software to avoid exposure to known vulnerabilities.
Patching and Updates
Stay informed about security updates from the vendor and apply them promptly to safeguard the system.