F5 Networks BIG-IP : TMM with HTTP/2 vulnerability (K45320419)
Medium Nessus Plugin ID 118664
SynopsisThe remote device is missing a vendor-supplied security patch.
DescriptionMaliciously crafted HTTP/2 request frames can lead to denial of
service. There is data plane exposure for virtual servers when the
HTTP2 profile is enabled. There is no control plane exposure to this
The BIG-IP system may temporarily fail to process traffic as it
recovers from a Traffic Management Microkernel (TMM) restart, and
devices configured as a high availability (HA) pair may fail over.
SolutionUpgrade to one of the non-vulnerable versions listed in the F5