此页面尚未翻译为您的语言。我们正在努力翻译,目前显示英文内容。

💡 Keep dependencies up to date — most exploits target known, patchable vulnerabilities.

HIGHCVE-2026-41227CVSS 7.5

CVE-2026-41227: DoS in F5 BIG-IP

平台

linux

组件

bigip

修复版本

17.5.1.4

正在翻译为您的语言…

CVE-2026-41227 describes a Denial of Service (DoS) vulnerability affecting F5 BIG-IP systems. Exploitation involves sending specially crafted HTTP/2 traffic to an HTTP/2 virtual server with Layer 7 DoS Protection enabled, leading to increased memory consumption and potential termination of the Traffic Management Microkernel (TMM) process. This can result in service outages. The vulnerability impacts versions 16.1.0 through 17.5.1.4, and a fix is available in version 17.5.1.4.

影响与攻击场景翻译中…

Successful exploitation of CVE-2026-41227 can lead to a complete denial of service for applications and services relying on the affected F5 BIG-IP instance. The TMM process termination effectively halts traffic processing, rendering the virtual server unavailable. The impact can range from temporary service interruptions to prolonged outages, depending on the criticality of the affected applications. While the vulnerability requires specific HTTP/2 traffic manipulation, the relative ease of crafting such payloads, combined with the potential for widespread disruption, makes it a significant concern. Organizations heavily reliant on F5 BIG-IP for load balancing and application delivery are particularly vulnerable.

利用背景翻译中…

CVE-2026-41227 was published on May 13, 2026. The vulnerability's severity is rated HIGH (CVSS 7.5). Currently, there are no publicly available exploits or active campaigns targeting this vulnerability. It is not listed on KEV (Known Exploited Vulnerabilities) as of the publication date. The EPSS (Exploit Prediction Score System) score is pending evaluation, but the potential for DoS impact suggests a medium to high probability of exploitation if a suitable exploit is developed and released.

威胁情报

漏洞利用状态

概念验证未知
CISA KEVNO
互联网暴露

CISA SSVC

利用情况none
可自动化yes
技术影响partial

CVSS 向量

威胁情报· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H7.5HIGHAttack VectorNetwork攻击者如何到达目标Attack ComplexityLow利用漏洞所需的条件Privileges RequiredNone攻击所需的认证级别User InteractionNone是否需要受害者采取行动ScopeUnchanged超出受影响组件的影响范围ConfidentialityNone敏感数据泄露风险IntegrityNone数据未授权篡改风险AvailabilityHigh服务中断风险nextguardhq.com · CVSS v3.1 基础分数
这些指标意味着什么?
Attack Vector
网络 — 可通过互联网远程利用,无需物理或本地访问。攻击面最大。
Attack Complexity
低 — 无需特殊条件,可以稳定地利用漏洞。
Privileges Required
无 — 无需认证,无需凭证即可利用。
User Interaction
无 — 攻击自动且无声,受害者无需任何操作。
Scope
未改变 — 影响仅限于脆弱组件本身。
Confidentiality
无 — 无机密性影响。
Integrity
无 — 无完整性影响。
Availability
高 — 完全崩溃或资源耗尽,完全拒绝服务。

受影响的软件

组件bigip
供应商F5
最低版本16.1.0
最高版本17.5.1.4
修复版本17.5.1.4

弱点分类 (CWE)

时间线

  1. 已保留
  2. 发布日期

缓解措施和替代方案翻译中…

The primary mitigation for CVE-2026-41227 is to upgrade F5 BIG-IP to version 17.5.1.4 or later, which contains the fix. If immediate upgrade is not feasible, implement temporary workarounds. Configure a Web Application Firewall (WAF) or proxy to filter out potentially malicious HTTP/2 requests. Specifically, look for unusual header patterns or request sizes that deviate from expected traffic. Consider implementing rate limiting on HTTP/2 connections to reduce the impact of a potential attack. Monitor TMM process resource utilization closely; spikes in memory consumption could indicate exploitation attempts. After upgrading, confirm the fix by sending test HTTP/2 requests and verifying that TMM resource usage remains stable.

修复方法翻译中…

Aplique las actualizaciones de seguridad proporcionadas por F5 para BIG-IP. Consulte la nota de seguridad K000158979 en el sitio web de F5 para obtener más detalles sobre las versiones afectadas y las actualizaciones disponibles.

常见问题翻译中…

What is CVE-2026-41227 — DoS in F5 BIG-IP?

CVE-2026-41227 is a high-severity Denial of Service vulnerability in F5 BIG-IP affecting versions 16.1.0–17.5.1.4. Malformed HTTP/2 traffic can cause service disruption by terminating the TMM process.

Am I affected by CVE-2026-41227 in F5 BIG-IP?

You are affected if you are running F5 BIG-IP versions 16.1.0 through 17.5.1.4 and have HTTP/2 virtual servers with Layer 7 DoS Protection enabled. Check your version immediately.

How do I fix CVE-2026-41227 in F5 BIG-IP?

Upgrade to F5 BIG-IP version 17.5.1.4 or later. As a temporary workaround, configure WAF rules to filter malicious HTTP/2 requests.

Is CVE-2026-41227 being actively exploited?

As of the publication date, there are no publicly known exploits or active campaigns targeting CVE-2026-41227, but the potential for exploitation exists.

Where can I find the official F5 advisory for CVE-2026-41227?

Refer to the official F5 Security Advisory for CVE-2026-41227 on the F5 website (link will be available upon publication).

你的项目受影响吗?

上传你的依赖文件,立即了解此CVE和其他CVE是否影响你。

live免费扫描

立即试用 — 无需账户

上传任何清单文件 (composer.lock, package-lock.json, WordPress 插件列表…) 或粘贴您的组件列表。您立即获得一份漏洞报告。上传文件只是开始:拥有账户后,您将获得持续监控、Slack/电子邮件警报、多项目和白标报告。

手动扫描Slack/邮件提醒持续监控白标报告

拖放您的依赖文件

composer.lock、package-lock.json、requirements.txt、Gemfile.lock、pubspec.lock、Dockerfile...