INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Multiple sectors CRITICAL 31m Global vulnerability Information Technology / Software Infrastructure CRITICAL 33m Global data_breach Healthcare CRITICAL 49m Global data_breach Mobile Technology / Consumer Electronics HIGH 1h Global ransomware Cybersecurity Services / Multiple Sectors CRITICAL 1h Global apt Cryptocurrency and Blockchain CRITICAL 1h Global malware Financial Services, Mobile Payments HIGH 2h Global vulnerability Government and Critical Infrastructure CRITICAL 5h Global apt Cryptocurrency and Blockchain CRITICAL 13h Global malware Financial Services / Cryptocurrency CRITICAL 13h Global vulnerability Multiple sectors CRITICAL 31m Global vulnerability Information Technology / Software Infrastructure CRITICAL 33m Global data_breach Healthcare CRITICAL 49m Global data_breach Mobile Technology / Consumer Electronics HIGH 1h Global ransomware Cybersecurity Services / Multiple Sectors CRITICAL 1h Global apt Cryptocurrency and Blockchain CRITICAL 1h Global malware Financial Services, Mobile Payments HIGH 2h Global vulnerability Government and Critical Infrastructure CRITICAL 5h Global apt Cryptocurrency and Blockchain CRITICAL 13h Global malware Financial Services / Cryptocurrency CRITICAL 13h Global vulnerability Multiple sectors CRITICAL 31m Global vulnerability Information Technology / Software Infrastructure CRITICAL 33m Global data_breach Healthcare CRITICAL 49m Global data_breach Mobile Technology / Consumer Electronics HIGH 1h Global ransomware Cybersecurity Services / Multiple Sectors CRITICAL 1h Global apt Cryptocurrency and Blockchain CRITICAL 1h Global malware Financial Services, Mobile Payments HIGH 2h Global vulnerability Government and Critical Infrastructure CRITICAL 5h Global apt Cryptocurrency and Blockchain CRITICAL 13h Global malware Financial Services / Cryptocurrency CRITICAL 13h
Vulnerabilities

CVE-2021-22991

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
F5 BIG-IP Traffic Management Microkernel Buffer Overflow — The Traffic Management Microkernel of BIG-IP ASM Risk Engine has a buffer overflow vulnerability, leading to a bypassing of URL-based access
Published: Jan 18, 2022  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

F5 BIG-IP Traffic Management Microkernel Buffer Overflow — The Traffic Management Microkernel of BIG-IP ASM Risk Engine has a buffer overflow vulnerability, leading to a bypassing of URL-based access controls.

🤖 AI Executive Summary

CVE-2021-22991 is a critical buffer overflow vulnerability in F5 BIG-IP Traffic Management Microkernel affecting ASM Risk Engine, with CVSS 9.0 severity. Attackers can exploit this to bypass URL-based access controls, potentially gaining unauthorized access to protected resources. Exploitation is actively available, making immediate patching essential for organizations relying on F5 BIG-IP for security enforcement.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 20, 2026 03:57
🇸🇦 Saudi Arabia Impact Assessment
This vulnerability poses critical risk to Saudi banking sector (SAMA-regulated institutions), government agencies (NCA oversight), and energy sector (ARAMCO, oil/gas operations) that rely on F5 BIG-IP for API gateway, load balancing, and WAF protection. Telecom operators (STC, Mobily) using BIG-IP for DDoS mitigation and access control are also at high risk. Exploitation enables attackers to bypass security policies protecting sensitive financial transactions, government systems, and critical infrastructure, potentially leading to data breaches, unauthorized access, and compliance violations under SAMA CSF and NCA ECC 2024.
🏢 Affected Saudi Sectors
Banking and Financial Services Government and Public Administration Energy and Oil & Gas Telecommunications Healthcare E-commerce and Retail
⚖️ Saudi Risk Score (AI)
9.2
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Identify all F5 BIG-IP instances in your environment and verify affected versions (check release notes for vulnerable versions)
2. Isolate or restrict network access to BIG-IP management interfaces
3. Review access logs for suspicious URL-based bypass attempts or unusual traffic patterns
4. Enable enhanced logging on ASM Risk Engine policies

PATCHING:
1. Apply F5 security patches immediately from https://support.f5.com/csp/article/K03009101
2. Test patches in non-production environment first
3. Schedule maintenance windows for production deployment
4. Verify patch installation and ASM Risk Engine functionality post-deployment

COMPENSATING CONTROLS (if patching delayed):
1. Implement network segmentation to restrict access to BIG-IP
2. Deploy additional WAF rules to detect buffer overflow attempts
3. Monitor for exploitation indicators: unusual request sizes, malformed URL patterns
4. Implement rate limiting on URL-based access endpoints
5. Enable request body inspection and size limits

DETECTION:
1. Monitor for HTTP requests with abnormally large URL lengths (>2048 characters)
2. Alert on ASM Risk Engine policy bypass events
3. Track failed access control decisions followed by successful resource access
4. Monitor BIG-IP system logs for microkernel crashes or restarts
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. حدد جميع مثيلات F5 BIG-IP في بيئتك وتحقق من الإصدارات المتأثرة
2. عزل أو تقييد الوصول إلى واجهات إدارة BIG-IP
3. راجع سجلات الوصول للكشف عن محاولات تجاوز قائمة على عناوين URL أو أنماط حركة غير عادية
4. تفعيل السجلات المحسنة على سياسات ASM Risk Engine

التصحيح:
1. طبق تصحيحات أمان F5 فورًا من موقع الدعم الرسمي
2. اختبر التصحيحات في بيئة غير الإنتاج أولاً
3. جدول نوافذ الصيانة لنشر الإنتاج
4. تحقق من تثبيت التصحيح وعمل ASM Risk Engine بعد النشر

الضوابط البديلة:
1. تطبيق تقسيم الشبكة لتقييد الوصول إلى BIG-IP
2. نشر قواعد WAF إضافية للكشف عن محاولات تجاوز المخزن المؤقت
3. مراقبة مؤشرات الاستغلال: أحجام الطلب غير العادية، أنماط عناوين URL المشوهة
4. تطبيق تحديد معدل على نقاط نهاية الوصول المستندة إلى عناوين URL
5. تفعيل فحص جسم الطلب وحدود الحجم

الكشف:
1. مراقبة طلبات HTTP بأطوال عناوين URL غير عادية
2. تنبيهات على أحداث تجاوز سياسة ASM Risk Engine
3. تتبع قرارات التحكم في الوصول الفاشلة متبوعة بالوصول الناجح إلى الموارد
4. مراقبة سجلات نظام BIG-IP للأعطال أو إعادة التشغيل
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
A.5.1.1 - Information Security Policies (access control policy enforcement) A.6.1.2 - Access Control (bypassing URL-based controls violates access restrictions) A.7.1.1 - Cryptography and Security (protection of data in transit) A.8.1.1 - Audit and Accountability (logging of access control decisions)
🔵 SAMA CSF
ID.AC-1 - Access Control (enforcement of access policies) PR.AC-1 - Access Management (identity and access control) DE.CM-1 - Detection and Analysis (monitoring for unauthorized access) RS.MI-1 - Response and Recovery (mitigation of access control bypass)
🟡 ISO 27001:2022
A.5.2.1 - Information Security Policies and Procedures A.6.1.1 - Access Control Policy A.6.2.1 - User Registration and De-registration A.8.1.1 - Audit and Accountability A.12.4.1 - Event Logging
🟣 PCI DSS v4.0
Requirement 1.1 - Firewall Configuration Standards (WAF/BIG-IP enforcement) Requirement 6.5.1 - Injection Flaws (buffer overflow is injection-class vulnerability) Requirement 10.2 - Logging of Access to Cardholder Data
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
F5:BIG-IP Traffic Management Microkernel
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS73.10%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2022-02-01
Published 2022-01-18
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
9.2
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.