{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-11T12:30:26.766","vulnerabilities":[{"cve":{"id":"CVE-2021-22999","sourceIdentifier":"f5sirt@f5.com","published":"2021-03-31T18:15:15.160","lastModified":"2024-11-21T05:51:07.523","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"On versions 15.0.x before 15.1.0 and 14.1.x before 14.1.4, the BIG-IP system provides an option to connect HTTP/2 clients to HTTP/1.x servers. When a client is slow to accept responses and it closes a connection prematurely, the BIG-IP system may indefinitely retain some streams unclosed. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated."},{"lang":"es","value":"En las versiones 15.0.x anteriores a 15.1.0 y 14.1.x anteriores a 14.1.4, el sistema BIG-IP ofrece una opción para conectar clientes HTTP/2 a servidores HTTP/1.x.&#xa0;Cuando un cliente tarda en aceptar respuestas y cierra una conexión prematuramente, el sistema BIG-IP puede retener indefinidamente algunos flujos sin cerrar.&#xa0;Nota: No se evalúan las versiones de software que han alcanzado End of Software Development (EoSD)."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndExcluding":"14.1.4","matchCriteriaId":"FB553A20-D521-4A32-AD49-8FFD5A95E684"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0.0","versionEndExcluding":"15.1.0","matchCriteriaId":"FC5CA1E2-341C-42A9-88AC-E6C83DED0B9D"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndExcluding":"14.1.4","matchCriteriaId":"DD3FC6D2-5816-47C0-81AE-DED62570F090"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0.0","versionEndExcluding":"15.1.0","matchCriteriaId":"16EBA08B-8FBD-47BE-A5BE-F5145788E8CB"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndExcluding":"14.1.4","matchCriteriaId":"DB183373-A897-43DF-A544-364E59358F30"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0.0","versionEndExcluding":"15.1.0","matchCriteriaId":"E916F91A-28F6-4CF2-A5EA-E4F4A2598039"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndExcluding":"14.1.4","matchCriteriaId":"F2442894-A473-49A5-95B6-6312C3407FE6"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0.0","versionEndExcluding":"15.1.0","matchCriteriaId":"9228FA0A-8745-4731-A214-5A8AC0AA902A"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndExcluding":"14.1.4","matchCriteriaId":"78F5DCAD-BE4E-4D57-82CD-ADAB32691A9E"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0.0","versionEndExcluding":"15.1.0","matchCriteriaId":"8BC7ABB7-2FA9-42CA-9BEF-241A91F317FF"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndExcluding":"14.1.4","matchCriteriaId":"8B318D4F-0D42-46CD-A5A9-02337BB1D2F2"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0.0","versionEndExcluding":"15.1.0","matchCriteriaId":"E08E3F72-4CEF-4607-8B27-515E6471B9D1"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndExcluding":"14.1.4","matchCriteriaId":"AE2899E6-ABEF-4B61-AB8D-AF060D571196"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0.0","versionEndExcluding":"15.1.0","matchCriteriaId":"9B58CDE9-5ADF-451E-B1F2-25C0954995B8"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndExcluding":"14.1.4","matchCriteriaId":"F7C6025C-7283-4568-929B-CFA11423E179"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0.0","versionEndExcluding":"15.1.0","matchCriteriaId":"9BE59364-3DB3-4528-AFC4-D3A39872514D"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndExcluding":"14.1.4","matchCriteriaId":"BBBAD42C-06D5-437F-AB92-1DCC23C1A78B"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0.0","versionEndExcluding":"15.1.0","matchCriteriaId":"F14F10D9-4F2D-4C6D-8B0C-9775ED35DFEF"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndExcluding":"14.1.4","matchCriteriaId":"3DB5F9D2-C452-4469-9626-15FA11960A9C"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0.0","versionEndExcluding":"15.1.0","matchCriteriaId":"14CEF743-6C3B-4D90-99BF-6A27B37ADAEA"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndExcluding":"14.1.4","matchCriteriaId":"57388787-F9DF-4930-ACBC-F3D1DAA53190"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0.0","versionEndExcluding":"15.1.0","matchCriteriaId":"542EB351-79B1-4A9D-A5A1-2F3E0E88963C"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndExcluding":"14.1.4","matchCriteriaId":"0AF0D639-0210-47D0-8680-6E09F0111D5D"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0.0","versionEndExcluding":"15.1.0","matchCriteriaId":"895E610D-52F6-45CA-B205-D110A1DC6BEC"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndExcluding":"14.1.4","matchCriteriaId":"704DF342-2CB5-4791-BF30-294D07B53653"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0.0","versionEndExcluding":"15.1.0","matchCriteriaId":"4B114C6C-E950-4B75-B341-022799ABBACF"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:ssl_orchestrator:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndExcluding":"14.1.4","matchCriteriaId":"C3FE49A0-46B4-49A1-92A4-1BEA5BF48CDF"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:ssl_orchestrator:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0.0","versionEndExcluding":"15.1.0","matchCriteriaId":"E71B1ACE-371A-4B0E-9BF0-8357E4C773E2"}]}]}],"references":[{"url":"https://support.f5.com/csp/article/K02333782","source":"f5sirt@f5.com","tags":["Vendor Advisory"]},{"url":"https://support.f5.com/csp/article/K02333782","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}