Skip to content
Threat Feed
medium threat

CVE-2026-41227: F5 Networks Traffic Management Microkernel (TMM) Process Termination via HTTP/2 Traffic

CVE-2026-41227 describes a vulnerability in an F5 Networks product where undisclosed traffic on an HTTP/2 virtual server with Layer 7 DoS Protection enabled can lead to increased memory consumption and termination of the Traffic Management Microkernel (TMM) process.

CVE-2026-41227 is a vulnerability affecting F5 Networks’ products. When an HTTP/2 virtual server is configured with Layer 7 DoS Protection, undisclosed traffic can trigger excessive memory consumption. This, in turn, causes the Traffic Management Microkernel (TMM) process to terminate, leading to a denial-of-service condition. The vulnerability exists in software versions that have not reached End of Technical Support (EoTS). Successful exploitation of this issue can severely impact the availability of affected F5 services.

Attack Chain

  1. An attacker sends a series of specially crafted HTTP/2 requests to a virtual server.
  2. The virtual server has Layer 7 DoS Protection configured.
  3. The undisclosed traffic triggers excessive memory allocation within the Traffic Management Microkernel (TMM) process.
  4. The TMM process’s memory consumption gradually increases.
  5. The TMM process reaches its memory limit.
  6. The TMM process terminates unexpectedly.
  7. Services relying on the TMM process become unavailable, resulting in a denial-of-service condition.

Impact

Successful exploitation of CVE-2026-41227 results in the termination of the Traffic Management Microkernel (TMM) process. This leads to a denial-of-service condition, impacting the availability of services that rely on the affected F5 device. The number of victims and the specific sectors targeted depend on the deployment and configuration of the F5 devices.

Recommendation

  • Monitor network traffic for anomalous HTTP/2 patterns that could indicate exploitation attempts targeting CVE-2026-41227.
  • Deploy the Sigma rules provided in this brief to your SIEM and tune for your environment.
  • Refer to F5 Networks’ advisory K000158979 for mitigation guidance and software updates.

Detection coverage 2

Detect CVE-2026-41227 Attempt - High Volume HTTP/2 Requests

medium

Detects a potential CVE-2026-41227 exploitation attempt by monitoring for an abnormally high volume of HTTP/2 requests from a single source IP address.

sigma tactics: denial_of_service techniques: T1499.001 sources: network_connection, firewall

Detect CVE-2026-41227 Attempt - HTTP/2 Requests with Specific Header Patterns

low

Detects CVE-2026-41227 exploitation attempt by monitoring for HTTP/2 requests with potentially malicious header patterns known to trigger the vulnerability

sigma tactics: denial_of_service techniques: T1499.001 sources: webserver

Detection queries are available on the platform. Get full rules →