F5 BIG-IP APM Undisclosed Traffic Denial-of-Service Vulnerability (CVE-2026-40067)
A vulnerability exists in F5 BIG-IP APM where, when an APM access policy is configured on a virtual server, undisclosed network traffic can cause the apmd process to terminate, resulting in a denial of service (CVE-2026-40067).
A denial-of-service vulnerability exists in F5 BIG-IP Access Policy Manager (APM). When an APM access policy is configured on a virtual server, sending undisclosed traffic can trigger a termination of the apmd process. This vulnerability is identified as CVE-2026-40067 and has a CVSS v3.1 base score of 7.5. Successful exploitation results in a denial of service, impacting the availability of the affected virtual server. Software versions that have reached End of Technical Support (EoTS) are not evaluated. Defenders should apply relevant patches or mitigations from F5 Networks.
Attack Chain
Due to the limited information available, a precise attack chain cannot be defined. However, a plausible attack chain involves the following general steps:
- An attacker identifies a BIG-IP virtual server with an active APM access policy.
- The attacker crafts malicious network traffic. Details of the traffic are undisclosed in the vulnerability report.
- The attacker sends the crafted traffic to the virtual server.
- The APM processes the traffic via the
apmdprocess. - The vulnerability within the
apmdprocess is triggered due to the malicious traffic. - The
apmdprocess terminates unexpectedly. - The virtual server becomes unavailable due to the termination of the
apmdprocess. - Legitimate users are unable to access resources protected by the APM access policy.
Impact
Successful exploitation of CVE-2026-40067 results in a denial-of-service condition on the targeted BIG-IP virtual server. This means legitimate users will be unable to access applications and services protected by the APM access policy. The NVD entry for this CVE lists a CVSS v3.1 base score of 7.5, indicating a high impact on availability. The number of affected organizations will depend on the prevalence of vulnerable BIG-IP APM configurations.
Recommendation
- Review and apply the mitigations or patches provided by F5 Networks in their security advisory K000161056 to address CVE-2026-40067.
- Monitor network traffic for anomalies that may indicate exploitation attempts targeting BIG-IP APM (consider deploying generic DoS rules as a temporary measure).
- Implement the Sigma rule
Detect BIG-IP APM apmd Process Crashto identify unexpected terminations of theapmdprocess, which could signal exploitation of CVE-2026-40067.
Detection coverage 2
Detect BIG-IP APM apmd Process Crash
mediumDetects unexpected termination of the apmd process, potentially indicating exploitation of CVE-2026-40067.
Detect BIG-IP APM apmd Process Crash (Syslog)
mediumDetects unexpected termination of the apmd process, potentially indicating exploitation of CVE-2026-40067, from Syslog events.
Detection queries are available on the platform. Get full rules →