<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>BIG-IP Configuration Utility — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/big-ip-configuration-utility/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 13 May 2026 16:21:23 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/big-ip-configuration-utility/feed.xml" rel="self" type="application/rss+xml"/><item><title>BIG-IP Configuration Utility LDAP Authentication Denial-of-Service (CVE-2026-39455)</title><link>https://feed.craftedsignal.io/briefs/2026-05-bigip-ldap-dos/</link><pubDate>Wed, 13 May 2026 16:21:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-bigip-ldap-dos/</guid><description>CVE-2026-39455 describes a denial-of-service vulnerability in the BIG-IP Configuration utility when configured with LDAP authentication, where undisclosed traffic can cause the httpd process to exhaust file descriptors.</description><content:encoded><![CDATA[<p>CVE-2026-39455 affects the F5 BIG-IP Configuration utility. When the utility is configured to use Lightweight Directory Access Protocol (LDAP) for authentication, a specific type of undisclosed network traffic can trigger a denial-of-service condition. This occurs due to the httpd process exhausting available file descriptors, preventing legitimate users from accessing or managing the BIG-IP system. Exploitation requires the BIG-IP system to be configured for LDAP authentication. Software versions that have reached End of Technical Support (EoTS) are not evaluated.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends undisclosed traffic to the BIG-IP Configuration utility.</li>
<li>The BIG-IP Configuration utility attempts to process the malicious traffic via the httpd process.</li>
<li>Due to the nature of the traffic and the LDAP configuration, the httpd process starts to open file descriptors.</li>
<li>The attacker continues to send the malicious traffic, causing the httpd process to rapidly consume available file descriptors.</li>
<li>The httpd process reaches the system&rsquo;s limit on open file descriptors.</li>
<li>Subsequent requests to the httpd process fail, as it cannot open new file descriptors to handle them.</li>
<li>Legitimate users are unable to access the BIG-IP Configuration utility, resulting in a denial-of-service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack exploiting CVE-2026-39455 results in a denial-of-service condition, rendering the BIG-IP Configuration utility inaccessible. Administrators are unable to manage or configure the BIG-IP system via the web interface, potentially impacting network operations and security. The severity is rated as High by F5 Networks with a CVSS v3.1 score of 7.5.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for unusual patterns or high request rates targeting the BIG-IP Configuration utility to identify potential exploitation attempts.</li>
<li>Deploy the Sigma rule provided below to detect potential file descriptor exhaustion events related to the httpd process.</li>
<li>Refer to F5&rsquo;s advisory K000160874 for mitigation guidance and software updates.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>denial-of-service</category><category>cve</category></item></channel></rss>