<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>BIG-IP PEM IRules — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/big-ip-pem-irules/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 13 May 2026 16:24:12 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/big-ip-pem-irules/feed.xml" rel="self" type="application/rss+xml"/><item><title>BIG-IP PEM iRules Traffic Management Microkernel (TMM) Termination</title><link>https://feed.craftedsignal.io/briefs/2026-05-big-ip-pem-tmm-termination/</link><pubDate>Wed, 13 May 2026 16:24:12 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-big-ip-pem-tmm-termination/</guid><description>CVE-2026-41218 describes a vulnerability in F5 BIG-IP PEM iRules where undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate, leading to a denial-of-service condition.</description><content:encoded><![CDATA[<p>CVE-2026-41218 describes a vulnerability affecting F5 BIG-IP Policy Enforcement Manager (PEM) iRules. When specific iRules commands are configured on a virtual server (iRules using commands starting with <code>CLASSIFICATION::</code>, <code>CLASSIFY::</code>, <code>PEM::</code>, <code>PSC::</code>, and the <code>urlcatquery</code> command), specially crafted, undisclosed traffic can trigger a termination of the Traffic Management Microkernel (TMM). The vulnerability leads to a denial-of-service condition. This issue does not affect software versions that have reached End of Technical Support (EoTS). The vulnerability was reported by F5 Networks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable BIG-IP system with PEM iRules configured.</li>
<li>The attacker crafts malicious network traffic.</li>
<li>The malicious traffic is sent to the BIG-IP virtual server.</li>
<li>The iRule processes the malicious traffic, specifically using vulnerable commands like <code>CLASSIFICATION::</code>, <code>CLASSIFY::</code>, <code>PEM::</code>, <code>PSC::</code>, or <code>urlcatquery</code>.</li>
<li>The processing of the crafted traffic causes a use-after-free condition in the TMM.</li>
<li>The TMM process crashes due to the memory corruption.</li>
<li>The BIG-IP system experiences a denial-of-service condition.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41218 results in the termination of the Traffic Management Microkernel (TMM), leading to a denial-of-service condition. This impacts the availability of services relying on the BIG-IP system. The severity is rated as High with a CVSS v3.1 score of 7.5.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for patterns exploiting the <code>CLASSIFICATION::</code>, <code>CLASSIFY::</code>, <code>PEM::</code>, <code>PSC::</code>, and <code>urlcatquery</code> commands in iRules as described in the vulnerability details for CVE-2026-41218.</li>
<li>Deploy the Sigma rule <code>Detect BIG-IP PEM iRules TMM Termination Attempt</code> to detect potential exploitation attempts by analyzing network traffic targeting the BIG-IP system.</li>
<li>Refer to F5 Networks advisory K000160875 for mitigation steps and affected versions.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>dos</category><category>f5</category><category>big-ip</category></item></channel></rss>