<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>BIG-IP Virtual Edition (VE) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/big-ip-virtual-edition-ve/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 13 May 2026 16:22:47 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/big-ip-virtual-edition-ve/feed.xml" rel="self" type="application/rss+xml"/><item><title>BIG-IP VE TMM Termination Vulnerability (CVE-2026-40618)</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-40618/</link><pubDate>Wed, 13 May 2026 16:22:47 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-40618/</guid><description>CVE-2026-40618 describes a vulnerability in F5 BIG-IP Virtual Edition (VE) where specific traffic can cause the Traffic Management Microkernel (TMM) to terminate when an SSL profile is configured without Intel QuickAssist Technology (QAT) or with crypto.hwacceleration disabled, potentially leading to a denial-of-service.</description><content:encoded><![CDATA[<p>CVE-2026-40618 affects F5 BIG-IP Virtual Edition (VE) and hardware platforms where the Traffic Management Microkernel (TMM) can be terminated due to undisclosed traffic conditions. This occurs when an SSL profile is configured on a virtual server without Intel QuickAssist Technology (QAT) support, or when the database variable <code>crypto.hwacceleration</code> is set to disabled. Exploitation results in a denial-of-service condition, impacting availability. F5 has not evaluated software versions that have reached End of Technical Support (EoTS). The vulnerability was reported on May 13, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable BIG-IP VE instance without Intel QAT or with <code>crypto.hwacceleration</code> disabled.</li>
<li>The attacker crafts specific network traffic targeting a virtual server configured with an SSL profile.</li>
<li>The malicious traffic is sent to the targeted BIG-IP VE instance.</li>
<li>Due to a calculation error (CWE-131) when processing the SSL traffic, the Traffic Management Microkernel (TMM) experiences a fault.</li>
<li>The TMM process terminates unexpectedly.</li>
<li>The BIG-IP system experiences a denial-of-service condition, as the TMM is responsible for handling traffic.</li>
<li>Legitimate users are unable to access services provided by the BIG-IP VE instance.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40618 results in a denial-of-service condition on the affected BIG-IP VE instance. This means that the device becomes unavailable, disrupting network services and potentially impacting business operations. The severity is rated high due to the ease of exploitation (low attack complexity, no privileges required).</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for anomalous SSL connections that may be attempting to trigger the vulnerability (see Sigma rule <code>Detect Unusual SSL Traffic to BIG-IP</code>).</li>
<li>Refer to F5&rsquo;s advisory K000158082 for specific mitigation steps and recommended configurations.</li>
<li>Enable Intel QuickAssist Technology (QAT) on BIG-IP VE instances where possible to prevent exploitation if the root cause relates to software crypto implementation.</li>
<li>Ensure that the <code>crypto.hwacceleration</code> database variable is properly configured according to F5&rsquo;s recommendations.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve</category><category>dos</category><category>big-ip</category></item></channel></rss>