TMM Crash on F5 BIG-IP UDP Virtual Server via Undisclosed Requests
CVE-2026-41956 Published on May 13, 2026

BIG-IP TMM Vulnerability
When a classification profile is configured on a UDP virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Vendor Advisory NVD

Vulnerability Analysis

CVE-2026-41956 is exploitable with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality and integrity, and a high impact on availability.

Attack Vector:
NETWORK
Attack Complexity:
LOW
Privileges Required:
NONE
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
NONE
Integrity Impact:
NONE
Availability Impact:
HIGH

Weakness Type

What is a Stack Overflow Vulnerability?

A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).

CVE-2026-41956 has been classified to as a Stack Overflow vulnerability or weakness.


Products Associated with CVE-2026-41956

Want to know whenever a new CVE is published for F5 Networks Big Ip? stack.watch will email you.

 

Affected Versions

F5 BIG-IP: F5 BIG-IP Next CNF: F5 BIG-IP Next for Kubernetes: