BIG-IP 17.5.1.4 Fixes and Known Issues
Version: 17.5.1.4
Build: 20.0
Note: This content is current as of the software release date
Updates to bug information occur periodically. For the most up-to-date bug data, see Bug Tracker.
| The blue background highlights fixes |
Cumulative fixes from BIG-IP v17.5.1.3 that are included in this release
Cumulative fixes from BIG-IP v17.5.1.2 that are included in this release
Cumulative fixes from BIG-IP v17.5.1.1 that are included in this release
Cumulative fixes from BIG-IP v17.5.1 that are included in this release
Known Issues in BIG-IP v17.5.x
Vulnerability Fixes
| ID Number | CVE | Links to More Info | Description | Fixed Versions |
| 2144389-2 | CVE-2025-40780 | K000157948, BT2144389 | CVE-2025-40780 BIND vulnerability | 17.5.1.4 |
| 2140621-1 | CVE-2025-8677 | K000157317, BT2140621 | CVE-2025-8677: Resource exhaustion via malformed DNSKEY handling | 17.5.1.4 |
| 928905-11 | CVE-2020-11022 | K02453220, BT928905 | jQuery vulnerability CVE-2020-11022 | 21.0.0, 17.5.1.4 |
| 551462-6 | CVE-2014-9730 | K17447 | CVE-2014-9730 - Linux Kernel UDF Filesystem Denial of Service Vulnerability | 17.5.1.4 |
| 1988993 | CVE-2024-42516 | K000153074 | CVE-2024-42516 Apache HTTP Server vulnerability | 17.5.1.4 |
| 1983349 | CVE-2023-2454, CVE-2023-39417, CVE-2023-39418, CVE-2023-5868, CVE-2023-5869, CVE-2023-5870 | K000152931 | CVE-2023-2454, CVE-2023-39417, CVE-2023-39418, CVE-2023-5868, CVE-2023-5869, CVE-2023-5870 PostgreSQL vulnerabilities | 17.5.1.4 |
| 1966849 | CVE-2023-5869 | K000152931, BT1966849 | CVE-2023-5869 postgresql: Buffer overrun from integer overflow in array modification | 21.0.0, 17.5.1.4, 17.1.3 |
| 1966841 | CVE-2023-39417 | K000152931, BT1966841 | CVE-2023-39417 postgresql: extension script @substitutions@ within quoting allow SQL injection | 21.0.0, 17.5.1.4 |
| 1966785 | CVE-2023-2454 | K000152931, BT1966785 | CVE-2023-2454 postgresql: schema_element defeats protective search_path changes | 21.0.0, 17.5.1.4 |
| 1893473-1 | CVE-2021-40438 | K01552024 | Apache vulnerability CVE-2021-40438 | 17.5.1.4 |
| 1893309-1 | CVE-2021-23337 | K12492858 | CVE-2021-23337 on HostOS: Command Injection via template function.\n' 'Link:https://sn | 17.5.1.4 |
| 1892025-1 | CVE-2019-11236 | K000135001 | CVE-2019-11236 python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service | 21.0.0, 17.5.1.4, 17.1.3 |
| 1590625-5 | CVE-2023-1667 | K000148495, BT1590625 | CVE-2023-1667 libssh: NULL pointer dereference vulnerability | 21.0.0, 17.5.1.4 |
| 1505309-2 | CVE-2021-23337 | K12492858 | CVE-2021-23337 nodejs-lodash: command injection via template | 17.5.1.4 |
| 1498949-5 | CVE-2023-2283 | K000138682 | CVE-2023-2283 libssh: authorization bypass in pki_verify_data_signature | 17.5.1.4 |
| 1136113-8 | CVE-2022-25647 | K00994461, BT1136113 | CVE-2022-25647: GSON Vulnerability | 21.0.0, 17.5.1.4 |
| 993681-9 | CVE-2019-18282 | K32380005, BT993681 | CVE-2019-18282 Kernel: Device Tracking Vulnerability | 21.0.0, 17.5.1.4 |
| 714238-13 | CVE-2018-1301 | K78131906 | CVE-2018-1301: Apache Vulnerability | 17.5.1.4 |
| 2053165-3 | CVE-2025-47268 | K000158112 | CVE-2025-47268 iputils: Signed Integer Overflow in Timestamp Multiplication in iputils ping | 17.5.1.4 |
| 1893905-1 | CVE-2023-40217 | K000139685 | Python vulnerability CVE-2023-40217 | 17.5.1.4 |
| 1209209 | CVE-2022-28733 | K000132893, BT1209209 | CVE-2022-28733 grub2: Integer underflow in grub_net_recv_ip4_packets | 21.0.0, 17.5.1.4 |
| 1086325-2 | CVE-2016-4658 | K49419538 | CVE-2016-4658 libxml2 vulnerability | 17.5.1.4 |
| 1005097-3 | CVE-2020-17507 | K11542555, BT1005097 | CVE-2020-17507: Vulnerability in Phantomjs | 21.0.0, 17.5.1.4 |
| 1590509-5 | CVE-2023-32573 | K000148690, BT1590509 | CVE-2023-32573 qt: Uninitialized variable usage in m_unitsPerEm | 21.0.0, 17.5.1.4, 17.1.3 |
Functional Change Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 944817-10 | 3-Major | Improper IP based access access restrictions via HTTPD | 21.0.0, 17.5.1.4 | |
| 578989-15 | 3-Major | Maximum request body size is limited to 25 MB | 17.5.1.4 | |
| 1589269-3 | 3-Major | BT1589269 | The maximum value of sys db provision.extramb was reduced from 8192 to 4096 MB★ | 17.5.1.4 |
TMOS Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1925485-1 | 0-Unspecified | CVE-2020-12655 kernel: sync of excessive duration via an XFS v5 image with crafted metadata | 17.5.1.4 | |
| 1925369-1 | 0-Unspecified | CVE-2018-10322 kernel: Invalid pointer dereference in xfs_ilock_attr_map_shared() when mounting crafted xfs image allowing denial of service | 17.5.1.4 | |
| 1925045-1 | 0-Unspecified | Linux Kernel Btrfs Information Leak Vulnerability (CVE-2024-35849) | 17.5.1.4 | |
| 1925029-1 | 0-Unspecified | CVE-2023-1611 - Linux Kernel btrfs Use-After-Free Vulnerability Leading to System Crash and Information Leak | 17.5.1.4 | |
| 1923997-1 | 0-Unspecified | CVE-2023-1668-openvswitch: ip proto 0 triggers incorrect handling | 17.5.1.4 | |
| 1893369-1 | 0-Unspecified | CVE-2021-33033 kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c | 17.5.1.4 | |
| 2137653-1 | 1-Blocking | BT2137653 | Unable to upload files that contain a colon in the filename★ | 21.0.0, 17.5.1.4 |
| 2130485 | 1-Blocking | BT2130485 | Warning: the current license is not valid - Fault code: 51133 | 17.5.1.4 |
| 935633-3 | 2-Critical | BT935633 | VCMP guests or F5OS tenants may experience constant clusterd restart after host upgrade★ | 17.5.1.4 |
| 901989-10 | 2-Critical | BT901989 | Corruption detected in /var/log/btmp | 17.5.1.4 |
| 2197173-2 | 2-Critical | Insufficient sanitization in SNMP configuration | 17.5.1.4 | |
| 2162849 | 2-Critical | BT2162849 | Removing the active controller does not trigger an immediate tenant failover | 17.5.1.4 |
| 2132125-4 | 2-Critical | K000157248, BT2132125 | Unable to upload QKView to iHealth | 21.0.0, 17.5.1.4 |
| 2130965-1 | 2-Critical | BT2130965 | Unable to create VELOS tenant with any subnet other than /24 | 21.0.0, 17.5.1.4 |
| 2125953-1 | 2-Critical | Insufficient access control to REST endpoint and TMSH for some CLI versions. | 17.5.1.4 | |
| 2078797-1 | 2-Critical | K000156885, BT2078797 | LTM Policy actions fail to render in configuration utility (web UI)★ | 21.0.0, 17.5.1.4 |
| 2077297-1 | 2-Critical | BT2077297 | HA Group List page in webUI shows a blank page | 21.0.0, 17.5.1.4 |
| 2047593 | 2-Critical | BT2047593 | Blade upgrade fails with the "HAL unexpected init failure (continuing) : Unknown slot for ChassisBase" error message★ | 21.0.0, 17.5.1.4 |
| 2044417-1 | 2-Critical | BT2044417 | Connectivity problems and eal-intr-thread cores on Azure using >= 6 interfaces | 21.0.0, 17.5.1.4 |
| 2007705-1 | 2-Critical | BT2007705 | HSL can incorrectly handle pending TCP connections leading to a TMM crash | 21.0.0, 17.5.1.4 |
| 1959549-1 | 2-Critical | BT1959549 | Upgrade to 17.5.0 or later overwrites #TMSH-VERSION in bigip_base.conf when source UCS is pre-17.5.0★ | 17.5.1.4 |
| 1826345-5 | 2-Critical | Security improvements in ca-bundle.crt | 17.5.1.4 | |
| 1783677-2 | 2-Critical | BT1783677 | HSB v3.11.8.0 bitstream release for VIPRION B4450N and B4460N blades | 17.5.1.4 |
| 936829-11 | 3-Major | TMUI Dashboard Hardening | 21.0.0, 17.5.1.4 | |
| 685626-12 | 3-Major | iControl REST improper sanitisation of data | 21.0.0, 17.5.1.4 | |
| 566995-6 | 3-Major | BT566995 | bgpd might crash in rare circumstances. | 17.5.1.4 |
| 528314-4 | 3-Major | K16816, BT528314 | Generating new default certificate and key pairs for BIG-IP ssl profiles via CLI will not be reflected in GUI or in tmsh | 17.5.1.4 |
| 2187529-1 | 3-Major | CVE-2025-12818: postgresql: libpq undersizes allocations, via integer wraparound | 17.5.1.4 | |
| 2161077 | 3-Major | BT2161077 | Bot profile properties page does not load when there are large number of SSL certs (> 1000) | 17.5.1.4 |
| 2152877-2 | 3-Major | Exclude /opt/CrowdStrike directory from Integrity Test | 17.5.1.4 | |
| 2152301 | 3-Major | BT2152301 | After upgrading from version 17.1.2 to 17.5.1.3, the guest-role user is unable to run the command show running-config in TMSH.★ | 17.5.1.4 |
| 2150525-2 | 3-Major | Improvements in iControl SOAP | 17.5.1.4 | |
| 2150489-4 | 3-Major | BT2150489 | Most DB keys encrypted by SecureVault master key are not persisted to BigDB.dat when the system master key is changed. | 17.5.1.4 |
| 2144497-3 | 3-Major | BT2144497 | Mellanox driver timeouts and packet drops on Azure instances with high NIC count | 17.5.1.4 |
| 2144445-2 | 3-Major | Insufficient sanitization in TMSH | 17.5.1.4 | |
| 2140905-2 | 3-Major | BT2140905 | System Integrity Test on VE is halting the whole system in FIPS mode | 17.5.1.4 |
| 2137977-1 | 3-Major | BT2137977 | Clicking on a policy in a virtual server's resource page navigates to the full policy list, instead of the specific policy★ | 17.5.1.4 |
| 213618-2 | 3-Major | Resetting DB variable to default does not always work | 21.0.0, 17.5.1.4 | |
| 2130601-1 | 3-Major | TMUI Request Processing Improvement | 21.0.0, 17.5.1.4 | |
| 2119173-1 | 3-Major | BT2119173 | The ACTIVE or STANDBY buttons in the webUI are not working | 21.0.0, 17.5.1.4 |
| 2098861-1 | 3-Major | BT2098861 | Single-NIC not supported on Azure Standard_Ds_v5 Series. | 21.0.0, 17.5.1.4 |
| 2078297-1 | 3-Major | Unexpected PVA traffic spike | 17.5.1.4 | |
| 2063265-2 | 3-Major | Improvements in HTTP headers | 17.5.1.4 | |
| 2058989-1 | 3-Major | TMUI hardening | 21.0.0, 17.5.1.4 | |
| 2058977-1 | 3-Major | TMUI hardening | 21.0.0, 17.5.1.4 | |
| 2053533-4 | 3-Major | Security improvements in TMSH and certain log files | 21.0.0, 17.5.1.4 | |
| 1974701-1 | 3-Major | BT1974701 | PVA stats may be double incremented when pva mode is dedicated | 17.5.1.4 |
| 1968033-1 | 3-Major | Remove the unused ImageMagick package from BIG-IP | 21.0.0, 17.5.1.4 | |
| 1966941-2 | 3-Major | BT1966941 | High CPU or increased translation errors following upgrade or restart when DAG distribution changes | 17.5.1.4 |
| 1966633-1 | 3-Major | BT1966633 | Non-eth0 management interface unbound after tmm restart on 17.5.0 in AWS★ | 17.5.1.4 |
| 1849265-4 | 3-Major | BT1849265 | A VCMP guest may not exit hardware syncookie mode | 17.5.1.4 |
| 1813505-2 | 3-Major | BT1813505 | Snmpd may seg fault on systems with large amounts of virtual memory | 17.5.1.4 |
| 1755413-2 | 3-Major | BT1755413 | Fast scp file transfer may not display progress bar | 21.0.0, 17.5.1.4 |
| 1731025-4 | 3-Major | Insufficient sanitization in BIGIP GUI | 21.0.0, 17.5.1.4 | |
| 1677429-4 | 3-Major | BT1677429 | BFD: TMM might not agree on session ownership. | 17.5.1.4 |
| 1670465-4 | 3-Major | BT1670465 | TMMs might not agree on session ownership when multiple cluster geometry changes occur. | 17.5.1.4 |
| 1580369-4 | 3-Major | BT1580369 | MCPD thrown exception when syncing from active device to standby device. | 17.5.1.4 |
| 1450481-5 | 3-Major | TMSH hardening | 17.5.1.4 | |
| 1403869-5 | 3-Major | BT1403869 | CONNFLOW_FLAG_DOUBLE_LB flows might route traffic to a stale next hop | 17.5.1.4 |
| 1377737-3 | 3-Major | BT1377737 | SSL Orchestrator does not pass traffic when MAC masquerading is configured on R4k or R2k systems | 17.5.1.4, 17.1.3 |
| 1144057-8 | 3-Major | K05403841 | BIG-IP and BIG-IQ improvements disclosed by Rapid7 | 21.0.0, 17.5.1.4 |
| 1137269 | 3-Major | BT1137269 | MCPD fails to reply if a request is proxied to another daemon and the connection to that daemon closes | 17.5.1.4 |
| 1029173-6 | 3-Major | BT1029173 | MCPD fails to reply and does not log a valid message if there are problems replicating a transaction to PostgreSQL | 21.0.0, 17.5.1.4 |
| 761853-2 | 4-Minor | Send HOST header in OCSP responder request | 17.5.1.4 | |
| 659579-8 | 4-Minor | BT659579 | Timestamps in icrd, restjavad, and restnoded logs are not synchronized with the system time | 17.5.1.4 |
| 2186153-4 | 4-Minor | CVE-2025-8194 cpython: Cpython infinite loop when parsing a tarfile | 17.5.1.4 | |
| 2163321-1 | 4-Minor | BT2163321 | Broken Address List hyperlink in the destination field of Virtual Server list | 17.5.1.4 |
| 2035641-4 | 4-Minor | APMd resource exhaustion | 17.5.1.4 | |
| 1966669-2 | 4-Minor | BT1966669 | [PVA] Provide a DB variable disabling NAT46/64 snoop inserts. | 17.5.1.4 |
| 1959513-4 | 4-Minor | CVE-2023-52803 kernel: SUNRPC: Fix RPC client cleaned up the freed pipefs dentries | 21.0.0, 17.5.1.4, 17.1.3 | |
| 1923657-1 | 4-Minor | CVE-2022-41858 kernel: null-ptr-deref vulnerabilities in sl_tx_timeout in drivers/net/slip | 21.0.0, 17.5.1.4 | |
| 1624701-4 | 4-Minor | Security improvement in BIGIP GUI | 17.5.1.4 | |
| 1325737-1 | 4-Minor | BT1325737 | Standby tenant cannot access floating traffic group when MAC masquerade is enabled | 17.5.1.4, 17.1.3 |
| 1178225-4 | 4-Minor | Scalability issues with F5-VE deployments | 17.5.1.4 | |
| 1128685-1 | 4-Minor | BT1128685 | REST API requests using deleted expired tokens returns xml response when authentication fails | 21.0.0, 17.5.1.4 |
| 1052477-4 | 4-Minor | CVE-2020-10751 kernel: SELinux netlink permission check bypass | 17.5.1.4 | |
| 1052253-8 | 4-Minor | CVE-2018-13095 kernel: NULL pointer dereference in fs/xfs/libxfs/xfs_inode_buf.c | 21.0.0, 17.5.1.4, 17.1.3 |
Local Traffic Manager Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1923817-1 | 0-Unspecified | CVE-2017-11499: Constant Hashtable Seeds vulnerability (NodeJS v6.9.1) | 17.5.1.4 | |
| 1923793-1 | 0-Unspecified | CVE-2019-5739: DoS with keep-alive HTTP connection | 17.5.1.4 | |
| 2198781 | 1-Blocking | BIG-IP high availability (HA) systems may experience an unexpected active-active state after an upgrade | 17.5.1.4 | |
| 2162705-1 | 1-Blocking | BT2162705 | Tmm restarting on multi-NUMA AWS instances with ENA interfaces★ | 17.5.1.4 |
| 2047569-1 | 1-Blocking | BT2047569 | TMM may crash during the startup with SR-IOV Intel E810 NIC | 21.0.0, 17.5.1.4 |
| 1785385-2 | 1-Blocking | BT1785385 | Intermittent traffic failures when tenant is running BIG-IP v17.1.2 or above and host is on version prior to F5OS-A 1.8.0 or F5OS-C 1.8.0★ | 17.5.1.4 |
| 2152785-2 | 2-Critical | TMM may crash under certain conditions. | 17.5.1.4 | |
| 2137581-1 | 2-Critical | TMM core may occur under certain conditions | 21.0.0, 17.5.1.4 | |
| 2132165-2 | 2-Critical | BT2132165 | SMTP, SSH/SFTP, FTP connections fail after enabling tm.tcpstopblindinjection | 21.0.0, 17.5.1.4 |
| 2131085-1 | 2-Critical | BT2131085 | Running 'tmsh reboot slot all' on multi-slot tenant or vCMP guest causes it to get stuck in unhealthy state | 17.5.1.4 |
| 2038393-3 | 2-Critical | BT2038393 | Looped dtls virtual can cause crash due to NULL dereference | 17.5.1.4 |
| 1825357-2 | 2-Critical | BT1825357 | Possible tmm crash or traffic loss after making vlan interface changes with an empty trunk | 17.5.1.4 |
| 1539997-2 | 2-Critical | BT1539997 | Secure HA connections cannot be established due to zombie HA flow | 17.5.1.4 |
| 1481889-4 | 2-Critical | BT1481889 | High CPU utilization or crash when CACHE_REQUEST iRule parks. | 17.5.1.4 |
| 1009161-5 | 2-Critical | BT1009161 | SSL mirroring protect for null sessions | 21.0.0, 17.5.1.4, 15.1.5.1, 14.1.4.5 |
| 901569-7 | 3-Major | BT901569 | Loopback traffic might get dropped when VLAN filter is enabled for a virtual server. | 17.5.1.4 |
| 783077-4 | 3-Major | BT783077 | IPv6 host defined via static route unreachable after BIG-IP reboot | 17.5.1.4 |
| 2183353-1 | 3-Major | BT2183353 | TMM Intel E810 VF driver updates the link state with 1 second delay | 17.5.1.4 |
| 2149233-2 | 3-Major | TMM crashes when using SSL | 17.5.1.4 | |
| 2130729-1 | 3-Major | BT2130729 | HTTP::respond not working properly with HTTP3/quic - content not sent | 21.0.0, 17.5.1.4 |
| 2035177-1 | 3-Major | BT2035177 | Use of OCSP responder with SSL C3D enabled in virtual server may leak SSL handshake instances | 17.5.1.4 |
| 2035129-4 | 3-Major | BT2035129 | The CMP stream communication between tmms on different blades might stall after a tmm memory exhaustion event | 21.0.0, 17.5.1.4 |
| 1987309-2 | 3-Major | BT1987309 | Bigd may get stuck in legacy mode | 17.5.1.4 |
| 1934397-2 | 3-Major | BT1934397 | SSL Orchestrator l2 inline monitor failure on r2000 or r4000 tenants | 21.0.0, 17.5.1.4, 17.1.3 |
| 1889845-1 | 3-Major | Improvements in Radius Monitor | 17.5.1.4 | |
| 1824985-3 | 3-Major | BT1824985 | In rare cases the Nitrox hardware compression queue may stop servicing requests. | 17.5.1.4 |
| 1758961-4 | 3-Major | BT1758961 | TMM may core if proxy_common_init errors out due to inappropriate NAT configuration | 21.0.0, 17.5.1.4 |
| 1753569-4 | 3-Major | CVE-2022-39353: node-xmldom vulnerability | 21.0.0, 17.5.1.4 | |
| 1623921-3 | 3-Major | BT1623921 | IPencap monitor probes from bigd are prone to connection re-use. | 17.5.1.4 |
| 1602641-5 | 3-Major | BT1602641 | Configuring verified-accept and SSL mirroring on the same virtual results in stalled connections. | 21.0.0, 17.5.1.4 |
| 1577161 | 3-Major | BT1577161 | BIG-IP tries to resume SSL sessions when session ID only matches partially | 21.0.0, 17.5.1.4, 16.1.6.1, 15.1.10.8 |
| 1474877-4 | 3-Major | BT1474877 | Unable to download large files through VIP due RST Compression error. | 17.5.1.4 |
| 1473913-6 | 3-Major | BT1473913 | Proxy Connections drop due to wrong counting | 17.5.1.4, 17.1.3, 16.1.6 |
| 1440409-6 | 3-Major | BT1440409 | TMM might crash or leak memory with certain logging configurations | 17.5.1.4 |
| 1380009-5 | 3-Major | BT1380009 | TLS 1.3 server-side resumption resulting in TMM crash due to NULL session | 17.5.1.4 |
| 1325649-3 | 3-Major | BT1325649 | POST request with "Expect: 100-Continue" and HTTP::collect + HTTP::release is not being passed to pool member | 17.5.1.4, 17.1.3 |
| 1271341-4 | 3-Major | Unable to use DTLS without TMM crashing | 17.5.1.4 | |
| 1190753-1 | 3-Major | BT1190753 | HTTP/2 Virtual Server ignores customized HTTP known-methods list | 21.0.0, 17.5.1.4 |
| 1173825-4 | 3-Major | Improper sanitisation in Qkview data | 21.0.0, 17.5.1.4 | |
| 857973-1 | 4-Minor | BT857973 | GUI sets FQDN Pool Member "Auto Populate" value Enabled by default | 17.5.1.4 |
| 2016041-1 | 4-Minor | BT2016041 | Remove the unused DynaCache Package | 21.0.0, 17.5.1.4 |
| 1953369-1 | 4-Minor | BT1953369 | DB monitor queries repeatedly if recv string configured but response does not match | 17.5.1.4 |
| 1756697-3 | 4-Minor | BT1756697 | Sec-WebSocket-Extensions header is not stripped when Compression is disabled | 21.0.0, 17.5.1.4 |
| 1670225-4 | 4-Minor | BT1670225 | 'Last Error' field remains empty after initial monitor Down status post-reboot | 21.0.0, 17.5.1.4 |
| 1429861-2 | 4-Minor | CVE-2019-5737: HTTP or HTTPS Denial of Service in keep-alive mode (NodeJS v6) | 17.5.1.4 | |
| 1004953-7 | 4-Minor | BT1004953 | HTTP does not fall back to HTTP/1.1★ | 17.5.1.4 |
Performance Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1574521-2 | 5-Cosmetic | BT1574521 | Intermittent high packet latency on R4000 and R2000 tenants | 17.5.1.4 |
Global Traffic Manager (DNS) Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1821089-4 | 2-Critical | BT1821089 | DNS64 and resolver cache may not function together as expected | 21.0.0, 17.5.1.4 |
| 2172069-2 | 3-Major | BT2172069 | GTM topology regions updates do not take effect within tmm | 17.5.1.4 |
| 2153893-2 | 3-Major | BT2153893 | With DNS64 configured, resolution aborts early on the first error response without trying other name servers. | 17.5.1.4 |
| 2144353-1 | 3-Major | BT2144353 | BIND upgrade to stable version 9.18.41 | 17.5.1.4 |
| 2141245-2 | 3-Major | Undisclosed traffic to TMM can lead to resource exhaustion | 17.5.1.4 | |
| 2106789-4 | 3-Major | BIGIP LTM Monitors Hardening | 17.5.1.4 | |
| 1943269-2 | 3-Major | GTM Server can be deleted while referenced by GTM Pools | 17.5.1.4 | |
| 1933357-2 | 3-Major | BT1933357 | DNS64 stats between cache resolver and TMM non-cache have inconsistent behavior. | 17.5.1.4 |
| 1083405-7 | 3-Major | BT1083405 | "Error connecting to named socket" from zrd | 17.5.1.4 |
Application Security Manager Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2162189-2 | 3-Major | BT2162189 | "Live Update" reinstalls the genesis ASU file, while the latest ASU file is installed manually★ | 17.5.1.4 |
| 2152689-1 | 3-Major | BT2152689 | ASM GUI "Failed to load requests" pop-up | 17.5.1.4 |
| 2152445-2 | 3-Major | BT2152445 | "Live Update" API is unresponsive after upgrade and recover only after tomcat restart★ | 17.5.1.4 |
| 2137773-1 | 3-Major | BT2137773 | Table content in FPS/DataSafe webUI page not shown correctly★ | 21.0.0, 17.5.1.4 |
| 2017105-2 | 3-Major | BT2017105 | Disk partition /var full after quick config changes★ | 21.0.0, 17.5.1.4 |
| 2008573-1 | 3-Major | BT2008573 | Login/Logout expected/unexpected string has no length validation | 21.0.0, 17.5.1.4 |
| 1989133-1 | 3-Major | BT1989133 | Unexpected blocking of valid login attempts after upgrade to version 17.5.0 | 21.0.0, 17.5.1.4 |
| 1959709-3 | 3-Major | BT1959709 | "Europe" IPs are allowed despite blocking all European countries | 21.0.0, 17.5.1.4, 16.1.6.1 |
| 1673157-3 | 3-Major | BT1673157 | Extended Latin characters are not blocked as expected from JSON schema patterns | 21.0.0, 17.5.1.4 |
| 2162589-2 | 4-Minor | BD crash with a specific configuration | 17.5.1.4 | |
| 2139901-1 | 4-Minor | BT2139901 | Server-ssl profile "do-not-remove-without-replacement" is recreated | 17.5.1.4 |
| 2046941-1 | 4-Minor | BT2046941 | Distributed Cloud-facing BIG-IP instance with bot-defense profile might block XC health monitor | 17.5.1.4 |
| 1966313-2 | 4-Minor | BT1966313 | Websocket event logs show "N/A" for virtual server name except during upgrade request | 21.0.0, 17.5.1.4 |
| 1591197-4 | 4-Minor | BT1591197 | Specific JSON enforcement is not working | 21.0.0, 17.5.1.4 |
| 1505257-2 | 4-Minor | BT1505257 | False positive with "illegal base64 value" for Authorization header | 17.5.1.4 |
| 1036221-3 | 4-Minor | BT1036221 | "Illegal parameter value length" is reported with parsing product length. | 17.5.1.4 |
Application Visibility and Reporting Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2183705-2 | 3-Major | Improper access control on SMTP | 17.5.1.4 | |
| 2058853-1 | 3-Major | SMTP validation improvements | 21.0.0, 17.5.1.4 | |
| 1959361-5 | 3-Major | BT1959361 | When running a tenant with more than 72 VCPUs / cores, adminstall crashes | 17.5.1.4 |
Access Policy Manager Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1975885 | 2-Critical | BT1975885 | Massive M_ACCESS string leak in TMM | 21.0.0, 17.5.1.4 |
| 2143165-1 | 3-Major | Oauth tokens are not shown in UI | 17.5.1.4 | |
| 2141337-1 | 3-Major | Auto-upgrade of the BIG-IP APM Edge Client does not upgrade the MachineTunnel Service on Windows systems★ | 17.5.1.4 | |
| 2034985 | 3-Major | BT2034985 | Unable to forward NTLM SSO back-end cookies to front-end | 21.0.0, 17.5.1.4 |
| 2034753 | 3-Major | BT2034753 | Domain name validation does not align with the error message on GUI | 17.5.1.4 |
| 1998985-1 | 3-Major | BT1998985 | "Page Unresponsive" error message when editing Active Directory group resource with large AD group count | 17.5.1.4 |
| 1756897-2 | 3-Major | BT1756897 | [APM][PA]Failed to execute 'observe' on 'MutationObserver': parameter 1 is not of type 'Node' | 17.5.1.4 |
| 1752873-2 | 3-Major | BT1752873 | [APM][SAML SP] Order of SAML attribute values saml.last.attr.name is reversed★ | 17.5.1.4 |
| 1554961-2 | 3-Major | BT1554961 | APM - Websso leeway time of 60 seconds | 17.5.1.4 |
| 1074285-4 | 3-Major | BT1074285 | Apmd crashes while handling JWT tokens. | 17.5.1.4 |
| 937665-3 | 4-Minor | BT937665 | Relaystate in SLO request results in two Relaystates in SLO Response | 17.5.1.4 |
| 1696641-3 | 4-Minor | BT1696641 | aced core running out of file descriptors | 17.5.1.4 |
Service Provider Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1268373-8 | 2-Critical | BT1268373 | MRF flow tear down can fill up the hudq causing leaks | 17.5.1.4 |
| 1977057-3 | 3-Major | BT1977057 | Memory leak when using an iRule to overwrite MR peer route | 17.5.1.4 |
Advanced Firewall Manager Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2162905-1 | 2-Critical | BT2162905 | AFM GUI does not display Port List members in Properties panel | 17.5.1.4 |
| 2143101-2 | 3-Major | BT2143101 | SNMP Malfunctioning for IPI BL: Incorrect Statistics Reported | 17.5.1.4 |
| 2099689-1 | 3-Major | BT2099689 | AFM Security Policy checkboxes for Auto Generate UUID and Logging for rules listed doesn't work via GUI | 21.0.0, 17.5.1.4 |
| 2077465 | 3-Major | Missing audit logs for dropped IP option packets (LSR/SSR/RR) prior to attack detection | 17.5.1.4 | |
| 1820489-2 | 3-Major | BT1820489 | Rule list order changes when modifying a rule using Filer Active Rules List | 17.5.1.4 |
Policy Enforcement Manager Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2086097-1 | 3-Major | PEM iRules causing traffic disruption | 17.5.1.4 | |
| 2046553-1 | 3-Major | BT2046553 | Memory leak when modifying PEM policies with flow-info-filters | 17.5.1.4 |
Carrier-Grade NAT Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1819721-3 | 3-Major | BT1819721 | LSN failed events details are ambiguous | 21.0.0, 17.5.1.4 |
Anomaly Detection Services Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2186897-2 | 3-Major | BT2186897 | TMM core SIGSEVG upon replacing L7 DOS policy | 17.5.1.4 |
| 2131233-2 | 3-Major | ADM not functioning properly | 21.0.0, 17.5.1.4 |
Traffic Classification Engine Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2152269-2 | 2-Critical | BT2152269 | Low reputation URIs are found in the URL DB binary | 21.0.0, 17.5.1.4 |
| 2131913-3 | 2-Critical | TMM may crash when sending QUIC traffic | 21.0.0, 17.5.1.4 |
iApp Technology Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1505813-3 | 4-Minor | CVE-2018-16487 lodash: Prototype pollution in utilities | 17.5.1.4 | |
| 1505297-3 | 4-Minor | CVE-2020-8203 nodejs-lodash: prototype pollution in zipObjectDeep function | 17.5.1.4 |
SSL Orchestrator Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1628129-2 | 4-Minor | BT1628129 | SSL Orchestrator traffic summary log does not display url-category for HTTP request if a SWG as a service blocks the connection | 17.5.1.4, 17.1.3 |
F5OS Messaging Agent Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1758957-3 | 2-Critical | BT1758957 | If two tenants share the same VLAN, TMM may egress broadcast traffic even when VLANs are disabled in F5OS | 17.5.1.4 |
| 1438801-1 | 3-Major | BT1438801 | VLAN name greater than or equal to 32 characters causes VLAN to lose member information | 21.0.0, 17.5.1.4 |
| 1359817-3 | 3-Major | BT1359817 | The setting of DB variable tm.macmasqaddr_per_vlan does not function correctly | 21.0.0, 17.5.1.4 |
Cumulative fixes from BIG-IP v17.5.1.3 that are included in this release
Vulnerability Fixes
| ID Number | CVE | Links to More Info | Description | Fixed Versions |
| 937433-10 | CVE-2020-15778 | K04305530, BT937433 | SCP vulnerability CVE-2020-15778 | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 884801-12 | CVE-2025-53474 | K44517780, BT884801 | TMM may crash while processing ILX::call commands | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 2099609-4 | CVE-2025-61990 | K000156912, BT2099609 | TMM might core with SIGSEGV with certain network traffic | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 2078793-2 | CVE-2022-31129, CVE-2020-11022, CVE-2020-11023, CVE-2020-7676, CVE-2017-18214, CVE-2021-41184, CVE-2010-5312, CVE-2016-7103, CVE-2022-31160, CVE-2021-41182, CVE-2022-24785, CVE-2015-9251, CVE-2019-11358, CVE-2021-41183 | K000134507, BT2078793 | GCUI Library Upgraded for AGC | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 2053705 | CVE-2025-61974 | K000156733, BT2053705 | TMM memory is not cleared after handshake failure | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 2046885-2 | CVE-2025-59481 | K000156642, BT2046885 | BIG-IP iControl REST and tmsh vulnerability CVE-2025-59481 | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 2016105-2 | CVE-2025-61960 | K000156597, BT2016105 | TMM might crash under certain conditions | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1 |
| 1980721-1 | CVE-2025-54854 | K000156602, BT1980721 | APMD Core while parsing the invalid JWT Header | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1977933-1 | CVE-2025-53521 | K000156741, BT1977933 | TMM might crash under certain conditions | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1977917-1 | CVE-2025-53521 | K000156741, BT1977917 | TMM might crash under certain conditions | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1958513-4 | CVE-2025-58096 | K000156691, BT1958513 | TMM might core with certain network traffic | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1927145-2 | CVE-2025-54858 | K000156621, BT1927145 | A bd process crash on a specific scenario | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1889349-2 | CVE-2025-53856 | K000156707, BT1889349 | Crash during handling ePVA metadata | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 936713-9 | CVE-2025-59268 | K90301300, BT936713 | REST UI interface enhancements | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 795993-13 | CVE-2019-12735 | K93144355, BT795993 | vim vulnerability: CVE-2019-12735 | 21.0.0, 17.5.1.3, 17.1.3 |
| 753498-6 | CVE-2018-16869 | K45616155, BT753498 | CVE-2018-16869: Nettle vulnerability | 21.0.0, 17.5.1.3, 17.1.3 |
| 2077209 | CVE-2025-54755 | K000156801, BT2077209 | File Import Handler Enhancement | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 2077201 | CVE-2025-59483 | K000156800, BT2077201 | TMUI File Import Handler Enhancement | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1990897-4 | CVE-2025-61933 | K000156596, BT1990897 | APM hardening | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1891673-2 | CVE-2018-14404 | K76678525 | CVE-2018-14404 libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c | 21.0.0, 17.5.1.3 |
| 1825901-4 | CVE-2015-6748 | K000150762, BT1825901 | CVE-2015-6748 jsoup: XSS vulnerability related to incomplete tags at EOF | 21.0.0, 17.5.1.3, 17.1.3 |
| 1572053-6 | CVE-2017-10989, CVE-2020-35527, CVE-2019-13734, CVE-2020-35525, CVE-2019-19880, CVE-2019-20218 | K000141088, BT1572053 | Multiple vulnerabilities patched in SQLite on BIG-IP | 21.0.0, 17.5.1.3, 17.1.3 |
| 1469629-6 | CVE-2023-5981, CVE-2024-0553 | K000138649, BT1469629 | CVE-2023-5981 & CVE-2024-0553: gnutls vulnerability on response times of ciphertexts | 21.0.0, 17.5.1.3, 17.1.3 |
| 1073461-2 | CVE-2018-15518 | K42941419, BT1073461 | CVE-2018-15518: Double free in QXmlStreamReader | 21.0.0, 17.5.1.3 |
| 912797-12 | CVE-2020-11868 | K44305703, BT912797 | NTP Vulnerability: CVE-2020-11868 | 17.5.1.3, 17.1.3 |
| 1893361-1 | CVE-2021-3177 | K000133761 | CVE-2021-3177 python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c | 21.0.0, 17.5.1.3, 17.1.3 |
| 1893141-1 | CVE-2020-26137 | K000133547 | CVE-2020-26137 in Library:python, Installed:2.7.5-58.el7.0.0.14.i686, FixVersion:2.7.5-92.el7_9 and others, on HostOS: CentOS Security Update for python | 21.0.0, 17.5.1.3, 17.1.3 |
| 1891817-2 | CVE-2018-18521 | K21426934 | CVE-2018-18521 elfutils: Divide-by-zero in arlib_add_symbols function in arlib.c | 21.0.0, 17.5.1.3, 17.1.3 |
| 1891813-2 | CVE-2018-18520 | K21426934 | CVE-2018-18520 elfutils: eu-size cannot handle recursive ar files | 21.0.0, 17.5.1.3, 17.1.3 |
| 1891805-2 | CVE-2018-18310 | K21426934 | CVE-2018-18310 elfutils: invalid memory address dereference was discovered in dwfl_segment_report_module.c in libdwfl | 21.0.0, 17.5.1.3, 17.1.3 |
| 1891361-2 | CVE-2015-8035 | K76678525 | CVE-2015-8035 libxml2: DoS caused by incorrect error detection during XZ decompression | 21.0.0, 17.5.1.3, 17.1.3 |
| 1787141-2 | CVE-2018-20852 | K000151520, BT1787141 | CVE-2018-20852 python: Cookie domain check returns incorrect results | 21.0.0, 17.5.1.3, 17.1.3 |
| 2050321-1 | CVE-2014-9426 | K16339, BT2050321 | PHP Vulnerabilities: CVE-2014-9425 | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8 |
Functional Change Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2083217-1 | 1-Blocking | BT2083217 | Updates to BIG-IP Image Signing and Verification Process - October 2025★ | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1710233-2 | 3-Major | BT1710233 | No option to disable violation for double-escaped NULL in query string | 21.0.0, 17.5.1.3, 17.1.3 |
TMOS Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1926141-1 | 0-Unspecified | kernel: possible out of bounds write in kbd_keycode of keyboard.c | 21.0.0, 17.5.1.3, 17.1.3 | |
| 1925837-1 | 0-Unspecified | CVE-2018-18508 nss: NULL pointer dereference in several CMS functions resulting in a denial of service | 21.0.0, 17.5.1.3, 17.1.3 | |
| 1925349-1 | 0-Unspecified | kernel: fs/quota/quota_tree.c does not validate the block number in the quota tree | 21.0.0, 17.5.1.3, 17.1.3 | |
| 1925037-1 | 0-Unspecified | Kernel: denial of service in atm_tc_enqueue in net/sched/sch_atm.c due to type confusion | 21.0.0, 17.5.1.3, 17.1.3 | |
| 1925033-1 | 0-Unspecified | kernel: slab-out-of-bounds read vulnerabilities in cbq_classify | 21.0.0, 17.5.1.3, 17.1.3 | |
| 1924981-1 | 0-Unspecified | kernel: Out-of-bounds access in write_extent_buffer() when mounting and operating a crafted btrfs image | 21.0.0, 17.5.1.3, 17.1.3 | |
| 1924977-1 | 0-Unspecified | kernel: Invalid pointer dereference in fs/btrfs/relocation.c:__del_reloc_root() when mounting crafted btrfs image | 21.0.0, 17.5.1.3, 17.1.3 | |
| 1923693-1 | 0-Unspecified | kernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race | 21.0.0, 17.5.1.3, 17.1.3 | |
| 1923665-1 | 0-Unspecified | kernel: Integer overflow in function rndis_query_oid of rndis_wlan.c | 21.0.0, 17.5.1.3, 17.1.3 | |
| 1923605-1 | 0-Unspecified | kernel: Salsa20 encryption algorithm does not correctly handle zero-length inputs allowing local attackers to cause denial-of-service | 21.0.0, 17.5.1.3, 17.1.3 | |
| 1891745-2 | 0-Unspecified | CVE-2018-16403 elfutils: Heap-based buffer over-read in libdw/dwarf_getabbrev.c and libwd/dwarf_hasattr.c causes crash | 21.0.0, 17.5.1.3, 17.1.3 | |
| 1976113 | 1-Blocking | BT1976113 | Deployment of BIG-IP Best Plus images on Azure fails with OSProvisioningClientError | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1 |
| 2077205 | 2-Critical | TMUI Request Processing Improvement | 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8 | |
| 2037409-1 | 2-Critical | BT2037409 | Tmctl tables are corrupted for large cluster size and tmm memory shows 0 | 21.0.0, 17.5.1.3 |
| 1943217 | 2-Critical | BT1943217 | BGP - using 'no bgp default ipv4-unicast' might lead to a crash | 17.5.1.3 |
| 1305117-2 | 2-Critical | BT1305117 | SSL profile "no-dtlsv1.2" option is left disabled while upgrading from v14.x or v15.x to 17.1.0★ | 21.0.0, 17.5.1.3 |
| 1014361 | 2-Critical | BT1014361 | Config sync fails after provisioning APM or changing BIG-IP license | 21.0.0, 17.5.1.3 |
| 2047293-2 | 3-Major | BT2047293 | TMM NULL dereference in Dyn-TCAM after multiple failures | 21.0.0, 17.5.1.3, 17.1.3 |
| 1924801-1 | 3-Major | grub2: Heap out-of-bounds write in short form option parser | 21.0.0, 17.5.1.3, 17.1.3 | |
| 1753533-5 | 3-Major | CVE-2018-16492 nodejs-extend: Prototype pollution can allow attackers to modify object properties | 21.0.0, 17.5.1.3, 16.1.6.1 | |
| 1032001-4 | 3-Major | BT1032001 | Statemirror address can be configured on management network or clusterd restarting | 21.0.0, 17.5.1.3, 17.1.3, 15.1.3.1 |
| 1959725-2 | 4-Minor | CVE-2024-42322 kernel: ipvs: properly dereference pe in ip_vs_add_service | 21.0.0, 17.5.1.3, 17.1.3 | |
| 1052445-4 | 4-Minor | CVE-2019-19537 kernel: race condition caused by a malicious USB device in the USB character device driver layer | 21.0.0, 17.5.1.3, 17.1.3 | |
| 1028541-9 | 4-Minor | CVE-2018-18384: Unzip Vulnerability | 21.0.0, 17.5.1.3, 17.1.3 |
Local Traffic Manager Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2119329 | 1-Blocking | BT2119329 | Tenant IP not getting propagated | 17.5.1.3 |
| 832153 | 2-Critical | BT832153 | Crash due to incorrect format specifiers is fixed. | 17.5.1.3 |
| 1935053-3 | 2-Critical | BT1935053 | Impact of crypto queue limits on SSL handshake reliability | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1 |
| 1134257-6 | 2-Critical | BT1134257 | TMM cores when pingaccess profile is modified multiple times and configuration is loaded | 21.0.0, 17.5.1.3, 17.1.3 |
| 1124865-5 | 2-Critical | BT1124865 | Removal of LAG member from an active LACP trunk on r2k and r4k systems requires tmm restart | 21.0.0, 17.5.1.3, 17.1.3, 15.1.9 |
| 966785-7 | 3-Major | BT966785 | Rate Shaping stops TCP retransmission | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1 |
| 2008633-1 | 3-Major | BT2008633 | Active mode FTP using port 0 for data-channel connections | 21.0.0, 17.5.1.3, 17.1.3 |
| 1952557-1 | 3-Major | BT1952557 | DB monitor incorrectly marks pool member UP if recv string configured but no results from DB server | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1 |
| 1071385-5 | 3-Major | BT1071385 | SSL session resumption is incorrectly logging handshake failure messages | 21.0.0, 17.5.1.3 |
| 1036645-4 | 3-Major | BT1036645 | Running keyswap.sh on a VIPRION or VCMP platform may not complete successfully | 21.0.0, 17.5.1.3, 17.1.3 |
| 990173-8 | 4-Minor | BT990173 | Dynconfd repeatedly sends the same mcp message to mcpd | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8 |
Global Traffic Manager (DNS) Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2064569-1 | 3-Major | BT2064569 | BIND upgrade to version 9.18.37 | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 2034789-3 | 3-Major | BT2034789 | Unbound has been upgraded from version 1.20.0 to 1.23.1 | 21.0.0, 17.5.1.3, 17.1.3 |
Application Security Manager Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1933825-2 | 2-Critical | BT1933825 | High cpu usage by BD | 21.0.0, 17.5.1.3, 17.1.3 |
| 2033809-4 | 3-Major | ASM Connection Handling Improvement | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8 | |
| 1976513-2 | 3-Major | BT1976513 | Some ASM entity names are not shown in the REST error response message | 21.0.0, 17.5.1.3, 17.1.3 |
| 1972369-1 | 3-Major | BT1972369 | BD performance improvement | 21.0.0, 17.5.1.3 |
| 1971217-1 | 3-Major | BT1971217 | False negative with illegal redirect attempt | 21.0.0, 17.5.1.3, 17.1.3 |
| 1849585-2 | 3-Major | BT1849585 | A correctly encoded long Authorization param triggers 'illegal base64 value' vaiolation | 21.0.0, 17.5.1.3, 17.1.3 |
| 1772329-3 | 3-Major | BT1772329 | Apply Policy failure after upgrading to v16.1.x and later, from earlier version★ | 21.0.0, 17.5.1.3, 17.1.3 |
| 1980649-2 | 4-Minor | BT1980649 | High CPU usage by bd | 21.0.0, 17.5.1.3, 17.1.3 |
| 1975941-2 | 4-Minor | BT1975941 | Alternate_response_content length greater than 51200 in ACCOUNT_ALTERNATE_RESPONSE_FILE causing ASM restart loop | 21.0.0, 17.5.1.3, 17.1.3 |
| 1962073-1 | 4-Minor | BT1962073 | Creation of file type entries with trailing and/or leading spaces is allowed via REST in ASM policy | 21.0.0, 17.5.1.3, 17.1.3 |
Access Policy Manager Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1957157-1 | 2-Critical | BT1957157 | [nlad]OpenSSL: DRBG Continuous RNG test failed: DRBG stuck. | 21.0.0, 17.5.1.3 |
| 2035005-2 | 3-Major | BT2035005 | VMware Horizon applications launched via BIG-IP as VDI proxy ignore args parameter in vmware-view URI | 21.0.0, 17.5.1.3, 17.1.3 |
| 1991289-2 | 3-Major | BT1991289 | ECA always invokes the default access profile 'kerberos_auth_default' | 21.0.0, 17.5.1.3, 17.1.3 |
| 1991261-2 | 3-Major | BT1991261 | AAA LDAP: priority group activation resets when updating configuration in APM | 21.0.0, 17.5.1.3, 17.1.3 |
| 1991241-2 | 3-Major | BT1991241 | ECA plugin unresponsive | 21.0.0, 17.5.1.3, 17.1.3 |
| 1991237-2 | 3-Major | BT1991237 | Unable to configure number of apmd threads using tmsh command | 21.0.0, 17.5.1.3, 17.1.3 |
| 1987361-2 | 3-Major | BT1987361 | APMD file descriptor exhaustion when LDAP operational timeout is set to 180 seconds | 21.0.0, 17.5.1.3, 17.1.3 |
| 1982937-1 | 3-Major | BT1982937 | InTune MDM endpoint compliance intermittently fails despite being compliant | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1 |
| 1980645-2 | 3-Major | BT1980645 | Bypass APM for Horizon Blast/PcoIP connection for internal users | 21.0.0, 17.5.1.3, 17.1.3 |
| 1969861-1 | 3-Major | BT1969861 | [APM][NTLM]ECA core SIGSEGV | 21.0.0, 17.5.1.3, 17.1.3 |
| 1856285-3 | 3-Major | BT1856285 | [APM]mdmsyncmgr core is observed very intermittently | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1 |
| 1607277-4 | 3-Major | BT1607277 | Permission Denied error when trying to download the Windows Client Package from Connectivity Profile on Standby | 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1100081-3 | 3-Major | K21440462, BT1100081 | Error message "http_process_state_prepend - Invalid action:0x10a091" for version 15 and "http_process_state_prepend - Invalid action:0x107061" for versions 16 and 17 appears in the LTM log★ | 21.0.0, 17.5.1.3, 17.1.3 |
| 1881145-3 | 4-Minor | BT1881145 | Change log level of PPP TunnelStats log messages to debug level | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1 |
| 1825253-1 | 4-Minor | BT1825253 | Enhance the log message for better readability User session was terminated due to IP address change during session | 21.0.0, 17.5.1.3, 17.1.3 |
| 1585981-2 | 4-Minor | BT1585981 | High instances of OAuth in TMM memory leak | 21.0.0, 17.5.1.3, 17.1.3 |
Service Provider Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1952881-1 | 3-Major | BT1952881 | Tmm memory leak in SCTP metadata | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1 |
Advanced Firewall Manager Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1968237-2 | 3-Major | BT1968237 | Configuration fails to load post upgrade due to invalid DoS signature predicate 'ip flags'★ | 21.0.0, 17.5.1.3 |
| 1920097-2 | 3-Major | BT1920097 | Allow bad actor threshold below 0.1% | 21.0.0, 17.5.1.3, 17.1.3 |
| 1510477-4 | 3-Major | BT1510477 | RD rule containing zones does not match expected traffic on the Network firewall policy | 21.0.0, 17.5.1.3, 17.1.3 |
Policy Enforcement Manager Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1934073-2 | 3-Major | BT1934073 | PEM policy rule incorrectly matching when using a flow condition | 17.5.1.3, 17.1.3, 16.1.6.1 |
| 1785145-5 | 3-Major | BT1785145 | TMM SIGSEGV core due to NULL check is not handled properly in PEM | 17.5.1.3, 17.1.3 |
iApp Technology Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1493765-5 | 3-Major | CVE-2021-22884 nodejs: DNS rebinding in --inspect | 21.0.0, 17.5.1.3, 17.1.3 |
Protocol Inspection Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1824037-2 | 3-Major | BT1824037 | IPS profile using engine after free | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1 |
| 1787981-3 | 3-Major | BT1787981 | Memory leak in ips_pcb_cache | 21.0.0, 17.5.1.3, 17.1.3 |
| 1786457-3 | 3-Major | BT1786457 | Protocol Inspection auto update with latest is not working | 17.5.1.3, 17.1.3 |
Cumulative fixes from BIG-IP v17.5.1.2 that are included in this release
Vulnerability Fixes
| ID Number | CVE | Links to More Info | Description | Fixed Versions |
| 1983229-4 | CVE-2025-61958 | K000154647, BT1983229 | Post-rotate Command Improvements for iHealth | 21.0.0, 17.5.1.2, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1068653-3 | CVE-2021-20271 | K10396196, BT1068653 | CVE-2021-20271 rpm: Signature checks bypass via corrupted rpm package | 21.0.0, 17.5.1.2, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 981885-8 | CVE-2020-8285 | K61186963 | CVE-2020-8285 curl: malicious FTP server can trigger stack overflow when CURLOPT_CHUNK_BGN_FUNCTION is used | 21.0.0, 17.5.1.2, 17.1.3 |
| 945421-12 | CVE-2020-1968 | K92451315, BT945421 | CVE-2020-1968: Raccoon vulnerability | 21.0.0, 17.5.1.2, 17.1.3, 16.1.6 |
| 798889-3 | CVE-2018-20836 | K11225249, BT798889 | CVE-2018-20836 kernel: race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c leads to use-after-free | 21.0.0, 17.5.1.2, 17.1.3 |
| 765053-11 | CVE-2019-1559 | K18549143, BT765053 | OpenSSL vulnerability CVE-2019-1559 | 21.0.0, 17.5.1.2, 17.1.3 |
| 1983321-1 | CVE-2025-48976 | K000152614, BT1983321 | CVE-2025-48976 apache-commons-fileupload: Apache Commons FileUpload DoS via part headers | 21.0.0, 17.5.1.2 |
| 1937817-4 | CVE-2025-54500 | K000152001, BT1937817 | CVE-2025-54500: A Particular HTTP/2 sequence may cause High CPU utilization [MadeYouReset] | 21.0.0, 17.5.1.2, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1787149-2 | CVE-2019-18348 | K000153042, BT1787149 | CVE-2019-18348 python: CRLF injection via the host part of the url passed to urlopen() | 21.0.0, 17.5.1.2, 17.1.3 |
| 1678789-5 | CVE-2019-10768 | K000141463, BT1678789 | CVE-2019-10768 AngularJS: Prototype pollution in merge function could result in code injection | 21.0.0, 17.5.1.2, 17.1.3 |
| 1678777-5 | CVE-2022-25869 | K000141459, BT1678777 | CVE-2022-25869 angular.js : insecure page caching in the browser, which allows interpolation of <textarea> elements. | 21.0.0, 17.5.1.2, 17.1.3 |
| 1678769-5 | CVE-2023-26116 | K000141463, BT1678769 | CVE-2023-26116 angularjs: Regular Expression Denial of Service via angular.copy() | 21.0.0, 17.5.1.2, 17.1.3 |
| 1600561-5 | CVE-2024-2961 | K000140901, BT1600561 | CVE-2024-2961 glibc Vulnerability | 21.0.0, 17.5.1.2, 17.1.3 |
| 1596097-5 | CVE-2023-37369 | K000148809, BT1596097 | CVE-2023-37369 qtbase: buffer overflow in QXmlStreamReader | 21.0.0, 17.5.1.2, 17.1.3 |
| 1596073-5 | CVE-2023-38197 | K000148809, BT1596073 | CVE-2023-38197 qtbase: infinite loops in QXmlStreamReader | 21.0.0, 17.5.1.2, 17.1.3 |
| 1589645-5 | CVE-2019-3859 | K000149288, BT1589645 | CVE-2019-3859 libssh2: Unchecked use of _libssh2_packet_require and _libssh2_packet_requirev resulting in out-of-bounds read | 21.0.0, 17.5.1.2, 17.1.3 |
| 1390457-6 | CVE-2022-25147 | K000137702, BT1390457 | CVE-2022-25147 apr-util: out-of-bounds writes in the apr_base64 | 21.0.0, 17.5.1.2, 17.1.3 |
| 1306305-2 | CVE-2023-24998 | K000133052, BT1306305 | CVE-2023-24998 [Apache Tomcat]: FileUpload DoS with excessive parts | 21.0.0, 17.5.1.2, 17.1.3 |
| 1266853-8 | CVE-2023-24998 | K000133052, BT1266853 | CVE-2023-24998 Apache Commons FileUpload: FileUpload DoS with excessive parts | 21.0.0, 17.5.1.2, 17.1.3 |
| 1099369-9 | CVE-2018-25032 | K21548854, BT1099369 | CVE-2018-25032 [NodeJS]zlib: A flaw found in zlib, when compressing (not decompressing!) certain inputs. | 21.0.0, 17.5.1.2, 17.1.3 |
| 1043977-10 | CVE-2021-3672 CVE-2021-22931 |
K53225395, BT1043977 | CVE-2021-3672 CVE-2021-22931 NodeJS Vulnerabilities in iAppLX | 21.0.0, 17.5.1.2, 17.1.3 |
| 1035781-9 | CVE-2021-33909 | K75133288, BT1035781 | CVE-2021-33909: Linux Kernel Vulnerability | 21.0.0, 17.5.1.2, 17.1.3 |
| 965545-10 | CVE-2020-27617 | K41142448, BT965545 | CVE-2020-27617 : QEMU Vulnerability | 21.0.0, 17.5.1.2, 17.1.3 |
| 874521-3 | CVE-2019-1551 | K43798238, BT874521 | OpenSSL vulnerability: CVE-2019-1551 | 21.0.0, 17.5.1.2 |
| 872109-12 | CVE-2019-17563 | K24551552, BT872109 | CVE-2019-17563: Tomcat Vulnerability | 21.0.0, 17.5.1.2, 17.1.3 |
| 1697273-4 | CVE-2020-8037 | K000149929, BT1697273 | CVE-2020-8037 tcpdump: ppp decapsulator can be convinced to allocate a large amount of memory | 21.0.0, 17.5.1.2, 17.1.3 |
| 1591481-4 | CVE-2017-1000381 | K000149130, BT1591481 | CVE-2017-1000381: C-ares Vulnerability iRulesLX | 21.0.0, 17.5.1.2, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1586537-3 | CVE-2024-0985 | K000140188, BT1586537 | CVE-2024-0985 postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL | 21.0.0, 17.5.1.2, 17.1.3 |
| 1566997-5 | CVE-2016-10349 | K000148259, BT1566997 | CVE-2016-10349 libarchive: Heap-based buffer over-read in the archive_le32dec function | 21.0.0, 17.5.1.2, 17.1.3 |
| 1326665-6 | CVE-2023-32067 | K000135831, BT1326665 | CVE-2023-32067 c-ares: 0-byte UDP payload Denial of Service | 21.0.0, 17.5.1.2 |
| 1240373-4 | CVE-2022-37436 | K000132665, BT1240373 | CVE-2022-37436: Flaw in mod_proxy module of httpd | 21.0.0, 17.5.1.2, 17.1.3 |
| 1029013-9 | CVE-2016-10228 | K52494142, BT1029013 | CVE-2016-10228 glibc: iconv program can hang when invoked with the -c option | 21.0.0, 17.5.1.2, 17.1.3 |
| 1678809-5 | CVE-2023-26117 | K000150967, BT1678809 | CVE-2023-26117: Angular JS vulnerability | 21.0.0, 17.5.1.2, 17.1.3 |
| 1678805-5 | CVE-2023-26118 | K000150967, BT1678805 | CVE-2023-26118 angularjs: Regular Expression Denial of Service via the <input type="url"> element | 21.0.0, 17.5.1.2, 17.1.3 |
| 1470177-6 | CVE-2023-46218 | K000138650, BT1470177 | CVE-2023-46218 curl: information disclosure by exploiting a mixed case flaw | 21.0.0, 17.5.1.2, 17.1.3 |
Functional Change Fixes
None
TMOS Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2053309 | 2-Critical | BT2053309 | Changes to README - mention of duojs.org URL | 21.0.0, 17.5.1.2, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1927513-1 | 2-Critical | BT1927513 | SIGSEGV TMM core ikev2_encrypt_packet_construct at iked/ikev2_packet.c:334 | 21.0.0, 17.5.1.2 |
| 1824413-4 | 2-Critical | BT1824413 | License activation in Automatic mode fails with "Couldn't contact INTERNAL licensing server★ | 21.0.0, 17.5.1.2, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1787621-2 | 2-Critical | BT1787621 | TMM may unexpectedly restart during IPsec tunnel negotiation | 21.0.0, 17.5.1.2 |
| 1965053-1 | 3-Major | BT1965053 | Keymgmtd: Incorrect and misleading debug log statements | 21.0.0, 17.5.1.2 |
| 1952729-1 | 3-Major | BT1952729 | Certificates with explicitly defined EC parameters are treated as invalid in Common Criteria mode and TLS communication will be rejected. | 21.0.0, 17.5.1.2 |
| 1936233-1 | 3-Major | BT1936233 | TMM mismanagement of IPsec connections can slowly leak memory and cause tunnel negotiation to fail | 21.0.0, 17.5.1.2 |
| 1935833-2 | 3-Major | BT1935833 | Tmm cores with "ERR: Attempting to send MPI message to ourself" | 21.0.0, 17.5.1.2 |
| 1928749-2 | 3-Major | BT1928749 | TMM cores in rare circumstances | 21.0.0, 17.5.1.2, 17.1.3 |
| 1856449-1 | 3-Major | BT1856449 | [keymgmtd]OpenSSL: DRBG Continuous RNG test failed: DRBG stuck. | 21.0.0, 17.5.1.2 |
| 1853721-3 | 3-Major | BT1853721 | User has reached maximum active login tokens | 21.0.0, 17.5.1.2, 17.1.3 |
| 1505301-2 | 3-Major | CVE-2022-29154 rsync: remote arbitrary files write inside the directories of connecting peers | 21.0.0, 17.5.1.2, 17.1.3 | |
| 1069341-2 | 3-Major | CVE-2016-4738 libxslt: Heap overread due to an empty decimal-separator | 21.0.0, 17.5.1.2, 17.1.3 | |
| 1027237-5 | 3-Major | BT1027237 | Cannot edit virtual server in GUI after loading config with traffic-matching-criteria | 21.0.0, 17.5.1.2, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1983185-1 | 4-Minor | BT1983185 | REST API queries sent to BIG-IP v17.5.1 fail if they are using v17.5.0 API version★ | 21.0.0, 17.5.1.2 |
| 1753617-5 | 4-Minor | CVE-2023-24621 Untrusted Polymorphic Deserialization to Java Classes | 21.0.0, 17.5.1.2, 17.1.3 | |
| 1314333-2 | 4-Minor | Patch gnutls library for CVEs CVE-2018-10844, CVE-2018-10845, CVE-2018-10846 | 21.0.0, 17.5.1.2, 17.1.3 | |
| 1061485-9 | 4-Minor | CVE-2019-19527: Linux kernel vulnerability | 21.0.0, 17.5.1.2, 17.1.3 | |
| 1059229-3 | 4-Minor | CVE-2019-16994 kernel: Memory leak in sit_init_net() in net/ipv6/sit.c | 21.0.0, 17.5.1.2, 17.1.3 | |
| 1058197-10 | 4-Minor | CVE-2019-14973: LibTIFF Vulnerability | 21.0.0, 17.5.1.2, 17.1.3 | |
| 1052333-8 | 4-Minor | CVE-2018-16885: Linux kernel vulnerability | 21.0.0, 17.5.1.2, 17.1.3 | |
| 1052245-9 | 4-Minor | CVE-2018-13093 kernel: NULL pointer dereference in lookup_slow function | 21.0.0, 17.5.1.2, 17.1.3 | |
| 1052181-8 | 4-Minor | CVE-2018-7191 kernel: denial of service via ioctl call in network tun handling | 21.0.0, 17.5.1.2, 17.1.3 | |
| 1051869-9 | 4-Minor | CVE-2018-20169: Linux kernel vulnerability | 21.0.0, 17.5.1.2, 17.1.3 | |
| 1051769-8 | 4-Minor | CVE-2019-10140 kernel: overlayfs: NULL pointer dereference in ovl_posix_acl_create function in fs/overlayfs/dir.c | 21.0.0, 17.5.1.2, 17.1.3 | |
| 1051697-9 | 4-Minor | CVE-2019-11833 kernel: fs/ext4/extents.c leads to information disclosure | 21.0.0, 17.5.1.2, 17.1.3 |
Local Traffic Manager Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2017137 | 2-Critical | BT2017137 | Pkcs11d Crash Risk Due to Unbounded Label/Password Length from MCPd | 17.5.1.2, 17.1.3 |
| 1519001-4 | 2-Critical | BT1519001 | After a crash, tmm may experience memory corruption | 21.0.0, 17.5.1.2 |
| 932461-9 | 3-Major | BT932461 | Certificate update on the SSL profile server for the HTTPS monitor: BIG-IP does not use the updated certificate. | 21.0.0, 17.5.1.2, 17.1.3 |
| 1952657-1 | 3-Major | BT1952657 | In FIPS-CC mode ECC Certificates with explicitly defined EC parameters are accepted | 21.0.0, 17.5.1.2 |
| 1937777-1 | 3-Major | BT1937777 | The client can resume a TLS session using psk_ke mode in the psk_key_exchange_modes extension. | 21.0.0, 17.5.1.2 |
| 1934781-2 | 3-Major | BT1934781 | In FIPS-CC mode ECC Certificates with explicitly defined EC parameters are accepted | 21.0.0, 17.5.1.2 |
| 1826185-2 | 3-Major | BT1826185 | Tenants on r2000 and r4000 series may drop packets larger than 9194 bytes | 21.0.0, 17.5.1.2 |
| 1708189-3 | 3-Major | BT1708189 | ICMP errors with HSL can rarely cause tmm cores | 21.0.0, 17.5.1.2, 17.1.3 |
| 1697041-2 | 3-Major | BT1697041 | TMM may fail to start, device is inoperative★ | 21.0.0, 17.5.1.2, 17.1.3 |
| 1553169-4 | 3-Major | BT1553169 | Parsing tcp payload using iRules can be inaccurate because of binary to string conversion | 21.0.0, 17.5.1.2 |
| 1273161-5 | 3-Major | BT1273161 | Secondary blades are unavailable, clusterd is reporting shutdown, and waiting for other blades | 21.0.0, 17.5.1.2 |
Global Traffic Manager (DNS) Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1962785-3 | 3-Major | BT1962785 | Monitors of type snmp_link can fail | 21.0.0, 17.5.1.2, 17.1.3, 16.1.6.1 |
| 1592209-3 | 3-Major | BT1592209 | Monitored objects stays "Offline (Enabled)" even after manually enabling the server object after reboot | 21.0.0, 17.5.1.2, 17.1.3 |
| 1041889-5 | 3-Major | BT1041889 | RRSIG missing for CNAME with RDATA in different zone | 21.0.0, 17.5.1.2 |
Application Security Manager Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1798601-4 | 2-Critical | BT1798601 | BD restart loop after upgrade on error in CONFIG_TYPE_ACCOUNT_CHARSET_TEMPLATES★ | 21.0.0, 17.5.1.2, 17.1.3 |
| 1365629-5 | 2-Critical | BT1365629 | FPS signature and engine update fail to access sys db key proxy.password | 21.0.0, 17.5.1.2, 17.1.2, 15.1.10.8 |
| 1934513-2 | 3-Major | BT1934513 | Redefinition of xlink namespace leads to 'malformed document' violation | 21.0.0, 17.5.1.2, 17.1.3 |
| 1927225-2 | 3-Major | BT1927225 | Vertical tab (u000b) is removed from the request by the JSON parser | 21.0.0, 17.5.1.2, 17.1.3 |
| 1783217-1 | 4-Minor | BT1783217 | Rare bd crash | 21.0.0, 17.5.1.2, 17.1.3 |
Access Policy Manager Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1966729-1 | 2-Critical | BT1966729 | Endpoint inspection not working with chrome browser | 21.0.0, 17.5.1.2 |
| 1819813-2 | 2-Critical | BT1819813 | [APM][NTLM]TMM core on null _ntlm_msg on 17.1.x on top of ID1495381 | 21.0.0, 17.5.1.2, 17.1.3 |
| 608745-3 | 3-Major | BT608745 | Send HOST header in OCSP responder request | 21.0.0, 17.5.1.2, 17.1.3, 16.1.6.1 |
| 1965849-1 | 3-Major | BT1965849 | [APM] TMM core is observed in validating the saml assertion signature | 21.0.0, 17.5.1.2, 17.1.3 |
| 1826013-1 | 3-Major | K000150397, BT1826013 | BIG-IP as Oauth C/RS "Invalid json error" after upgrade to 17.1.2.1 when json response has non ASCII characters★ | 21.0.0, 17.5.1.2, 17.1.3 |
| 1771945-2 | 3-Major | BT1771945 | Memory leak when using event-wait with SSL SANs | 21.0.0, 17.5.1.2, 17.1.3 |
| 1617037-4 | 3-Major | BT1617037 | [PA]"navigator.userAgent" detects Chrome browser as Safari | 21.0.0, 17.5.1.2 |
| 1587453-2 | 3-Major | BT1587453 | “default-all” profile is selected by default in “Dynamic LAN address spaces” | 21.0.0, 17.5.1.2, 17.1.3 |
| 1587421-2 | 3-Major | BT1587421 | GUI issue when creating a new Network Access connection | 21.0.0, 17.5.1.2, 17.1.3 |
| 1583745-3 | 3-Major | BT1583745 | "Out of bounds" TCL error in VDI iRule | 21.0.0, 17.5.1.2, 17.1.3, 16.1.6.1 |
| 1008885-3 | 3-Major | BT1008885 | Sessiondump CPU is showing unknown for Mac OS and BIG-IP platform | 21.0.0, 17.5.1.2, 17.1.3, 16.1.6.1 |
| 1701209-2 | 4-Minor | BT1701209 | APM ignores the update-interval setting | 21.0.0, 17.5.1.2, 17.1.3, 16.1.6.1 |
Advanced Firewall Manager Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1786325-3 | 2-Critical | BT1786325 | Nxdomain stop blocking & nxdomain added into the allow list on rSeries | 21.0.0, 17.5.1.2 |
| 935769-8 | 3-Major | BT935769 | Upgrading / Rebooting BIG-IP with huge address-list configuration takes a long time★ | 21.0.0, 17.5.1.2 |
| 1635209-3 | 3-Major | BT1635209 | Firewall NAT policy with SNAT automap does not work with ALG protocols in active mode | 21.0.0, 17.5.1.2, 17.1.3 |
| 1635189-3 | 3-Major | BT1635189 | TMM crashes when firewall NAT policy uses automap with Active FTP connection | 21.0.0, 17.5.1.2, 17.1.3 |
Protocol Inspection Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1756825-4 | 2-Critical | K000150010, BT1756825 | IPS Signatures not inspected being sometime after reboot | 21.0.0, 17.5.1.2, 17.1.3 |
| 1715685-2 | 3-Major | BT1715685 | Protocol inspection takes up to 5 hours before starting to work after a reboot | 21.0.0, 17.5.1.2, 17.1.3 |
Cumulative fixes from BIG-IP v17.5.1.1 that are included in this release
Vulnerability Fixes
| ID Number | CVE | Links to More Info | Description | Fixed Versions |
| 1678793-5 | CVE-2019-14863 | K000141459, BT1678793 | CVE-2019-14863 angular: Cross-site Scripting (XSS) due to no proper sanitization of xlink:href attributes | 21.0.0, 17.1.3 |
Functional Change Fixes
None
Local Traffic Manager Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1622425-2 | 4-Minor | BT1622425 | Float the management ip to the next available ip when the connectivity of primary blade is lost | 21.0.0 |
Cumulative fixes from BIG-IP v17.5.1 that are included in this release
Vulnerability Fixes
| ID Number | CVE | Links to More Info | Description | Fixed Versions |
| 1934493-2 | CVE-2025-53868 | K000151902, BT1934493 | BIG-IP SFTP hardening | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1922525-1 | CVE-2025-53868 | K000151902, BT1922525 | BIG-IP SCP hardening | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1920057-1 | CVE-2025-61935 | K000154664, BT1920057 | Bd crashes | 21.0.0, 17.5.1, 17.1.3, 15.1.10.8 |
| 1881373-2 | CVE-2024-3661 | K000139553, BT1881373 | CVE-2024-3661 Tunnelvision Vulnerability | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1874825-4 | CVE-2025-58071 | K000156746, BT1874825 | Specific IPsec traffic might trigger a tmm crash | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1826393-4 | CVE-2025-54479 | K000151475, BT1826393 | TMM may restart under certain conditions | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1758153-5 | CVE-2025-61938 | K000156624, BT1758153 | Configuring a Data Guard URL longer than 1024 characters triggers a restart loop | 21.0.0, 17.5.1, 17.1.3 |
| 1582781-6 | CVE-2021-23177 | K000140961, BT1582781 | CVE-2021-23177 libarchive: extracting a symlink with ACLs modifies ACLs of target | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1382313-5 | CVE-2025-59478 | K000152341, BT1382313 | TMM might crash under certain conditions | 21.0.0, 17.5.1, 17.1.3, 15.1.10.8 |
| 1353609-8 | CVE-2023-45886 | K000137315, BT1353609 | ZebOS BGP vulnerability CVE-2023-45886 | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1282837-4 | CVE-2025-61951 | K000151309, BT1282837 | DTLS1.2 Handshakes are causing tmm crash with mTLS connection | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1 |
| 987813-14 | CVE-2020-25643 | K65234135, BT987813 | CVE-2020-25643 kernel:improper input validation in the ppp_cp_parse_cr function | 21.0.0, 17.5.1, 17.1.3 |
| 975605-11 | CVE-2018-1122 | K00409335, BT975605 | CVE-2018-1122 procps-ng, procps: Local privilege escalation in top | 21.0.0, 17.5.1, 17.1.3 |
| 949509-11 | CVE-2025-59269 | K000151308, BT949509 | Eviction Policy UI Hardening | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 785209-6 | CVE-2019-9074 | K09092524, BT785209 | CVE-2019-9074 binutils: out-of-bound read in function bfd_getl32 | 21.0.0, 17.5.1, 17.1.3 |
| 760895-13 | CVE-2009-5155 | K64119434, BT760895 | CVE-2009-5155 glibc: parse_reg_exp in posix/regcomp.c misparses alternatives leading to denial of service or trigger incorrect result | 21.0.0, 17.5.1, 17.1.3 |
| 1787153-2 | CVE-2019-9740 | K000153040, BT1787153 | CVE-2019-9740 python: CRLF injection via the query part of the url passed to urlopen() | 21.0.0, 17.5.1, 17.1.3 |
| 1772377-3 | CVE-2024-7006 | K000152542 | Libtiff CVE-2024-7006: NULL pointer dereference in tif_dirinfo.c | 21.0.0, 17.5.1, 17.1.3 |
| 1672313-5 | CVE-2016-9841 | K000149915, BT1672313 | CVE-2016-9841 zlib: Out-of-bounds pointer arithmetic in inffast.c | 21.0.0, 17.5.1, 17.1.3 |
| 1672249-5 | CVE-2016-9840 | K000149905, BT1672249 | CVE-2016-9840 zlib: Out-of-bounds pointer arithmetic in inftrees.c | 21.0.0, 17.5.1, 17.1.3 |
| 1589661-5 | CVE-2019-3860 | K000149288, BT1589661 | CVE-2019-3860 libssh2: Out-of-bounds reads with specially crafted SFTP packets | 21.0.0, 17.5.1, 17.1.3 |
| 1585277-4 | CVE-2024-28757 | K000139637, BT1585277 | Libexpat through 2.6.1 allows an XML Entity Expansion attack: CVE-2024-28757 | 21.0.0, 17.5.1, 17.1.2.2 |
| 1576897-4 | CVE-2016-9063 | K000139691, BT1576897 | CVECVE-2016-9063 firefox: Possible integer overflow to fix inside XML_Parse in Expat | 21.0.0, 17.5.1, 17.1.3 |
| 1576125-4 | CVE-2024-27983 | K000139532, BT1576125 | Node.js vulnerability CVE-2024-27983 | 21.0.0, 17.5.1, 17.1.2.2 |
| 1572145-5 | CVE-2023-29469 | K000139592, BT1572145 | CVE-2023-29469 libxml2: Hashing of empty dict strings isn't deterministic | 21.0.0, 17.5.1, 17.1.3 |
| 1550785-4 | CVE-2025-58153 | K000151658 | HSB lock up in Syn-Ack generator module | 17.5.1, 17.1.0, 16.1.6.1, 15.1.10.8 |
| 1517561-5 | CVE-2023-28484 | K000139641, BT1517561 | CVE-2023-28484 libxml2: NULL dereference in xmlSchemaFixupComplexType | 21.0.0, 17.5.1, 17.1.3 |
| 1494229-5 | CVE-2023-2953 | K000138814, BT1494229 | CVE-2023-2953 openldap: null pointer dereference in ber_memalloc_x function | 21.0.0, 17.5.1, 17.1.3 |
| 1441577-6 | CVE-2023-42795 | K000138178, BT1441577 | CVE-2023-42795 tomcat: improper cleaning of recycled objects could lead to information leak | 21.0.0, 17.5.1, 17.1.3 |
| 1393733-8 | CVE-2022-43750 | K000139700, BT1393733 | CVE-2022-43750 kernel: memory corruption in usbmon driver | 21.0.0, 17.5.1, 17.1.3 |
| 1327169-7 | CVE-2023-24329 | K000135921, BT1327169 | CVE-2023-24329 python: urllib.parse url blocklisting bypass | 21.0.0, 17.5.1, 17.1.3 |
| 1306309-4 | CVE-2023-28709 | K000135262, BT1306309 | CVE-2023-28709 Apache tomcat: Fix for CVE-2023-24998 was incomplete | 21.0.0, 17.5.1, 17.1.3 |
| 1301545-7 | CVE-2023-0568 | K000134747, BT1301545 | CVE-2023-0568 php: 1-byte array overrun in common path resolve code | 21.0.0, 17.5.1, 17.1.3 |
| 1270257-8 | CVE-2023-0662 | K000133753, BT1270257 | CVE-2023-0662 php: DoS vulnerability when parsing multipart request body | 21.0.0, 17.5.1, 17.1.3 |
| 1144673-5 | CVE-2025-47148 | K000148816, BT1144673 | Persistent Connection Issue in SSO v2 Plugin | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1093685-8 | CVE-2021-4083 | K52379673, BT1093685 | CVE-2021-4083 kernel: fget: check that the fd still exists after getting a ref to it | 21.0.0, 17.5.1, 17.1.3 |
| 1057141-7 | CVE-2018-14647 | K000151007, BT1057141 | CVE-2018-14647 python: Missing salt initialization in _elementtree.c module | 21.0.0, 17.5.1, 17.1.3 |
| 1041141-3 | CVE-2021-35942 | K98121587, BT1041141 | CVE-2021-35942 glibc: Arbitrary read in wordexp() | 21.0.0, 17.5.1, 17.1.3 |
| 1028701-12 | CVE-2019-9947 | K000151516, BT1028701 | CVE-2019-9947 python: CRLF injection via the path part of the url passed to urlopen() | 21.0.0, 17.5.1, 17.1.3 |
| 1001369-9 | CVE-2020-12049 | K16729408, BT1001369 | D-Bus vulnerability CVE-2020-12049 | 21.0.0, 17.5.1, 17.1.3, 15.1.4.1 |
| 988589-11 | CVE-2019-25013 | K68251873, BT988589 | CVE-2019-25013 glibc vulnerability: buffer over-read in iconv | 21.0.0, 17.5.1, 17.1.3, 15.1.4.1 |
| 921525-7 | CVE-2020-1752 | K49921213, BT921525 | CVE-2020-1752: glibc vulnerability using glob | 21.0.0, 17.5.1, 17.1.3 |
| 1692917-5 | CVE-2024-6232 | K000148252, BT1692917 | CVE-2024-6232 CPython Tarfile vulnerability | 21.0.0, 17.5.1, 17.1.3 |
| 1623197-5 | CVE-2024-37891 | K000140711, BT1623197 | CVE-2024-37891 urllib3: proxy-authorization request header is not stripped during cross-origin redirects | 21.0.0, 17.5.1, 17.1.3 |
| 1591249-5 | CVE-2018-6913 | K000141301, BT1591249 | CVE-2018-6913 perl: heap buffer overflow in pp_pack.c | 21.0.0, 17.5.1, 17.1.3 |
| 1566533-7 | CVE-2017-18342 | K000139901, BT1566533 | CVE-2017-18342 PyYAML: yaml.load() API could execute arbitrary code | 21.0.0, 17.5.1, 17.1.3 |
| 1336185-6 | CVE-2018-12123 | K000137090, BT1336185 | NodeJS Vulnerability - CVE-2018-12123 | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1330801-8 | CVE-2018-12123, CVE-2018-12121, CVE-2018-12122 | K000137090, BT1330801 | NodeJS Vulnerability CVE-2018-12123, CVE-2018-12121, CVE-2018-12122 | 21.0.0, 17.5.1, 17.1.3 |
| 1304081-7 | CVE-2023-2650 | K000135178, BT1304081 | CVE-2023-2650 openssl: Possible DoS translating ASN.1 object identifiers | 21.0.0, 17.5.1, 17.1.3 |
| 1673161-4 | CVE-2023-45853 | K000149884, BT1673161 | CVE-2023-45853 zlib: integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_6 | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8 |
Functional Change Fixes
None
TMOS Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 740258-2 | 2-Critical | BT740258 | Support IPv6 connections to TACACS+ remote auth servers | 21.0.0, 17.5.1 |
| 1934401-1 | 2-Critical | BT1934401 | iSeries HSB v5.26.8.0 firmware | 21.0.0, 17.5.1 |
| 1934393-1 | 2-Critical | BT1934393 | iSeries HSB v5.9.14.0 firmware | 21.0.0, 17.5.1 |
| 1934385-1 | 2-Critical | BT1934385 | iSeries HSB v4.3.5.0 firmware | 21.0.0, 17.5.1 |
| 1926989-1 | 2-Critical | BT1926989 | BIG-IP Virtual Edition: kswapd running constantly and consuming most of the CPU cycles of a core★ | 21.0.0, 17.5.1 |
| 1492337-4 | 2-Critical | BT1492337 | TMM fails to start up using Xnet-DPDK-virtio due to out of bounds MTU | 21.0.0, 17.5.1, 17.1.3 |
| 891333-6 | 3-Major | K32545132, BT891333 | The HSB on BIG-IP platforms can get into a bad state resulting in packet corruption. | 17.5.1 |
| 867253-7 | 3-Major | BT867253 | Systemd not deleting user journals | 21.0.0, 17.5.1 |
| 1922501-1 | 3-Major | BT1922501 | TMM crash loop due to missing kernel driver★ | 21.0.0, 17.5.1 |
| 1920341-1 | 3-Major | BT1920341 | SSH Public Key authentication allows RSA and not ECDSA in ccmode | 21.0.0, 17.5.1 |
| 1880365-1 | 3-Major | BT1880365 | Cannot log into Fs_v2 Azure BIG-IP with >= 32 vCPUs and >= 5 interfaces | 21.0.0, 17.5.1 |
| 1798961-2 | 3-Major | BT1798961 | With CC/FIPS license installed, OpenSSL should raise fatal alert when client does not advertise EMS support | 21.0.0, 17.5.1, 17.1.3 |
| 1789477-4 | 3-Major | BT1789477 | Orphaned tmsh processes might eventually lead to an out-of-memory condition | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1622789-3 | 3-Major | BT1622789 | Traffic levels for NAT64/46 traffic might be different after an upgrade | 21.0.0, 17.5.1, 17.1.2 |
| 1621269-1 | 3-Major | BT1621269 | TMM restart loop when attaching large number of interfaces. | 21.0.0, 17.5.1 |
| 1612345-4 | 3-Major | Improved Handling of BFD Session Traffic | 21.0.0, 17.5.1, 17.1.3 | |
| 1121517-5 | 3-Major | BT1121517 | Interrupts on Hyper-V are pinned on CPU 0 | 21.0.0, 17.5.1, 17.1.3, 16.1.4, 15.1.10 |
| 1047789-1 | 3-Major | BT1047789 | [APM] MCP err msg seen when editing/applying resource assign in VPE | 21.0.0, 17.5.1 |
| 857045-6 | 4-Minor | BT857045 | LDAP system authentication may stop working | 21.0.0, 17.5.1, 16.1.5 |
| 1753933-4 | 4-Minor | CVE-2020-14393 perl-dbi: Buffer overflow on an overlong DBD class name | 21.0.0, 17.5.1, 17.1.3 | |
| 1623597-3 | 4-Minor | BT1623597 | Nat46/64 hardware connection re-offload is not optimal. | 21.0.0, 17.5.1 |
| 1401961-4 | 4-Minor | BT1401961 | A blade with a non-functional backplane may override the dag context for the whole system | 21.0.0, 17.5.1 |
| 1144421-3 | 4-Minor | CVE-2019-14866 cpio: improper input validation when writing tar header fields leads to unexpected tar generation | 21.0.0, 17.5.1, 17.1.3 | |
| 1069949-8 | 4-Minor | CVE-2018-1000007 curl: HTTP authentication leak in redirects | 21.0.0, 17.5.1, 17.1.3 | |
| 1052249-8 | 4-Minor | CVE-2018-13094 kernel: NULL pointer dereference in xfs_da_shrink_inode function | 21.0.0, 17.5.1, 17.1.3 | |
| 1052217-8 | 4-Minor | CVE-2018-19985 kernel: oob memory read in hso_probe in drivers/net/usb/hso.c | 21.0.0, 17.5.1, 17.1.3 | |
| 1580357-2 | 5-Cosmetic | CVE-2016-2037 CVE-2015-1197 cpio: out of bounds write | 21.0.0, 17.5.1, 17.1.3 |
Local Traffic Manager Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1825513 | 1-Blocking | BT1825513 | ClientSSL profile with PQC group may cause TMM to crash | 21.0.0, 17.5.1 |
| 1756525-2 | 2-Critical | BT1756525 | ixlv driver could have failed hardware offload with TSO off | 21.0.0, 17.5.1, 17.1.3 |
| 1579533-3 | 2-Critical | BT1579533 | Jitterentropy read is restricted to FIPS mode or TMM usage only, for performance reasons★ | 21.0.0, 17.5.1, 17.1.3 |
| 1267221-5 | 2-Critical | BT1267221 | When TMM starts, Hyper-V shows no RX packets on the ethX interface★ | 21.0.0, 17.5.1 |
| 881065-8 | 3-Major | BT881065 | Adding port-list to Virtual Server changes the route domain to 0 | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1928537-1 | 3-Major | BT1928537 | Missing initial PKCS11d login state causes login failures on certain AWS CloudHSMs | 21.0.0, 17.5.1, 17.1.3 |
| 1825241-4 | 3-Major | BT1825241 | MCPD validation fails when non-existent cipher group is referenced by SSL profile | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1821033-2 | 3-Major | BT1821033 | Assertion "packet must already have an ethernet header" when using tcpdump | 21.0.0, 17.5.1 |
| 1814821-3 | 3-Major | BT1814821 | DHE groups present in profile's cipherlist with TLS1.3 enabled and tmm.ssl.useffdhe set to false simultaneously | 21.0.0, 17.5.1 |
| 1636077-2 | 3-Major | BT1636077 | Adding an operationally DOWN interface to existing LAG causes traffic disruption on r2k/r4k | 21.0.0, 17.5.1 |
| 1555525-4 | 3-Major | BT1555525 | WCCP traffic may have its source port changed | 21.0.0, 17.5.1, 17.1.2, 16.1.6 |
| 1550869-4 | 3-Major | BT1550869 | Tmm leak on request-logging or response logging on FTP virtual server | 21.0.0, 17.5.1, 17.1.3 |
| 1505649-3 | 3-Major | BT1505649 | SSL Handshake fall back to full handshake during session resumption, if SNI string is more than 32 characters in length | 21.0.0, 17.5.1, 17.1.2 |
| 1470265-5 | 3-Major | DTLS over TCP results in unsupported behavior | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8 | |
| 1382181-2 | 3-Major | BT1382181 | BIG-IP resets only server-side on idle timeout when used FastL4 profile with loose-* settings enabled★ | 21.0.0, 17.5.1, 17.1.3 |
| 1309637-5 | 3-Major | BT1309637 | Mac masquerade not working after VLAN movement on host interfaces | 21.0.0, 17.5.1 |
| 1620785-4 | 4-Minor | BT1620785 | F5 cache mechanism relies only on Last-Modified/If-Modified-Since headers and ignores the etag/If-None-Match headers | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1352649-4 | 4-Minor | BT1352649 | The trailing semicolon at the end of [HTTP::path] in the iRule is being omitted. | 21.0.0, 17.5.1, 17.1.3 |
Performance Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1814477-1 | 2-Critical | BT1814477 | AWS Performance Drop from BIG-IP v17.1.2.1 to v17.5.0 | 21.0.0, 17.5.1 |
Global Traffic Manager (DNS) Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1856289-2 | 3-Major | BT1856289 | Virtual server, which is managed by remote LTM device, is shown as "offline/enabled" with "Monitor /Common/bigip : no reply from big3d: timed out" message (red diamond icon). | 21.0.0, 17.5.1, 17.1.3 |
| 1756397-3 | 3-Major | BT1756397 | BIG-IP is not forwarding the Extended DNS Error (EDE) Codes to Clients | 21.0.0, 17.5.1 |
Application Security Manager Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1857413-2 | 2-Critical | BT1857413 | Malformed XML data or Malformed JSON data violation raised despite URL containing content-profile | 21.0.0, 17.5.1, 17.1.3 |
| 1789529-3 | 3-Major | BT1789529 | A crash of the bd daemon | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1 |
| 1629701-2 | 3-Major | BT1629701 | Attack signature is not shown in local event log for staged entity when not in learn/staging | 21.0.0, 17.5.1, 17.1.3 |
| 1621185-2 | 3-Major | BT1621185 | A BD crash on a specific scenario, even after ID1553989 | 21.0.0, 17.5.1, 17.1.3 |
| 1812201-4 | 4-Minor | BT1812201 | A specific unicode character issue a malformed json violation | 21.0.0, 17.5.1, 17.1.3 |
| 1782365-3 | 4-Minor | BT1782365 | Importing a policy creates default 'password' sensitive parameter when it is not present in the exported policy in full JSON format | 21.0.0, 17.5.1, 17.1.3 |
| 1709557-2 | 4-Minor | BT1709557 | Header value length greater than 1023 in alternate response file headers causing ASM restart loop | 21.0.0, 17.5.1, 17.1.3 |
| 1469393-2 | 4-Minor | BT1469393 | Browser extension can cause Bot-Defense profile screen to misfunction | 21.0.0, 17.5.1, 17.1.3 |
Access Policy Manager Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1930945 | 1-Blocking | BT1930945 | [APM][KERBEROS][NTLM FALLBACK] Kerberos Authentication fails post-upgrade to v17.5.0/v17.5.1 — “Profile '/Common/kerberos_auth_config_default' was not found” and ECA Crashes★ | 21.0.0, 17.5.1 |
| 930625-6 | 2-Critical | BT930625 | TMM crash is seen due to double free in SAML flow | 21.0.0, 17.5.1, 17.1.3 |
| 1825949-2 | 2-Critical | BT1825949 | [APM][Radius] Message-Authenticator value is incorrect for OTP request | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1821373-2 | 2-Critical | BT1821373 | SAML Assertion Handling issue in APM SSO | 21.0.0, 17.5.1, 17.1.3 |
| 1783081-3 | 2-Critical | BT1783081 | Removing conditional freeing for m_oauth instances in tmm | 21.0.0, 17.5.1, 17.1.3 |
| 1773161-2 | 2-Critical | BT1773161 | BIG-IP APM 17.1.2 VPN tunnels failed to establish at "GET /isession" stage | 21.0.0, 17.5.1, 17.1.3 |
| 1552705-6 | 2-Critical | BT1552705 | New subsession reads access_token from per-session policy instead of per-request policy. | 21.0.0, 17.5.1, 17.1.3, 16.1.6 |
| 648946-4 | 3-Major | BT648946 | Oauth server is not registered in the map for HA addresses | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1 |
| 641662-1 | 3-Major | BT641662 | Always connected exclusion list does not support more than 10 entries. | 21.0.0, 17.5.1 |
| 634576-6 | 3-Major | K48181045, BT634576 | TMM core in per-request policy | 21.0.0, 17.5.1, 16.1.5, 13.1.0 |
| 1926885 | 3-Major | BT1926885 | [APM] URL DB mismatch error for Religion categories in the upgrade★ | 21.0.0, 17.5.1 |
| 1917741-2 | 3-Major | BT1917741 | [APM][TMM] memory growth in SAML SP while decoding assertion attributes | 21.0.0, 17.5.1 |
| 1813841-1 | 3-Major | BT1813841 | Password Caching setting is not applied | 21.0.0, 17.5.1 |
| 1813209-1 | 3-Major | BT1813209 | Password Cache Expiration field is hidden in Connectivity profile | 21.0.0, 17.5.1 |
| 1796609-3 | 3-Major | BT1796609 | [APM][VDI]TCL error when upgrading to 17.x: can't read "tmm_apm_feed_login": no such variable★ | 21.0.0, 17.5.1, 17.1.3, 16.1.6 |
| 1789501-3 | 3-Major | BT1789501 | [APM][Standard Customisation]Webtop is blank after upgrading APM version 17.1.2 with Edge Browser in Compatibility mode.★ | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1 |
| 1782113-3 | 3-Major | BT1782113 | Parameter 'redirectwebauthn:i:0' is crashing the RDP file with 'The RDP File is corrupted' error message | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1 |
| 1771985-3 | 3-Major | BT1771985 | [APM] OAuth AS max claims data support upto 8kb dynamically | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1758181-2 | 3-Major | BT1758181 | Optimal gateway routing issue with HTML5 client | 21.0.0, 17.5.1, 17.1.3 |
| 1672997-3 | 3-Major | BT1672997 | Apmd memory grows over time in AD/LDAP auth scenarios | 21.0.0, 17.5.1, 17.1.3, 16.1.6, 15.1.10.8 |
| 1628001-4 | 3-Major | BT1628001 | TMM core when ACL operation is performed on a deleted session | 21.0.0, 17.5.1, 17.1.3 |
| 1623941-4 | 3-Major | BT1623941 | [AD] BIG-IP APM AD Auth agent sometimes prompts for new password (every login) after upgrade★ | 21.0.0, 17.5.1, 17.1.3, 16.1.6 |
| 1583261-3 | 3-Major | BT1583261 | Saml traffic can rarely cause tmm cores | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1567761-3 | 3-Major | BT1567761 | [APM] AccessProfile name is missing in log User '<username>' belongs to domain '<domain_name>' | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1 |
| 1495381-3 | 3-Major | BT1495381 | TMM core with SWG explicit forward proxy or PRP configuration | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1 |
| 1400533-5 | 3-Major | BT1400533 | TMM core dump include SIGABRT multiple times, on the Standby device. | 21.0.0, 17.5.1, 17.1.3 |
| 1292605-4 | 3-Major | BT1292605 | Uncaught ReferenceError: ReferenceError: REquest is not defined | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1269709-5 | 3-Major | BT1269709 | GUI should throw the error when the VS is configured with both vdi and HTTP/2 profiles | 21.0.0, 17.5.1, 17.1.2, 16.1.5 |
| 1081245-3 | 3-Major | BT1081245 | [APM] SSO OAuth Bearer passthrough inserts an old access token instead of the latest one. | 21.0.0, 17.5.1, 17.1.3 |
| 1078713-1 | 3-Major | BT1078713 | Windows 11 not included in client OS check and Windows Info agent. | 21.0.0, 17.5.1 |
| 926917-4 | 4-Minor | BT926917 | Portal Access: unwanted decoding html entities in attribute values of HTML tags | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 811829-3 | 4-Minor | BT811829 | BIG-IP as Authorization server: OAuth Report GUI display expired token as active | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 485387-2 | 4-Minor | BT485387 | EncryptedAssertion may not be processed by BIG-IP as SP when EncryptedKey element is specified by RetrievalMethod Element by external IdP. | 21.0.0, 17.5.1, 17.1.3 |
| 1825449-2 | 4-Minor | BT1825449 | Citrix Optimal Gateway Routing is not showing login username of session | 21.0.0, 17.5.1, 17.1.3 |
| 1818461-2 | 4-Minor | BT1818461 | [APM][VPN][WIN] Tunnel can't be established if endpoint inspection is Skipped. Machine Hash is not maching★ | 21.0.0, 17.5.1, 17.1.3 |
| 1737465-3 | 4-Minor | BT1737465 | Port number being used for verifying server certificate CN field | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1 |
| 1612885-3 | 4-Minor | BT1612885 | [PORTAL] Handle error in get_frameElement() | 21.0.0, 17.5.1, 17.1.2, 16.1.6.1 |
| 1591813-12 | 4-Minor | BT1591813 | [APM][SAML] SP automation fails with error message 'cannot update (cert_type)' | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1 |
Advanced Firewall Manager Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1132449-6 | 1-Blocking | BT1132449 | Incomplete or missing IPv6 IP Intelligence database results to connection reset and/or high TMM CPU usage | 21.0.0, 17.5.1, 17.1.3, 16.1.6 |
| 997169-4 | 3-Major | BT997169 | AFM rule not triggered | 21.0.0, 17.5.1, 17.1.2, 16.1.6, 15.1.4.1 |
| 1936421-2 | 3-Major | BT1936421 | Core generated for autodosd daemon when synchronization process is terminated | 21.0.0, 17.5.1, 17.1.3 |
| 1934865-1 | 3-Major | BT1934865 | Remove multiple redundant entries for port-list objects in configuration file | 21.0.0, 17.5.1 |
Device Management Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 985329-5 | 3-Major | BT985329 | Saving UCS takes longer and leaves temp files when iControl LX extension is installed | 17.5.1, 17.5.0, 17.1.2, 16.1.5, 15.1.10.8 |
| 1626337-4 | 3-Major | K81310610, BT1626337 | RPMS not being included in the generated UCS with fix of ID985329 incorporated★ | 21.0.0, 17.5.1, 17.1.3 |
In-tmm monitors Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1819777-4 | 2-Critical | BT1819777 | In-tmm TCP monitor with no RCV and RCVdisable string might lead to a crash | 21.0.0, 17.5.1, 17.1.3 |
Cumulative fix details for BIG-IP v17.5.1.4 that are included in this release
997169-4 : AFM rule not triggered
Links to More Info: BT997169
Component: Advanced Firewall Manager
Symptoms:
An AFM rule is not triggered when it should be.
Conditions:
-- Source and destination zone configured
-- A gateway pool is used in the route
Impact:
A firewall rule is not triggered and the default deny rule is used.
Workaround:
Alter the route to use an IP address and not a pool.
Fix:
Firewall rules are now triggered when gateway pools are used.
Fixed Versions:
21.0.0, 17.5.1, 17.1.2, 16.1.6, 15.1.4.1
990173-8 : Dynconfd repeatedly sends the same mcp message to mcpd
Links to More Info: BT990173
Component: Local Traffic Manager
Symptoms:
If dynconfd sends a single message to mcpd containing two or more operations, and one of the operations fails mcpd validation, dynconfd repeatedly sends same message to mcpd.
An example of two operations in one mcp message would be an ephemeral node creation and an ephemeral pool member creation in a single mcp message.
Once one such message fails, dynconfd repeatedly attempts to resend the same message. In addition, at the next DNS query interval, dynconfd may create one or more new instances of such messages, which may each be retried if they fail. The result can cause an increasing accumulation of MCP messages sent by dynconfd which must be processed by mcpd.
Conditions:
This can occur when:
-- Using FQDN nodes and FQDN pool members.
-- There is an additional issue where the message from dynconfd fails validation within mcpd (e.g., a misconfiguration in which the monitor assigned to the pool is configured with a wildcard destination and the pool member is added to the pool with a port of '0' or 'any'.
Impact:
MCP messages from dynconfd which fail due to an error might cause the population of ephemeral nodes and pool members to fail and become out of sync with what the DNS server is resolving.
By repeatedly resending the same messages, which fail repeatedly, dynconfd causes increased mcpd CPU utilization.
Eventually, the load caused by processing an increasing accumulation of MCP messages may cause increasing and excessive memory usage by mcpd and a possible mcpd core, or may cause mcpd to become busy and unresponsive and be killed/restarted by SOD.
Workaround:
Examine the LTM logs for mcpd error messages indicating failed attempts to create ephemeral nodes or ephemeral pool members, and resolve the cause of the failed node or pool-member creation.
Fix:
Dynconfd no longer repeatedly resends MCP messages that have failed due to an error.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8
985329-5 : Saving UCS takes longer and leaves temp files when iControl LX extension is installed
Links to More Info: BT985329
Component: Device Management
Symptoms:
The tmsh command 'save sys ucs' takes longer when iControl LX extensions is installed, and it may leave /shared/tmp/rpm-tmp* files.
You may see warnings that /var is full.
You may also see errors logged in /var/log/restjavad.0.log:
[WARNING][211][date and time UTC][8100/shared/iapp/build-package BuildRpmTaskCollectionWorker] Failed to execute the build command 'rpmbuild -bb --define '_tmppath /shared/tmp' --define 'main /var/config/rest/iapps/f5-service-discovery' --define '_topdir /var/config/rest/node/tmp' '/var/config/rest/node/tmp/ac891731-acb1-4832-b9f0-325e73ed1fd1.spec'', Threw:com.f5.rest.common.CommandExecuteException: Command execution process killed
at com.f5.rest.common.ShellExecutor.finishExecution(ShellExecutor.java:281)
at com.f5.rest.common.ShellExecutor.access$000(ShellExecutor.java:33)
at com.f5.rest.common.ShellExecutor$1.onProcessFailed(ShellExecutor.java:320)
at org.apache.commons.exec.DefaultExecutor$1.run(DefaultExecutor.java:203)
at java.lang.Thread.run(Thread.java:748)
Errors logged in /var/log/ltm:
err iAppsLX_save_pre: Failed to get task response within timeout for: /shared/iapp/build-package/a1724a94-fb6b-4b3e-af46-bc982567df8f
err iAppsLX_save_pre: Failed to get getRPM build response within timeout for f5-service-discovery
Conditions:
iControl LX extensions (e.g., AS3, Telemetry) are installed on the BIG-IP system.
Impact:
Saving the UCS file takes a longer time (e.g., ~1-to-2 minutes) than it does if iControl LX extensions are not installed (e.g., ~40 seconds).
/shared/tmp directory is filled with rpm-tmp* files.
Workaround:
The fix of another ID 929213 introduced a new database key iapplxrpm.timeout (default 60 seconds), which allows the RPM build timeout value to be increased.
sys db iapplxrpm.timeout {
default-value "60"
scf-config "true"
value "60"
value-range "integer min:30 max:600"
}
For example:
tmsh modify sys db iapplxrpm.timeout value 300
tmsh restart sys service restjavad
Increasing the db key and restarting restjavad should not be traffic impacting.
Fix:
Temp files under /shared/tmp is now cleaned up correctly.
Fixed Versions:
17.5.1, 17.5.0, 17.1.2, 16.1.5, 15.1.10.8
981885-8 : CVE-2020-8285 curl: malicious FTP server can trigger stack overflow when CURLOPT_CHUNK_BGN_FUNCTION is used
Links to More Info: K61186963
966785-7 : Rate Shaping stops TCP retransmission
Links to More Info: BT966785
Component: Local Traffic Manager
Symptoms:
When rate shaping is applied to a virtual server, the BIG-IP system does not retransmit unacknowledged data segments, even when the BIG-IP system receives a duplicate ACK.
Conditions:
This issue occurs when both of the following conditions are met:
-- Virtual server configured with a rate shaping.
-- Standard type of virtual server.
Impact:
The BIG-IP system does not retransmit unacknowledged data segments.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1
949509-11 : Eviction Policy UI Hardening
Links to More Info: K000151308, BT949509
944817-10 : Improper IP based access access restrictions via HTTPD
Component: TMOS
Symptoms:
Under certain conditions HTTPD IP based access restriction may work improperly.
Conditions:
When using HTTPD IP based access restriction.
Impact:
Improper restriction based on IP address
Fix:
IP Access restrictions for HTTPD now works properly
Behavior Change:
IP Access restrictions for HTTPD now works properly
Fixed Versions:
21.0.0, 17.5.1.4
937665-3 : Relaystate in SLO request results in two Relaystates in SLO Response
Links to More Info: BT937665
Component: Access Policy Manager
Symptoms:
When BIG-IP APM acts as the SAML IdP and receives a redirect binding single logout (SLO) request that contains a relaystate, the BIG-IP APM generates an SLO response that contains two relaystates.
Conditions:
-- BIG-IP APM configured as IdP
-- Redirect binding SLO request contains a relaystate
Impact:
SLO processing on SP may not work.
Workaround:
None.
Fixed Versions:
17.5.1.4
936829-11 : TMUI Dashboard Hardening
Component: TMOS
Symptoms:
In certain scenarios, TMUI does not follow best security practices.
Conditions:
NA
Impact:
NA
Workaround:
NA
Fix:
Best security practices are now applied.
Fixed Versions:
21.0.0, 17.5.1.4
935769-8 : Upgrading / Rebooting BIG-IP with huge address-list configuration takes a long time★
Links to More Info: BT935769
Component: Advanced Firewall Manager
Symptoms:
Version upgrade takes more time than usual when the config contains address-lists with a lot of IP addresses. The same delay will be observed with 'tmsh load sys config' as well.
Conditions:
-- Configure address-list with 10K to 20K IP addresses or address ranges or subnets.
-- Configuration loading (e.g. Post upgrade, running tmsh load sys config, modification of the configuration and subsequent full load as in full config sync)
Impact:
Version upgrade / 'tmsh load sys config' process takes a long time than usual.
Workaround:
1) Convert continuous individual addresses in the address-lists to IP address ranges and subnets if possible.
2) Remove the huge address-lists from config before the upgrade and add back after the upgrade process is finished.
3) Upgrading to a release or EHF that contains the fix for 1209409. 1209409 does not eliminate the issue but it does reduce the time it takes to validate certain address lists.
Fixed Versions:
21.0.0, 17.5.1.2
935633-3 : VCMP guests or F5OS tenants may experience constant clusterd restart after host upgrade★
Links to More Info: BT935633
Component: TMOS
Symptoms:
Sometimes, when vCMP guests or F5OS tenants are started after the host has been upgraded, the guests or tenants may enter an unhealthy state due to clusterd constantly restarting.
Conditions:
-- vCMP guest or F5OS tenant has Mirroring IP configured.
-- vCMP guest or F5OS tenant is powered on after vCMP host upgrade.
-- vCMP guest or F5OS tenant is powered on and receives a new license file from the host during startup.
Impact:
-- This issue might prevent the guest or tenant from servicing traffic if the system fails to load the config and clusterd keeps restarting.
-- During startup of the guest or tenant, the following message is logged to /var/log/ltm:
err mcpd[6519]: 0107146f:3: Self-device state mirroring address cannot reference the non-existent Self IP ([IP address]); Create it in the /Common folder first.
-- /var/log/ltm shows clusterd constantly restarting.
-- One or more slots are in INOPERATIVE state, while the host shows slots as RUN/Healthy.
Workaround:
-- To avoid the issue before it occurs:
1. Prior to shutting down vCMP guests or F5OS tenants before host upgrade, ensure guests or tenants have free space in the /var partition.
2. Ensure any license updates (e.g., reactivation) are applied before shutting down the vCMP guest or F5OS tenant.
3. Issue 'tmsh save sys config' on the vCMP guest or F5OS tenant.
4. Issue 'ls /var/db/mcp*' and confirm the presence of mcpdb.bin and mcpdb.info in the /var/db directory.
5. Proceed with vCMP guest or F5OS tenant shutdown and host upgrade as per standard F5 recommended process.
-- To mitigate after the issue has been experienced on a vCMP guest or F5OS tenant:
1. Set the vCMP guest or F5OS tenant to the Configured state and wait for it to complete transition to Configured.
2. Set vCMP guest or F5OS tenant to Deployed state.
3. Review startup logs and confirm 'Self-device state mirroring address cannot reference the non-existent Self IP' message is no longer present.
4. Review /var/log/ltm and confirm clusterd is no longer restarting.
5. If issue persists, delete and recreate the vCMP guest or F5OS tenant.
Fixed Versions:
17.5.1.4
932461-9 : Certificate update on the SSL profile server for the HTTPS monitor: BIG-IP does not use the updated certificate.
Links to More Info: BT932461
Component: Local Traffic Manager
Symptoms:
When you overwrite the certificate that is configured on the SSL profile server and is used with the HTTPS monitor, the BIG-IP system neither uses a client certificate nor continues to use the old certificate.
After you update the certificate, the stored certificate is incremented. However, the monitor log indicates that it is using the old certificate.
Conditions:
--Create a pool with an HTTPS pool member.
--Create an HTTPS monitor with a certificate and key.
--Assign the HTTPS monitor to the HTTPS pool.
--Update the certificate through GUI or TMSH.
Impact:
The monitor tries to use the old certificate or does not present a client certificate after the update.
Workaround:
Use one of the following workarounds:
-- Restart bigd:
bigstart restart bigd
-- Modify the server SSL profile certificate key. Set it to ‘none’, and switch back to the original certificate key name.
The bigd utility successfully loads the new certificate file.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
930625-6 : TMM crash is seen due to double free in SAML flow
Links to More Info: BT930625
Component: Access Policy Manager
Symptoms:
When this issue occurs the TMM will crash
Conditions:
Exact reproduction steps are not known but it occurs during SAML transactions
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fix:
N/A
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
926917-4 : Portal Access: unwanted decoding html entities in attribute values of HTML tags
Links to More Info: BT926917
Component: Access Policy Manager
Symptoms:
HTML Entities in Attribute values in HTML tags are decoded when they shouldn't be.
Conditions:
Portal Access is enabled
Impact:
Unwanted Application errors
Workaround:
None
Fix:
HTML entities in attribute values of HTML tags are no longer decoded by Portal Access
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8
901989-10 : Corruption detected in /var/log/btmp
Links to More Info: BT901989
Component: TMOS
Symptoms:
The boot_marker is written to /var/log/btmp, but /var/log/btmp is a binary file.
A message similar to:
warning <process>[10901]: pam_lastlog(<process>:session): corruption detected in /var/log/btmp
... may be logged to /var/log/secure.
Conditions:
This issue is triggered following a reboot of the BIG-IP system. Subsequently, you may observe the log message appearing in relation to various administrative activities, such as logging in through the console or restarting the tomcat service.
Impact:
Since this file is unknowingly corrupt after each boot, any potential investigation needing this data may be compromised.
Workaround:
Option 1; After bootup you can truncate the file.
$ truncate --size 0 /var/log/btmp
This will remove any instances of failed logins from the file.
--or--
Option 2; this will stop boot_markers from logging to /var/log/btmp:
CAVEATS:
- If the system has FIPS enabled, do not use this workaround! Modifying this file will cause FIPS validation to fail the next time it runs, and the system will halt on next boot.
- This workaround will not persist on software upgrades.
- Familiarity with vi is required to perform this.
Backup:
cp /etc/sysconfig/sysinit/01bootlogmarker.sysinit /var/tmp/01bootlogmarker.sysinit.bak
Open in vi:
vi /etc/sysconfig/sysinit/01bootlogmarker.sysinit
Change the following line to include "btmp":
old: excludeFiles=( "lastlog" "wtmp" "tmm*tech.out" "*.json" )
new: excludeFiles=( "lastlog" "wtmp" "btmp" "tmm*tech.out" "*.json" )
Force save and quit with (required since file is RO):
:wq!
Truncate the "/var/log/btmp" file:
truncate --size 0 /var/log/btmp
Reboot
Fixed Versions:
17.5.1.4
901569-7 : Loopback traffic might get dropped when VLAN filter is enabled for a virtual server.
Links to More Info: BT901569
Component: Local Traffic Manager
Symptoms:
Loopback traffic (local traffic) destined to a virtual server might get dropped when the incoming packet matches a terminating connection flow.
Conditions:
-- VLAN filter is enabled on the virtual server created for loopback traffic processing.
-- An incoming packet matches a terminating connection flow (i.e., the connection flow terminates because of timeout, being dropped by iRule, etc.).
Impact:
Traffic that is matched against a terminating connection flow of a virtual is not processed by the virtual server.
Workaround:
Because this filter is ignored for loopback traffic, removing the 'Enabled On VLAN' filter at the virtual server mitigates the issue.
Fixed Versions:
17.5.1.4
891333-6 : The HSB on BIG-IP platforms can get into a bad state resulting in packet corruption.
Links to More Info: K32545132, BT891333
Component: TMOS
Symptoms:
Networking connectivity issues, such as ARP resolution issues, high availability (HA) failures, health monitor instability, etc.
Packet captures with Wireshark or tshark can be used to show bit-errors/corruption in the network packet for traffic passing through the HSB. This corruption can occur in various parts of the packet such as the MAC address, EtherType, packet checksums, etc.
Conditions:
This can occur on BIG-IP hardware platforms containing a high-speed bridge (HSB).
Impact:
Network connectivity problems on some traffic passing through the affected HSB. Could be reflected in the status of Config Sync or more health monitors down on one member of HA pair.
Workaround:
Reboot the affected device.
If a reboot does not resolve the issue, then its most likely a hardware issue. Please work with Support on a RMA.
F5 has introduced a detection mechanism in newer versions of code. Please refer to the following document for more details: https://cdn.f5.com/product/bugtracker/ID1211513.html
Fix:
New FPGA firmware images are available for this issue.
Fixed Versions:
17.5.1
881065-8 : Adding port-list to Virtual Server changes the route domain to 0
Links to More Info: BT881065
Component: Local Traffic Manager
Symptoms:
When attaching the port-list to virtual server dest:port-list, the route domain of the virtual server is changed to the default value of 0, and the port-list is not correctly applied. This is encountered in the GUI but not in the CLI.
Conditions:
Using port-list along with virtual server in non default route domain using the GUI.
Impact:
You are unable to use the GUI to attach a port-list that uses a non-default route domain to a virtual server.
Workaround:
Use tmsh to attach a port-list to a virtual server if the port-list uses a non-default route domain.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8
867253-7 : Systemd not deleting user journals
Links to More Info: BT867253
Component: TMOS
Symptoms:
When setting 'SystemMaxUse' to any value, systemd does not honor this limit, and the specified size is exceeded.
Conditions:
Using a non-TMOS user account with external authentication permission.
Note: Systemd-journald is configured to create a user journal for every remote user that logs into the BIG-IP system.
Impact:
Journald filling up the file system. These journals are allocated with a minimum size of 4MiB and are not removed when the log entries age-out.
Workaround:
Option 1:
To immediately free up space, manually remove per-user journal logs from the following location:
/var/log/journal/*/user-*
Option 2:
To prevent the system from creating these journal files going forward:
1. Edit /etc/systemd/journald.conf and add the following at the bottom of the file:
SplitMode=none
2. Restart systemd-journal service
# systemctl restart systemd-journald
3. Delete the existing user journal files from /var/log
# rm /var/log/journal/*/user-*
Note:
-- You must apply this workaround separately to each blade of a VIPRION or vCMP guest running on a VIPRION.
-- You must reapply this workaround after performing software installations.
Fixed Versions:
21.0.0, 17.5.1
857973-1 : GUI sets FQDN Pool Member "Auto Populate" value Enabled by default
Links to More Info: BT857973
Component: Local Traffic Manager
Symptoms:
In the GUI, the "autopopulate" value is Enabled by default when creating an FQDN template Pool Member, but Disabled by default when creating an FQDN template Node.
Conditions:
This is observed when using FQDN names to configure Pool Members and/or Nodes in the GUI.
Impact:
Differing default "autopopulate" values displayed in the GUI are confusing.
The "autopopulate" value for an FQDN Pool Member cannot be set to "enabled" if the "autopopulate" value of the corresponding FQDN Node is set to the default value of "disabled".
Attempting to do so via tmsh will generate an error similar to:
01070734:3: Configuration error: Cannot enable pool member to autopopulate: node (<fqdn node name>) has autopopulate set to disabled
Workaround:
Be careful to select the appropriate option for the "Auto Populate" parameter when configuring FQDN Pool Members using the GUI.
Fixed Versions:
17.5.1.4
857045-6 : LDAP system authentication may stop working
Links to More Info: BT857045
Component: TMOS
Symptoms:
If the system daemon responsible for LDAP authentication crashes, the system will not automatically restart it, and remote LDAP authentication may stop working.
In /var/log/daemon.log, you may see the following:
warning systemd[1]: nslcd.service failed
Conditions:
Nslcd daemon crashed, and it fails to restart.
Impact:
System authentication stops working until nslcd is restarted.
Workaround:
Manually restart nslcd daemon:
systemctl start nslcd
nslcd can be reconfigured to restart automatically and create core files when it crashes, though these changes will be lost across software installs (and is not backed up as part of a UCS archive):
1. Run "systemctl edit nslcd", which will open a text editor (by default, nano).
2. In the text editor, add these contents:
[Service]
# Allow core files
LimitCORE=infinity
# Try to keep auth daemon running, even if it crashes
Restart=always
3. Exit the text editor and save the file
4. Check the output of "systemctl status nslcd" for any warnings/errors from systemd as a result of editing the file; there should not be any.
5. Restart nslcd:
systemctl restart nslcd
Fixed Versions:
21.0.0, 17.5.1, 16.1.5
832153 : Crash due to incorrect format specifiers is fixed.
Links to More Info: BT832153
Component: Local Traffic Manager
Symptoms:
TMM crashes
Conditions:
This is handled internally in the code. Currently, the scenario is not possible, and the existing logic ensures that this issue is not triggered.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fix:
Corrected the format specifiers in the affected log statement to align with the actual data types being passed. This fix prevents potential TMM crashes.
Fixed Versions:
17.5.1.3
811829-3 : BIG-IP as Authorization server: OAuth Report GUI display expired token as active
Links to More Info: BT811829
Component: Access Policy Manager
Symptoms:
Expired tokens status is shown as ACTIVE in the GUI whereas it is shown AS EXPIRED in the CLI via tmsh list apm oauth token-details
Conditions:
-- Access tokens/Refresh tokens should be expired
Impact:
Misleading information regarding the token status
Workaround:
Uuse 'tmsh list apm oauth token-details' but this shows only the first 100 tokens
Fix:
Made GUI changes to match the tmsh functionality
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8
798889-3 : CVE-2018-20836 kernel: race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c leads to use-after-free
783077-4 : IPv6 host defined via static route unreachable after BIG-IP reboot
Links to More Info: BT783077
Component: Local Traffic Manager
Symptoms:
Static route unreachable after BIG-IP system reboot.
Conditions:
-- Add a static route.
-- Issue a ping (works fine).
-- Reboot the BIG-IP system.
-- Issue a ping (cannot pint the route).
Impact:
Static route exists in both kernel and LTM routing table but unable to ping the route after rebooting the BIG-IP system.
Workaround:
Workaround-1:
Delete the IPv6 route entry and recreate the route by issuing the following commands in sequence:
tmsh delete net route IPv6
tmsh create net route IPv6 network 2a05:d01c:959:8408::b/128 gw fe80::250:56ff:fe86:2065 interface internal
Workaround-2:
net route /Common/IPv6 {
gw fe80::456:54ff:fea1:ee02 <-- Change this address to unicast address from 2a05:d01c:959:8409::/64 network
interface /Common/Internal
mtu 1500
network 2a05:d01c:959:8408::b/128
}
Fixed Versions:
17.5.1.4
761853-2 : Send HOST header in OCSP responder request
Component: TMOS
Symptoms:
As per the Digicert documentation, the OCSP/CRL connections require either HTTP1.1 or HTTP1.0 with host header. (Digicert).
LTM uses HTTP1.1 without the host header in OCSP responder request
Conditions:
OCSP and CRL Authentication uses HTTP1.0 for OCSP responder requests
Impact:
OCSP in the current BIG-IP relies on OpenSSL for its operations and current version of OpenSSL that is available in BIG-IP is 1.0.2za
OpenSSL 1.0.2 is only capable of generating HTTP/1.0 requests for OCSP and CRL fetches; it does not support HTTP/1.1.
This limitation prevents clients from communicating with OCSP/CRL endpoints that require HTTP/1.1, resulting in failures for revocation checks in environments where modern protocols are mandated.
Workaround:
Add either of these iRules to the Virtual Server
Modify HTTP 1.0 to HTTP1.1
when HTTP_REQUEST {
HTTP::version "1.1"
}
Add Host header
when HTTP_REQUEST {
HTTP::host "[HTTP::host]”
}
Fix:
Support for HTTP1.1 is added. The OCSP requests for auth should now use HTTP1.1 version
Fixed Versions:
17.5.1.4
760895-13 : CVE-2009-5155 glibc: parse_reg_exp in posix/regcomp.c misparses alternatives leading to denial of service or trigger incorrect result
740258-2 : Support IPv6 connections to TACACS+ remote auth servers
Links to More Info: BT740258
Component: TMOS
Symptoms:
Pam_tacplus package 1.2.9 does not support IPv6 connections to TACACS+ remote auth server
Conditions:
IPv6 connections to TACACS+ remote auth server in system-auth methods
Impact:
On a pure IPv6 network, or a network where their TACACS server is only reachable via IPv6, will not be able to use TACACS for system-auth
Workaround:
None
Fix:
NA
Fixed Versions:
21.0.0, 17.5.1
714238-13 : CVE-2018-1301: Apache Vulnerability
Links to More Info: K78131906
685626-12 : iControl REST improper sanitisation of data
Component: TMOS
Symptoms:
A few values are not properly being sanitised by iControl REST.
Conditions:
When using iControl REST APIs
Impact:
Improper sanitisation of data
Workaround:
Limit access to management and self-ips to trusted networks and users to limit the exposure.
Fix:
iControl REST is now properly sanitising data.
Fixed Versions:
21.0.0, 17.5.1.4
659579-8 : Timestamps in icrd, restjavad, and restnoded logs are not synchronized with the system time
Links to More Info: BT659579
Component: TMOS
Symptoms:
Logs on icrd, restnoded, and restjavad are in the UTC time zone and are not aligned to the system time, which makes it difficult to determine the time during troubleshooting operations.
Conditions:
Checking the icrd, restnoded, and restjavad logs timestamps.
Impact:
Difficult to troubleshoot as the logs are not aligned with system time.
Workaround:
None
Fixed Versions:
17.5.1.4
648946-4 : Oauth server is not registered in the map for HA addresses
Links to More Info: BT648946
Component: Access Policy Manager
Symptoms:
The same loopback address is assigned to two listeners.
Conditions:
-- AAA Servers with pool.
-- OAuth Server.
Impact:
Traffic issues due loopback address that is assigned to OAuth Server, can be assigned to some other AAA Server that also uses pool.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6.1
641662-1 : Always connected exclusion list does not support more than 10 entries.
Links to More Info: BT641662
Component: Access Policy Manager
Symptoms:
In locked client mode, APM provides a way to configure destinations that can still be reached by client, even in locked client mode. Number of entries is limited to 10.
Conditions:
Locked client mode is enabled
Impact:
More than 10 exclusions cannot be added
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1
634576-6 : TMM core in per-request policy
Links to More Info: K48181045, BT634576
Component: Access Policy Manager
Symptoms:
TMM might core in cases when per-request policy encounters a reject ending and the server-side flow is not available.
Conditions:
APM or SWG per-request policy with reject ending.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None.
Fix:
TMM no longer cores when per-request policy encounters reject ending.
Fixed Versions:
21.0.0, 17.5.1, 16.1.5, 13.1.0
608745-3 : Send HOST header in OCSP responder request
Links to More Info: BT608745
Component: Access Policy Manager
Symptoms:
HOST header not sent in OCSP responder request. APM OCSP responder object uses HTTP/1.0 to send a request to the OCSP responder and HTTP/1.0 does not have a host header.
Conditions:
OCSP configuration
Impact:
APM receives an invalid response because the OCSP Server didn't know which site to send the request to due to no HOST header.
Workaround:
Create a layer virtual server listening on the IP of the ocsp server and having an irule insert the host header.
ltm rule ocsp_insert_http_host {
when HTTP_REQUEST {
HTTP::header insert Host <e.g. IP address>
}
}
Fix:
HOST header added in OCSP responder request for HTTP/1.1.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3, 16.1.6.1
578989-15 : Maximum request body size is limited to 25 MB
Component: Access Policy Manager
Symptoms:
When a POST request with body size exceeds 25 MB is sent to APM virtual server, the request fails.
Conditions:
POST request body size exceeded 25 MB.
Impact:
The POST request fails. The maximum request body size is limited to 25 MB
Workaround:
There is no workaround at this time.
Behavior Change:
Request body size is increased.
Fixed Versions:
17.5.1.4
566995-6 : bgpd might crash in rare circumstances.
Links to More Info: BT566995
Component: TMOS
Symptoms:
Under unspecified conditions and in rare cases, bgpd might crash. Although bgpd restarts right away, routing table might be impacted.
Conditions:
The conditions under which this occurs are not known.
Impact:
This might impact routing table and reachability.
Workaround:
None known.
Fixed Versions:
17.5.1.4
551462-6 : CVE-2014-9730 - Linux Kernel UDF Filesystem Denial of Service Vulnerability
Links to More Info: K17447
528314-4 : Generating new default certificate and key pairs for BIG-IP ssl profiles via CLI will not be reflected in GUI or in tmsh
Links to More Info: K16816, BT528314
Component: TMOS
Symptoms:
Using the CLI to generate new default certificate and key pairs for BIG-IP ssl profiles are not reflected in the GUI or tmsh.
Conditions:
Using OpenSSL commands to generate a new default certificate and key pair, as described in SOL13579: Generating new default certificate and key pairs for BIG-IP ssl profiles, available here: https://support.f5.com/kb/en-us/solutions/public/13000/500/sol13579.html.
Impact:
After the renewal, tmsh list sys file ssl-cert default.crt command or the general properties in the GUI SSL Cert List shows the old one. This is a cosmetic issue only. The system uses the new default.
Workaround:
Perform a force reload of mcpd by running the following commands: -- touch /service/mcpd/forceload. -- tmsh restart sys service mcpd.
Fix:
After renewing certificates with OpenSSL, you can now use the simpler command "tmsh install sys crypto cert default.crt from-local-file /config/ssl/ssl.crt/default.crt" and the new certificate is immediately reflected in tmsh list and the GUI. Alternatively, "tmsh load sys config" also now properly recognizes the renewed certificate. No manual mcpd restart is required with either method.
Fixed Versions:
17.5.1.4
485387-2 : EncryptedAssertion may not be processed by BIG-IP as SP when EncryptedKey element is specified by RetrievalMethod Element by external IdP.
Links to More Info: BT485387
Component: Access Policy Manager
Symptoms:
An encrypted assertion from an external SAML Identity Provider (IdP) can contain the RetrievalMethod element to specify a link to the EncryptedKey element. The EncryptedKey element contains the key for decrypting the CipherData associated with an EncryptedData element.
BIG-IP configured as a Service Provider (SP) does not support the RetrievalMethod element while processing an encrypted assertion. As a result, the assertion is not processed properly, and error messages are printed to the log files: "Cannot decrypt SAML Assertion" and "failed to process encrypted assertion, error: Cipher value from EncryptedKey element not found".
Conditions:
External IdP uses RetrievalMethod to specify EncryptedKey element.
BIG-IP is configured as SP. BIG-IP requires received assertions to be encrypted.
Impact:
Authentication will fail due to inability to process assertion.
Workaround:
To work around the problem, reconfigure IdP to use embedded EncryptedKey instead of using RetrievalMethod.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
2198781 : BIG-IP high availability (HA) systems may experience an unexpected active-active state after an upgrade
Component: Local Traffic Manager
Symptoms:
Multiple HA devices become active and attempt to process traffic.
A traffic group may report "Initializing / Not Synced" while the device group reports that it is in sync.
Conditions:
This has been observed after a new installation or an upgrade.
Impact:
Multiple devices in a traffic group become active and attempt to process traffic. Devices remain in active active state.
Workaround:
To work around this issue, you can reboot or restart the sod process on the affected system.
To restart sod, perform the following procedure:
Impact of workaround: Restarting the sod process after an upgrade or reboot clears the condition. The following procedure will disrupt traffic processing and should only be performed during a maintenance window.
Log in to the BIG-IP command line.
From the terminal while logged in as root:
bigstart restart sod
Or from tmsh while logged in as admin:
restart sys service sod
Fixed Versions:
17.5.1.4
2197173-2 : Insufficient sanitization in SNMP configuration
Component: TMOS
Symptoms:
SNMP configuration is not sanitizing input properly.
Conditions:
NA
Impact:
It can lead to unexpected behaviour.
Workaround:
Restrict SNMP access to localhost.
Fix:
SNMP configuration is now properly sanitizing the inputs.
Fixed Versions:
17.5.1.4
2187529-1 : CVE-2025-12818: postgresql: libpq undersizes allocations, via integer wraparound
Component: TMOS
Symptoms:
A vulnerability has been identified in PostgreSQL’s libpq client library, where integer wraparound in several allocation-size calculations allows a peer or input provider to cause an undersized buffer and then write out-of-bounds by hundreds of megabytes. This can lead to a client application segmentation fault or crash when using libpq to connect to a PostgreSQL server.
Conditions:
A client application using a vulnerable libpq version connects to a malicious or compromised PostgreSQL server that sends crafted responses triggering integer wraparound during memory allocation.
Impact:
It can cause out-of-bounds memory writes, leading to a client application crash or segmentation fault (denial of service).
Workaround:
Upgrade to a patched libpq/PostgreSQL client version and avoid connecting to untrusted or compromised PostgreSQL servers.
Fix:
Upgrade to a patched libpq/PostgreSQL client version and avoid connections to untrusted or compromised PostgreSQL servers.
Fixed Versions:
17.5.1.4
2186897-2 : TMM core SIGSEVG upon replacing L7 DOS policy
Links to More Info: BT2186897
Component: Anomaly Detection Services
Symptoms:
On rare cases of expired connection, tmm can crash.
Conditions:
BADOS L7 configured
Replacing DOS policy under traffic
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fix:
TMM does not crash upon replacing L7 DOS policy.
Fixed Versions:
17.5.1.4
2186153-4 : CVE-2025-8194 cpython: Cpython infinite loop when parsing a tarfile
Component: TMOS
Symptoms:
A flaw was found in the Python tarfile module. Processing a specially crafted tar archive, specifically an archive with negative offsets, can cause an infinite loop and deadlock. This issue results in a denial of service in the Python application using the tarfile module.
Conditions:
The application uses the Python tarfile module to process an attacker-supplied malicious tar archive containing negative offsets.
Impact:
It can cause an infinite loop leading to application hang or denial of service.
Workaround:
Update to a patched Python version and avoid processing untrusted tar archives, or validate archives before extraction
Fix:
Upgrade to a Python version that includes the tarfile module fix for this issue.
Fixed Versions:
17.5.1.4
2183705-2 : Improper access control on SMTP
Component: Application Visibility and Reporting
Symptoms:
Security best practices are not being followed for SMTP in BIGIP.
Conditions:
NA
Impact:
Unexpected behaviour
Fix:
Security best practices are being followed.
Fixed Versions:
17.5.1.4
2183353-1 : TMM Intel E810 VF driver updates the link state with 1 second delay
Links to More Info: BT2183353
Component: Local Traffic Manager
Symptoms:
TMM gets the old link state from the driver level. It leads to 1 second delay for the link state change.
The problem may also create link flapping messages in /var/log/ltm for the same interface in some conditions:
Sep 17 15:02:22 notice mcpd[7553]: 01b5004a:5: Link: 1.8 is UP
Sep 17 15:02:22 notice mcpd[7553]: 01b5004a:5: Link: 1.2 is UP
Sep 17 15:02:22 notice mcpd[7553]: 01b5004a:5: Link: 1.8 is DOWN
Sep 17 15:02:22 notice mcpd[7553]: 01b5004a:5: Link: 1.2 is DOWN
Sep 17 15:02:22 notice mcpd[7553]: 01b5004a:5: Link: 1.8 is UP
Conditions:
- The interface link state is changed.
- Multiple VFs of the same physical interface are attached to BIG-IP VE.
Impact:
Link state is updated with a delay.
Workaround:
None
Fix:
TMM correctly get the link state from the driver layer.
Fixed Versions:
17.5.1.4
2172069-2 : GTM topology regions updates do not take effect within tmm
Links to More Info: BT2172069
Component: Global Traffic Manager (DNS)
Symptoms:
GTM topology regions updates do not take effect within tmm
Conditions:
Modifications made to gtm topology regions do not take effect when only one client is sending queries. Note that this issue is tmm-thread specific, meaning one or more tmm threads can get into this state, as long as DNS queries keep hitting the same tmm thread(s), coming from the same source IP address(es)
This is a very unlikely scenario in most production environments, and is likely to only be seen during lab testing with client traffic from one or few IP addresses.
Impact:
GTM not answering with latest GTM topology region updates.
Workaround:
Restart tmm, or perform the DNS lookup from a different client IP address (not the same address that the affected tmm thread previously processed a topology-based DNS query from)
Fixed Versions:
17.5.1.4
2163321-1 : Broken Address List hyperlink in the destination field of Virtual Server list
Links to More Info: BT2163321
Component: TMOS
Symptoms:
Clicking on the Address List hyperlink in the destination field of Virtual Server list directs the user to a Create new address list page instead of the expected address list page
Conditions:
1) A Virtual Server is set up with an address list
2) User clicks on the address list hyperlink in the Virtual Server list
Impact:
Hyperlink takes you to the wrong page.
Workaround:
None
Fixed Versions:
17.5.1.4
2162905-1 : AFM GUI does not display Port List members in Properties panel
Links to More Info: BT2162905
Component: Advanced Firewall Manager
Symptoms:
AFM GUI fails to display port-list members in the Properties pane
Conditions:
Occurs when viewing any Port List object in the AFM Policy Editor GUI
Impact:
Administrators cannot visually verify port-list contents in the GUI
Workaround:
Tmsh list security firewall port-list <port_list_name>
Fixed Versions:
17.5.1.4
2162849 : Removing the active controller does not trigger an immediate tenant failover
Links to More Info: BT2162849
Component: TMOS
Symptoms:
On a setup where BIG-IP tenant is active for a traffic group and is running on a VELOS chassis, and HA score configured with a weightage for F5OS_INTERNAL_TRUNK , pullinf out the active controller does not trigger an immediate failover
Conditions:
1)Tenant is active for a traffic group and is running on a controller that is active for the partition on which the tenant is running
2) Active system controller is removed or powered off using AOM
Impact:
Tenant failover is delayed upto 4min when an active controller of the active tenant is pulled out .
Workaround:
None
Fixed Versions:
17.5.1.4
2162705-1 : Tmm restarting on multi-NUMA AWS instances with ENA interfaces★
Links to More Info: BT2162705
Component: Local Traffic Manager
Symptoms:
Tmm is in the restart loop because dpdk driver is failing to attach with the error message in tmm log:
notice dpdk: [0000:00:06.0]: Multiple NUMA nodes usage is unsupported.
Conditions:
- BIG-IP VE large instance deployed on AWS cloud.
- NUMA node count more than 1 (check "lscpu | grep NUMA").
Impact:
Unable to use dpdk driver on some large AWS instances.
Workaround:
Switch to sock driver: https://my.f5.com/manage/s/article/K10142141
Fix:
DPDK correctly initializes the memory on multi-NUMA AWS instances.
Fixed Versions:
17.5.1.4
2162589-2 : BD crash with a specific configuration
Component: Application Security Manager
Symptoms:
BD daemon crash and restart
Conditions:
Navigation parameter is configured
Impact:
traffic disturbance, failover.
Workaround:
Remove navigation parameter from the configuration.
Fix:
BD working properly.
Fixed Versions:
17.5.1.4
2162189-2 : "Live Update" reinstalls the genesis ASU file, while the latest ASU file is installed manually★
Links to More Info: BT2162189
Component: Application Security Manager
Symptoms:
When operating in automatic mode, Live Update installs the genesis Automatic Signature Update (ASU) file instead of the manually installed latest ASU file.
Conditions:
Live Update is operating in automatic mode, there are only 2 installations in ASU files installations list, one is genesis file and another is latest ASU file that was published on ESDM.
Impact:
BIG-IP will not install the latest signatures.
Workaround:
Live Update should be switched to manual mode. The latest ASU file should be installed manually again instead of the genesis ASU file. When the newer ASU file is available on ESDM, do not install it manually, but switch Live Update to automatic mode again.
Fixed Versions:
17.5.1.4
2161077 : Bot profile properties page does not load when there are large number of SSL certs (> 1000)
Links to More Info: BT2161077
Component: TMOS
Symptoms:
When a large number of SSL certs are present, the Bot Defense profile properties page (Security > Bot Defense > Bot Profile Properties) does not load correctly
Conditions:
- ASM is provisioned
- SSL cert count > 1000
Impact:
Bot Defense profile properties page does not load
Workaround:
Use tmsh to manage the Bot profiles.
Fix:
Increase restjavad memory to 1.3GB after applying the fix and restart restjavad
> tmsh modify sys db provision.restjavad.extramb value 1280
> bigstart restart restjavad
Fixed Versions:
17.5.1.4
2153893-2 : With DNS64 configured, resolution aborts early on the first error response without trying other name servers.
Links to More Info: BT2153893
Component: Global Traffic Manager (DNS)
Symptoms:
When multiple name servers for a zone are known, as soon as one name server responds with an error rcode, resolution is aborted and other name server are not tried.
Conditions:
-- DNS64 is configured.
-- More than one name server is configured for a zone.
-- One name server responds with an error rcode.
Impact:
DNS resolution will intermittently fail. DNS resolution will succeed only if the cache randomly selects a working name server to contact first.
Workaround:
Disable DNS64.
Fixed Versions:
17.5.1.4
2152877-2 : Exclude /opt/CrowdStrike directory from Integrity Test
Component: TMOS
Symptoms:
CrowdStrike directory needs to be excluded from Integrity Test
Conditions:
CrowdStrike directory not present in Integrity Test exception list
Impact:
System integrity fails after Crowdstrike installation via falcon sensor
Workaround:
None
Fix:
CrowdStrike directory added Integrity Test exclusion
Fixed Versions:
17.5.1.4
2152785-2 : TMM may crash under certain conditions.
Component: Local Traffic Manager
Symptoms:
TMM crashes when HTTP/2 traffic
Conditions:
When HTTP/2 profile is configured on TMM.
Impact:
Traffic is disrupted
Workaround:
Add http router to the virtual, converting to HTTP/2 Full Proxy mode from HTTP/2 Gateway mode.
Fix:
TMM handling HTTP/2 traffic properly
Fixed Versions:
17.5.1.4
2152689-1 : ASM GUI "Failed to load requests" pop-up
Links to More Info: BT2152689
Component: Application Security Manager
Symptoms:
A "Failed to load requests" pop-up appears on the page.
REST framework responds with:
{"code":400,"message":"A valid filename must be supplied"}
This is visible in the log of the web browser's interaction with the BIG-IP UI (.har file).
Conditions:
A user with username that contains a slash i.e. "my\name"
clicking
on Security -> Event Logs -> Application -> Requests
or Security -> Event Logs -> Bot Defense -> Bot Requests
Impact:
Can't view request details
Workaround:
Do not use '/' in the username
Fixed Versions:
17.5.1.4
2152445-2 : "Live Update" API is unresponsive after upgrade and recover only after tomcat restart★
Links to More Info: BT2152445
Component: Application Security Manager
Symptoms:
After upgrading BIG-IP, the Live Update GUI displays an empty installation list. Errors are logged in the Tomcat log file. When attempting to refresh the Live Update page, additional errors appear in the Live Update log file.
Conditions:
"Live Update" has very long list of installations of ASU files.
Impact:
After the upgrade, BIG-IP retains the latest signatures that were present before the upgrade. The Live Update feature becomes non-functional until it is restarted.
Workaround:
Before upgrading, shorten ASU file installations by removing old entries. This helps prevent issues. If a problem occurs, restart the Live Update system.
Fixed Versions:
17.5.1.4
2152301 : After upgrading from version 17.1.2 to 17.5.1.3, the guest-role user is unable to run the command show running-config in TMSH.★
Links to More Info: BT2152301
Component: TMOS
Symptoms:
Guest-role user is unable to run the command show running-config in TMSH.
Executing this command from TMSH results in an error:
"Unexpected Error: Can't display all items, can't get object count from mcpd"
MCPD throws error:
result_message "01070823:3: Read Access Denied: user (myguest) type (HPKE Key)"
Conditions:
Except for all these 4 user roles, all the other user roles (operator, cert manager, app editor...etc) hit the same error.
- admin
- resource-admin
- log-manager
- auditor
Impact:
Unable to show the running config, or use list or list sys commands.
Workaround:
Login with an account with admin access.
Fixed Versions:
17.5.1.4
2152269-2 : Low reputation URIs are found in the URL DB binary
Links to More Info: BT2152269
Component: Traffic Classification Engine
Symptoms:
Publishing BIG-IQ image to Azure cloud is blocked due to malware scan detecting these low reputed URLs.
Conditions:
When uploading the image on Azure Cloud and these low reputed URLs are detected in malware scanners.
Impact:
No impact on the functionality
Workaround:
None.
Fix:
Low reputation URIs such as che168, cssplay, newliveplayer, tinypic.info referring test code are removed from the product.
Fixed Versions:
21.0.0, 17.5.1.4
2150525-2 : Improvements in iControl SOAP
Component: TMOS
Symptoms:
Security best practices were not being followed in iControl SOAP.
Conditions:
NA
Impact:
Can lead to unexpected behaviour.
Workaround:
NA
Fix:
iControl SOAP now has security best practices.
Fixed Versions:
17.5.1.4
2150489-4 : Most DB keys encrypted by SecureVault master key are not persisted to BigDB.dat when the system master key is changed.
Links to More Info: BT2150489
Component: TMOS
Symptoms:
After restarting mcpd, mcpd is stuck in a restart loop.
Conditions:
-- You set a DB variable that's encrypted ( proxy.password, configsync.password)
-- Change the SecureVault master key and save the configuration
Impact:
BIG-IP is in inoperative state , MCPD in a restart loop
Workaround:
If a system is affected by this issue, set the DB key back to its default value. Once the configuration is loaded, set the DB key back to the correct value:
- tmsh modify /sys db config.auditing.forward.sharedsecret value '<null>'
After changing the SecureValue master key but before encountering the issue, run the following command to update the value of the DB key on-disk:
setdb config.auditing.forward.sharedsecret "$(getdb config.auditing.forward.sharedsecret)"
Fixed Versions:
17.5.1.4
2149233-2 : TMM crashes when using SSL
Component: Local Traffic Manager
Symptoms:
Under certain SSL condition, TMM crashes.
Conditions:
When SSL is configured
Impact:
Traffic is disrupted.
Fix:
TMM working properly now.
Fixed Versions:
17.5.1.4
2144497-3 : Mellanox driver timeouts and packet drops on Azure instances with high NIC count
Links to More Info: BT2144497
Component: TMOS
Symptoms:
On Azure instances with high interface count (6 or more) Mellanox linux kernel driver mlx5_core may fail to initialize the interface or attach it very slow. Another symptom of this problem: packets drops because of timeouts in Mellanox device queue processing.
mlx_core will report multiple errors in the kernel logs (run "dmesg | grep mlx5_core" to display it).
Conditions:
- BIG-IP VE instance deployed in Azure with 6 or more interfaces
- Accelerated networking is enabled
Impact:
- Azure instance starting time may be significant
- SSH access may be unavailable
- Packets drops on dataplane Mellanox interfaces
Workaround:
None
Fix:
Device interrupts are assigned on correct vCPUs in Azure/HyperV environments to prevent Mellanox device timeouts.
Fixed Versions:
17.5.1.4
2144445-2 : Insufficient sanitization in TMSH
Component: TMOS
Symptoms:
TMSH is not sanitizing input properly
Conditions:
NA
Impact:
Can cause unexpected behaviour in TMSH
Fix:
TMSH is now properly sanitizing the input.
Fixed Versions:
17.5.1.4
2144389-2 : CVE-2025-40780 BIND vulnerability
Links to More Info: K000157948, BT2144389
2144353-1 : BIND upgrade to stable version 9.18.41
Links to More Info: BT2144353
Component: Global Traffic Manager (DNS)
Symptoms:
BIND upgrade to stable version 9.18.41.
Conditions:
Using local BIND.
Impact:
BIND upgrade to stable version 9.18.41.
Workaround:
None.
Fix:
BIND upgrade to stable version 9.18.41.
Fixed Versions:
17.5.1.4
2143165-1 : Oauth tokens are not shown in UI
Component: Access Policy Manager
Symptoms:
Oauth tokens are not shown in UI
Conditions:
Access >> Overview >> OAuth Reports >> Tokens
Impact:
Oauth tokens are not visible
Workaround:
Use tmsh to see the Oauth Tokens:
"tmsh list / apm oauth token-details db-instance oauthdb"
Fixed Versions:
17.5.1.4
2143101-2 : SNMP Malfunctioning for IPI BL: Incorrect Statistics Reported
Links to More Info: BT2143101
Component: Advanced Firewall Manager
Symptoms:
The statistics counters retrieved via SNMP and tmctl do not reflect any increments for the corresponding blacklist category, despite packets being dropped and logged as expected.
Conditions:
Blacklist categories populated dynamically via feed lists or automatic updates.
Impact:
Inaccurate stats due to missing statistics.
Workaround:
None.
Fix:
When an IP address is dynamically blacklisted by IP Intelligence (IPI), packets from that source are dropped and logged as expected. The statistics counters for the relevant blacklist category viewed via SNMP or tmctl are also incremented.
Fixed Versions:
17.5.1.4
2141337-1 : Auto-upgrade of the BIG-IP APM Edge Client does not upgrade the MachineTunnel Service on Windows systems★
Component: Access Policy Manager
Symptoms:
When a new version of the MachineTunnel Service is available, the updated BIG-IP APM Edge Client package must be installed.
Conditions:
A new version of the MachineTunnel Service is available for Windows systems.
Impact:
Run the updated BIG-IP APM Edge Client installer package to upgrade the MachineTunnel Service.
Workaround:
Manually install the newest version of the BIG-IP APM Edge Client.
Fix:
The MachineTunnel Service automatically upgrades via the BIG-IP APM Edge Client on Windows systems.
Fixed Versions:
17.5.1.4
2141245-2 : Undisclosed traffic to TMM can lead to resource exhaustion
Component: Global Traffic Manager (DNS)
Symptoms:
Certain traffic sent to TMM is leading to resource exhaustion.
Conditions:
Undisclosed conditions
Impact:
TMM Resource exhaustion
Fix:
DNS LDNS API correction.
Fixed Versions:
17.5.1.4
2140905-2 : System Integrity Test on VE is halting the whole system in FIPS mode
Links to More Info: BT2140905
Component: TMOS
Symptoms:
System Integrity Test on VE halts the whole system in FIPS mode
Conditions:
-- BIG-IP Virtual Edition
-- FIPS Mode enabled
-- Falcon sensor installed
Impact:
System integrity test fails and the system will not boot.
Workaround:
None
Fix:
System Integrity Test on VE will stop tmm in FIPS mode now and user can bigstart tmm start.
Fixed Versions:
17.5.1.4
2140621-1 : CVE-2025-8677: Resource exhaustion via malformed DNSKEY handling
Links to More Info: K000157317, BT2140621
2139901-1 : Server-ssl profile "do-not-remove-without-replacement" is recreated
Links to More Info: BT2139901
Component: Application Security Manager
Symptoms:
A required profile for a deprecated service is recreated on restart, but not saved to bigip.conf
Conditions:
The "do-not-remove-without-replacement" profile is deleted and the bewaf daemon is restarted
Impact:
The profile is recreated, but not saved to bigip.conf without another user action.
Workaround:
"tmsh save sys config" can be run to save the active config to bigip.conf
Fixed Versions:
17.5.1.4
2137977-1 : Clicking on a policy in a virtual server's resource page navigates to the full policy list, instead of the specific policy★
Links to More Info: BT2137977
Component: TMOS
Symptoms:
The hyperlink for the policy on virtual server's resource page navigates to the incorrect location.
Conditions:
Virtual server with an ltm policy attached.
Impact:
The hyperlink navigates to the full policy list, so the specific policy would still need to be found in the full list to navigate to it.
Workaround:
None
Fixed Versions:
17.5.1.4
2137773-1 : Table content in FPS/DataSafe webUI page not shown correctly★
Links to More Info: BT2137773
Component: Application Security Manager
Symptoms:
When the user navigates either to
Security ›› Fraud Protection Service : Anti-Fraud Profiles
or
Security ›› Data Protection : BIG-IP DataSafe
The table content is not shown.
Conditions:
Navigate to
Security ›› Fraud Protection Service : Anti-Fraud Profiles
or
Security ›› Data Protection : BIG-IP DataSafe
Impact:
User cannot see or access the profile contents via GUI.
Workaround:
None
Fix:
User can see the profiles table.
Fixed Versions:
21.0.0, 17.5.1.4
2137653-1 : Unable to upload files that contain a colon in the filename★
Links to More Info: BT2137653
Component: TMOS
Symptoms:
You are unable to upload files where the filename contains a colon.
The BIG-IP returns a 400 HTTP error with the following error message: "A valid filename must be supplied".
Conditions:
Trying to upload a file to the BIG-IP where the filename uses one or more colons.
Impact:
Files that contain colons in the filename are unable to me uploaded.
Workaround:
The only option is to use a filename that does not use a colon.
Fixed Versions:
21.0.0, 17.5.1.4
2137581-1 : TMM core may occur under certain conditions
Component: Local Traffic Manager
Symptoms:
Under certain SSL conditions, TMM could encounter a core.
Conditions:
NA
Impact:
Traffic is disrupted while the TMM process restarts.
Workaround:
Set the 'Alert Timeout' value to a specific value, say 5 seconds, instead of the default 'indefinite' value, in ALL client-ssl AND server-ssl profiles.
Configuration Steps
-------------------
GUI Path:
Local Traffic ›› Profiles : SSL : Client ›› clientssl → Alert Timeout = 5 seconds
Local Traffic ›› Profiles : SSL : Server ›› serverssl → Alert Timeout = 5 seconds
TMSH Command:
(tmos)# modify ltm profile client-ssl clientssl alert-timeout 5
(tmos)# modify ltm profile server-ssl serverssl alert-timeout 5
Fix:
TMM able to work properly.
Fixed Versions:
21.0.0, 17.5.1.4
213618-2 : Resetting DB variable to default does not always work
Component: TMOS
Symptoms:
When using the 'reset-to-default' option to set a DB variable to its default value, the DB variable may appear to be reconfigured for its default value, but the new value may not have any functional effect.
For example, if the DB variable 'log.mcpd.level' is configured with a value of 'debug', then the command 'tmsh mod sys db log.mcpd.level reset-to-default', the DB variable 'log.mcpd.level' will display a value of 'notice', but mcpd will continue logging at 'debug' level.
Conditions:
This may occur when:
-- A system DB variable is configured with a non-default value.
-- A command is issued to reset that DB variable to its default value using the following syntax:
-- from a tmsh prompt:
'modify /sys db <variable.name> reset-to-default'
-- from a bash prompt:
'tmsh modify sys db <variable.name> reset-to-default'
Impact:
The intended change in the system DB variable value does not have the desired effect.
For example, if system DB variable controlling logging levels is changed from 'debug' (or other verbose logging level) to its default (non-debug) value, debug logging continues, which may fill the file system unexpectedly and result in system failures.
Workaround:
To ensure that:
-- BIG-IP daemons implement the behavior expected by changing the system DB variable to its default value, and
-- The saved BIG-IP configuration reflects that the system DB variable is no longer configured with a non-default value,
Issue two commands to (1) explicitly configure the system DB variable to the desired value, and (2) make system DB variable as being configured with its default value, using the following format:
-- from a tmsh prompt:
'modify /sys db <variable.name> value <desired_value>'
'modify /sys db <variable.name> reset-to-default'
-- from a bash prompt:
'tmsh modify sys db <variable.name> value <desired_value>'
'tmsh modify sys db <variable.name> reset-to-default'
Fixed Versions:
21.0.0, 17.5.1.4
2132165-2 : SMTP, SSH/SFTP, FTP connections fail after enabling tm.tcpstopblindinjection
Links to More Info: BT2132165
Component: Local Traffic Manager
Symptoms:
Connections fail through virtual servers as the server's initial data is dropped.
Conditions:
- DB key tm.tcpstopblindinjection is enabled
- Virtual server for protocol where server speaks first (e.g. SMTP, SSH/SFTP, FTP)
Impact:
Connections fail.
Workaround:
Disable the DB key sys db tm.tcpstopblindinjection
Fix:
Improved handling of sys db tm.tcpstopblindinjection
Fixed Versions:
21.0.0, 17.5.1.4
2132125-4 : Unable to upload QKView to iHealth
Links to More Info: K000157248, BT2132125
Component: TMOS
Symptoms:
Message displayed after attempting to upload a QKview:
Failed to upload the QKView file to iHealth
Conditions:
Unable to upload QKView.
Impact:
Can't upload.
Workaround:
You can download the qkview file from the BIG-IP and then upload it through the iHealth webui.
Fix:
Can upload.
Fixed Versions:
21.0.0, 17.5.1.4
2131913-3 : TMM may crash when sending QUIC traffic
Component: Traffic Classification Engine
Symptoms:
TMM cores under certain conditions when handling QUIC traffic
Conditions:
When classification profile is enabled in VS
Impact:
Temporary service disruption due to TMM restart.
Workaround:
Remove/disable the Classification profile on any UDP virtual server that can receive QUIC‑formatted traffic
Fix:
TMM handling traffic properly
Fixed Versions:
21.0.0, 17.5.1.4
2131233-2 : ADM not functioning properly
Component: Anomaly Detection Services
Symptoms:
ADM handling high concentration of HTTP/2.0 traffic is utilizing high resources from TMM.
Conditions:
When ADM is configured
Impact:
TMM resources are getting exhausted.
Workaround:
Disabling ADM
Fixed Versions:
21.0.0, 17.5.1.4
2131085-1 : Running 'tmsh reboot slot all' on multi-slot tenant or vCMP guest causes it to get stuck in unhealthy state
Links to More Info: BT2131085
Component: Local Traffic Manager
Symptoms:
Running 'tmsh reboot slot all' on multi-slot tenant or vCMP guest or VIPRION causes BIG-IP to get stuck in unhealthy state.
MCPD is failing to load with the error '01070710:3: Could not find master-key object':
slot3/tenant1.example.com notice clusterd[7956]: 013a0024:5: Blade 3: Changing primary from 0 (none) to 2
slot3/tenant1.example.com err clusterd[7956]: 013a0018:3: Blade 3 turned RED: Quorum: stepping slow clock forward by 747.133704 ms, HA TABLE offline
slot3/tenant1.example.com notice clusterd[7956]: 013a0006:5: Blade status: 0 GREEN 1 YELLOW 1 Not Ready
slot1/tenant1.example.com notice mcpd[4785]: 01070419:5: Platform initialization phase triggered.
slot2/tenant1.example.com emerg load_config_files[9951]: "/usr/bin/tmsh -n -g -a load sys config partitions all base " - failed. -- 01070710:3: Could not find master-key object - sys/validation/MasterKey.cpp, line 3070
All slots will have an Availability of "offline" as reported in tmsh show sys cluster:
[root@rdt2:/S1-red-P::INOPERATIVE:Standalone] config # tmsh show sys cluster
-----------------------------------------
Sys::Cluster: default
-----------------------------------------
Address 10.0.0.2/16
Alt-Address ::
Availability available
State enabled
Reason Cluster Enabled
Primary Slot ID 1
Primary Selection Time 11/01/25 18:06:26
-----------------------------------------------------------------------------------------------------
| Sys::Cluster Members
| ID Address Alt-Address Availability State Licensed HA Clusterd Reason
-----------------------------------------------------------------------------------------------------
| 1 :: :: offline enabled true offline running Run, HA TABLE offline
| 2 :: :: offline enabled false offline running Run, HA TABLE offline
Conditions:
1. Multi-slot F5OS tenant or Multi-slot vCMP guest or multi-bladed VIPRION.
2. Rebooting all the slots of the guest or tenant (e.g. 'tmsh reboot slot all' or 'clsh reboot')
Impact:
All tenant or VCMP guest slots remain offline, and are inoperable from a traffic standpoint.
Workaround:
For both tenants and guests, re-deploying them has a high probability of resolving the issue.
That is changing the tenant's or guest's state from "deployed" to "provisioned" or "configured", and then back to "deployed".
or
Restarting mcpd on the primary slot also has a high probability of resolving the issue.
Tmsh show sys cluster will report the "Primary Slot ID"
# tmsh show sys cluster
-----------------------------------------
Sys::Cluster: default
-----------------------------------------
Address address
Alt-Address ::
Availability available
State enabled
Reason Cluster Enabled
Primary Slot ID 1
Primary Selection Time 11/01/25 18:06:26
Both workarounds are highly likely to restore the tenant or guest to full functionality.
Note: the issue might return if all tenant or guest slots are rebooted.
Fixed Versions:
17.5.1.4
2130965-1 : Unable to create VELOS tenant with any subnet other than /24
Links to More Info: BT2130965
Component: TMOS
Symptoms:
When a VELOS tenant is created with any subnet (example:/23 subnet), the tenant is created with a /24 subnet instead.
Conditions:
-- Creating a VELOS tenant
-- Assigning an explicit subnet as /23 or any subnet other than /24
Impact:
The wrong subnet is assigned to the management IP address
Workaround:
None
Fix:
Made sure while propagating subnet along with the ip to tenants, it will even get the right subnet which configured.
Fixed Versions:
21.0.0, 17.5.1.4
2130729-1 : HTTP::respond not working properly with HTTP3/quic - content not sent
Links to More Info: BT2130729
Component: Local Traffic Manager
Symptoms:
An iRule for a HTTP/3 virtual server with HTTP::respond that includes content will not send the content
Conditions:
The header sent to the client does indicate content with a content-length above 0
* Request completely sent off
< HTTP/3 200
< content-type: text/html
< server: BIG-IP
< content-length: 179
But no content is sent and the connection is terminated abnormally.
Impact:
Not able to use HTTP::respond with content
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.4
2130601-1 : TMUI Request Processing Improvement
Component: TMOS
Symptoms:
TMUI may not properly process certain requests in specific scenarios.
Conditions:
NA
Impact:
Unexpected behavior
Workaround:
NA
Fix:
TMUI now processes requests as expected.
Fixed Versions:
21.0.0, 17.5.1.4
2130485 : Warning: the current license is not valid - Fault code: 51133
Links to More Info: BT2130485
Component: TMOS
Symptoms:
License activation may fail on specific platforms.
root@(localhost)(cfg-sync Standalone)(NO LICENSE)(/Common)(tmos)# install sys license registration-key D1234-12345-12345-12345-1234567
Warning: the current license is not valid
License server has returned an exception.
Fault code: 51133
Fault text: Error 51133, F5 registration key is not compatible with the detected platform - This platform, "", cannot be activated with this registration key "I123456-1234567".
Conditions:
- DEV or Evaluation license
- KVM on HP AMD server
- IBM Bare Metal
Impact:
Unable to license BIG-IP.
Workaround:
None
Fix:
License activation is successful.
Fixed Versions:
17.5.1.4
2125953-1 : Insufficient access control to REST endpoint and TMSH for some CLI versions.
Component: TMOS
Symptoms:
Security best practices are not followed for some CLI versions.
Conditions:
Not specified.
Impact:
Unexpected behaviour
Fix:
Security best practices are being followed.
Fixed Versions:
17.5.1.4
2119329 : Tenant IP not getting propagated
Links to More Info: BT2119329
Component: Local Traffic Manager
Symptoms:
Tenant IP is not getting propagated.
Conditions:
On a VELOS chassis, when a tenant is deployed, unable to get the management IP for the tenant.
Impact:
Tenant IP is not getting propagated.
Workaround:
None
Fix:
Ensure MCPD publishes both the management IP and the gateway information.
Fixed Versions:
17.5.1.3
2119173-1 : The ACTIVE or STANDBY buttons in the webUI are not working
Links to More Info: BT2119173
Component: TMOS
Symptoms:
A blank page is displayed when the Active or StandBy button in the top left corner of the webUI is clicked.
Conditions:
Click the ACTIVE or the STANDBY button on the top left corner of the webUI.
Impact:
Blank page is displayed.
Workaround:
Navigate to Device Management >> Traffic Groups and select the desired traffic group.
Fixed Versions:
21.0.0, 17.5.1.4
2106789-4 : BIGIP LTM Monitors Hardening
Component: Global Traffic Manager (DNS)
Symptoms:
BIG-IP LTM External Monitors are not following the best security practices
Conditions:
When external montiors is configured
Impact:
Unexpected behaviour
Fix:
Best security practices are now applied
Fixed Versions:
17.5.1.4
2099689-1 : AFM Security Policy checkboxes for Auto Generate UUID and Logging for rules listed doesn't work via GUI
Links to More Info: BT2099689
Component: Advanced Firewall Manager
Symptoms:
The "Logging" and "Auto Generate UUID" checkboxes for firewall rules do not respond in the GUI but work correctly via tmsh CLI.
Conditions:
The issue occurs when editing firewall rules in the BIG-IP AFM GUI
Impact:
Users are unable to enable or disable "Logging" and "Auto Generate UUID" for firewall rules via the BIG-IP AFM GUI
Workaround:
Use tmsh:
tmsh modify security firewall rule-list SELF-IP-WEB rules modify { new3 { log yes } }
Fixed Versions:
21.0.0, 17.5.1.4
2099609-4 : TMM might core with SIGSEGV with certain network traffic
Links to More Info: K000156912, BT2099609
2098861-1 : Single-NIC not supported on Azure Standard_Ds_v5 Series.
Links to More Info: BT2098861
Component: TMOS
Symptoms:
In Azure/HyperV single NIC VMs, tmm fails to attach to the 1.0 interface.
Conditions:
- HyperV or Azure VM that has a single SR-IOV NIC attached to the VM.
- Affected instances show `getdb provision.1nic` value as "disable". For 1nic instances, this dbvar should have "enable" value to correctly configure tmm and mgmt networking.
- This problem does not happen with 1nic instances using only a synthetic netvsc nic.
Impact:
As tmm can't successfully attach to the 1nic instance, no data traffic passes.
Workaround:
Configure "provision.1nic" dbar value to "forced_enable" to override the automation behavior:
setdb provision.1nic "forced_enable"
Fix:
Both data connectivity through TMM works in Single-NIC instances deployed in Azure/HyperV.
Fixed Versions:
21.0.0, 17.5.1.4
2086097-1 : PEM iRules causing traffic disruption
Component: Policy Enforcement Manager
Symptoms:
In some scenario, there is improper termination of connection and it is leading to TMM core
Conditions:
PEM iRules configured.
Impact:
TMM core. Service disruption.
Fix:
Connection is properly terminating and TMM is not coring.
Fixed Versions:
17.5.1.4
2083217-1 : Updates to BIG-IP Image Signing and Verification Process - October 2025★
Links to More Info: BT2083217
Component: TMOS
Symptoms:
A key update in October 2025 impacts image signature verification for certain BIG-IP and F5OS releases, potentially blocking installations or validations on older systems.
Conditions:
This change is implemented in BIG-IP versions released October 2025 or later, and all BIG-IP Engineering Hotfixes created on or after October 13, 2025.
Impact:
As a result, BIG-IP images signed with new keys may not be automatically verified by earlier BIG-IP and F5OS releases.
In addition, earlier BIG-IP releases may not be automatically verified by BIG-IP versions released October 2025 or later.
Workaround:
BIG-IP ISO Images:
Signature verification (as documented in K15225) will block installation of this release on systems running earlier BIG-IP versions.
To install this release:
1.Temporarily disable BIG-IP ISO signature verification.
2.Install this BIG-IP release.
3.Re-enable BIG-IP ISO signature verification.
Signature verification (as documented in K15225) will also block installation of older BIG-IP versions (released before October 2025) on systems running this BIG-IP release.
To install older versions:
1.Temporarily disable BIG-IP ISO signature verification.
2.Install the desired older BIG-IP version.
3.Re-enable BIG-IP ISO signature verification.
F5OS Tenant Images:
For this BIG-IP release, ".qcow2.zip.bundle" tenant images cannot be validated on F5OS host systems (VELOS chassis or rSeries appliances) running F5OS versions released prior to October 2025. This is due to differences in signing and verification methods.
To install F5OS tenant images:
Where possible, use the ".tar.bundle" image type, which is compatible with all supported F5OS releases other than F5OS-A 1.5.x. For F5OS-A 1.5.x, upgrade the host to F5OS-A 1.5.4 or later, and then use the ".qcow2.zip.bundle" tenant image.
For more information, see:
K15225: Enabling signature verification for BIG-IP ISO image files
https://my.f5.com/manage/s/article/K15225
K24341140: Verifying BIG-IP software images using SIG and PEM files
https://my.f5.com/manage/s/article/K24341140
K000157005: F5 signing certificate and key rotation, October 2025
https://my.f5.com/manage/s/article/K000157005
Fix:
This BIG-IP release has been signed with cryptographic keys updated as of October 2025.
Behavior Change:
As the result of rotation of the keys used to sign BIG-IP images, verification of images for this BIG-IP release may not behave as historically expected.
- For BIG-IP ISO images, ISO image signature verification documented in K15225 will block installation of this release on systems running earlier releases of BIG-IP.
To successfully install this BIG-IP release:
1. Disable BIG-IP ISO signature verification
2. Install this BIG-IP release
3. Re-enable BIG-IP ISO signature verification
- For BIG-IP ISO images, ISO image signature verification documented in K15225 will block installation of BIG-IP versions released prior to October 2025.
To successfully install older BIG-IP versions while running this BIG-IP release:
1. Disable BIG-IP ISO signature verification
2. Install the desired BIG-IP release
3. Re-enable BIG-IP ISO signature verification
- For F5OS tenant images for this BIG-IP release, F5OS tenant images of the ".qcow2.zip.bundle" type cannot be validated when imported into an F5OS host system (VELOS partition or rSeries appliance) for F5OS versions released prior to October 2025. This is due to different signing and verification methods for ".qcow2.zip.bundle" image types.
To successfully install an F5OS tenant image for this BIG-IP release:
- For F5OS-A 1.5.x, upgrade the system to at least F5OS-A 1.5.4 and then import an ".qcow2.zip.bundle" image.
- For all other supported F5OS versions, import an F5OS tenant image of the ".tar.bundle" type. This image type uses a different signing and verification method which is recognized as valid on both newer and older F5OS host software versions.
It is highly recommended that all F5-provided software images be manually verified using the procedures described in:
K24341140: Verifying BIG-IP software images using SIG and PEM files
https://my.f5.com/manage/s/article/K24341140
See also:
K15225: Enabling signature verification for BIG-IP ISO image files
https://my.f5.com/manage/s/article/K15225
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8
2078797-1 : LTM Policy actions fail to render in configuration utility (web UI)★
Links to More Info: K000156885, BT2078797
Component: TMOS
Symptoms:
Upon going to Local Traffic >> Policies : Policy List and selecting a policy that has actions defined, the following error is logged via the browser developer console.
TypeError: can't access property "action", i.action is undefined
t app.min.js:20
ActionTextController app.min.js:20
Angular 44
jQuery 5
angular.js:15717:16
Conditions:
- LTM Policies and actions are configured.
- The LTM Policies are viewed in the configuration utility (web UI)
Impact:
- This issue prevents the BIG-IP administrator from being able to view detailed information about the LTM Policies via the configuration utility.
- BIG-IP administrator is also unable to edit pools or virtual servers from the drop-down list when selecting an action to forward traffic for the LTM policy rule.
Workaround:
Use TMSH to view or edit LTM Policies.
Alternatively, install an engineering hotfix with the fix, available from the MyF5 Downloads site:
- Hotfix-BIGIP-17.1.3.0.210.11-ENG.iso
- Hotfix-BIGIP-17.5.1.3.0.192.19-ENG.iso
K4918: Overview of the F5 critical issue hotfix policy
https://my.f5.com/manage/s/article/K4918
Fix:
The LTM Policies correctly render in the configuration utility.
Fixed Versions:
21.0.0, 17.5.1.4
2078793-2 : GCUI Library Upgraded for AGC
Links to More Info: K000134507, BT2078793
2078297-1 : Unexpected PVA traffic spike
Component: TMOS
Symptoms:
In rare circumstances, traffic may spike on the graphs inside the tenant without corresponding graphs on the external interfaces.
Conditions:
VELOS tenant
epva traffic
Impact:
Loss of connectivity,
extremely high PVA traffic spike
tcpdump on the appliance ceases to function
Workaround:
Disabling PVA acceleration on affected virtual servers
Fix:
PVA traffic not spiking.
Fixed Versions:
17.5.1.4
2077465 : Missing audit logs for dropped IP option packets (LSR/SSR/RR) prior to attack detection
Component: Advanced Firewall Manager
Symptoms:
-- Packets containing IP options (RR, LSR, SSR) are dropped when the IP Option Frames DoS vector threshold is set to 0.
-- No audit logs are generated for these dropped packets unless attack detection is triggered.
-- Very low packet counts (e.g., 1–2 packets) do not increment the attack counter and therefore do not produce logs.
Conditions:
-- DoS vectors such as “IP Option Frames” or “Bad TCP Flags Malformed” are configured with a rate limit of 0.
-- Packets containing:
IP Record Route (RR) / Loose Source Routing (LSR) / Strict Source Routing (SSR)
-- Packet rate is low (below the stats_1m aggregation threshold).
-- Attack detection is not triggered.
Impact:
-- Dropped packets with prohibited IP options are not logged.
Workaround:
-- No effective workaround currently available.
-- Increasing the traffic rate to trigger attack detection generates logs; however, this approach does not satisfy CC requirements regarding low-rate packet drops.
Fix:
Audit logging has been improved for DoS vectors configured with a zero rate limit. Packets containing prohibited IP options (RR, LSR, SSR) that are dropped due to policy enforcement are now logged regardless of whether traffic rates exceed the attack detection threshold. This enhancement provides visibility into low-rate packet drops without the need for attack detection to be triggered.
Fixed Versions:
17.5.1.4
2077297-1 : HA Group List page in webUI shows a blank page
Links to More Info: BT2077297
Component: TMOS
Symptoms:
HA Group List page shows a blank page with no information on the screen
Conditions:
The system is configured for High Availability (HA)
1) Go to System > High Availability > HA Group List
2) Click the Create button or an existing entry in the list
Impact:
No information is visible in HA Group List page in webUI
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.4
2077209 : File Import Handler Enhancement
Links to More Info: K000156801, BT2077209
2077205 : TMUI Request Processing Improvement
Component: TMOS
Symptoms:
TMUI may not properly process certain requests in specific scenarios.
Conditions:
NA
Impact:
Unexpected behavior
Workaround:
NA
Fix:
TMUI now processes requests as expected.
Fixed Versions:
17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8
2077201 : TMUI File Import Handler Enhancement
Links to More Info: K000156800, BT2077201
2064569-1 : BIND upgrade to version 9.18.37
Links to More Info: BT2064569
Component: Global Traffic Manager (DNS)
Symptoms:
BIND version 9.18.28 was published on 23 July 2024
Conditions:
New security fixes were made available in the last 9.18.37 BIND version: CVE-2025-40775, CVE-2025-40776.
Impact:
NA
Workaround:
None
Fix:
BIND was upgraded to the last 9.18.37 version
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8
2063265-2 : Improvements in HTTP headers
Component: TMOS
Symptoms:
Certain flags were missing from HTTP headers.
Conditions:
NA
Impact:
Can lead to unexpected behaviour
Fix:
Headers now have proper flags.
Fixed Versions:
17.5.1.4
2058989-1 : TMUI hardening
Component: TMOS
Symptoms:
In certain scenarios, TMUI does not follow best security practices.
Conditions:
NA
Impact:
NA
Workaround:
NA
Fix:
Best security practices are now applied.
Fixed Versions:
21.0.0, 17.5.1.4
2058977-1 : TMUI hardening
Component: TMOS
Symptoms:
In certain scenarios, TMUI does not follow best security practices.
Conditions:
NA
Impact:
NA
Workaround:
NA
Fix:
Best security practices are now applied.
Fixed Versions:
21.0.0, 17.5.1.4
2058853-1 : SMTP validation improvements
Component: Application Visibility and Reporting
Symptoms:
SMTP validation did not follow expected behavior.
Conditions:
NA
Impact:
NA
Workaround:
NA
Fix:
SMTP validation follows expected behaviour.
Fixed Versions:
21.0.0, 17.5.1.4
2053705 : TMM memory is not cleared after handshake failure
Links to More Info: K000156733, BT2053705
2053533-4 : Security improvements in TMSH and certain log files
Component: TMOS
Symptoms:
TMSH and certain logs on BIGIP are not following security best practices.
Conditions:
NA
Impact:
Unexpected behaviour
Workaround:
NA
Fix:
TMSH and the logs are now following security best practices.
Fixed Versions:
21.0.0, 17.5.1.4
2053309 : Changes to README - mention of duojs.org URL
Links to More Info: BT2053309
Component: TMOS
Symptoms:
https://my.f5.com/s/article/K000156036
Conditions:
https://my.f5.com/s/article/K000156036
Impact:
https://my.f5.com/s/article/K000156036
Fix:
https://my.f5.com/s/article/K000156036
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3, 16.1.6.1, 15.1.10.8
2053165-3 : CVE-2025-47268 iputils: Signed Integer Overflow in Timestamp Multiplication in iputils ping
Links to More Info: K000158112
2047593 : Blade upgrade fails with the "HAL unexpected init failure (continuing) : Unknown slot for ChassisBase" error message★
Links to More Info: BT2047593
Component: TMOS
Symptoms:
C4800 chassis blades at slot positions 5 - 8 fails to join cluster after upgrading to BIG-IP TMOS 17.5.0 with error "Unknown slot for ChassisBase".
Conditions:
C4800 chassis that supports 8 blades with blades at slots 5 to 8 and running with BIG-IP v17.5.0.
Impact:
Reduced capacity due to fewer blades joining cluster for traffic handling.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.4
2047569-1 : TMM may crash during the startup with SR-IOV Intel E810 NIC
Links to More Info: BT2047569
Component: Local Traffic Manager
Symptoms:
During the TMM restart, the Intel E810 SR-IOV interface may remain in an invalid state. It will prevent the initialisation of the interface on the next TMM start, and TMM will generate the core file in this case.
Conditions:
BIG-IP VE using xnet-iavf driver
Impact:
TMM may crash during startup.
Workaround:
To clean invalid SR-IOV interface state, a complete reboot of the BIG-IP VM or the hypervisor is required.
Fix:
TMM correctly shut down Intel E810 SR-IOV interfaces during the service restart.
Fixed Versions:
21.0.0, 17.5.1.4
2047293-2 : TMM NULL dereference in Dyn-TCAM after multiple failures
Links to More Info: BT2047293
Component: TMOS
Symptoms:
TMM SIGSEGV crash.
Conditions:
Triggered by HW offload of a security feature.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
2046941-1 : Distributed Cloud-facing BIG-IP instance with bot-defense profile might block XC health monitor
Links to More Info: BT2046941
Component: Application Security Manager
Symptoms:
Bot-defense profile detects a Distributed Cloud health monitor as a bot, and might block it (depends on configuration).
Conditions:
-- Bot-defense profile is attached to a virtual server.
-- BIG-IP is configured in front of Distributed Cloud.
Impact:
Distributed Cloud health monitors are blocked, false-positive bots are detected and logs.
Workaround:
None
Fix:
Signature Category 'F5 Health Monitor' description added. New signature of category 'F5 Health Monitor' is included in latest Bot Signatures Live Update. While configuring BIG-IP device to work, user should make sure DNS resolvers are properly configured and reachable via data path
Fixed Versions:
17.5.1.4
2046885-2 : BIG-IP iControl REST and tmsh vulnerability CVE-2025-59481
Links to More Info: K000156642, BT2046885
2046553-1 : Memory leak when modifying PEM policies with flow-info-filters
Links to More Info: BT2046553
Component: Policy Enforcement Manager
Symptoms:
Tmm memory slowly grows over time.
Conditions:
Modifying PEM policies with flow-info-filters
Impact:
Tmm can run out of memory
Workaround:
Restart tmm before memory is exhausted. Subscriber traffic will be impacted while tmm restarts.
Fix:
Tmm does no longer leak memory.
Fixed Versions:
17.5.1.4
2044417-1 : Connectivity problems and eal-intr-thread cores on Azure using >= 6 interfaces
Links to More Info: BT2044417
Component: TMOS
Symptoms:
With Hyper-V platforms, VMBus devices are present due to the virtualization architecture. These devices make use of VMBus channels in the /sys/bus directories. Hyper-V has a reported supported limit of 128 monitored VMBus channels. Patches for non-monitored (low-speed) VMBus channels have caused connectivity problems and eal-intr-thread cores.
Conditions:
-- Use Hyper-V platform
-- Use 16 vCPUs and attach >= 7 interfaces
-- Use 24 vCPUs and attach >= 6 interfaces
Impact:
Traffic interrupts and eal-intr-thread cores can occur.
Workaround:
Deploy instances with <= 3 interfaces on Hyper-V platforms.
Fix:
Regardless of combinations of vCPU and interface counts, traffic can be passed and eal-intr-thread cores are limited. VMBus channels correspond with device queues so the 128 monitored VMBus channel limit forces queue-sharing and impacts performance. To avoid losing performance, deploy instances with fewer interfaces.
Fixed Versions:
21.0.0, 17.5.1.4
2038393-3 : Looped dtls virtual can cause crash due to NULL dereference
Links to More Info: BT2038393
Component: Local Traffic Manager
Symptoms:
Tmm crashes while passing dtls traffic.
Conditions:
An iRule uses the 'virtual' command to loop into a dtls virtual as a second virtual, and using serverside dtls on the first virtual.
Impact:
Tmm crashes
Workaround:
Do not use the virtual command or any other form to loop into dtls virtual.
Fix:
Fixed a tmm crash with a dtls virtual server.
Fixed Versions:
17.5.1.4
2037409-1 : Tmctl tables are corrupted for large cluster size and tmm memory shows 0
Links to More Info: BT2037409
Component: TMOS
Symptoms:
When a BIG-IP is deployed on a large cluster with 5 or more blades on VELOS chassis platforms, the following tables are shown as corrupted:
tmctl -d blade tmm/sdaglib_mirror_table
tmctl -d blade tmm/sdaglib_did_info
tmctl -d blade ipfix_destination_stats
tmctl -d blade tmm/sctp
tmctl -d blade tmm/lac
The command tmsh show sys tmm-info; shows 0 tmm memory
Memory (bytes)
tmsh show sys tmm-info
Conditions:
When using F5 VELOS Chassis platforms installed and deployed with BIG_IP with a number of blades 5 or above.
Impact:
Any data presented to user based on the impacted tables will be indicating incorrect data.
Workaround:
None
Fix:
A new DID table column is added to represent DAG PG tables in a concise format.This fits and adhere to TMSTAT size restriction and avoids table corruption for larger DAG tables using wide format(16-bit virtual server 8 bit) in DAG tables.
Fixed Versions:
21.0.0, 17.5.1.3
2035641-4 : APMd resource exhaustion
Component: TMOS
Symptoms:
Under certain conditions, APMd is exhausting resources leading to core.
Conditions:
Access sessions create, and sessions are processed
Impact:
APMd core may cause temporary traffic disruption.
Fix:
APMd not coring.
Fixed Versions:
17.5.1.4
2035177-1 : Use of OCSP responder with SSL C3D enabled in virtual server may leak SSL handshake instances
Links to More Info: BT2035177
Component: Local Traffic Manager
Symptoms:
SSL C3D with OCSP responder may cause SSL handshake instances to be leaked because of MPI dropping replies due to traffic bursts.
Conditions:
Traffic flows through a virtual server with C3D enabled, utilizing an OCSP responder to validate the status of the client's certificate.
Impact:
TMM ssl_hs_m memory usage grows over time, eventually causing memory pressure, and potentially a traffic disruption due to TMM restart.
Workaround:
None
Fix:
Added a timeout and considers session timeouts as an OCSP 'try-later' error response.
Fixed Versions:
17.5.1.4
2035129-4 : The CMP stream communication between tmms on different blades might stall after a tmm memory exhaustion event
Links to More Info: BT2035129
Component: Local Traffic Manager
Symptoms:
Issues with ARP or NDP resolution. Intermittent issues with the tmm session table.
Conditions:
BIG-IP is running on a chassis platform
tmm has run out of memory at some point but was able to recover
Impact:
CMP communication is impacted which may affect the tmm session table, ARP and NDP resolution, intra-chassis mirroring among other things.
Workaround:
It is difficult to determine which tmm(s) on which slot(s) might have been affected by the issue. Either restart tmm on the blades that experienced a memory exhaustion event or restart tmm on each blade in the chassis.
Fixed Versions:
21.0.0, 17.5.1.4
2035005-2 : VMware Horizon applications launched via BIG-IP as VDI proxy ignore args parameter in vmware-view URI
Links to More Info: BT2035005
Component: Access Policy Manager
Symptoms:
Applications launched through BIG-IP virtual server start correctly, but the args parameter is dropped.
Example: Command Prompt opens but does not execute ipconfig when launched with args=%2Fk%20ipconfig.
When bypassing BIG-IP (direct VCS node access), the same URI executes the command successfully.
Applications without args (e.g., Calculator) work as expected both with and without BIG-IP.
Conditions:
VMware Horizon published applications behind BIG-IP APM.
Launching applications via vmware-view:// URI with args parameter.
Protocols tested: Blast, PCoIP.
Issue occurs consistently when BIG-IP virtual server FQDN is used.
Direct access to Horizon Connection Server (bypassing BIG-IP) does not exhibit the problem.
Impact:
User cannot deep-link into specific app states or pass runtime arguments to published applications through BIG-IP.
Breaks workflows relying on args, such as opening IBM Notes documents directly or running pre-defined commands in applications.
Causes functional discrepancy between direct Horizon access and BIG-IP proxied access, leading to user frustration and support escalations.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
2034985 : Unable to forward NTLM SSO back-end cookies to front-end
Links to More Info: BT2034985
Component: Access Policy Manager
Symptoms:
Unable to forward NTLM SSO back-end cookies to front-end.
NTLM has three HTTP round-trips and can set different sets of cookies in each trip. After successful NTLM SSO, APM does not forward some cookies from the back-end to the front-end.
Conditions:
-- NTLM SSO is configured.
-- The server side sends one or more 401 responses to the BIG-IP system during the transaction, followed by a 200 response.
Impact:
Cookies are not sent to the client side, and SSO negotiation fails.
Workaround:
None
Fix:
Send relevant cookies in response.
Fixed Versions:
21.0.0, 17.5.1.4
2034789-3 : Unbound has been upgraded from version 1.20.0 to 1.23.1
Links to More Info: BT2034789
Component: Global Traffic Manager (DNS)
Symptoms:
Unbound has been upgraded to include the latest fixes in version 1.23.1
Conditions:
None
Impact:
Unbound has been upgraded to include the latest fixes in version 1.23.1
Workaround:
None
Fix:
Unbound has been upgraded to include the latest fixes in version 1.23.1
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
2034753 : Domain name validation does not align with the error message on GUI
Links to More Info: BT2034753
Component: Access Policy Manager
Symptoms:
Domain names which include hyphens are not accepted, an error message is shown on GUI.
Conditions:
Domain names with hyphens or forward slashes will cause this issue.
Impact:
BIG-IP administrator will not be able to update DNS Exclude/Include Fields in Network Access settings if they include hyphens/dashes.
Workaround:
None
Fix:
Update the mcp validation regex to allow hyphens and forward slashes.
Fixed Versions:
17.5.1.4
2033809-4 : ASM Connection Handling Improvement
Component: Application Security Manager
Symptoms:
ASM connections may not close properly under certain conditions.
Conditions:
- Processing large JSON requests
- Default ASM configuration (bypass_upon_load = 0)
- High memory usage scenarios
Impact:
Potential connection issues during high load.
Workaround:
NA
Fix:
Improved ASM connection handling.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8
2017137 : Pkcs11d Crash Risk Due to Unbounded Label/Password Length from MCPd
Links to More Info: BT2017137
Component: Local Traffic Manager
Symptoms:
Unexpected behaviour or even a crash of pkcs11d
Conditions:
Configure the label/password values more than or equal to 32 characters.
Impact:
Configuring the label or password exceeding the allowed length, it could lead to memory corruption, unexpected behavior, or even a crash of the pkcs11d daemon.
Workaround:
Configure the values with 31 or fewer characters.
Fix:
The daemon now gracefully rejects inputs that exceed the length limit, logs an appropriate error, and exits the operation safely.
Fixed Versions:
17.5.1.2, 17.1.3
2017105-2 : Disk partition /var full after quick config changes★
Links to More Info: BT2017105
Component: Application Security Manager
Symptoms:
When a new configuration is applied, the previous data files are kept as long as they may be needed and also had a minimum age for deletion applied. When multiple config changes were made in quick succession this resulting in multiple generations that were under the minimum age for cleanup, and some duplicate data files that hadn't changed between generations. This can exhaust the available space in /var.
Conditions:
Many small config changes are applied in quick succession. This can occur during a version upgrade or EHF installation.
Impact:
Disk space was exhausted, leading to failure to apply configuration or configuration corruption.
Fix:
File cleanup now correctly removes files that are no longer needed, regardless of their age. "Duplicate" data files are now hardlinked to reduce wasted disk space.
Fixed Versions:
21.0.0, 17.5.1.4
2016105-2 : TMM might crash under certain conditions
Links to More Info: K000156597, BT2016105
2016041-1 : Remove the unused DynaCache Package
Links to More Info: BT2016041
Component: Local Traffic Manager
Symptoms:
DynaCache is shipped as part of BIG-IP and is no longer used anywhere in BIG-IP.
Conditions:
DynaCache Package is included in BIG-IP
Impact:
None
Workaround:
None
Fix:
DynaCache package has been removed from BIG-IP.
Fixed Versions:
21.0.0, 17.5.1.4
2008633-1 : Active mode FTP using port 0 for data-channel connections
Links to More Info: BT2008633
Component: Local Traffic Manager
Symptoms:
- Infrequent FTP data-channel failure.
- Control-channel is terminated with ABOR due to data-channel failure.
Conditions:
- FTP profile configured with data-port 0 (any).
- Active mode FTP.
- Server using privileged port(s) (<1024).
Impact:
Failed FTP data connection.
Workaround:
If the server uses a known privileged port (e.g., 20), set this as the data-port in the FTP profile.
Alternatively, configure the server to use non-privileged port (>= 1024).
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
2008573-1 : Login/Logout expected/unexpected string has no length validation
Links to More Info: BT2008573
Component: Application Security Manager
Symptoms:
You can configure an inappropriately long string for the login/logout criteria.
Conditions:
Configuring the Login/Logout expected/unexpected string.
Impact:
Upon asm restarted bd goes into restart loop. ASM traffic disrupted while bd restarts.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.4
2007705-1 : HSL can incorrectly handle pending TCP connections leading to a TMM crash
Links to More Info: BT2007705
Component: TMOS
Symptoms:
TMM crashes.
Conditions:
A pool member is marked down or delete while there are TCP connection issues with some pool members
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fix:
Does not core anymore, and TMM handle the situation correctly
Fixed Versions:
21.0.0, 17.5.1.4
1998985-1 : "Page Unresponsive" error message when editing Active Directory group resource with large AD group count
Links to More Info: BT1998985
Component: Access Policy Manager
Symptoms:
The Active Directory Group resource page becomes unresponsive
Conditions:
AD Group Resource is configured for an Active Directory server that has a large group count.
Impact:
Active Directory Group Resource agent cannot be edited
Workaround:
Delete the existing Active Directory Group Resource agent and recreate it by first adding the desired resources (e.g., VDI, RDP, Webtops, etc.) during the edit operation. After adding the resources, attach the Active Directory server as the final step.
Fixed Versions:
17.5.1.4
1991289-2 : ECA always invokes the default access profile 'kerberos_auth_default'
Links to More Info: BT1991289
Component: Access Policy Manager
Symptoms:
ECA always invokes the kerberos_auth_default profile, even when it’s known that the request will be denied later.
Conditions:
-- SSL Orchestrator Proxy configured with SWG-explicit NTLM ONLY Access Profile
Impact:
Increasing unnecessary load on apmd, which will cause a performance issue during peak time.
Workaround:
None
Fix:
ECA will not send a known invalid request to APMD to deny
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1991261-2 : AAA LDAP: priority group activation resets when updating configuration in APM
Links to More Info: BT1991261
Component: Access Policy Manager
Symptoms:
AAA LDAP pool-based configuration in APM resets the Priority Group Activation (PGA) setting to the default after any update to AAA LDAP configuration.
Manual changes to PGA (e.g., disabling it) are overwritten during AAA updates in the APM UI.
Conditions:
-- AAA LDAP is configured in APM with the "Use Pool" option enabled.
-- Priority Group Activation on the auto-generated pool is manually set to "Disabled" via Local Traffic > Pools.
-- Any subsequent update to the AAA LDAP configuration in APM resets the Priority Group Activation setting back to "Less than 1 Available Member(s)".
Impact:
-- Custom settings for Priority Group Activation are not persistent and are overwritten during APM updates.
-- Load balancing behavior may not work as intended if PGA is reset unexpectedly.
Workaround:
Manually update Priority Group Activation settings in the auto-generated pool via Local Traffic > Pools after each AAA LDAP configuration update in APM.
Disable Priority Group Activation immediately after updating any AAA LDAP configuration values in APM.
Fix:
No changes to the UI are required for the fix.
The TMUI backend logic has been updated to retain custom Priority Group Activation settings when reloading the LDAP AAA configuration.
When reloading the LDAP AAA configuration, the system will now preserve existing Priority Group Activation settings and prevent reinitialization of this variable.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1991241-2 : ECA plugin unresponsive
Links to More Info: BT1991241
Component: Access Policy Manager
Symptoms:
ECA plugin becomes unresponsive and is stuck on a read call.
Conditions:
-- SSL Orchestrator Proxy configured with SWG-explicit NTLM ONLY Access Profile
Impact:
ECA plugin became unresponsive, leading to a performance degradation.
Workaround:
None
Fix:
Added support for a read socket timeout.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1991237-2 : Unable to configure number of apmd threads using tmsh command
Links to More Info: BT1991237
Component: Access Policy Manager
Symptoms:
You are unable to configure the number of apmd threads via tmsh.
Conditions:
-- SSL Orchestrator Proxy is configured with SWG-explicit NTLM ONLY Access Profile
-- Any access policy configured in APM.
Impact:
Unable to control the number of apmd threads using tmsh command.
Workaround:
None
Fix:
Manage the number of apmd threads using TMSH. The default value will be used if no changes are required to the apmd threads, and the current behaviour will remain unchanged.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1990897-4 : APM hardening
Links to More Info: K000156596, BT1990897
1989133-1 : Unexpected blocking of valid login attempts after upgrade to version 17.5.0
Links to More Info: BT1989133
Component: Application Security Manager
Symptoms:
Users may experience blocking of legitimate login attempts due to incorrect classification of failed logins.
Conditions:
Occurs when brute force protection is enabled and login attempts are made to a configured login URL without authentication headers.
Impact:
Valid login attempts may be falsely flagged as brute force attacks, triggering enforcement actions such as CAPTCHA or blocking pages, potentially disrupting user access.
Workaround:
None
Fix:
Fixed issue with blocking valid login attempts
Fixed Versions:
21.0.0, 17.5.1.4
1988993 : CVE-2024-42516 Apache HTTP Server vulnerability
Links to More Info: K000153074
1987361-2 : APMD file descriptor exhaustion when LDAP operational timeout is set to 180 seconds
Links to More Info: BT1987361
Component: Access Policy Manager
Symptoms:
You may observe below string in /var/log/apm*
"Too many open files"
"threads 560, running 560"
Conditions:
NTLM config with LDAP pool configuration.
Impact:
Unable to process APM traffic
Workaround:
Restart APMD process
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1987309-2 : Bigd may get stuck in legacy mode
Links to More Info: BT1987309
Component: Local Traffic Manager
Symptoms:
Https monitors may spuriously mark a pool member as down and it will fail to mark the pool member back up.
The monitor remains in legacy mode, and probes are sent using TLS 1.0.
Conditions:
-- Server supports version TLSv1.2 and above.
-- bigd is configured to monitor the server with SSL.
-- The monitor flips into legacy mode.
Impact:
Bigd is stuck in legacy mode.
Workaround:
Bigd can be brought out of legacy mode by detaching and re-attaching monitor to the pool.
Fixed Versions:
17.5.1.4
1983349 : CVE-2023-2454, CVE-2023-39417, CVE-2023-39418, CVE-2023-5868, CVE-2023-5869, CVE-2023-5870 PostgreSQL vulnerabilities
Links to More Info: K000152931
1983321-1 : CVE-2025-48976 apache-commons-fileupload: Apache Commons FileUpload DoS via part headers
Links to More Info: K000152614, BT1983321
1983229-4 : Post-rotate Command Improvements for iHealth
Links to More Info: K000154647, BT1983229
1983185-1 : REST API queries sent to BIG-IP v17.5.1 fail if they are using v17.5.0 API version★
Links to More Info: BT1983185
Component: TMOS
Symptoms:
When using REST API to issue commands to a BIG-IP system and specifying the API version to use, BIG-IP v17.5.1 does not recognize v17.5.0 as a supported version and raises an error:
"Version 17.5.0 is not supported"
This causes BIG-IQ to no longer be able to discover a BIG-IP running on 17.5.1
Conditions:
1. A REST API query is sent to a BIG-IP v17.5.1 system
2. This REST API query uses v17.5.0 API version by including 'ver=17.5.0' in the query string.
Impact:
Any REST API query sent to a BIG-IP v17.5.1 fails if it has 'ver=17.5.0' in the query string. This leads to an unreliable REST API on BIG-IP v17.5.1.
One such business impact is that BIG-IPs become unmanageable from BIG-IQs as the REST API queries are still using v17.5.0 API version in them.
Workaround:
When sending a REST API query to BIG-IP v17.5.1, use a different available API version other than v17.5.0.
For ex. Instead of 'ver=17.5.0', use 'ver=17.1.1'.
restcurl -u admin "/tm/sys/provision/urldb?ver=17.5.0"
restcurl -u admin "/tm/sys/provision/urldb?ver=17.1.1"
Fix:
BIG-IP v17.5.1 now recognizes v17.5.0 as a supported version in the context of REST API commands
Fixed Versions:
21.0.0, 17.5.1.2
1982937-1 : InTune MDM endpoint compliance intermittently fails despite being compliant
Links to More Info: BT1982937
Component: Access Policy Manager
Symptoms:
Compliant devices are shown as non-compliant
Conditions:
MDM Intune mdm check is used
Impact:
Access policy is denied even for compliant devices
Workaround:
None
Fix:
Access policy should be allowed if device is compliant.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1
1980721-1 : APMD Core while parsing the invalid JWT Header
Links to More Info: K000156602, BT1980721
1980649-2 : High CPU usage by bd
Links to More Info: BT1980649
Component: Application Security Manager
Symptoms:
High CPU usage by bd
Conditions:
-- ASM provisioned and in use
-- A specific condition leads BD to unnecessary high CPU
Impact:
High CPU
Workaround:
None
Fix:
BD no longer causes high CPU under the specific condition.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1980645-2 : Bypass APM for Horizon Blast/PcoIP connection for internal users
Links to More Info: BT1980645
Component: Access Policy Manager
Symptoms:
Need a method to bypass APM for Horizon Blast connection for internal users using some configuration option in VPE.
Conditions:
1. VMware VDI is configured in APM
2. Internal and external users traffic is separated before reaching this Virtual Server.
Impact:
Internal user VMware horizon desktop/app traffic always goes through the Virtual Server though it can be bypassed after Authentication.
Workaround:
None
Fix:
There should be a configurable option in VPE to bypass vmware horizon desktop/app traffic for Internal users.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1977933-1 : TMM might crash under certain conditions
Links to More Info: K000156741, BT1977933
1977917-1 : TMM might crash under certain conditions
Links to More Info: K000156741, BT1977917
1977057-3 : Memory leak when using an iRule to overwrite MR peer route
Links to More Info: BT1977057
Component: Service Provider
Symptoms:
Messagerouter memory consumption is excessive:
tmctl memory_usage_stat -w 300 | grep 'name\|messagerou'
name allocated max_allocated size slop cur_allocs tot_allocs fail_allocs type caches_used
dns_qname_cache 0 0 1280 255 0 0 0 std:
messagerouter 5384040 5924240 1 0 3253 122000 0 var:
Conditions:
'MR::message route' is used to overwrite peer route.
Impact:
Memory leak possibly leading to system overload/crash.
Workaround:
None
Fixed Versions:
17.5.1.4
1976513-2 : Some ASM entity names are not shown in the REST error response message
Links to More Info: BT1976513
Component: Application Security Manager
Symptoms:
A REST response of patching a hostname for Virus Detection Server is missing ASM entity name "hostname" in the error message
Conditions:
A REST request is made on a specific ASM entity and error response is returned
Impact:
The error message in REST response may be unclear
Workaround:
None
Fix:
ASM entity names are shown in the REST error response message successfully
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1976113 : Deployment of BIG-IP Best Plus images on Azure fails with OSProvisioningClientError
Links to More Info: BT1976113
Component: TMOS
Symptoms:
When deploying BIG-IP Best Plus images in Azure, the deployment process fails with the following error message status:
Status: "OSProvisioningClientError"
Despite this error, the VM may still allow SSH login, causing confusion about the actual deployment status.
Conditions:
- Occurs during provisioning of BIG-IP Best Plus images in Azure.
- The error is related to SSH key generation timing during the provisioning process.
Impact:
- Deployment status is reported as Failed even though the VM is accessible via SSH.
- Automation workflows relying on successful provisioning status may break.
- Users may assume the deployment is unusable, leading to unnecessary troubleshooting or redeployment.
Workaround:
- After receiving the error, verify if the VM is accessible via SSH.
- If accessible, you can proceed with manual configuration.
Fix:
The fix ensures that the necessary SSH keys are generated prior to the service initialization.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1
1975941-2 : Alternate_response_content length greater than 51200 in ACCOUNT_ALTERNATE_RESPONSE_FILE causing ASM restart loop
Links to More Info: BT1975941
Component: Application Security Manager
Symptoms:
Bd goes into a restart loop
Conditions:
Custom response body configured with tokens present and length becomes greater than 51200 after replacing tokens with their respective values.
Impact:
Bd constantly restarts. Traffic disrupted while bd restarts.
Workaround:
Reduce the size of response body less than 51200
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1975885 : Massive M_ACCESS string leak in TMM
Links to More Info: BT1975885
Component: Access Policy Manager
Symptoms:
Memory leak while deleting apm session.
Conditions:
-- Running a version that fixed ID 1672257 (currently version 17.5.0)
-- Access sessions are deleted
Impact:
Increase in tmm memory
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.4
1974701-1 : PVA stats may be double incremented when pva mode is dedicated
Links to More Info: BT1974701
Component: TMOS
Symptoms:
Offloaded connections may be double counted for dedicated PVA flows.
Conditions:
PVA mode is set to dedicated in fastl4 profile.
Impact:
Incorrect stats.
Workaround:
None
Fix:
Offloaded dedicated PVA flows are counted once.
Fixed Versions:
17.5.1.4
1972369-1 : BD performance improvement
Links to More Info: BT1972369
Component: Application Security Manager
Symptoms:
A specific performance issue that can be fixed occurs on a basic structure used throughout the BD.
Conditions:
ASM is configured and traffic is passing.
Impact:
Increased CPU utilization.
Workaround:
None
Fix:
Fixed the performance issue.
Fixed Versions:
21.0.0, 17.5.1.3
1971217-1 : False negative with illegal redirect attempt
Links to More Info: BT1971217
Component: Application Security Manager
Symptoms:
ASM does not block illegal redirect attempt in a certain scenario
Conditions:
Occurs with a specific configuration on ASM and a specific server redirect response .
Impact:
False negative.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1969861-1 : [APM][NTLM]ECA core SIGSEGV
Links to More Info: BT1969861
Component: Access Policy Manager
Symptoms:
ECA cores repeatedly
Conditions:
NTLM Configuration in APM
Impact:
Cannot process NTLM traffic.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1968237-2 : Configuration fails to load post upgrade due to invalid DoS signature predicate 'ip flags'★
Links to More Info: BT1968237
Component: Advanced Firewall Manager
Symptoms:
After upgrading from v16.1.4.1 to v17.1.2.2, both device slots remain in an offline state.
Configuration fails to load due to a DoS signature issue (/Common/dos_Sig).
The system throws the following error:
>01071cc8:3: Dos Signature (/Common/dos-common/Sig_69253_39_1737834503): Arg (Fragmented) for predicate 'IP Flags' is invalid for DNS/NETWORK signature.
Conditions:
-- DoS signatures are configured using persistence-based predicates such as ‘IP Flags’.
-- Configuration executed via tmsh commands as outlined in the documentation:
https://clouddocs.f5.com/cli/tmsh-reference/v15/modules/security/security_dos_dos-signature.html
-- This can be configured via the GUI as well
-- Issue occurs when upgrading from 16.1.4.1 to 17.1.2.2.
Impact:
Device will be in offline state Post Upgrade
Workaround:
None
Fix:
Fixed
Fixed Versions:
21.0.0, 17.5.1.3
1968033-1 : Remove the unused ImageMagick package from BIG-IP
Component: TMOS
Symptoms:
ImageMagick-6.7.8.9-15.el7_2 is no longer used anywhere in BIG-IP and is being removed.
Conditions:
None
Impact:
None
Workaround:
None
Fix:
ImageMagick has been removed from BIG-IP.
Fixed Versions:
21.0.0, 17.5.1.4
1966941-2 : High CPU or increased translation errors following upgrade or restart when DAG distribution changes
Links to More Info: BT1966941
Component: TMOS
Symptoms:
Dagv2 tables are randomized and may change when a tmm is restarted. This can result in a change of traffic distribution, which in some cases may lead to traffic disruption.
The specific condition when this option was introduced is using a CGNAT pool that is not large enough.
Other ways of encountering include increased translation failed errors following an upgrade or restart or blade replacement.
Conditions:
Tenant tmm is restarted (or VELOS chassis rebooted)
Impact:
- dag distribution changes which may cause a traffic disruption.
Workaround:
You can restart tmm until the distribution is good, which can be checked using tools like cmp_dest.
Fix:
Added DB variables to control dagv2 behavior - sdag.runtime.hashtable and sdag.runtime.mirror.hashtable. The format is a list of hexadecimal entries separated by a colon, same as `tmctl -d blade tmm/sdaglib_hash_table`. Both variables must be set. A tmm restart is required after locking the new dag tables. The default value is "<null>".
Fixed Versions:
17.5.1.4
1966849 : CVE-2023-5869 postgresql: Buffer overrun from integer overflow in array modification
Links to More Info: K000152931, BT1966849
1966841 : CVE-2023-39417 postgresql: extension script @substitutions@ within quoting allow SQL injection
Links to More Info: K000152931, BT1966841
1966785 : CVE-2023-2454 postgresql: schema_element defeats protective search_path changes
Links to More Info: K000152931, BT1966785
1966729-1 : Endpoint inspection not working with chrome browser
Links to More Info: BT1966729
Component: Access Policy Manager
Symptoms:
Endpoint inspection may not start when virtual server is accessed from Chrome browser of MacOS. When refreshed it may work properly.
Also client-type agent in access policy incorrectly detects MacOS as win11.
Conditions:
-- User accesses virtual server via a Chrome browser on MacOS.
-- Access policy has "client os" agent in VPE.
Impact:
Server incorrectly detects client platform macOS as win11
Workaround:
When HTTP_REQUEST {
if {[HTTP::uri] equals "/my.policy"} {
if {[HTTP::header exists "Sec-CH-UA-Platform-Version"] && [HTTP::header exists "Sec-CH-UA-Platform"]} {
set platform [string tolower [HTTP::header value "Sec-CH-UA-Platform"]]
set platform [string tolower [string trim [string map {\" ""} $platform]]]
if { $platform ne "windows" } {
HTTP::header remove "Sec-CH-UA-Platform-Version"
log local0. "Removing header $platform"
}
}
}
}
when CLIENT_ACCEPTED {
ACCESS::restrict_irule_events disable
}
Fix:
Server should detect platform correctly if client is using macOS.
Fixed Versions:
21.0.0, 17.5.1.2
1966669-2 : [PVA] Provide a DB variable disabling NAT46/64 snoop inserts.
Links to More Info: BT1966669
Component: TMOS
Symptoms:
Starting from version 16.X NAt64/46 traffic can be accelerated in PVA. Under some circumstances this is not desired. A DB variable is needed to disable NAt64/46 offload to hardware.
Conditions:
- Nat46/64 configured on virtual-servers eligible for hardware offload.
- Version 16.X or above.
Impact:
Hardware offload of Nat64/46 traffic is not desired in some cases.
Workaround:
None
Fixed Versions:
17.5.1.4
1966633-1 : Non-eth0 management interface unbound after tmm restart on 17.5.0 in AWS★
Links to More Info: BT1966633
Component: TMOS
Symptoms:
Management connectivity is lost after licensing BIG-IP 17.5.0 on AWS. The parameter provision.managementeth was changed to non-eth0 interface during deployment with cloud-init. When the issue occurs, the mgmt bridge loses the associated interface ethX.
Conditions:
1. Deploy an instance on AWS.
2. Change provision.managementeth to non-eth0 device and reboot.
3. After boot up, any operation that restart tmm (i.e. licensing BIG-IP) will cause the issue.
Impact:
Management connectivity is lost to BIG-IP instance.
Workaround:
Reboot the device twice after licensing the device. One reboot will not resolve the issue.
Fixed Versions:
17.5.1.4
1966313-2 : Websocket event logs show "N/A" for virtual server name except during upgrade request
Links to More Info: BT1966313
Component: Application Security Manager
Symptoms:
Remote logging for WebSocket traffic may display "N/A" in the vs_name field for messages other than the initial upgrade request.
Conditions:
Occurs when using a remote logging profile in CSV format with ASM and WebSocket traffic on a configured virtual server.
Impact:
Log entries may lack clarity or traceability due to missing virtual server name information, potentially complicating monitoring and troubleshooting.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.4
1965849-1 : [APM] TMM core is observed in validating the saml assertion signature
Links to More Info: BT1965849
Component: Access Policy Manager
Symptoms:
In SAML assertion signature validation, there is an error scenario where a macro in the defined log expects multiple arguments, which have been incorrectly passed.
Conditions:
SAML SP is configured with
- Invalid certificates.
- Or incorrect permission for certificates.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
SAML is configured with proper certificates with proper permissions.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1965053-1 : Keymgmtd: Incorrect and misleading debug log statements
Links to More Info: BT1965053
Component: TMOS
Symptoms:
A few debug log statements in the keymgmtd daemon are inaccurate or misleading, resulting in confusion and difficulty when troubleshooting production issues.
Conditions:
Reviewing keymgmtd logs
Impact:
Misleading debug log messages
Workaround:
None
Fix:
Fixed misleading log messages
Fixed Versions:
21.0.0, 17.5.1.2
1962785-3 : Monitors of type snmp_link can fail
Links to More Info: BT1962785
Component: Global Traffic Manager (DNS)
Symptoms:
Monitors of type snmp_link can fail as they may not be added to the active probe list.
Conditions:
Use of monitor type snmp_link.
Impact:
Availability status may be shown in red.
Workaround:
None
Fix:
Removed the condition check for adding Monitors to the active probe list.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3, 16.1.6.1
1962073-1 : Creation of file type entries with trailing and/or leading spaces is allowed via REST in ASM policy
Links to More Info: BT1962073
Component: Application Security Manager
Symptoms:
Duplicate 'File Type' entries seen in ASM policy
Conditions:
'File Type' entries in ASM policy created via REST
Impact:
'File Type' protection do not work as expected
Workaround:
Delete the existing entries and add them via GUI
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1959725-2 : CVE-2024-42322 kernel: ipvs: properly dereference pe in ip_vs_add_service
Component: TMOS
Symptoms:
In the Linux kernel, the following vulnerability has been resolved: ipvs: properly dereference pe in ip_vs_add_service Use pe directly to resolve sparse warning: net/netfilter/ipvs/ip_vs_ctl.c:1471:27: warning: dereference of noderef expression
Conditions:
Linux kernel 4.7 up to (but not including) 5.10.237, 5.15.181, 6.1.119, 6.6.44, 6.10.3, and 6.11 are vulnerable to this CVE.
Impact:
Exploitation of the vulnerability could cause the system to become unavailable (DoS).
Workaround:
NA
Fix:
Patched kernel to fix the vulnerability.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1959709-3 : "Europe" IPs are allowed despite blocking all European countries
Links to More Info: BT1959709
Component: Application Security Manager
Symptoms:
Blocked Europe IP being allowed to access the web service
Conditions:
In ASM policy, configure to block all European countries. Thus any IP from 'Europe' should be blocked.
Impact:
IP access to the web service is allowed, which was supposed to be blocked.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.4, 16.1.6.1
1959549-1 : Upgrade to 17.5.0 or later overwrites #TMSH-VERSION in bigip_base.conf when source UCS is pre-17.5.0★
Links to More Info: BT1959549
Component: TMOS
Symptoms:
When upgrading from versions below 17.5.0 to 17.5.0 or later, the #TMSH-VERSION marker in bigip_base.conf is rewritten to the target system version instead of preserving the source UCS version. This prevents MCPD schema migration code from executing, potentially causing configuration mismatches and missing schema-based workarounds.
Conditions:
- roll-forward upgrade from v14.x/v15.x/v16.x/v17.1.x to v17.5.1 and later releases. upgrade from v17.5.x to v21.x and later versions is not affected.
Impact:
Overwriting TMSH-VERSION in bigip_base.conf file, uses the wrong schema when loading the configuration and miss applying MCP schema based workarounds.
Workaround:
None
Fixed Versions:
17.5.1.4
1959513-4 : CVE-2023-52803 kernel: SUNRPC: Fix RPC client cleaned up the freed pipefs dentries
Component: TMOS
Symptoms:
BIG-IP is impacted because the vulnerable SUNRPC code for CVE-2023-52803 is present as a loadable kernel module in the affected kernel version (3.10.0). Although the module is not loaded by default, a privileged (root) user could load and use it, exposing the system to a potential denial-of-service via kernel crash if the vulnerability is triggered. Unprivileged or remote exploitation is not possible in the current configuration, so impact is limited to privileged misuse or error.
Conditions:
NA
Impact:
BIG-IP is impacted because the vulnerable SUNRPC code for CVE-2023-52803 is present as a loadable kernel module in the affected kernel version (3.10.0). Although the module is not loaded by default, a privileged (root) user could load and use it, exposing the system to a potential denial-of-service via kernel crash if the vulnerability is triggered. Unprivileged or remote exploitation is not possible in the current configuration, so impact is limited to privileged misuse or error.
Workaround:
Restrict shell and administrative access to trusted users only, and ensure that only authorized administrators are permitted to load kernel modules.
Fix:
Patched kernel to fix the CVE-2023-52803
Fixed Versions:
21.0.0, 17.5.1.4, 17.1.3
1959361-5 : When running a tenant with more than 72 VCPUs / cores, adminstall crashes
Links to More Info: BT1959361
Component: Application Visibility and Reporting
Symptoms:
When running a tenant with more than 72 VCPUs / cores, adminstall crashes.
Conditions:
When ASM provisioned and running a Tenant with more than 72 VCPUs / cores per blade.
Impact:
DOSL7 (BADOS) is not functioning. Core created.
Workaround:
None
Fix:
Now adminstall donot crash, when ASM provisioned and Tenant with more than 72 VCPUs / cores per blade.
Fixed Versions:
17.5.1.4
1958513-4 : TMM might core with certain network traffic
Links to More Info: K000156691, BT1958513
1957157-1 : [nlad]OpenSSL: DRBG Continuous RNG test failed: DRBG stuck.
Links to More Info: BT1957157
Component: Access Policy Manager
Symptoms:
You may observe below logs in /var/log/ltm
err nlad[31252]: OpenSSL: DRBG Continuous RNG test failed: DRBG stuck.
err fips_monitor[19162]: 01da0011:3: SelfTest/Integrity test failure detected, triggering reboot action
Conditions:
Conditions are unknown
Impact:
Unexpected reboot causing disruption to traffic and failover.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.3
1953369-1 : DB monitor queries repeatedly if recv string configured but response does not match
Links to More Info: BT1953369
Component: Local Traffic Manager
Symptoms:
A database monitor (mssql, mysql, oracle, postgresql) may send multiple queries to the database server in quick succession if the monitor is configured with a 'recv' string, but the response from the server does not contain the configured string.
Conditions:
-- A database monitor (mssql, mysql, oracle, postgresql) is configured with a 'recv' string.
-- The query to the database server completes successfully, but the response does not contain the configured 'recv' string.
Impact:
The database monitor correctly marks the configured pool member 'DOWN' as appropriate, but generates unnecessary queries to the database server.
Workaround:
None
Fixed Versions:
17.5.1.4
1952881-1 : Tmm memory leak in SCTP metadata
Links to More Info: BT1952881
Component: Service Provider
Symptoms:
Tmm crashes on out of memory.
Conditions:
Virtual server configured with a sctp profile and a legacy diameter profile.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Use the recommended message routing framework (MRF) Diameter solution instead of the legacy diameter (MBLB) profile.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1
1952729-1 : Certificates with explicitly defined EC parameters are treated as invalid in Common Criteria mode and TLS communication will be rejected.
Links to More Info: BT1952729
Component: TMOS
Symptoms:
In Common Criteria mode, BIG-IP accepts certificates with explicit EC parameters
Conditions:
1. BIG-IP is in Common Criteria (Common Criteria) mode
2. BIG-IP has ECC certificates as a Server and/or Clients/Servers interacting with BIG-IP sending ECC certificates with Explicit EC params.
Impact:
In Common Criteria mode, BIG-IP accepts certificates with explicit EC parameters and TLS connection is successful.
Workaround:
None
Fix:
Added fix to reject certificates with explicit defined EC params by BIG-IP.
Fixed Versions:
21.0.0, 17.5.1.2
1952657-1 : In FIPS-CC mode ECC Certificates with explicitly defined EC parameters are accepted
Links to More Info: BT1952657
Component: Local Traffic Manager
Symptoms:
BIG-IP accepts certificates with explicit EC parameters enabled while importing and handshakes will be successful.
Conditions:
1. BIG-IP is in CC (Common Criteria) mode
2. BIG-IP has ECC certificates as a Server and/or Clients/Servers interacting with BIG-IP sending ECC certificates with Explicit EC params
Impact:
BIG-IP improperly imports certificates with explicitly-defined EC params when running in Common Criteria mode.
Workaround:
None
Fix:
Added fix to reject certificates with explicit defined ec params by BIG-IP while importing
Fixed Versions:
21.0.0, 17.5.1.2
1952557-1 : DB monitor incorrectly marks pool member UP if recv string configured but no results from DB server
Links to More Info: BT1952557
Component: Local Traffic Manager
Symptoms:
A database monitor (mssql, mysql, oracle, postgresql) may incorrectly mark a pool member as UP if the monitor is configured with a 'recv' string, but the query configured in the 'send' string does not return any results from the database server.
In this case, the DB (database) monitor attempts to match the 'recv' string to the result set from the database server, and fails to mark an empty result set as a mismatch.
Conditions:
-- A DB (database) monitor (mssql, mysql, oracle, postgresql) is configured and applied to an LTM or GTM pool.
-- The DB monitor has a 'send' string configured with a query that does not return any results from the database server.
-- The DB monitor has a 'recv' string configured.
Impact:
Pool members may be incorrectly marked UP.
Workaround:
In the DB monitor configuration, modify the query in the 'send' to return a result that does not match the 'recv' string.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1
1943269-2 : GTM Server can be deleted while referenced by GTM Pools
Component: Global Traffic Manager (DNS)
Symptoms:
A GTM server object can be deleted even when it was referenced by GTM pools. Deleting the server will also remove it from the associated pool members without any warning.
Conditions:
Occurs when a GTM virtual server is referenced in one or more GTM pools.
Impact:
This may cause unexpected behavior or service disruption if the server is deleted while still in use.
Workaround:
None.
Fix:
A validation check has been added to prevent deletion of a GTM server that is referenced by GTM pools, and a warning is now displayed to the user.
Fixed Versions:
17.5.1.4
1943217 : BGP - using 'no bgp default ipv4-unicast' might lead to a crash
Links to More Info: BT1943217
Component: TMOS
Symptoms:
Using 'no bgp default ipv4-unicast' might lead to a crash when saving a configuration.
Conditions:
'no bgp default ipv4-unicast' configured.
Impact:
Bgpd crash/core.
Workaround:
Do not use 'no bgp default ipv4-unicast' configuration statement.
Fixed Versions:
17.5.1.3
1937817-4 : CVE-2025-54500: A Particular HTTP/2 sequence may cause High CPU utilization [MadeYouReset]
Links to More Info: K000152001, BT1937817
1937777-1 : The client can resume a TLS session using psk_ke mode in the psk_key_exchange_modes extension.
Links to More Info: BT1937777
Component: Local Traffic Manager
Symptoms:
In TLS, the psk_key_exchange_modes extension in the Client Hello specifies the supported key exchange modes for resuming sessions with pre-shared keys (PSK).
As per Common Criteria guidelines, if client hello contains only psk_ke mode in the "psk_key_exchange_modes" extension then TLS handshake either (1) implicitly rejects the session ticket by performing a full handshake, or (2) terminates the TLS handshake to prevent the flow of application data.
Conditions:
In ClientHello, only psk_ke mode should be present in the "psk_key_exchange_modes" extension.
ClientHello should contain "pre_shared_key" extension too.
Impact:
TLS handshake will be successful with this configuration.
Workaround:
None
Fix:
Updated the code to perform full handshake if psk_ke mode present in the "psk_key_exchange_modes" extension.
Fixed Versions:
21.0.0, 17.5.1.2
1936421-2 : Core generated for autodosd daemon when synchronization process is terminated
Links to More Info: BT1936421
Component: Advanced Firewall Manager
Symptoms:
Autodosd cores on SIGSEGV.
Conditions:
-- AFM DoS vectors configured
-- This can occur during normal operation but the specific conditions that trigger it are unknown
Impact:
Autodosd is restarted, but up to 15 seconds of history may be lost.
Workaround:
None
Fix:
Fixed an autodosd crash.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1936233-1 : TMM mismanagement of IPsec connections can slowly leak memory and cause tunnel negotiation to fail
Links to More Info: BT1936233
Component: TMOS
Symptoms:
-- The BIG-IP cannot setup a specific IPsec tunnel.
-- The BIG-IP may eventually run out of memory, or core
Conditions:
-- IPsec IKEv2
-- Tunnel config changes, or tunnel never works from initial setup
Impact:
-- TMM may run out of memory after a very long time
-- TMM may core due to the leaked connections
Workaround:
None
Fix:
The connection leak will not happen.
Fixed Versions:
21.0.0, 17.5.1.2
1935833-2 : Tmm cores with "ERR: Attempting to send MPI message to ourself"
Links to More Info: BT1935833
Component: TMOS
Symptoms:
A TMM crash occurs, tmm_assert is triggered if an MPI message is sent to the same TMM (self).
Conditions:
New IPsec tunnel configured or deleted and High Availability config sync is started.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None.
Fix:
The crash no longer occurs.
Fixed Versions:
21.0.0, 17.5.1.2
1935053-3 : Impact of crypto queue limits on SSL handshake reliability
Links to More Info: BT1935053
Component: Local Traffic Manager
Symptoms:
SSL handshake failures triggered by sudden connection spikes and crypto queue saturation
Conditions:
1. Brief surge in SSL connection volume
2. Saturation of the crypto processing queue
Impact:
Degraded service availability due to SSL handshake disruptions
Workaround:
None
Fix:
OVERVIEW
--------
This code implements an intelligent rate-limiting mechanism to protect TMM (Traffic
Management Microkernel) from SSL/TLS crypto queue exhaustion during high load conditions.
The system monitors pending crypto operations and handshake completion rates to detect
and mitigate overload situations.
CONFIGURATION PARAMETERS
------------------------
- tmm_ssl_crypto_queues_max (default: 2048)
Maximum allowed pending crypto operations per TMM instance before triggering
overload detection.
- tmm_ssl_queues_exceed_time (default: 1 second)
Grace period to wait after queue overflow is detected before evaluating
handshake completion rate.
OPERATIONAL BEHAVIOR
--------------------
Stage 1: Normal Operation
When pending crypto operations remain below the configured threshold (2048),
the system operates normally with no restrictions.
Stage 2: Queue Overflow Detection
When pending crypto operations exceed tmm_ssl_crypto_queues_max:
- The system records the current timestamp
- Captures a snapshot of total handshakes completed
- Enters monitoring mode for the configured grace period (1 second)
- No connections are rejected during initial grace period
Stage 3: Sustained Overload Analysis
After the grace period expires, if queue remains overloaded:
- Calculates handshake completion rate:
Rate = (Handshakes completed since overflow) / (Time elapsed)
- Compares completion rate against health threshold:
Threshold = Current active handshakes / 100 (1% of active handshakes)
Stage 4: Protection Action
If completion rate falls below the 1% threshold:
- System determines TMM is experiencing crypto starvation
- Rejects new SSL/TLS connections with SSL_A_INTERNAL_ERROR
- Logs diagnostic message containing:
* Current pending crypto operations count
* Per-TMM queue limit
* Handshake completion rate
* Current active handshakes count
If completion rate exceeds the 1% threshold:
- System determines TMM is recovering
- Resets monitoring state
- Resumes normal operation
Stage 5: Automatic Recovery
When pending crypto operations drop below threshold:
- Monitoring state is immediately reset
- System returns to normal operation
- New connections are accepted normally
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1
1934865-1 : Remove multiple redundant entries for port-list objects in configuration file
Links to More Info: BT1934865
Component: Advanced Firewall Manager
Symptoms:
When a port-list object is created using TMSH, REST or GUI under any context, redundant entries for the same object are generated in the configuration file under three contexts:
net port-list
security firewall port-list
security shared-objects port-list
For example, a port-list created using one CLI results in multiple entries referring to the same schema object, such as:
net port-list /Common/portListExample {
ports {
80 { }
443 { }
}
}
security shared-objects port-list /Common/portListExample {
ports {
80 { }
443 { }
}
}
security firewall port-list /Common/portListExample {
ports {
80 { }
443 { }
}
}
This behaviour causes unnecessary duplication in the configuration file.
Conditions:
Creating a port-list object in any context results in the same object being added as three separate entries in the configuration file.
Ex: Using TMSH CLI configuration.
Redundant entries occur in the configuration file when:
A port-list object is created using any one of the following TMSH CLIs:
1. tmsh create net port-list
2. tmsh create security firewall port-list
3. tmsh create security shared-objects port-list
All three CLI commands point to the same object and record three separate entries in the configuration file.
Impact:
Redundant entries in the configuration file lead to:
1. Increased configuration file size unnecessarily.
2. Risk of user confusion during manual editing or review of configuration files.
This issue does not impact runtime functionality or object behaviour, but it introduces maintenance overhead when users interact with their configurations.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1
1934781-2 : In FIPS-CC mode ECC Certificates with explicitly defined EC parameters are accepted
Links to More Info: BT1934781
Component: Local Traffic Manager
Symptoms:
BIG-IP accepts certificates with explicit EC parameters enabled and handshakes will be successful.
Conditions:
1. BIG-IP is in CC (Common Criteria) mode
2. BIG-IP has ECC certificates as a Server and/or Clients/Servers interacting with BIG-IP sending ECC certificates with Explicit EC params
Impact:
BIG-IP improperly accepts certificates with explicitly-defined EC params when running in Common Criteria mode.
Workaround:
None
Fix:
Added fix to reject certificates with explicit defined ec params by BIG-IP
Fixed Versions:
21.0.0, 17.5.1.2
1934513-2 : Redefinition of xlink namespace leads to 'malformed document' violation
Links to More Info: BT1934513
Component: Application Security Manager
Symptoms:
An unexpected 'malformed document' violation is seen
Conditions:
- XML schema with redefined xlink namespace is set
- Request contains redefined xlink namespace
Impact:
False positive
Workaround:
None
Fix:
Redefinition of xlink namespace can be enabled through setting ASM internal variable 'allowXLINKRename' to 1
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1934493-2 : BIG-IP SFTP hardening
Links to More Info: K000151902, BT1934493
1934401-1 : iSeries HSB v5.26.8.0 firmware
Links to More Info: BT1934401
Component: TMOS
Symptoms:
iSeries HSB v5.26.8.0 firmware
Conditions:
iSeries i11000 series appliance
Impact:
Not applicable.
Workaround:
Not applicable.
Fix:
Fixes HSB bit-flip issues. See ID891333 for more information.
Fixed Versions:
21.0.0, 17.5.1
1934397-2 : SSL Orchestrator l2 inline monitor failure on r2000 or r4000 tenants
Links to More Info: BT1934397
Component: Local Traffic Manager
Symptoms:
SSL Orchestrator l2 inline monitors may not function correctly on r2000 or r4000 tenants.
Conditions:
-- SSL Orchestrator
-- l2 inline monitor
A traffic capture will show packets being egressed out one interface and not arriving at the other.
Impact:
The l2 inline service monitored via these interfaces will be marked down.
Workaround:
The issue is due to the MAC filter that is installed for every interface's MAC address. When the filter also matches a vlan MAC address this issue occurrs.
Compare the output of
tmsh show net interface all-properties
and
tmsh show net vlan
and make sure there is no MAC overlap. If there is, create some "dummy" vlans to move the overlap.
After creating dummy vlans, re-assign the MACs with the following command
tmsh modify ltm global-settings general share-single-mac global
tmsh modify ltm global-settings general share-single-mac unique
Fix:
We now provide a workaround to disable MAC filters via xnet_init.tcl
echo -e "drvcfg iavf uc_mac_filter 0\ndrvcfg iavf mc_mac_filter 0" >> /config/xnet_init.tcl
bigstart restart tmm
Fixed Versions:
21.0.0, 17.5.1.4, 17.1.3
1934393-1 : iSeries HSB v5.9.14.0 firmware
Links to More Info: BT1934393
Component: TMOS
Symptoms:
iSeries HSB v5.9.14.0 firmware
Conditions:
iSeries i5000, i7000, or i10000 series appliance
Impact:
Not applicable.
Workaround:
Not applicable.
Fix:
Fixes HSB bit-flip issues. See ID891333 for more information.
Fixed Versions:
21.0.0, 17.5.1
1934385-1 : iSeries HSB v4.3.5.0 firmware
Links to More Info: BT1934385
Component: TMOS
Symptoms:
iSeries HSB v4.3.5.0 firmware
Conditions:
iSeries i2000 or i4000 series appliance
Impact:
Not applicable.
Workaround:
Not applicable.
Fix:
Fixes HSB bit-flip issues. See ID891333 for more information.
Fixed Versions:
21.0.0, 17.5.1
1934073-2 : PEM policy rule incorrectly matching when using a flow condition
Links to More Info: BT1934073
Component: Policy Enforcement Manager
Symptoms:
When a PEM policy rule is configured to match the destination IP address and port, the message might match the source IP and port instead.
Conditions:
PEM policy rule is using flow conditions to match IP address and port
Impact:
An incorrect policy rule might be matched
Workaround:
None
Fix:
The PEM policy rule now correctly matches the source and destination IP addresses and ports when the flow condition is used.
Fixed Versions:
17.5.1.3, 17.1.3, 16.1.6.1
1933825-2 : High cpu usage by BD
Links to More Info: BT1933825
Component: Application Security Manager
Symptoms:
High cpu usage by BD
Conditions:
A specific condition leads BD to unnecessary high CPU
Impact:
High CPU
Workaround:
None
Fix:
BD no longer causes high CPU under the specific condition.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1933357-2 : DNS64 stats between cache resolver and TMM non-cache have inconsistent behavior.
Links to More Info: BT1933357
Component: Global Traffic Manager (DNS)
Symptoms:
DNS64 stats (tmstat table profile_dns_stat) in the TMM behave as follows:
dns64reqs - A queries to the server after the AAAA queries fail. Does not include the AAAA queries.
dns64fails - Failed AAAA queries to the server. Does not include the subsequent A queries.
DNS64 stats (tmstat table dns_cache_resolver_stat) in the cache behave as follows:
mesh.dns64reqs - Includes both A and AAAA queries to the server. Includes both successful and failed AAAA queries.
mesh.dns64nodata - Includes both A and AAAA query nodata responses (rcode=0 and no records).
mesh.dns64error - Includes both A and AAAA query error rcode responses.
mesh.dns64timeout - Includes both A and AAAA query timed-out responses.
Conditions:
-- A DNS resolver cache is enabled on a DNS profile.
-- The DNS profile has DNS64 configured.
Impact:
The current cache resolver stats makes it difficult to diagnose backend DNS64 performance.
Workaround:
None
Fix:
Mesh.dns64reqs behaves like the TMM's dns64reqs (counts only DNS64 A queries to the server.) Additionally, a new stat mesh.dns64fails sums all failures (mesh.dns64nodata, mesh.dns64error, mesh.dns64timeout) and, like the TMM, only counts DNS64 AAAA failures to the server.
Fixed Versions:
17.5.1.4
1930945 : [APM][KERBEROS][NTLM FALLBACK] Kerberos Authentication fails post-upgrade to v17.5.0/v17.5.1 — “Profile '/Common/kerberos_auth_config_default' was not found” and ECA Crashes★
Links to More Info: BT1930945
Component: Access Policy Manager
Symptoms:
1.ECA process continuously restarts (SIGSEGV/crash).
2. /var/log/apm contains errors indicating missing Kerberos config and NTLM fallback.
Conditions:
1. kerberos usecase
Impact:
1. Kerberos authentication fails, leading to unsuccessful proxy access for domain-joined users.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1
1928749-2 : TMM cores in rare circumstances
Links to More Info: BT1928749
Component: TMOS
Symptoms:
TMM cores in rare circumstances
Conditions:
Can occur after High Availability (HA) failover.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fix:
TMM crash prevented.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1928537-1 : Missing initial PKCS11d login state causes login failures on certain AWS CloudHSMs
Links to More Info: BT1928537
Component: Local Traffic Manager
Symptoms:
The PKCS11d daemon did not properly initialize the login state for each partition. It was previously assumed that a user was effectively “logged in” on startup, even though no explicit state indicated CKR_USER_NOT_LOGGED_IN.
This worked with older HSMs and earlier AWS CloudHSM SDK3 primarily because those libraries did not strictly require an explicit CKR_USER_NOT_LOGGED_IN state; they would either auto-login or return CKR_USER_ALREADY_LOGGED_IN in most cases.
However, newer AWS CloudHSM libraries (SDK5) and other current HSM vendors require a proper indication that the user is not logged in to handle re-login flows correctly.
Conditions:
Use SDK version 5 with BIG-IP.
Impact:
Key creation fails.
Workaround:
None
Fix:
- This fix is applied to all HSMs, not just AWS CloudHSM. Each partition starts in a well-defined, “not logged in” state. It only transitions to CKR_OK or CKR_USER_ALREADY_LOGGED_IN when the device confirms the user is authenticated.
- The change sets the hsm_partitions.array[slot].login_status = CKR_USER_NOT_LOGGED_IN during session/partition initialization.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1927513-1 : SIGSEGV TMM core ikev2_encrypt_packet_construct at iked/ikev2_packet.c:334
Links to More Info: BT1927513
Component: TMOS
Symptoms:
Crashes after many failovers when upgraded from 15.1.x to 17.1.x version.
Conditions:
- IPsec is configured, ie the BIG-IP is an IPsec peer.
- Observed only after a failover and when an upgrade from software version 15.x to 16.x or 17.x is being performed.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Enable the sys db variable "ipsec.removeredundantsa" to avoid the crash.
Fix:
This tmm crash will not occur after upgrade and failover.
Fixed Versions:
21.0.0, 17.5.1.2
1927225-2 : Vertical tab (u000b) is removed from the request by the JSON parser
Links to More Info: BT1927225
Component: Application Security Manager
Symptoms:
The JSON parser removes the vertical tab (\u00b) from the request, preventing attack signatures from matching and causing the request to be bypassed.
Conditions:
Attaching the JSON profile, send a request with a vertical tab (\u000b).
Impact:
Attack signatures are not matched to the SQL injection attack vector.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1927145-2 : A bd process crash on a specific scenario
Links to More Info: K000156621, BT1927145
1926989-1 : BIG-IP Virtual Edition: kswapd running constantly and consuming most of the CPU cycles of a core★
Links to More Info: BT1926989
Component: TMOS
Symptoms:
After a new installation or after an upgrade to of a Virtual Edition to one of the affected versions, the 'kswapd' daemon runs constantly, consuming up to 100% of the cycles of a CPU core.
Swap use may be higher after upgrade.
Conditions:
- installation of a new BIG-IP Virtual Edition
or
- upgrade of a BIG-IP Virtual Edition to one of the affected versions
Impact:
A CPU core constantly consuming most of its CPU cycles.
General slowness of the system.
Swap use may be higher after upgrade.
Workaround:
If the problem is present after a TMOS upgrade:
- check what was the value of vm.min_free_kbytes before the upgrade by booting back in the previous volume
- set the same value in the new volume with the command:
# sysctl -w vm.min_free_kbytes=<VALUE>
No reboot or tmm restart is needed.
If the Virtual Edition is a fresh install:
- set the vm.min_free_kbytes value to 24141
# sysctl -w vm.min_free_kbytes=24141
No reboot or tmm restart is needed.
You may need to follow the "Additional Information" section in https://my.f5.com/manage/s/article/K000150960 to ensure that the changes persist after a reboot.
Fix:
Vm.min_free_kbytes is given the correct value.
Fixed Versions:
21.0.0, 17.5.1
1926885 : [APM] URL DB mismatch error for Religion categories in the upgrade★
Links to More Info: BT1926885
Component: Access Policy Manager
Symptoms:
Error messages in /var/log/apm
"The requested URL Category (/Common/Lesser-Known_Religions) was not found."
"The requested URL Category (/Common/Widely-Known_Religions) was not found."
Conditions:
APM provisions and SWG database downloads enabled.
Impact:
Upgrades fails with below error:
There were warnings:
Category name changed from /Common/Lesser_Known_Religions to in allowed categories of url filter /Common/test_filter
Category name changed from /Common/Widely_Known_Religions to in allowed categories of url filter /Common/test_filter
Compliance '/Common/gtp_unknown_tunnel_id' is deprecated and removed from '/Common/protocol_inspection'.
Compliance '/Common/smtp_command_length_overflow' is deprecated and removed from '/Common/protocol_inspection'.
01070734:3: Configuration error: In url-filter (/Common/<filter>), allowed-category () does not exist. In url-filter (/Common/<filter>), allowed-category () does not exist.
Unexpected Error: Loading configuration process failed.
Workaround:
Edit the respective categories before upgrading to the latest version.
1. Edit bigip.conf
2. Look for the respective failure filter name and change the
Lesser_Known_Religions to Lesser-Known_Religions and
Widely_Known_Religions to Widely-Known_Religions
3. Save the file
4. Update the configuration using tmsh save/load sys config
Fix:
Corrected category names in the configuration to address upgrade failures from older versions to 17.5.x caused by mismatches. The handling is implemented in the fixup script, which is triggered when a URL Filter is configured.
Fixed Versions:
21.0.0, 17.5.1
1926141-1 : kernel: possible out of bounds write in kbd_keycode of keyboard.c
Component: TMOS
Symptoms:
In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-144161459
Conditions:
NA
Impact:
Attacker can cause denial of service and take the system down
Workaround:
Allow access to only trusted users
Fix:
Patched kernel to fix the vulnerability
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1925837-1 : CVE-2018-18508 nss: NULL pointer dereference in several CMS functions resulting in a denial of service
Component: TMOS
Symptoms:
In Network Security Services (NSS) before 3.36.7 and before 3.41.1, a malformed signature can cause a crash due to a null dereference, resulting in a Denial of Service.
Conditions:
NSS version before 3.36.7 and before 3.41.1
Impact:
Exploitation could cause the system to become unavailable (DoS).
Workaround:
NA
Fix:
Patched nss to fix the vulnerability.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1925485-1 : CVE-2020-12655 kernel: sync of excessive duration via an XFS v5 image with crafted metadata
Component: TMOS
Symptoms:
A flaw was discovered in the XFS source in the Linux kernel. This flaw allows an attacker with the ability to mount an XFS filesystem, to trigger a denial of service while attempting to sync a file located on an XFS v5 image with crafted metadata.
Conditions:
An attacker can mount a crafted XFS v5 filesystem image on a vulnerable Linux kernel and trigger the issue during file sync operations.
Impact:
It can cause a kernel crash or hang, resulting in a denial of service.
Workaround:
Upgrade to a Linux kernel version that includes the XFS fix and avoid mounting untrusted or crafted XFS filesystem images.
Fix:
Upgrade to a Linux kernel version that includes the XFS crafted-metadata sync fix.
Fixed Versions:
17.5.1.4
1925369-1 : CVE-2018-10322 kernel: Invalid pointer dereference in xfs_ilock_attr_map_shared() when mounting crafted xfs image allowing denial of service
Component: TMOS
Symptoms:
The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel can cause a NULL pointer dereference in xfs_ilock_attr_map_shared function. An attacker could trick a legitimate user or a privileged attacker could exploit this by mounting a crafted xfs filesystem image to cause a kernel panic and thus a denial of service.
Conditions:
A vulnerable Linux kernel mounts a crafted or malicious XFS filesystem image, triggering a NULL pointer dereference during inode verification.
Impact:
It can trigger a kernel panic, resulting in a denial of service.
Workaround:
Upgrade to a Linux kernel version that includes the XFS fix and avoid mounting untrusted or crafted XFS filesystem images.
Fix:
Upgrade to a Linux kernel version that includes the XFS NULL pointer dereference fix.
Fixed Versions:
17.5.1.4
1925349-1 : kernel: fs/quota/quota_tree.c does not validate the block number in the quota tree
Component: TMOS
Symptoms:
In the Linux kernel before 5.15.3, fs/quota/quota_tree.c does not validate the block number in the quota tree (on disk). This can, for example, lead to a kernel/locking/rwsem.c use-after-free if there is a corrupted quota file.
Conditions:
NA
Impact:
High impact on system availability
Workaround:
Give access to trusted users only.
Fix:
Patched kernel to fix the vulnerability
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1925045-1 : Linux Kernel Btrfs Information Leak Vulnerability (CVE-2024-35849)
Component: TMOS
Symptoms:
An information leak in the Btrfs btrfs_ioctl_logical_to_ino() ioctl allowed uninitialized kernel memory to be copied to user space, potentially exposing sensitive data.
Conditions:
A system running a vulnerable Linux kernel with Btrfs enabled, where a local user invokes the btrfs_ioctl_logical_to_ino() ioctl.
Impact:
It can leak uninitialized kernel memory to user space, potentially exposing sensitive information.
Workaround:
Upgrade to a Linux kernel version that includes the Btrfs fix (uses kvzalloc() to zero memory) or apply the relevant kernel patch.
Fix:
Upgrade to a Linux kernel version that includes the Btrfs btrfs_ioctl_logical_to_ino() memory initialization fix.
Fixed Versions:
17.5.1.4
1925037-1 : Kernel: denial of service in atm_tc_enqueue in net/sched/sch_atm.c due to type confusion
Component: TMOS
Symptoms:
atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).
Conditions:
NA
Impact:
Attacker can cause denial of service and take the system down
Workaround:
Allow access to only trusted users
Fix:
Patched kernel to fix the vulnerability
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1925033-1 : kernel: slab-out-of-bounds read vulnerabilities in cbq_classify
Component: TMOS
Symptoms:
cbq_classify in net/sched/sch_cbq.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service (slab-out-of-bounds read) because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).
Conditions:
NA
Impact:
Attacker can cause denial of service and take the system down
Workaround:
Allow access to only trusted users
Fix:
Patched kernel to fix the vulnerability
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1925029-1 : CVE-2023-1611 - Linux Kernel btrfs Use-After-Free Vulnerability Leading to System Crash and Information Leak
Component: TMOS
Symptoms:
A use-after-free flaw was found in btrfs_search_slot in fs/btrfs/ctree.c in btrfs in the Linux Kernel.This flaw allows an attacker to crash the system and possibly cause a kernel information lea
Conditions:
A system running a vulnerable Linux kernel with Btrfs enabled, where an attacker triggers the btrfs_search_slot() code path via crafted filesystem operations or images.
Impact:
It can cause a kernel crash (denial of service) and may lead to a kernel information leak.
Workaround:
Upgrade to a Linux kernel version that includes the Btrfs use-after-free fix and avoid using or mounting untrusted Btrfs filesystems.
Fix:
Upgrade to a Linux kernel version that includes the Btrfs btrfs_search_slot() use-after-free fix.
Fixed Versions:
17.5.1.4
1924981-1 : kernel: Out-of-bounds access in write_extent_buffer() when mounting and operating a crafted btrfs image
Component: TMOS
Symptoms:
An issue was discovered in the Linux kernel through 4.17.10. There is out-of-bounds access in write_extent_buffer() when mounting and operating a crafted btrfs image, because of a lack of verification that each block group has a corresponding chunk at mount time, within btrfs_read_block_groups in fs/btrfs/extent-tree.c.
Conditions:
NA
Impact:
Attacker can cause denial of service and take the system down
Workaround:
Allow access to only trusted users
Fix:
Patched kernel to fix the vulnerability
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1924977-1 : kernel: Invalid pointer dereference in fs/btrfs/relocation.c:__del_reloc_root() when mounting crafted btrfs image
Component: TMOS
Symptoms:
An issue was discovered in the Linux kernel through 4.17.10. There is an invalid pointer dereference in __del_reloc_root() in fs/btrfs/relocation.c when mounting a crafted btrfs image, related to removing reloc rb_trees when reloc control has not been initialized.
Conditions:
NA
Impact:
Attacker can cause denial of service and take the system down
Workaround:
Allow access to only trusted users
Fix:
Patched kernel to fix the vulnerability
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1924801-1 : grub2: Heap out-of-bounds write in short form option parser
Component: TMOS
Symptoms:
A flaw was found in grub2 in versions prior to 2.06. The option parser allows an attacker to write past the end of a heap-allocated buffer by calling certain commands with a large number of specific short forms of options. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Conditions:
NA
Impact:
The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Workaround:
Ensure bootloader is not exposed to shell or remote control: BIG-IP TMOS by default does not expose GRUB menu to remote users
Functional Impact: Potential DOS
Fix:
Patched grub2 to fix the vulnerability
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1923997-1 : CVE-2023-1668-openvswitch: ip proto 0 triggers incorrect handling
Component: TMOS
Symptoms:
A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow.
Conditions:
Open vSwitch is running a vulnerable version and processes an IP packet with protocol value 0, causing an incorrect datapath flow to be installed with wildcarded nw_proto.
Impact:
It can cause incorrect handling or misrouting of other IP packets, potentially leading to traffic disruption or denial of service.
Workaround:
Upgrade to a patched Open vSwitch version and avoid processing or allowing malformed IP packets with protocol value 0.
Fix:
Upgrade to a patched Open vSwitch version that correctly handles IP packets with protocol value 0.
Fixed Versions:
17.5.1.4
1923817-1 : CVE-2017-11499: Constant Hashtable Seeds vulnerability (NodeJS v6.9.1)
Component: Local Traffic Manager
Symptoms:
Node.js v4.0 through v4.8.3, all versions of v5.x, v6.0 through v6.11.0, v7.0 through v7.10.0, and v8.0 through v8.1.3 was susceptible to hash flooding remote DoS attacks as the HashTable seed was constant across a given released version of Node.js. This was a result of building with V8 snapshots enabled by default which caused the initially randomized seed to be overwritten on startup.
Conditions:
The application runs a vulnerable Node.js version and processes attacker-controlled inputs that result in many hash collisions (e.g., crafted object keys), allowing hash flooding.
Impact:
It can cause high CPU usage and event loop blocking, leading to a remote denial of service.
Workaround:
Upgrade to a fixed Node.js version, or rebuild Node.js without V8 snapshots and limit or validate untrusted input sizes.
Fix:
Upgrade to a Node.js version where the HashTable seed is properly randomized at startup.
Fixed Versions:
17.5.1.4
1923793-1 : CVE-2019-5739: DoS with keep-alive HTTP connection
Component: Local Traffic Manager
Symptoms:
Keep-alive HTTP and HTTPS connections can remain open and inactive for up to 2 minutes in Node.js 6.16.0 and earlier. Node.js 8.0.0 introduced a dedicated server.keepAliveTimeout which defaults to 5 seconds. The behavior in Node.js 6.16.0 and earlier is a potential Denial of Service (DoS) attack vector. Node.js 6.17.0 introduces server.keepAliveTimeout and the 5-second default.
Conditions:
The server runs Node.js 6.16.0 or earlier and accepts keep-alive HTTP/HTTPS connections, allowing attackers to keep many idle connections open.
Impact:
It can exhaust server connections and resources, leading to a denial of service.
Workaround:
Upgrade to Node.js 6.17.0 or later and configure a low server.keepAliveTimeout to limit idle connections.
Fix:
Upgrade to Node.js 6.17.0 or later, where server.keepAliveTimeout is available and defaults to 5 seconds.
Fixed Versions:
17.5.1.4
1923693-1 : kernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race
Component: TMOS
Symptoms:
A use-after-free flaw was found in vcs_read in drivers/tty/vt/vc_screen.c in vc_screen in the Linux Kernel. This issue may allow an attacker with local user access to cause a system crash or leak internal kernel information.
Conditions:
NA
Impact:
High impact on the confidentiality and availability of BIGIP
Workaround:
Give access to trusted users.
Fix:
Patched kernel to fix the vulnerability
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1923665-1 : kernel: Integer overflow in function rndis_query_oid of rndis_wlan.c
Component: TMOS
Symptoms:
In rndis_query_oid in drivers/net/wireless/rndis_wlan.c in the Linux kernel through 6.1.5, there is an integer overflow in an addition.
Conditions:
NA
Impact:
Attacker can cause denial of service and take the system down
Workaround:
Allow access to only trusted users
Fix:
Patched kernel to fix the vulnerability
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1923657-1 : CVE-2022-41858 kernel: null-ptr-deref vulnerabilities in sl_tx_timeout in drivers/net/slip
Component: TMOS
Symptoms:
A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information.
Conditions:
A vulnerable Linux kernel where the SLIP network driver is enabled and a detach operation occurs during sl_tx_timeout().
Impact:
It can trigger a kernel crash (denial of service) and potentially leak kernel memory information.
Workaround:
Upgrade to a Linux kernel version that includes the SLIP driver fix or disable the SLIP driver if it is not required.
Fix:
patch has been applied
Fixed Versions:
21.0.0, 17.5.1.4
1923605-1 : kernel: Salsa20 encryption algorithm does not correctly handle zero-length inputs allowing local attackers to cause denial-of-service
Component: TMOS
Symptoms:
The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable.
Conditions:
NA
Impact:
Attacker can cause denial of service and take the system down
Workaround:
Allow access to only trusted users
Fix:
Patched kernel to fix the vulnerability
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1922525-1 : BIG-IP SCP hardening
Links to More Info: K000151902, BT1922525
1922501-1 : TMM crash loop due to missing kernel driver★
Links to More Info: BT1922501
Component: TMOS
Symptoms:
TMM goes into a crash loop with following logs in 'tmm' logs
notice EAL: Driver cannot attach the device (<VMBus-ID>)
notice EAL: Failed to attach device on primary process
notice dpdk[<VMBus-ID>]: Error: rte_dev_probe failed: err=-95
notice xnet_lib [vmbus:eth2]: Error: Failed to initialize driver
notice xnet[00:e2.0]: Error: Unable to attach to xnet dev
This is due to missing uio_hv_generic kernel module which gets removed on TMM shutdown but fails to be re-inserted upon TMM post-crash restart.
Conditions:
1) BIG-IP on HyperV or Azure
2) Using xnet-DPDK driver
3) TMM crashes due to any other reason and restarts; can not repro directly using 'bigstart restart tmm' unless a 'bigstart restart' also reproduces the initial crash as well
Impact:
Traffic disrupted while tmm restarts.
Workaround:
(A)
1) Add 'modprobe uio_hv_generic' to '/usr/lib/bigstart/functions'
This will likely require remounting /usr to allow writing; this can be done via
sudo mount -o remount,rw /usr
2) Within 'functions', search for 'vadc_restore_vmbus_nics()' and add 'modprobe uio_hv_generic' to bottom of function after 'done'
3) Afterwards, restart TMM with 'bigstart restart tmm'
(B)
1) Switch to 'sock' driver by adding following config
[root@BIGIP:Active:Standalone] config # cat /config/tmm_init.tcl
device driver vendor_dev f5f5:f550 sock
[root@BIGIP:Active:Standalone] config #
2) Restart TMM with 'bigstart restart tmm'
Fix:
Re-activate missing module after TMM crash
Fixed Versions:
21.0.0, 17.5.1
1920341-1 : SSH Public Key authentication allows RSA and not ECDSA in ccmode
Links to More Info: BT1920341
Component: TMOS
Symptoms:
When a device is in common criteria mode, you cannot use ecdsa-sha2-nistp256 or ecdsa-sha2-nistp384 for SSH public key authentication. Additionally, you can use rsa key which you should not be able to according to common criteria guidelines.
Conditions:
-- Common Criteria mode is enabled
Impact:
You cannot ssh with ECDSA but can with RSA key
Workaround:
Workaround is in file /config/ssh/sshd_config, on line 34 replace:
HostKey /config/ssh/ssh_host_rsa_key
with:
HostKey /config/ssh/ssh_host_ecdsa_key
HostKey /config/ssh/ssh_host_ecdsa_p384_key
Note that this workaround must be applied after each reboot in ccmode, since the sshd_config file will revert after reboot.
Fix:
SSH public key authentication works as expected in ccmode.
Fixed Versions:
21.0.0, 17.5.1
1920097-2 : Allow bad actor threshold below 0.1%
Links to More Info: BT1920097
Component: Advanced Firewall Manager
Symptoms:
When configuring AFM DoS vector protections, the bad actor threshold cannot be set below 0.1% for the configured DoS vector rate threshold. This restriction may prevent users from tailoring thresholds for large-scale environments with high user volume and low per-user traffic.
Conditions:
AFM DoS Profile with per-source (bad actor) detection enabled.
Bad actor threshold configured less than 0.1% for vector rate threshold.
Impact:
Prevents deployment of granular bad actor detection in high-scale environments where per-source traffic is significantly lower than 0.1% of the total DoS vector threshold. This impacts the ability to accurately detect and mitigate abusive sources without affecting normal user behaviour.
Workaround:
None
Fix:
Reduced bad actor threshold enforcement to allow configuration below 0.1% for the vector threshold (up to 0.01%), enabling finer-grained control over source detection in large-scale deployments.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1920057-1 : Bd crashes
Links to More Info: K000154664, BT1920057
1917741-2 : [APM][TMM] memory growth in SAML SP while decoding assertion attributes
Links to More Info: BT1917741
Component: Access Policy Manager
Symptoms:
Tmm crashes due to out of memory while passing SAML traffic
Conditions:
-- SAML SP configured with assertion attributes.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1
1893905-1 : Python vulnerability CVE-2023-40217
Links to More Info: K000139685
1893473-1 : Apache vulnerability CVE-2021-40438
Links to More Info: K01552024
1893369-1 : CVE-2021-33033 kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c
Component: TMOS
Symptoms:
A flaw use-after-free in the Linux kernel CIPSO network packet labeling protocol functionality was found in the way user open local network connection with the usage of the security labeling that is IP option number 134. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.
Conditions:
A vulnerable Linux kernel with CIPSO/IP option 134 enabled, where a local user opens a network connection using CIPSO security labeling.
Impact:
It can cause a kernel crash (denial of service) and may allow local privilege escalation.
Workaround:
Upgrade to a Linux kernel version that includes the CIPSO use-after-free fix or disable CIPSO/IP option 134 if not required.
Fix:
patch has been applied
Fixed Versions:
17.5.1.4
1893361-1 : CVE-2021-3177 python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c
Links to More Info: K000133761
1893309-1 : CVE-2021-23337 on HostOS: Command Injection via template function.\n' 'Link:https://sn
Links to More Info: K12492858
1893141-1 : CVE-2020-26137 in Library:python, Installed:2.7.5-58.el7.0.0.14.i686, FixVersion:2.7.5-92.el7_9 and others, on HostOS: CentOS Security Update for python
Links to More Info: K000133547
1892025-1 : CVE-2019-11236 python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service
Links to More Info: K000135001
1891817-2 : CVE-2018-18521 elfutils: Divide-by-zero in arlib_add_symbols function in arlib.c
Links to More Info: K21426934
1891813-2 : CVE-2018-18520 elfutils: eu-size cannot handle recursive ar files
Links to More Info: K21426934
1891805-2 : CVE-2018-18310 elfutils: invalid memory address dereference was discovered in dwfl_segment_report_module.c in libdwfl
Links to More Info: K21426934
1891745-2 : CVE-2018-16403 elfutils: Heap-based buffer over-read in libdw/dwarf_getabbrev.c and libwd/dwarf_hasattr.c causes crash
Component: TMOS
Symptoms:
libdw in elfutils 0.173 checks the end of the attributes list incorrectly in dwarf_getabbrev in dwarf_getabbrev.c and dwarf_hasattr in dwarf_hasattr.c, leading to a heap-based buffer over-read and an application crash.
Conditions:
elfutils version prior to 0.174
Impact:
Exploitation could cause the system to become unavailable (DoS).
Workaround:
NA
Fix:
Patched elfutils to fix the vulnerability.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1891673-2 : CVE-2018-14404 libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c
Links to More Info: K76678525
1891361-2 : CVE-2015-8035 libxml2: DoS caused by incorrect error detection during XZ decompression
Links to More Info: K76678525
1889845-1 : Improvements in Radius Monitor
Component: Local Traffic Manager
Symptoms:
Certain headers were missing from radius monitor packet.
Conditions:
When radius monitors is configured
Impact:
Can lead to unexpected behaviour
Fix:
Missing headers are now included in the packets.
Fixed Versions:
17.5.1.4
1889349-2 : Crash during handling ePVA metadata
Links to More Info: K000156707, BT1889349
1881373-2 : CVE-2024-3661 Tunnelvision Vulnerability
Links to More Info: K000139553, BT1881373
1881145-3 : Change log level of PPP TunnelStats log messages to debug level
Links to More Info: BT1881145
Component: Access Policy Manager
Symptoms:
Presently PPP Tunnel Stats logs are in log level Notice.
Conditions:
Enable APM logs to Notice and establish VPN session. When disconnect VPN session user will see these logs.
Impact:
Lot of logs are seen in Notice level which are needed only for additional debugging.
Workaround:
None
Fix:
After changing log level to debug user should see less logs in APM log file.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1
1880365-1 : Cannot log into Fs_v2 Azure BIG-IP with >= 32 vCPUs and >= 5 interfaces
Links to More Info: BT1880365
Component: TMOS
Symptoms:
No login prompt is available to access Azure Fs_v2 instances when attaching 5 or more instances. 8 is the max number of interfaces for F32_v2 or larger.
Conditions:
-- Use Azure F32_v2 instance size or larger.
-- Attach 5 or more interfaces to BIG-IP.
Impact:
No access to F32_v2 instances or larger when attaching 5 or more interfaces.
Workaround:
None
Fix:
Login prompt is available.
Fixed Versions:
21.0.0, 17.5.1
1874825-4 : Specific IPsec traffic might trigger a tmm crash
Links to More Info: K000156746, BT1874825
1857413-2 : Malformed XML data or Malformed JSON data violation raised despite URL containing content-profile
Links to More Info: BT1857413
Component: Application Security Manager
Symptoms:
* XML/JSON traffic gets flagged or blocked with a Malformed XML data or Malformed JSON data violation despite the URL having a content-profile associated with it.
* When the violation gets raised, the violation details lists the profile as "N/A".
* The XML/JSON content profiles are visible when viewing the content profile configuration via WebUI. However, corresponding database tables lose integrity, which results false positive.
Conditions:
Any change followed by 'Apply Policy' on a policy can ruin the integrity of corresponding database that might affect other policies, and false positive would start after subsequent 'Apply Policy' or global configuration update.
Impact:
XML/JSON traffic gets flagged or, if enforced, blocked despite the content profile associated to the URL.
Workaround:
Make a spurious policy change to the affected XML or JSON profile (e.g., updating its Description), followed by applying policy changes via 'Apply Policy,'
This helps resolve the issue by populating a new entry in the database table for this policy.
Avoid making any change on any GraphQL profile to prevent it from re-occurring.
Fix:
Configuration change will not ruin the integrity of the database tables.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1856449-1 : [keymgmtd]OpenSSL: DRBG Continuous RNG test failed: DRBG stuck.
Links to More Info: BT1856449
Component: TMOS
Symptoms:
You may observe below logs in /var/log/ltm
err keymgmtd[31381]: OpenSSL: DRBG Continuous RNG test failed: DRBG stuck.
err fips_monitor[18007]: 01da0011:3: SelfTest/Integrity test failure detected, triggering reboot action
Conditions:
Conditions are unknown
Impact:
Unexpected reboot causing disruption to traffic and failover.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.2
1856289-2 : Virtual server, which is managed by remote LTM device, is shown as "offline/enabled" with "Monitor /Common/bigip : no reply from big3d: timed out" message (red diamond icon).
Links to More Info: BT1856289
Component: Global Traffic Manager (DNS)
Symptoms:
When a virtual server object, which is managed by a remote LTM device, is disabled, after gtmd is restarted (or GTM/DNS device reboot) and gtmd becomes online and iQuery communication is re-established with the remote LTM device, the bellow message is logged to /var/log/gtm and virtual server status becomes "offline/disabled" (black diamond icon).
gtmd[xxxx]: 011ae0f2:1: Monitor instance /Common/bigip 10.1.1.201:80 CHECKING --> DOWN from /Common/bigipdns (no reply from big3d: timed out)
gtmd[xxxx]: 011a6006:1: SNMP_TRAP: virtual server /Common/vs1 (ip:port=10.1.1.201:80) (Server /Common/bigipltm) state change blue --> red ( Monitor /Common/bigip : no reply from big3d: timed out: disabled directly)
Then, even after re-enabling the virtual server, which is managed by LTM, virtual server stays as "offline/enabled" (red diamond icon) with "Monitor /Common/bigip : no reply from big3d: timed out" message.
----------------------------------
| Gtm::Virtual Server: vs1
----------------------------------
| Status
| Availability : offline
| State : enabled
| Reason : Monitor /Common/bigip : no reply from big3d: timed out
| Destination : 10.1.1.201:80
| Up Time : ---
Conditions:
All of the following conditions met.
- GTM/DNS device manages remote LTM device and its virtual server.
- Remote LTM virtual server is not directly monitored by GTM/DNS device monitor object. Instead, remote LTM virtual server is monitored by remote LTM device itself (e.g., on remote LTM device, virtual server pool is monitored by pool monitor).
- On GTM/DNS device, disable and re-enable virtual server, which is managed by remote LTM device.
- After virtual server is disabled on GTM/DNS device, gtmd restart on GTM/DNS device or GTM/DNS device reboots.
- GTM/DNS is running on a software versions 17.1.1 or 16.1.5 or later versions in which the ID 1133201 is fixed.
Impact:
Virtual server stays as unavailable despite the remote LTM device reporting virtual server status as 'up'. Hence, pool or wideIP, which uses the affected server object, may be unavailable too.
Workaround:
If issue had already occurred and virtual server stayed as "offline/enabled" (red diamond icon), restarting gtmd on GTM/DNS device will rescue the affected virtual server.
If issue does not yet occur but virtual server is going to be disabled and re-enabled, you can prevent issue by changing "DNS >> Settings : GSLB : General - Monitor Disabled Objects" setting (gtm global-settings general monitor-disabled-objects) to "yes" (default "no"). This needs to be done prior to disabling virtual server (prior to gtmd restart/reboot).
# tmsh modify gtm global-settings general monitor-disabled-objects yes
# tmsh save sys config gtm-only
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1856285-3 : [APM]mdmsyncmgr core is observed very intermittently
Links to More Info: BT1856285
Component: Access Policy Manager
Symptoms:
Mdmsyncmgr process cores
Conditions:
MDM usecase in APM Network Access
Impact:
Unable to use MDM
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1
1853721-3 : User has reached maximum active login tokens
Links to More Info: BT1853721
Component: TMOS
Symptoms:
You are unable to create any new tokens for a user.
Conditions:
To reproduce the issue, create 100 active tokens for non admin user and reboot device
-- 100 active tokens already exist for a non-admin user
-- The system is rebooted
Impact:
You are unable to create any new tokens for the user.
An error is reported: "User has reached maximum active login tokens"
Workaround:
Execute below command
restcurl -X DELETE /shared/authz/tokens
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1849585-2 : A correctly encoded long Authorization param triggers 'illegal base64 value' vaiolation
Links to More Info: BT1849585
Component: Application Security Manager
Symptoms:
A correctly encoded base64 string that is over 8192 triggers 'illegal base64 value' violation
Conditions:
Authorization param is longer than 8192 chars
Impact:
False positive with 'illegal base64 value'
Workaround:
Disable the violation
Fix:
Introduced a new BD internal max_header_length. Default is 8192 that is the same value as it was. If you want to let ASM handling auth-param longer than 8192, set larger value than the auth-param with this internal.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1849265-4 : A VCMP guest may not exit hardware syncookie mode
Links to More Info: BT1849265
Component: TMOS
Symptoms:
On a VCMP guest, if a virtual server enters hardware syncookie mode due to a syn flood, and the virtual server is passing a significant amount of valid traffic, it may not exit syncooke mode.
Conditions:
-- VCMP guest
-- Hardware syncookie mode
Impact:
Syncookies may continue to be issued even though the attack has stopped.
Workaround:
Remove traffic from the virtual server until syncookies deactivates.
This can be accomplished by using cli transaction to alter the first virtual server and create an identical new virtual server.
Example:
Assume my_vs1 is the existing virtual server listening on port 80
tmsh
create /cli transaction
delete ltm virtual my_vs1
create ltm virtual my_vs2 destination 10.10.10.16:80 pool pool1 profiles add { fastL4 http } source-address-translation { type automap }
submit /cli transaction
This will, delete the first virtual server but existing TCP connections will be maintained. And then the new virtual server will be created which will accept new transaction. Since syncookie are enabled per virtual server, this new virtual server will not be in hardware syncookie mode.
Fix:
Syncookie threshold calculation is now accurate.
Fixed Versions:
17.5.1.4
1826393-4 : TMM may restart under certain conditions
Links to More Info: K000151475, BT1826393
1826345-5 : Security improvements in ca-bundle.crt
Component: TMOS
Symptoms:
Security best practices were not being followed for CA bundles.
Conditions:
When SSL profile is configured.
Impact:
Can lead to unexpected behaviour
Workaround:
Manually updating the default CA bundle or using CA bundle Manager.
Fix:
Security best practices are now being followed.
Fixed Versions:
17.5.1.4
1826185-2 : Tenants on r2000 and r4000 series may drop packets larger than 9194 bytes
Links to More Info: BT1826185
Component: Local Traffic Manager
Symptoms:
F5OS tenants have a supported maximum MTU of 9198 bytes as per K6399. Tenants running on 2000 and r4000 series may drop packets larger than 9194 bytes.
The tmm/xnet/iavf/per_vf_stats.rx_discards stat increments when this occurrs.
Conditions:
R2000 or r4000 platform.
Jumbo frames
Impact:
Dropped jumbo frames
Workaround:
Lower the MTU such that packets are not exceeding 9194 bytes.
Fixed Versions:
21.0.0, 17.5.1.2
1826013-1 : BIG-IP as Oauth C/RS "Invalid json error" after upgrade to 17.1.2.1 when json response has non ASCII characters★
Links to More Info: K000150397, BT1826013
Component: Access Policy Manager
Symptoms:
OAuth authentication fails with error error: Invalid json on oauth client/RS
Conditions:
OAuth client/RS receives JWT token which contains non-ASCII characters
Impact:
OAuth authentication fails
Workaround:
None
Fix:
17.1.2.1 code has libjson:isvalid() to check if the json is valid or not. this function cannot validate non ASCII characters and returns error. removed this function and added logic to check if valid json is received or not.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1825949-2 : [APM][Radius] Message-Authenticator value is incorrect for OTP request
Links to More Info: BT1825949
Component: Access Policy Manager
Symptoms:
When a OTP challenge is requested on RSA, the Message-Authenticator value in the second request is not corrected/alarmed by the RSA server.
Eventually the packet is dropped at the Radius Server.
Conditions:
The Message-Authenticator attribute radius.messageauthenticator is set to true.
Impact:
This causes authentication failures, disrupting the user’s access control process.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8
1825901-4 : CVE-2015-6748 jsoup: XSS vulnerability related to incomplete tags at EOF
Links to More Info: K000150762, BT1825901
1825513 : ClientSSL profile with PQC group may cause TMM to crash
Links to More Info: BT1825513
Component: Local Traffic Manager
Symptoms:
TMM or system services may restart unexpectedly due to memory pressure.
In /var/log/tmm:
warning tmm[24255]: 01260013:4: SSL Handshake failed for TCP 10.20.2.115:44404 -> 10.20.40.191:443
err tmm[24255]: 01230140:3: RST sent from 10.20.40.191:443 to 10.20.2.115:44404, [0x3076761:2571] SSL handshake timeout exceeded
err tmm3[24255]: 01010282:3: Crypto codec error: sw_crypto-3 RSA private encrypt error OpenSSL error:03078069:bignum routines:BN_EXPAND_INTERNAL:expand on static bignum data
err tmm2[24255]: 01010282:3: Per-invocation log rate exceeded; throttling.
err tmm6[24255]: 01010282:3: Resuming log processing at this invocation; held 53 messages.
Conditions:
Cipher rule DH group X25519KYBER768 is enabled.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
There is no workaround, disable X25519KYBER768 to mitigate the issue.
Fix:
Fix memory issues.
Fixed Versions:
21.0.0, 17.5.1
1825449-2 : Citrix Optimal Gateway Routing is not showing login username of session
Links to More Info: BT1825449
Component: Access Policy Manager
Symptoms:
When an iRule-based solution for optimal gateway routing is used for Citrix VDI, the currently logged-in username will not be displayed on the GUI session details page.
Conditions:
- APM Citrix VDI OGR is implemented with an iRule workaround.
- When the user checks the last logged-in username in the GUI.
Impact:
Username column displays empty instead of username.
Workaround:
None
Fix:
The Username column should display the name of the user currently logged in for the session.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1825357-2 : Possible tmm crash or traffic loss after making vlan interface changes with an empty trunk
Links to More Info: BT1825357
Component: Local Traffic Manager
Symptoms:
Tmm crashes and generates a core file.
or
Network traffic via a trunk does not work.
Conditions:
Platform i2600, i2800, i4600, i4800, r2800, r4800 or VADC
All trunk members are removed from a trunk attached to a vlan.
Then, the trunk is removed from one or more vlans.
Then, the trunk is deleted.
This could result in a tmm crash.
or
A trunk with no members is added to a vlan.
Then, one or more members are added to the trunk.
This will result in traffic on that vlan not being being sent over that trunk.
Impact:
Traffic disrupted while tmm restarts
or
Traffic is not sent out via the trunk
Workaround:
Do not remove and a trunk with no members from a vlan.
It will be necessary to restart tmm to correct this situation.
Do not add a trunk with no members to a vlan.
If a trunk with no members was added to the vlan, the issue can be corrected by removing the trunk from the vlan, ensuring that there are members in the trunk and adding it back to the vlan.
Fix:
FIX is not yet available.
Fixed Versions:
17.5.1.4
1825253-1 : Enhance the log message for better readability User session was terminated due to IP address change during session
Links to More Info: BT1825253
Component: Access Policy Manager
Symptoms:
Users experience an unexpected termination of their session when the IP address changes during the active session. So the log message was improved for better readability.
Conditions:
This issue is observed when there is a network change, such as:
-- Switching from WIFI to mobile data.
-- VPN IP address change.
-- IP address reassignment due to DHCP lease renewal.
Impact:
Users are abruptly logged out, resulting in lost session data or work in progress. This can cause delays and interruptions in workflows, especially in environments that require continuous access.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1825241-4 : MCPD validation fails when non-existent cipher group is referenced by SSL profile
Links to More Info: BT1825241
Component: Local Traffic Manager
Symptoms:
When using "tmsh load sys config verify" or performing an MCPD forceload/reboot, no validation error is reported for a SSL profile referencing a non-existent cipher group. This is unexpected behavior.
However, when using "tmsh load sys config", the system correctly identifies and reports the missing cipher group as a validation error. This is the expected behavior.
Conditions:
The disk config file (/config/bigip.conf) is missing the cipher group configuration, while that cipher group continues to be referenced within a SSL profile.
Impact:
When a SSL profile references a non-existent cipher group, the configuration loads without validation errors under certain conditions. This can result in connection failures with error messages such as:
Connection error: hud_ssl_handler:1315: alert(40) invalid profile unknown on VIP <VIP_NAME>
Workaround:
Ensure the disk config file (/config/bigip.conf) always has the cipher group present if it is being referenced by a Client or Server SSL profile.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8
1824985-3 : In rare cases the Nitrox hardware compression queue may stop servicing requests.
Links to More Info: BT1824985
Component: Local Traffic Manager
Symptoms:
In rare cases, the Nitrox hardware may stop servicing requests.
When this issue occurs the tmctl compress table shows a high number of cur_enqueued entries and the number of requests handled in software (zlib) will be growing.
Conditions:
-- Nitrox compression hardware.
-- HTTP compression in use.
Impact:
Some connections may fail, and higher than expected CPU usage will be observed since requests will be handled in software.
Workaround:
Remove traffic from the device, or disable compression until the queues are completely drained.
Fixed Versions:
17.5.1.4
1824413-4 : License activation in Automatic mode fails with "Couldn't contact INTERNAL licensing server★
Links to More Info: BT1824413
Component: TMOS
Symptoms:
License activation fails with an error "Couldn't contact INTERNAL licensing server. Check your base registration key for correct formatting."
Conditions:
-- Click System :: License : Reactivate and select automatic method to reactivate.
Impact:
Unable to license via GUI in automatic licensing.
Workaround:
Use TMSH license method.
tmsh install sys license registration-key <key>
Fix:
TMOS BIG-IP use Entrust CA in callhome updatecheck and GUI licensing(javacerts). In code base these using "ca-bundle.crt" and it is now replaced with new ca-file "f5-ca-bundle.crt"
For gui licensing, tomcat uses new f5-ca-bundle-cacerts file which is generated from "f5-ca-bundle.crt"
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3, 16.1.6.1, 15.1.10.8
1824037-2 : IPS profile using engine after free
Links to More Info: BT1824037
Component: Protocol Inspection
Symptoms:
crashes while passing IPS traffic.
Conditions:
-- IPS license applied to BIG-IP
-- IPS profile attached to a virtual server
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fix:
Fixed a tmm crash related to IPS.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1
1821373-2 : SAML Assertion Handling issue in APM SSO
Links to More Info: BT1821373
Component: Access Policy Manager
Symptoms:
When attributes with large encrypted values are present, the allocated memory may not be appropriately resized, leading to unexpected behavior, or tmm may crash.
Conditions:
This occurs specifically under configurations that utilize SAML with encrypted attributes containing large values.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fix:
SAML Assertion Handling issue in APM SSO has been addressed.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1821089-4 : DNS64 and resolver cache may not function together as expected
Links to More Info: BT1821089
Component: Global Traffic Manager (DNS)
Symptoms:
Wirth DNS64 enabled and also a resolver cache, the first AAAA query for a name that has only an A record and no AAAA record is correctly translated to the configured prefix. However, subsequent queries return only NOERROR to the client instead of the AAAA response.
Conditions:
-- DNS64 enabled with resolver cache
-- AAAA queries
Impact:
Subsequent queries return NOERROR and no record responses
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.4
1821033-2 : Assertion "packet must already have an ethernet header" when using tcpdump
Links to More Info: BT1821033
Component: Local Traffic Manager
Symptoms:
Tmm crashes when running tcpdump.
Conditions:
1. A virtual server references another virtual server with an iRule
2. The destination virtual server has an iRule with reject inside FLOW_INIT
3. Use tcpdump while hitting the reject rule
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Use either remote tcpdump or avoid using reject rule in FLOW_INIT.
Fix:
Tmm no longer crashes in this scenario.
Fixed Versions:
21.0.0, 17.5.1
1820489-2 : Rule list order changes when modifying a rule using Filer Active Rules List
Links to More Info: BT1820489
Component: Advanced Firewall Manager
Symptoms:
Firewall Policy rule ID changes when Modifying a rule using "Filer Active Rules List" and commit the changes.
Conditions:
- AFM licensed and provisioned.
- Create a rule-list with 4-5 rules in it.
- Create a Policy and add rule-list under it.
- Now Filer any of 2 Active Rules from rule List and then the Rule ID order changes, Now do any modification on filtered rules and commit the changes.
- Now remove the filter and observe the Rule ID changes for all the rules once after commit the changes.
Impact:
May lead to a change in the rule order and priority.
Workaround:
Remove the filter before committing the changes.
Fixed Versions:
17.5.1.4
1819813-2 : [APM][NTLM]TMM core on null _ntlm_msg on 17.1.x on top of ID1495381
Links to More Info: BT1819813
Component: Access Policy Manager
Symptoms:
Tmm cores while APM looks up a session.
Conditions:
SWG explicit forward proxy or PRP with NTLM or Kerberos or LDAP credentials identification method.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1819777-4 : In-tmm TCP monitor with no RCV and RCVdisable string might lead to a crash
Links to More Info: BT1819777
Component: In-tmm monitors
Symptoms:
In-tmm TCP monitor with no RCV and RCVdisable string might lead to a crash.
Conditions:
This happens when TCP in-tmm monitor is configured without any matching disable/enable string
ltm monitor tcp TCP {
adaptive disabled
defaults-from tcp
interval 5
ip-dscp 0
recv none <<<< !
recv-disable none <<<< !
send "GET /check HTTP/1.0\r\n\r\n"
time-until-up 0
timeout 16
}
Bigd monitoring is not affected.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
- Disable in-tmm monitoring.
- OR, configure in-tmm TCP monitor with any string match.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1819721-3 : LSN failed events details are ambiguous
Links to More Info: BT1819721
Component: Carrier-Grade NAT
Symptoms:
When an LSN translation failure occurs, the logs show ""NAPT - Translation failed" which does not give enough details to narrow down potential root causes.
Conditions:
A LSN translation failure occurs
Impact:
Narrowing down potential root causes of the failure may be difficult.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.4
1818461-2 : [APM][VPN][WIN] Tunnel can't be established if endpoint inspection is Skipped. Machine Hash is not maching★
Links to More Info: BT1818461
Component: Access Policy Manager
Symptoms:
Because of selecting Skip Inspection button during EPI launch, it leads to in-correct machine hash and VPN connection is failed with below errors.
err tmm1[18549]: 01230140:3: RST sent from 10.103.xx.xx:443 to 10.103.xx.xx:64086, [0x2ff9084:34740] Machine Hash is not Valid
tmm1[18549]: 01230140:3: RST sent from 10.103.xx.xx:443 to 10.103.xx.xx:64123, [0x2ff9084:4239] Access encountered an error (Operation not supported)
Conditions:
-- Endpoint inspection is enabled in access policy, add Advanced resources assignment for fallback branch and end with allow
-- Launch endpoint inspection, select Skip Inspection instead of Start Inspection
If you are upgrading, this can be encountered after upgrading to version 17.1.2 and APM client (7250 or 7251).
Impact:
TCP connection reset is encountered and VPN connection fails.
Workaround:
Instead of Skip Inspection, select Start Inspection
(Or)
Don't configure any EPI check in Access policy
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1814821-3 : DHE groups present in profile's cipherlist with TLS1.3 enabled and tmm.ssl.useffdhe set to false simultaneously
Links to More Info: BT1814821
Component: Local Traffic Manager
Symptoms:
You might observe CRIT-level logs of configuration issues in the TMM logs but there is no impact to the traffic. Example log message:
crit tmm4[17746]: 01260000:2: Profile /Common/serverssl-secure: DHE groups present in profile's cipherlist with TLS1.3 enabled and tmm.ssl.useffdhe set to false simultaneously.
Conditions:
1. The db variable tmm.ssl.useffdhe set to false
2. Virtual server configured to use DH groups
Impact:
Crit-level logs are logged to /var/log/tmm
Workaround:
Leave the tmm.ssl.useffdhe value to default which is true
Fixed Versions:
21.0.0, 17.5.1
1814477-1 : AWS Performance Drop from BIG-IP v17.1.2.1 to v17.5.0
Links to More Info: BT1814477
Component: Performance
Symptoms:
A FastL4 throughput drop occurs when updating to BIG-IP version 17.5.0.
Conditions:
-- Using AWS BIG-IP v17.5.0
Impact:
Throughput is lower compared to v17.1.2.1.
Workaround:
None
Fix:
Performance is improved in v17.5.0 compared to v17.1.2.1.
Fixed Versions:
21.0.0, 17.5.1
1813841-1 : Password Caching setting is not applied
Links to More Info: BT1813841
Component: Access Policy Manager
Symptoms:
In the Connectivity profile, "F5 Access for Mac OS" is removed and updated on "Desktop Client Settings".
The Allow password caching functionality which was used to work with "F5 Access for Mac OS" is not working after updating the UI to "Desktop Client Settings".
Conditions:
Allow Password Caching is enabled on BIG-IP UI for Mac F5 Access.
Impact:
Users will be prompted to password page even after Allow Password caching is enabled.
Workaround:
Enable the Allow password caching via TMSH:
For Memory Option to Enable on Allow Password Caching:
modify apm profile connectivity Connectivity_profile client-policy modify { Connectivity_profile_clientPolicy { macos-ec { save-password true save-password-method memory save-password-timeout 10 } } }
For Disk option to Enable on Allow Password Caching:
modify apm profile connectivity Connectivity_profile client-policy modify { Connectivity_profile_clientPolicy { macos-ec { save-password true save-password-method disk } } }
Fixed Versions:
21.0.0, 17.5.1
1813505-2 : Snmpd may seg fault on systems with large amounts of virtual memory
Links to More Info: BT1813505
Component: TMOS
Symptoms:
Snmpd cores
Conditions:
* systems with large amounts of virtual memory (e.g. 3.5 TB)
* attempt to access dot3StatsTable
Impact:
Snmp unavailable when snmpd restarts
Workaround:
Avoid using dot3StatsTable.
Fixed Versions:
17.5.1.4
1813209-1 : Password Cache Expiration field is hidden in Connectivity profile
Links to More Info: BT1813209
Component: Access Policy Manager
Symptoms:
Password Cache Expiration field is hidden in Connectivity profile under Desktop Client Settings
Conditions:
1. Access-> Connectivity/VPN -> Profiles ->add/edit
2. Desktop Client Settings -> enable "Allow Password Caching"
3. Select "memory" as the "Save Password Method"
Impact:
For Creating new Connectivity profile:
You will not be able to set Password Cache Expiration value and default value of 240 will be used
For Existing Connectivity Profile:
You will not be able to modify the Password Cache Expiration value (Existing value).
In case of upgrades the existing value will be used
Workaround:
To modify the Password Cache Expiration value run:
tmsh modify apm profile connectivity <profile_name> client-policy modify { <profile_name>_clientPolicy { ec { save-password-timeout <desired value> } } }
Fixed Versions:
21.0.0, 17.5.1
1812201-4 : A specific unicode character issue a malformed json violation
Links to More Info: BT1812201
Component: Application Security Manager
Symptoms:
When JSON arrives with a specific character, a malformed json violation is issued.
Conditions:
A specific character arrives in a JSON payload
Impact:
A blocking violation occurs.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1798961-2 : With CC/FIPS license installed, OpenSSL should raise fatal alert when client does not advertise EMS support
Links to More Info: BT1798961
Component: TMOS
Symptoms:
When FIPS license is installed, OpenSSL enforces Extended Master Secret (EMS) to its peer clients. If a legacy TLS/SSL client does not provide EMS in its ClientHello extension, OpenSSL server merely aborts the handshake without sending a Fatal Handshake Alert message to the client. As a result, the reason for handshake abort is not clear.
Conditions:
1. FIPS license is installed on the BIG-IP Device
2. HTTPD server running on the BIG-IP device is linked with libssl.{so, a}
3. An attempt is made to contact the WebUI from a legacy browser that did not have support for EMS (or alternatively, from a service that did not advertise EMS support)
Impact:
Absence of explicit log message results in some confusion as to what the error was when the handshake terminated.
Workaround:
None
Fix:
A log message indicating a Fatal Handshake Message alert will be added. Then, whenever a legacy TLS/SSL client failed to provide the Extended Master Secret in its ClientHello message to the BIG-IP device with FIPS license installed, an error will be logged as the handshake aborts. This will inform the user the reason for the handshake termination.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1798601-4 : BD restart loop after upgrade on error in CONFIG_TYPE_ACCOUNT_CHARSET_TEMPLATES★
Links to More Info: BT1798601
Component: Application Security Manager
Symptoms:
After upgrade, bd goes into a restart loop. An error is logged to /var/log/bd.log:
ECARD_POLICY|NOTICE|Feb 01 21:35:01.061|21460|table_funcs.cpp:1471|handle_table_dynamic CONFIG_TYPE_INTERNAL_PARAMETERS res:[0]
ECARD_POLICY|NOTICE|Feb 01 21:35:01.061|21460|table_funcs.cpp:1471|handle_table_dynamic CONFIG_TYPE_ENFORCER_ACCOUNTS res:[0]
ECARD_POLICY|NOTICE|Feb 01 21:35:01.063|21460|table_funcs.cpp:1471|handle_table_dynamic CONFIG_TYPE_LANGUAGE_CHARSET res:[0]
ECARD_POLICY|NOTICE|Feb 01 21:35:01.067|21460|table_funcs.cpp:1471|handle_table_dynamic CONFIG_TYPE_ACCOUNT_CHARSET_TEMPLATES res:[0]
BD_MISC|ERR |Feb 01 21:35:01.070|21460|temp_func.c:2296|CONFIG_TYPE_PROTOBUF_FILENAMES message had parsing error: could not parse protobuf message
Conditions:
There is a licensing change on a device, and there is a policy that does not have any JSON profiles that have metacharElementCheck enabled.
Impact:
BD restarts in a loop. Traffic disrupted while bd restarts.
Workaround:
Run the following SQL on an affected system(s).
UPDATE DCC.ACCOUNT_CHARSET_TEMPLATES AS target JOIN (SELECT policy_name_crc, charset FROM DCC.ACCOUNT_CHARSET_TEMPLATES WHERE charset_templ_id = 2) AS source ON (target.policy_name_crc = source.policy_name_crc AND target.charset = '') SET target.charset = source.charset;
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1796609-3 : [APM][VDI]TCL error when upgrading to 17.x: can't read "tmm_apm_feed_login": no such variable★
Links to More Info: BT1796609
Component: Access Policy Manager
Symptoms:
After upgrading from BIG-IP version 15 to version 17 you may get a RST due to the below TCL error when requesting some application URLs:
TCL error: /Common/_sys_APM_VDI_Helper <HTTP_RESPONSE_RELEASE> - can't read "tmm_apm_feed_login": no such variable while executing "if { ($tmm_apm_client_type == "rdg-http" || $tmm_apm_feed_login) && $tmm_apm_is_nego_auth } { # Getting response header fo..."
Conditions:
-- VDI profile is attached
-- iRules are attached with custom priorities
Impact:
TCL errors observed in the LTM logs leading to connection reset
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6
1789529-3 : A crash of the bd daemon
Links to More Info: BT1789529
Component: Application Security Manager
Symptoms:
A crash happens on specific xml payloads
Conditions:
Very specific circumstances related to specific policy and traffic.
Impact:
Traffic disrupted while bd restarts.
Workaround:
None
Fix:
A crash related to the XML parser was fixed.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6.1
1789501-3 : [APM][Standard Customisation]Webtop is blank after upgrading APM version 17.1.2 with Edge Browser in Compatibility mode.★
Links to More Info: BT1789501
Component: Access Policy Manager
Symptoms:
The Webtop is blank, does not display any resources.
Conditions:
The issue occurs when all of the following conditions are met.
-Using Microsoft Edge browser in compatibility mode (IE mode)
-Access Profile is using standard customisation
-BIG-IP Version 17.1.2 or later, 16.1.5 or later (version with fix of ID504374)
Impact:
Unable to use legacy applications in Microsoft Edge's IE compatibility mode
Workaround:
Use modern customization for access profile.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6.1
1789477-4 : Orphaned tmsh processes might eventually lead to an out-of-memory condition
Links to More Info: BT1789477
Component: TMOS
Symptoms:
Occasionally, tmsh processes are orphaned when a user connects to the BIG-IP system via SSH, runs commands, and then quits the session or disconnects.
An orphaned tmsh process will have a parent pid (PPID) of 1. You can check for orphaned tmsh processes using the following shell command:
/bin/ps -o pid,ppid,comm -C tmsh
PID PPID COMMAND
8255 1 tmsh
If this issue occurs often enough, it might cause the BIG-IP system to run out of memory.
Conditions:
-- Using tmsh to connect to the BIG-IP system via SSH.
-- Running commands.
-- Quitting the session or disconnecting.
Impact:
Orphaned tmsh processes are created, which might eventually lead to an out-of-memory condition, if it occurs often enough.
Workaround:
There are several workarounds for this issue:
-- Change the default shell to bash for users that are going to use the script.
-- Use iControl.
-- Kill orphaned tmsh processes.
Fix:
Tmsh processes are no longer orphaned when a user connects to the BIG-IP system via SSH, runs commands, and then quits the session or disconnects under these conditions.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8
1787981-3 : Memory leak in ips_pcb_cache
Links to More Info: BT1787981
Component: Protocol Inspection
Symptoms:
The ips_pcb_cache stat keeps increasing while the system is passing traffic.
Conditions:
- IPS licensed and provisioned.
- Port missing from service or
- Port configured for service that does not match traffic.
Impact:
Increased memory usage of ips_pcb_cache and may lead to tmm crash. Traffic disrupted while tmm restarts.
Workaround:
Add TCP port (e.g., port 443) to the respective service on the IPS profile. For example, with a virtual-server that is configured with port 443, the port should be added to HTTP service if it terminates SSL (e.g., has client-ssl profile), otherwise the SSL service.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1787621-2 : TMM may unexpectedly restart during IPsec tunnel negotiation
Links to More Info: BT1787621
Component: TMOS
Symptoms:
Tmm crashes while handling IPSec traffic
Conditions:
-- IPsec IKEv2 tunnel configured and in use
-- The IPsec attempts to establish a tunnel with the remote peer
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fix:
The TMM restart will not occur.
Fixed Versions:
21.0.0, 17.5.1.2
1787153-2 : CVE-2019-9740 python: CRLF injection via the query part of the url passed to urlopen()
Links to More Info: K000153040, BT1787153
1787149-2 : CVE-2019-18348 python: CRLF injection via the host part of the url passed to urlopen()
Links to More Info: K000153042, BT1787149
1787141-2 : CVE-2018-20852 python: Cookie domain check returns incorrect results
Links to More Info: K000151520, BT1787141
1786457-3 : Protocol Inspection auto update with latest is not working
Links to More Info: BT1786457
Component: Protocol Inspection
Symptoms:
The latest Protocol Inspection IM package is not updating automatically. var/log/pi_hitless_upgrade contains errors and reports
ERROR Error: Exception caught in script. Check logs (/var/log/pi_hitless_upgrade) for details
Conditions:
The IPS is licensed and provisioned.
Impact:
The latest Protocol Inspection IM package is not updated.
Workaround:
Download IM package and install it manually. or click on "Security ›› Protocol Security : Inspection Updates --> Download Package --> From f5.com" and deploy the package manually.
Fixed Versions:
17.5.1.3, 17.1.3
1786325-3 : Nxdomain stop blocking & nxdomain added into the allow list on rSeries
Links to More Info: BT1786325
Component: Advanced Firewall Manager
Symptoms:
Nxdomain domain eg:nxdomain.example.com is added into allow list. This causes tmctl nxdomain vector stats to not be accounted for, even when the client receives a response as nxdomain.
Conditions:
-- An nxdomain DoS vector is triggered
-- The nxdomain is later added to the allow list
Impact:
Tmctl stats for nxdomain vector is not accurate.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.2
1785385-2 : Intermittent traffic failures when tenant is running BIG-IP v17.1.2 or above and host is on version prior to F5OS-A 1.8.0 or F5OS-C 1.8.0★
Links to More Info: BT1785385
Component: Local Traffic Manager
Symptoms:
Intermittent traffic failures for a tenant running BIG-IP v17.1.2 or above.
This often manifests as ICMP monitors failing.
Conditions:
- Tenant running BIG-IP v17.1.2 or above
- Host is one of the following platforms:
-- r5000, r10000, or r12000-series appliance
-- VELOS
- Host is running a version prior to F5OS-A 1.8.0 (rSeries appliance) or F5OS-C 1.8.0 (VELOS chassis)
Impact:
Intermittent traffic disruption. This often manifests as ICMP monitors intermittently failing, but will also impact virtual server traffic and other protocols (e.g. UDP and TCP).
Workaround:
Upgrade F5OS to version 1.8.0 or higher.
Fix:
New FPGA bitstreams in F5OS-A 1.8.0 and F5OS-C 1.8.0 resolve this issue.
Fixed Versions:
17.5.1.4
1785145-5 : TMM SIGSEGV core due to NULL check is not handled properly in PEM
Links to More Info: BT1785145
Component: Policy Enforcement Manager
Symptoms:
TMM crashes while passing PEM traffic
Conditions:
A PEM profile is enabled on a virtual server.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fix:
Core will not be seen after the changes.
Fixed Versions:
17.5.1.3, 17.1.3
1783677-2 : HSB v3.11.8.0 bitstream release for VIPRION B4450N and B4460N blades
Links to More Info: BT1783677
Component: TMOS
Symptoms:
A new HSB bitfile is available for release to VIPRION B4450N and B4460N blades.
Conditions:
VIPRION B4450N and B4460N blades using the HSB FPGA bitfile.
Impact:
Enables use of HSB bitfile v3.11.8.0 on the VIPRION B4450N and B4460N blades.
Workaround:
None.
Fix:
Updated HSB FPGA bitfile to v3.11.8.0.
Fixed Versions:
17.5.1.4
1783217-1 : Rare bd crash
Links to More Info: BT1783217
Component: Application Security Manager
Symptoms:
A rare bd crash on some conditions related to json parsing
Conditions:
-- ASM provisioned, passing traffic
-- JSON parsing occurs
Impact:
ASM traffic disrupted while bd restarts.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1783081-3 : Removing conditional freeing for m_oauth instances in tmm
Links to More Info: BT1783081
Component: Access Policy Manager
Symptoms:
Increase in TMM memory with M_OAUTH instances
Conditions:
M_OAUTH instances are freed based on conditional checks.
Impact:
Memory leak in TMM.
Workaround:
None
Fix:
Remove conditional freeing.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1782365-3 : Importing a policy creates default 'password' sensitive parameter when it is not present in the exported policy in full JSON format
Links to More Info: BT1782365
Component: Application Security Manager
Symptoms:
Importing a policy creates a default 'password' sensitive parameter when it is not present in the exported policy in full JSON mode
Conditions:
-- Create a policy with API security template.
-- Delete the default "password" sensitive parameter.
-- Export the policy in full JSON format.
-- Import the policy again.
Impact:
Unexpected sensitive parameter appears in imported policy
Workaround:
None
Fix:
The policy is imported without sensitive parameters that do not appear in the full JSON policy
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1782113-3 : Parameter 'redirectwebauthn:i:0' is crashing the RDP file with 'The RDP File is corrupted' error message
Links to More Info: BT1782113
Component: Access Policy Manager
Symptoms:
Currently, with the below Custom Parameters
redirectclipboard:i:0
redirectprinters:i:0
redirectsmartcards:i:0
redirectwebauthn:i:0
The issue is when adding 'redirectwebauthn:i:0' to RDP Custom Parameters, the user gets RDP connection error when the user opens the downloaded RDP file. The ‘The RDP File is corrupted. The remote connection cannot be started’ message is displayed.
Conditions:
The parameter 'redirectwebauthn:i:0' is added to RDP Custom Parameters.
Impact:
Displays the below error message while opening the RDP file:
‘The RDP File is corrupted. The remote connection cannot be started’
Workaround:
Launch the RDP without the "redirectwebauthn:i:0" parameter.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6.1
1773161-2 : BIG-IP APM 17.1.2 VPN tunnels failed to establish at "GET /isession" stage
Links to More Info: BT1773161
Component: Access Policy Manager
Symptoms:
Windows Edgeclient (any other client) stuck at Initialisation.
You may observe a lot of below logs in f5tunnelserver.txt
2024-12-15,12:32:26:530, 19084,19088,, 48, , 970, CUTunnelServerX::isReady(), server response , result=0
2024-12-15,12:32:27:035, 19084,19088,, 48, , 970, CUTunnelServerX::isReady(), server response , result=0
2024-12-15,12:32:27:541, 19084,19088,, 48, , 970, CUTunnelServerX::isReady(), server response , result=0
2024-12-15,12:32:28:046, 19084,19088,, 48, , 970, CUTunnelServerX::isReady(), server response , result=0
Conditions:
-- BIG-IP version with fix of ID 903501
-- "sys db ipv6.enabled" is set to FALSE
-- Any client attempting to establish a VPN tunnel
Impact:
VPN fails to establish
Workaround:
1. "sys db ipv6.enabled" is set to TRUE
OR
2. Perform below two operations
a) Disable the DB variable isession.ctrl.apm:
tmsh modify sys db isession.ctrl.apm value disable
b) Perform 'Apply Access Policy' for the access policy attached to the virtual server.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1772377-3 : Libtiff CVE-2024-7006: NULL pointer dereference in tif_dirinfo.c
Links to More Info: K000152542
1772329-3 : Apply Policy failure after upgrading to v16.1.x and later, from earlier version★
Links to More Info: BT1772329
Component: Application Security Manager
Symptoms:
An error occurs when applying a policy:
crit perl[21254]: 01310027:2: ASM subsystem error (asm_start,F5::SetActive::Impl::set_active): Setting policy active failed: Failed on insert to DCC.CONTENT_PROFILE_TEMPLATES (DBD::mysql::db do failed: Column 'flg_tolerate' cannot be null)
Conditions:
You had previously imported a policy that was exported from ASM running on v16.1.x or later, to a system running a software version earlier than v16.1.x.
e.g:
You exported a policy from ASM running on v16.1.x, and import it to another ASM running on v15.1.x. Then you upgrade your v15.1.x to higher version.
Impact:
Changes on affected policies are not applied and an error occurs.
Workaround:
Delete graphql content profile with affected policies.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1771985-3 : [APM] OAuth AS max claims data support upto 8kb dynamically
Links to More Info: BT1771985
Component: Access Policy Manager
Symptoms:
The max claim data size is set to 8kb by default.
Conditions:
Oauth AS configured with multiple claims.
Impact:
The large claim size can lead to excessive memory consumption.
Workaround:
None
Fix:
Allocate the right amount of memory dynamically as required based on claims configuration
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8
1771945-2 : Memory leak when using event-wait with SSL SANs
Links to More Info: BT1771945
Component: Access Policy Manager
Symptoms:
- Memory usage continues to grow despite load.
- TMM Crash / HA Failover.
Conditions:
- Access policy with event-wait
- Rule contains [ACCESS::perflow get perflow.ssl.server_cert.subject_alt_name]
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1758961-4 : TMM may core if proxy_common_init errors out due to inappropriate NAT configuration
Links to More Info: BT1758961
Component: Local Traffic Manager
Symptoms:
TMM core is generated and tmm is restarted.
Conditions:
When proxy_common_init() fails due to incorrect configuration of a transparent HTTP proxy in non-standard HTTP and pass-through mode, it only occurs when an ACK and data are received during the connection setup.
Impact:
The core will be generated, and the TMM will be restarted accordingly. Traffic disrupted while TMM restarts.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.4
1758957-3 : If two tenants share the same VLAN, TMM may egress broadcast traffic even when VLANs are disabled in F5OS
Links to More Info: BT1758957
Component: F5OS Messaging Agent
Symptoms:
In certain scenarios, such as restoring a UCS on an F5OS tenant, if the VLANs in F5OS are disabled, the TMM may egress broadcast traffic such as gratuitous ARPs onto the disabled VLANs.
Conditions:
-- VLAN is currently assigned to any tenant.
-- An F5OS tenant where VLANs were assigned and then removed.
-- An F5OS tenant where TMM is not in forced-offline mode.
-- An action occurs on the tenant (such as restoring a UCS or restarting TMM, or loading the config) that results in gratuitous ARPs.
Impact:
This could cause IP address conflicts on the network or other issues related to unexpected broadcast traffic such as gratuitous ARPs on the network.
Workaround:
- In F5OS, remove the affected VLANs from the LAG or interface.
- In F5OS, ensure there is at least one VLAN still attached to the tenant. This could be a temporary VLAN.
- On the tenant, use forced offline to prevent traffic egress.
- If you are restoring a UCS from another BIG-IP such as for a platform migration, put the source BIG-IP into a forcedoffline state before taking the UCS.
- Delete the tenant, and recreate without any VLANs assigned.
- In F5OS, remove the VLAN from all tenants.
Fixed Versions:
17.5.1.4
1758181-2 : Optimal gateway routing issue with HTML5 client
Links to More Info: BT1758181
Component: Access Policy Manager
Symptoms:
When you configure APM VDI Citrix OGR using article https://community.f5.com/kb/technicalarticles/solution-for-citrix-optimal-gateway-routing/278727, the system fails to start ica connection to the backend desktop using HTML5 access.
Additionally, the iRule example is incorrect.
Conditions:
1. OGR is configured using https://community.f5.com/kb/technicalarticles/solution-for-citrix-optimal-gateway-routing/278727
2. Use HTML5 client access
Impact:
Could not connect to backend desktop using HTML5.
Workaround:
None
Fix:
It should connect to backend desktop using HTML5 along with native client.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1758153-5 : Configuring a Data Guard URL longer than 1024 characters triggers a restart loop
Links to More Info: K000156624, BT1758153
1756897-2 : [APM][PA]Failed to execute 'observe' on 'MutationObserver': parameter 1 is not of type 'Node'
Links to More Info: BT1756897
Component: Access Policy Manager
Symptoms:
Application fails to load with below console error in developer tools.
Uncaught TypeError: Failed to execute 'observe' on 'MutationObserver': parameter 1 is not of type 'Node'.
Conditions:
Portal Access configured.
Impact:
Unable to load application via portal access.
Workaround:
Customized cache-fm-Modern.js ifile workaround is available for this.
Fixed Versions:
17.5.1.4
1756825-4 : IPS Signatures not inspected being sometime after reboot
Links to More Info: K000150010, BT1756825
Component: Protocol Inspection
Symptoms:
After sudden or normal reboot, ipsd takes own time to bring respective ips profiles to Ready state. during this time traffic is not inspected for the signature traffic and passes through.
Conditions:
A high number of signatures across multiple or duplicated inspection profiles leads to significant delays in enforcement after a reboot.
Impact:
Traffic is not inspected for the signature after reboot before enforcing and actually passes through.
Fix:
After the fix, IPS Profiles will take less time to reach the ready state, even if the tmm or mcpd is restarted.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1756697-3 : Sec-WebSocket-Extensions header is not stripped when Compression is disabled
Links to More Info: BT1756697
Component: Local Traffic Manager
Symptoms:
When compression mode is 'Typed' and compression is 'disabled' in websocket profile, BIG-IP should strip Sec-WebSocket-Extensions header but it is not happening.
Conditions:
Compression mode is 'Typed' and compression is 'disabled' in websocket profile
Impact:
Sec-WebSocket-Extensions header is seen in server side.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.4
1756525-2 : ixlv driver could have failed hardware offload with TSO off
Links to More Info: BT1756525
Component: Local Traffic Manager
Symptoms:
IPv4 packets for TLS alerts contain empty IP checksums.
Conditions:
-- The ixlv driver is used by tmm
-- TSO is disabled
Impact:
Empty checksums will cause TLS clients to reject TLS alert messages.
Workaround:
Change driver type to use xnet in tmm_init.tcl by inputting `device driver pci vendor_dev 8086:1889 xnet` or for a specific PCI device with `device driver pci XX:XX.X xnet`
Fix:
Removed offloading IPv4 header checksum to the hardware unless TSO is on and so use what BIG-IP calculates instead.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1756397-3 : BIG-IP is not forwarding the Extended DNS Error (EDE) Codes to Clients
Links to More Info: BT1756397
Component: Global Traffic Manager (DNS)
Symptoms:
When BIG-IP processes responses from upstream name servers, it strips the Extended DNS Error (EDE) information, which provides additional details about the cause of DNS errors.
Conditions:
-- BIG-IP is configured with a listener that has a DNS profile to process DNS queries.
-- DNS requests from clients include the EDNS (Extension Mechanisms for DNS) flag.
Impact:
DNS clients will not receive additional information about the cause of DNS errors.
Workaround:
None
Fix:
With the fix, BIG-IP is now able to process and respond to clients with Extended DNS Errors (EDE) information that it receives from upstream name servers.
We have exposed the fix through a Db variable called dns.forwardextendeddnserrorcode. By default, the Extended DNS Errors(EDE) support is disabled. If you want to enable EDE support you can change the Db variable value to enable.
sys db dns.forwardextendeddnserrorcode {
value "enable"
}
To avoid truncation due to lengthy extra text that is part of the EDE, we have limited it to 64 bytes.
Fixed Versions:
21.0.0, 17.5.1
1755413-2 : Fast scp file transfer may not display progress bar
Links to More Info: BT1755413
Component: TMOS
Symptoms:
- Missing progress bar on scp file transfer.
Conditions:
- Includes fix for CVE-2019-6109.
Impact:
The progress bar indicating download progress of scp file transfer is missing in the output.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.4
1753933-4 : CVE-2020-14393 perl-dbi: Buffer overflow on an overlong DBD class name
Component: TMOS
Symptoms:
A buffer overflow was found in perl-DBI < 1.643 in DBI.xs. A local attacker who is able to supply a string longer than 300 characters could cause an out-of-bounds write, affecting the availability of the service or integrity of data.
Conditions:
Triggered when loading a DBD module with an excessively long class name.
Impact:
This vulnerability may cause a heap-based buffer overflow, potentially leading to a crash or arbitrary code execution.
Workaround:
NA
Fix:
Patched Perl-DBI to fix the vulnerability.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1753617-5 : CVE-2023-24621 Untrusted Polymorphic Deserialization to Java Classes
Component: TMOS
Symptoms:
It allows untrusted deserialisation to Java classes by default, where the data and class are controlled by the author of the YAML document being processed.
Conditions:
yamlbeans versions before 1.15 are vulnerable
Impact:
It can result in remote code execution (RCE) or denial of service.
Workaround:
N/A
Fix:
yamlbeans has been patched to address this vulnerability.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1753569-4 : CVE-2022-39353: node-xmldom vulnerability
Component: Local Traffic Manager
Symptoms:
xmldom is a pure JavaScript W3C standard-based (XML DOM Level 2 Core) `DOMParser` and `XMLSerializer` module. xmldom parses XML that is not well-formed because it contains multiple top level elements, and adds all root nodes to the `childNodes` collection of the `Document`, without reporting any error or throwing. This breaks the assumption that there is only a single root node in the tree, which led to issuance of CVE-2022-39299 as it is a potential issue for dependents. Update to @xmldom/xmldom@~0.7.7, @xmldom/xmldom@~0.8.4 (dist-tag latest) or @xmldom/xmldom@>=0.9.0-beta.4 (dist-tag next). As a workaround, please one of the following approaches depending on your use case: instead of searching for elements in the whole DOM, only search in the `documentElement`or reject a document with a document that has more then 1 `childNode`.
Conditions:
NA
Impact:
This can lead to unexpected behaviour or at least application level Denial of Service.
Workaround:
NA
Fix:
xmldom is patched with the fix.
Fixed Versions:
21.0.0, 17.5.1.4
1753533-5 : CVE-2018-16492 nodejs-extend: Prototype pollution can allow attackers to modify object properties
Component: TMOS
Symptoms:
A prototype pollution vulnerability was found in the extend module (<2.0.2, <3.0.2). This allows an attacker to inject arbitrary properties onto Object.prototype. Node.js components such as odata-v4-server and odata-v4-service-metadata may expose BIG-IP systems to prototype pollution attacks.
Conditions:
Node.js-based components where extend library (< v3.0.2) is in use.
Impact:
Potentially leading to unexpected behavior
Workaround:
NA
Fix:
NPM version is now updated to v6.4.1 to support extend version v3.0.2 where the fix is available
Fixed Versions:
21.0.0, 17.5.1.3, 16.1.6.1
1752873-2 : [APM][SAML SP] Order of SAML attribute values saml.last.attr.name is reversed★
Links to More Info: BT1752873
Component: Access Policy Manager
Symptoms:
After upgrading, the order of SAML attribute values parsed from assertion are stored in reverse order.
Conditions:
-- BIG-IP as SAML SP,
-- Upgrade to 17.1.0
Impact:
The SAML assertion values are parsed in reverse order, which can cause iRules or policies to fail if they expect the values to arrive in a certain order.
Workaround:
None
Fixed Versions:
17.5.1.4
1737465-3 : Port number being used for verifying server certificate CN field
Links to More Info: BT1737465
Component: Access Policy Manager
Symptoms:
TMM reports a SSL certificate error:
warning tmm1[18695]: 01260022:4: Peer cert verification: The common name (10.1.1.1) is invalid or does not match the authenticate name (10.1.1.1:4430). The subject alternative name also does not match the authenticate name.
Conditions:
-- The ssl server certificate is set to "require"
-- The URI includes the port number
Impact:
SSL server certificate validation fails
Workaround:
Set server certificate requirement to "ignore"
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6.1
1731025-4 : Insufficient sanitization in BIGIP GUI
Component: TMOS
Symptoms:
BIGIP GUI is not sanitizing input properly.
Conditions:
NA
Impact:
Unexpected behaviour
Fix:
BIGIP now sanitizing input properly.
Fixed Versions:
21.0.0, 17.5.1.4
1715685-2 : Protocol inspection takes up to 5 hours before starting to work after a reboot
Links to More Info: BT1715685
Component: Protocol Inspection
Symptoms:
Long hours of CPU spike of ipsd and mcpd were observed after a sudden reboot of BIG-IP Virtual Edition.
Protocol inspection stats from "tmctl protocol_inspection_stats" are not recorded for up to 5 hours after rebooting.
Conditions:
The ips profile loaded with a significant number of profiles and includes HTTP and OTHER services for all.
Impact:
Ipsd and mcp high cpu utilization after reboot. This can last for several hours. During this time, protocol inspection is not ready.
Workaround:
Reduce the duplicated IPS Profiles
Fix:
After the fix, IPS Profiles will take less time to reach the ready state, even if the tmm or mcpd is restarted.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1710233-2 : No option to disable violation for double-escaped NULL in query string
Links to More Info: BT1710233
Component: Application Security Manager
Symptoms:
Requests containing double-escaped NULL characters (e.g., %2500) trigger a violation, even when single-escaped NULL (%00) detection is desired.
Conditions:
Occurs when ASM is configured to detect NULL characters in query strings. There is currently no granular control to differentiate between a single encoded NULL and a double encoded NULL.
Impact:
May result in false positives for legitimate traffic using double-escaped characters, with no available configuration to suppress this specific violation.
Workaround:
None
Behavior Change:
ASM treated both a single URL-encoded NULL byte and a double-encoded NULL as the same violation, always flagging both as “Escaped NULL in query string” - with no way to suppress only the double-encoded case.
In this fix, an internal toggle "enforce_multiple_decoded_null" allows administrators to keep blocking the singly encoded NULL byte while allowing the twice-encoded sequence. This provides granular control on how the encoded NULL bytes are handled.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1709557-2 : Header value length greater than 1023 in alternate response file headers causing ASM restart loop
Links to More Info: BT1709557
Component: Application Security Manager
Symptoms:
Bd goes into a restart loop with the following error messages:
ECARD_POLICY|NOTICE|Oct 25 02:01:27.939|21735|table_funcs.cpp:1471|handle_table_dynamic CONFIG_TYPE_ACCOUNT_ALTERNATE_RESPONSE_FILE_HEADERS res:[0]
BD_MISC|ERR |Oct 25 02:01:27.939|21735|temp_func.c:2295|CONFIG_TYPE_PROTOBUF_FILENAMES message had parsing error: could not parse protobuf message
BD_MISC|ERR |Oct 25 02:01:27.939|21735|table_funcs.cpp:2734|CONFIG_TYPE_PROTOBUF_FILENAMES message had errors in block_index: 22. status=-1
BD_MISC|NOTICE|Oct 25 02:01:27.939|21735|table_funcs.cpp:2734|{"component":"BD","datetime":"1969-12-31T16:00:00Z","jobId":"","jobStartDatetime":"1969-12-31T16:00:00Z","jobStatus":"failed"}
BD_MISC|ERR |Oct 25 02:01:27.940|21735|temp_func.c:2288|CONFIG_TYPE_MANIFEST message had parsing error: could not parse protobuf message
Conditions:
A header in the blocking page is configured to be more than 1023 bytes.
Impact:
Endless restart loop
Workaround:
Change the blocking page header size.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1708189-3 : ICMP errors with HSL can rarely cause tmm cores
Links to More Info: BT1708189
Component: Local Traffic Manager
Symptoms:
High-speed logging configured to use a remote syslog server can cause tmm to core if the server sends back ICMP errors (like ICMP unreachable).
Conditions:
-- High Speed Logging to a remote syslog server
-- Remote server sends back ICMP errors
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1701209-2 : APM ignores the update-interval setting
Links to More Info: BT1701209
Component: Access Policy Manager
Symptoms:
Irrespective of update-interval value, APM fetches the CRL from the CRLDP for each client certificate.
Conditions:
Configure update-interval.
Impact:
Multiple request keep triggering to update the CRL cache.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3, 16.1.6.1
1697273-4 : CVE-2020-8037 tcpdump: ppp decapsulator can be convinced to allocate a large amount of memory
Links to More Info: K000149929, BT1697273
1697041-2 : TMM may fail to start, device is inoperative★
Links to More Info: BT1697041
Component: Local Traffic Manager
Symptoms:
In very rare circumstances, tmm may fail to start and log a message similar to the following:
/var/log/tmm:
notice vmxnet3(1.3)[1b:00.0]: Waiting for tmm1 to reach state 1...
/var/log/tmm1:
notice Failed to connect to TMROUTED: ERR_INPROGRESS. Try again in 10 seconds.
notice MCP connection expired early in startup; retrying
While the issue is occurring, there will be incomplete ARP entries for tmm.
# arp -an | grep 127.1.1.
? (127.1.1.2) at <incomplete> on tmm
? (127.1.1.3) at <incomplete> on tmm
? (127.1.1.4) at <incomplete> on tmm
? (127.1.1.6) at <incomplete> on tmm
? (127.1.1.7) at <incomplete> on tmm
? (127.1.1.8) at <incomplete> on tmm
Conditions:
-- BIG-IP VE or Tenant OS
-- Hypervisor under high load
This has also been reported to occur after the reboot during an upgrade.
Impact:
Tmm is unable to start
Workaround:
Restart tmm manually with
bigstart restart tmm
Alternatively, set up a static arp mapping on the linux host:
arp -s 127.1.1.2 00:01:23:45:67:01
arp -s 127.1.1.3 00:01:23:45:67:02
arp -s 127.1.1.4 00:01:23:45:67:03
arp -s 127.1.1.5 00:01:23:45:67:04
arp -s 127.1.1.6 00:01:23:45:67:05
arp -s 127.1.1.7 00:01:23:45:67:06
arp -s 127.1.1.8 00:01:23:45:67:07
If there are more than 8 tmms, the following script can be used:
for y in $(seq $(/usr/bin/getdb Provision.tmmCountActual)); do arp -s 127.1.1.$(($y+1)) 00:01:23:45:67:$(printf "%02g" $y); done
Fix:
Fixed a race condition during tmm startup.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1696641-3 : aced core running out of file descriptors
Links to More Info: BT1696641
Component: Access Policy Manager
Symptoms:
-- The aced process may exhaust available file descriptors over time when using SecurID authentication
-- Users are unable to authenticate using RSA SecurID
-- Complete APM service outage with "Too many open files" errors in /var/log/apm
-- aced process may core and restart
Conditions:
-- BIG-IP APM system configured with SecurID authentication
-- aced process runs for extended periods (typically weeks)
-- Authentication failures or connection issues between APM and SecurID server may accelerate the issue.
Impact:
-- Complete APM service outage.
-- All VPN clients unable to establish connections
-- SecurID authentication failures.
-- Service becomes unstable and stops processing authentication requests.
Workaround:
Restart the aced process: bigstart restart aced.
Perform system failover to restore service temporarily.
Fix:
The aced daemon now properly cleans up file descriptors (sockets) created during SecurID authentication requests, particularly during error scenarios such as authentication failures. This prevents file descriptor exhaustion that previously caused the aced process to crash and resulted in complete APM service outages.
Fixed Versions:
17.5.1.4
1692917-5 : CVE-2024-6232 CPython Tarfile vulnerability
Links to More Info: K000148252, BT1692917
1678809-5 : CVE-2023-26117: Angular JS vulnerability
Links to More Info: K000150967, BT1678809
1678805-5 : CVE-2023-26118 angularjs: Regular Expression Denial of Service via the <input type="url"> element
Links to More Info: K000150967, BT1678805
1678793-5 : CVE-2019-14863 angular: Cross-site Scripting (XSS) due to no proper sanitization of xlink:href attributes
Links to More Info: K000141459, BT1678793
1678789-5 : CVE-2019-10768 AngularJS: Prototype pollution in merge function could result in code injection
Links to More Info: K000141463, BT1678789
1678777-5 : CVE-2022-25869 angular.js : insecure page caching in the browser, which allows interpolation of <textarea> elements.
Links to More Info: K000141459, BT1678777
1678769-5 : CVE-2023-26116 angularjs: Regular Expression Denial of Service via angular.copy()
Links to More Info: K000141463, BT1678769
1677429-4 : BFD: TMM might not agree on session ownership.
Links to More Info: BT1677429
Component: TMOS
Symptoms:
Bidirectional forwarding detection (BFD): TMM might not agree on session ownership.
Conditions:
- Multi-bladed chassis.
- A blade is added or removed in a cluster.
Impact:
BFD session ownership moves to a new TMM.
Workaround:
None
Fixed Versions:
17.5.1.4
1673161-4 : CVE-2023-45853 zlib: integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_6
Links to More Info: K000149884, BT1673161
1673157-3 : Extended Latin characters are not blocked as expected from JSON schema patterns
Links to More Info: BT1673157
Component: Application Security Manager
Symptoms:
Extended Latin or non-ASCII characters (e.g., ß, à, á, ä, ç, ü) are not blocked as instructed by a regular expression in the JSON schema in the API Security based policy.
Conditions:
This occurs when using the API Security template that includes regex-based validation rules that target Unicode ranges above U+00C0.
Impact:
Character validation does not work as intended, allowing disallowed Unicode characters to pass through.
Workaround:
None
Fix:
Expected blocking to Latin characters in JSON schema.
Fixed Versions:
21.0.0, 17.5.1.4
1672997-3 : Apmd memory grows over time in AD/LDAP auth scenarios
Links to More Info: BT1672997
Component: Access Policy Manager
Symptoms:
Apmd memory grows over time. It is mainly due to memory fragmentation due to memory sharing among apmd threads.
Conditions:
The access policy in use has AD/LDAP auth as one of the agents
Impact:
Apmd memory grows over time. After it grows beyond a limit, oom killer might kill apmd thereby leading to traffic disruption.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6, 15.1.10.8
1672313-5 : CVE-2016-9841 zlib: Out-of-bounds pointer arithmetic in inffast.c
Links to More Info: K000149915, BT1672313
1672249-5 : CVE-2016-9840 zlib: Out-of-bounds pointer arithmetic in inftrees.c
Links to More Info: K000149905, BT1672249
1670465-4 : TMMs might not agree on session ownership when multiple cluster geometry changes occur.
Links to More Info: BT1670465
Component: TMOS
Symptoms:
TMMs might not agree on session ownership when multiple cluster geometry changes occur in a quick succession.
Conditions:
Cluster geometry changes occur in a quick succession, for example two blades come up one after another during a software upgrade.
Impact:
Session might be dropped few minutes/seconds after cluster geometry change happens
Workaround:
None
Fixed Versions:
17.5.1.4
1670225-4 : 'Last Error' field remains empty after initial monitor Down status post-reboot
Links to More Info: BT1670225
Component: Local Traffic Manager
Symptoms:
After rebooting the BIG-IP system, the 'Last Error' field in the /var/log/ltm log for a TCP monitor shows as empty (null) following the first occurrence of the monitor's down status.
mcpd[6893]: 01070638:5: Pool /Common/http_pool member /Common/192.168.10.71:80 monitor status down. [ /Common/my_tcp_monitor: down; last error: ] [ was up for 0hr:0min:41sec ]
And If pool member goes back to 'up' and then 'down' again, 'last error:' string is not empty, but the 'last error" string is not the most recent failure reason following.
mcpd[8820]: 01070638:5: Pool /Common/http_pool member /Common/10.2.116.207:80 monitor status down. [ /Common/myhttpmon: down; last error: /Common/myhttpmon: Response Code: 200 (OK) @2024/12/09 00:14:23. ] [ was up for 0hr:0min:32sec ]
Conditions:
The issue occurs when the monitor status of system is up and rebooted and during the first occurrence of a monitor's down status following the reboot, and pool member goes back to 'up' and then 'down' again.
Impact:
Users may not be able to determine the cause of monitor failures immediately after a system reboot, and pool member goes back to 'up' and then 'down' again. as the 'Last Error' field does not provide the necessary diagnostic information
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.4
1636077-2 : Adding an operationally DOWN interface to existing LAG causes traffic disruption on r2k/r4k
Links to More Info: BT1636077
Component: Local Traffic Manager
Symptoms:
When an operationally DOWN interface is added to an existing LAG interface, traffic flow to the tenant stops on r2k/r4k based appliances.
Conditions:
-- Interface is marked down
-- Interface is added to an existing LAG interface
Impact:
Traffic flow gets impacted and the system misses the packets routed onto the LACP trunk to where the LAG member was added.
Workaround:
Restart tmm on all tenants that are associated with the trunk.
Fixed Versions:
21.0.0, 17.5.1
1635209-3 : Firewall NAT policy with SNAT automap does not work with ALG protocols in active mode
Links to More Info: BT1635209
Component: Advanced Firewall Manager
Symptoms:
Connection is dropping when firewall NAT policy uses SNAT automap and ALG.
Conditions:
-- Firewall NAT translation using source automap.
-- ALG protocol profile applied.
Impact:
-- Connection is dropped
Workaround:
None
Fix:
Done
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1635189-3 : TMM crashes when firewall NAT policy uses automap with Active FTP connection
Links to More Info: BT1635189
Component: Advanced Firewall Manager
Symptoms:
Tmm crashes when running an Active FTP connection through a virtual server that uses a firewall NAT policy with source automap.
Conditions:
-- Firewall NAT translation using source automap.
-- FTP profile applied on the virtual server (Active FTP connection).
-- Connection traverses a FW NAT policy referencing automap
Impact:
TMM crash/core.
Traffic disrupted while TMM restarts.
Workaround:
None
Fix:
TMM no longer restarts due to software failure.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1629701-2 : Attack signature is not shown in local event log for staged entity when not in learn/staging
Links to More Info: BT1629701
Component: Application Security Manager
Symptoms:
Attack signature is not shown in local event log for staged entity when the attack signatures are not in learning/staging.
Conditions:
- Security policy with staged URL, parameter or cookie;
- Attack signatures are not in learning or staging;
- Attack is detected by signature in request.
Impact:
Detected attack signature is not shown in local event log.
Workaround:
Possible workarounds:
- enable learning for attack signatures;
- examine detected signatures via remote log (if enabled).
Fix:
Detected attack signatures are now shown also for staged entities.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1628129-2 : SSL Orchestrator traffic summary log does not display url-category for HTTP request if a SWG as a service blocks the connection
Links to More Info: BT1628129
Component: SSL Orchestrator
Symptoms:
The traffic summary for an SSL Orchestrator explicit proxy topology in the apm logs when log levels are set to Information does not display the url-category for the connection. Instead just `url-category: NA` is displayed.
Conditions:
An explicit proxy topology is deployed that uses a Secure Web Gateway (SWG) as a service to process traffic and the SWG rejects an http connection coming through the proxy.
Impact:
The traffic summary log message is incomplete not displaying the url-category.
Workaround:
There is no workaround for the traffic summary log message. Instead the category would need to be logged in a different way such as
1. Use a logging macro in the Secure Web Gateway's Per-Request-Policy
Fixed Versions:
17.5.1.4, 17.1.3
1628001-4 : TMM core when ACL operation is performed on a deleted session
Links to More Info: BT1628001
Component: Access Policy Manager
Symptoms:
TMM core
Conditions:
A session was deleted while performing an ACL iRule action.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
The TMM crash caused when performing iRule command
"[ACCESS::acl matched]" for a deleted session, this can be mitigated by adding a check for session existence like below
==================
set sessionid [ACCESS::session data get {session.user.sessionid}]
if {[ACCESS::session exists -sid $sessionid]} {
if {[ACCESS::acl matched] eq <ACL NAME>}
{
///Logic
}
} else {
log local0. "Session does not exist"
}
=============
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1626337-4 : RPMS not being included in the generated UCS with fix of ID985329 incorporated★
Links to More Info: K81310610, BT1626337
Component: Device Management
Symptoms:
While saving the UCS file after installing iAppLX RPMs, iAppLX RPMs are not included in the UCS file. The issue is observed in BIG-IP running software release that includes fix of ID985329.
Some possible symptoms:
-- AS3 replies with a "404 not found" error after upgrading
-- iAppLX applications that have a GUI, such as SSL Orchestrator, display a "Not Found" or "Access forbidden" error after upggrading
Conditions:
- Saving UCS using either CLI (Command Line Interface) or GUI
- BIG-IP running software release that includes fix of ID985329 (starting with verison 16.1.5, 17.1.2, 17.5.0)
Impact:
iAppLX RPMs and iAppLX declarations will be missing if UCS restore is performed. This can cause issues such as "NotFound" or "Access Forbidden" when trying to access the iAppLX.
This can be encountered following an upgrade from verison 16.1.5, 17.1.2, 17.5.0 to a later version.
Workaround:
Mitigation depends on the iAppLX package you are using because uninstall/reinstall approach is sometimes different.
SSL Orchestrator
Follow the recovery steps in K81310610: SSL Orchestrator Configuration: Access forbidden or Not Found or show wizard of new topology
https://my.f5.com/manage/s/article/K81310610
Access Guided Configuration
Follow the recovery steps in K55177400: Guided configuration displays: Not found - The requested URL was not found on this server
https://my.f5.com/manage/s/article/K55177400.
AS3 or any other manually-installed iAppLX
Follow the recovery steps in K000132348: AS3 declaration failure: mgmt shared service-discovery task update response=404 body
https://my.f5.com/manage/s/article/K000132348
Impact of workaround: uninstalling and reinstalling an iAppLX RPM should not impact the configuration data that the iAppLX was managing; for example uninstalling and reinstalling AS3 will not cause the previously-loaded AS3 declaration to be lost.
Fix:
If you upgrade from affected version to unaffected, you will still have to complete the workaround as described in K81310610 article.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1624701-4 : Security improvement in BIGIP GUI
Component: TMOS
Symptoms:
BIGIP GUI was not following best security practices.
Conditions:
NA
Impact:
Unexpected behaviour
Fix:
Security best practices are now being followed.
Fixed Versions:
17.5.1.4
1623941-4 : [AD] BIG-IP APM AD Auth agent sometimes prompts for new password (every login) after upgrade★
Links to More Info: BT1623941
Component: Access Policy Manager
Symptoms:
AD Auth agent always prompts for a new password after upgrading from v15.x to v17.1.x The user password is *NOT* expired in Active Directory. The user account does not have the "User must change password at next logon" option checked.
This can be seen any in any version upgrades.
Conditions:
Active Directory auth is configured
Impact:
After the upgrade to v17.1.x, v16.1.x, v15.1.x change password prompt appears every time you log in.
Workaround:
None
Fix:
Added the Client constructer as a part of the Client Initialisation
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6
1623921-3 : IPencap monitor probes from bigd are prone to connection re-use.
Links to More Info: BT1623921
Component: Local Traffic Manager
Symptoms:
When using a DNS monitor with IP encapsulation, TMM handles probe encapsulation. Bigd reuses source ports after closing sockets quickly, but TMM applies a 30-second timeout, leading to connection re-use. This can result in probes being incorrectly encapsulated to the wrong pool member, causing inaccurate health monitoring
Conditions:
1. DNS monitor configured with 'transparent' destination and IP encapsulation enabled.
2. Large number of pool members (e.g., 60).
Impact:
Probes may be encapsulated to the wrong destination, leading to inaccurate health monitoring of pool members.
Workaround:
None
Fixed Versions:
17.5.1.4
1623597-3 : Nat46/64 hardware connection re-offload is not optimal.
Links to More Info: BT1623597
Component: TMOS
Symptoms:
Nat46/64 hardware connection re-offload is not optimal.
Conditions:
Nat46/64 configuration with hardware offload (fastl4).
Impact:
Not optimal resource usage.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1
1623197-5 : CVE-2024-37891 urllib3: proxy-authorization request header is not stripped during cross-origin redirects
Links to More Info: K000140711, BT1623197
1622789-3 : Traffic levels for NAT64/46 traffic might be different after an upgrade
Links to More Info: BT1622789
Component: TMOS
Symptoms:
Starting from version 16.X BIG-IP supports hardware acceleration of NAT64/46 traffic. Due to a software defect part of accelerated traffic might not be reported properly in connection statistics.
Conditions:
Nat64/46 virtual server with fastL4 PVA acceleration enabled.
Impact:
Part of accelerated traffic might not be reported properly in connection statistics.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1, 17.1.2
1622425-2 : Float the management ip to the next available ip when the connectivity of primary blade is lost
Links to More Info: BT1622425
Component: Local Traffic Manager
Symptoms:
When the connectivity of the primary blade is lost with the management interface, then the UI is also lost.
Conditions:
The primary blade lost connectivity on the management interface.
Impact:
Lost chassis monitoring/alerting and access to the Management GUI.
Workaround:
Manual switchover of the slot will solve the issue.
Fix:
Float the management ip to the next available ip when the primary blade loses connectivity on the management interface without disturbing the data plane.
Fixed Versions:
21.0.0
1621269-1 : TMM restart loop when attaching large number of interfaces.
Links to More Info: BT1621269
Component: TMOS
Symptoms:
TMM is unable to finish initialization when attaching 9 or more Intel 710/E810 SR-IOV interfaces.
Conditions:
-- Using 9 or more Intel 710/E810 SR-IOV VFs
Impact:
BIG-IP is unable to go into the Active state because TMM restart loop is present.
Workaround:
Update Mcpd.KeepAliveCount DB variable to 127 and reboot the BIG-IP.
Fix:
DB variable Mcpd.KeepAliveCount was introduced to keep network connections between TMOS proccesses alive longer. Therefore, TMM would have enough time to finish initializing when attaching 9 or more Intel 710/E810 SR-IOV interfaces.
Fixed Versions:
21.0.0, 17.5.1
1621185-2 : A BD crash on a specific scenario, even after ID1553989
Links to More Info: BT1621185
Component: Application Security Manager
Symptoms:
A BD crash, failover.
Conditions:
Specific requests under specific conditions.
Impact:
Traffic disrupted while bd restarts.
Workaround:
None
Fix:
Fixed a bd crash while passing traffic.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1620785-4 : F5 cache mechanism relies only on Last-Modified/If-Modified-Since headers and ignores the etag/If-None-Match headers
Links to More Info: BT1620785
Component: Local Traffic Manager
Symptoms:
-- Server has a document x with etag - AAAA
-- When the client requests for x through BIG-IP, BIG-IP caches it and responds with 200 OK.
-- Document on Server changes; new etag is BBBB and cache in BIG-IP is expired
-- Clients sending requests with If None-Match: BBBB, should receive 304 with BBBB response but receiving 200 OK with AAAA.
Conditions:
-- Client having access to the server directly and through BIG-IP with cache enabled.
(Or)
-- Deployment containing two BIG-IPs with caching enabled one at a time.
Impact:
BIG-IP serves old documents when requested with etag of the latest document
Workaround:
When HTTP_REQUEST_RELEASE {
if { [HTTP::header exists If-None-Match] && [HTTP::header exists ETag] }{
HTTP::header remove If-None-Match
}
}
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8
1617037-4 : [PA]"navigator.userAgent" detects Chrome browser as Safari
Links to More Info: BT1617037
Component: Access Policy Manager
Symptoms:
You may observe an error like below in Developer tools console
Uncaught TypeError: TypeError: Cannot read properties of undefined (reading 'document')
Conditions:
Accessing applications through Portal Access
Impact:
Unable to access applications via Portal Access.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.2
1612885-3 : [PORTAL] Handle error in get_frameElement()
Links to More Info: BT1612885
Component: Access Policy Manager
Symptoms:
You may see get_frameElement() related errors in Devtools Console:
cache-fm-Modern.js:1494 Uncaught TypeError: Cannot read properties of undefined (reading 'document')
Conditions:
Portal Access configured on APM
Impact:
Failure in loading application through Portal Access.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1, 17.1.2, 16.1.6.1
1612345-4 : Improved Handling of BFD Session Traffic
Component: TMOS
Symptoms:
BFD sessions may experience timeouts under heavy traffic conditions.
Conditions:
This issue can occur when the system experiences heavy traffic loads, affecting the handling of BFD traffic over the datapath.
Impact:
BFD session stability may be affected, potentially causing interruptions in liveness detection.
Workaround:
Configure the system to distribute BFD traffic evenly across all TMMs to reduce congestion.
Fix:
The fix introduces improved handling and distribution of BFD traffic using round-robin DAG, which enhances stability in supported environments. These changes are applicable only to platforms that support this round-robin DAG feature.
- round robin DAG config on a vlan level and dag.roundrobin.udp.portlist targeting BFD port is required for this change to work properly.
- "tm.bfddagroundrobin" defaults to 'disabled' and requires a system restart when changed. This variable has to be enabled for this change to work properly.
- "tm.bfdprioritytimer" defaults to '900' (msec). This db variable should be set to be 100-200ms less then the lowest BFD RX timer configured on a system.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1607277-4 : Permission Denied error when trying to download the Windows Client Package from Connectivity Profile on Standby
Links to More Info: BT1607277
Component: Access Policy Manager
Symptoms:
An exception occurs when trying to download the Windows Edgeclient package
clientdownload.DownloadHandler:error -
java.io.FileNotFoundException: /var/tmp/BIGIPEdgeClient.exe (Permission denied)
Conditions:
-- On standby device
-- Windows Edgeclient package download
Impact:
Unable to download the Windows EdgeClient Package.
Workaround:
None
Fixed Versions:
17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8
1602641-5 : Configuring verified-accept and SSL mirroring on the same virtual results in stalled connections.
Links to More Info: BT1602641
Component: Local Traffic Manager
Symptoms:
If a virtual server has SSL mirroring and with verified-accept enabled, the set handshake timeout value will be delayed during the SSL handshake client connections. The standby unit will not copy the connection to the virtual server.
Conditions:
- Verified accept enabled
- SSL mirroring enables
- An HA pair
Impact:
- SSL connections delayed inside the SSL handshake
- SSL connections are not mirrored to the peer unit.
Workaround:
Disable mirroring or disable verified-accept.
Fix:
Verified accept and SSL mirroring now work together.
Fixed Versions:
21.0.0, 17.5.1.4
1600561-5 : CVE-2024-2961 glibc Vulnerability
Links to More Info: K000140901, BT1600561
1596097-5 : CVE-2023-37369 qtbase: buffer overflow in QXmlStreamReader
Links to More Info: K000148809, BT1596097
1596073-5 : CVE-2023-38197 qtbase: infinite loops in QXmlStreamReader
Links to More Info: K000148809, BT1596073
1592209-3 : Monitored objects stays "Offline (Enabled)" even after manually enabling the server object after reboot
Links to More Info: BT1592209
Component: Global Traffic Manager (DNS)
Symptoms:
A Generic host server object reports “Offline (Enabled)”.
When enabling the server object, the bellow message is logged to /var/log/gtm:
gtmd[xxxx]: 011a5004:1: SNMP_TRAP: Server /Common/[generic-server] (ip=192.1.1.51) state change blue --> red (No enabled virtual server available)
Conditions:
-- Any operations that cause GTMd to rebuild its probe list. Following are a few example operations:
- Monitored objects being disabled,
- GTMd restart,
- Loss of iQuery to other GTMs,
- Adding or removing probes.
-- BIG-IP is running on a software versions 17.1.1 or 16.1.5 or later versions in which the ID 1133201 is fixed.
Impact:
Virtual servers that are associated with the affected generic server object may stay unavailable. Hence, pool or wideIP, which uses the affected server object, may be unavailable too.
Workaround:
After the issue, restart the GTMd. Generic host server object will be get back to 'Available (Enabled)' status.
Following is an example command to restart the GTMd:
# tmsh restart /sys service gtmd
Global server load balancing is disrupted while gtmd is restarted.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1591813-12 : [APM][SAML] SP automation fails with error message 'cannot update (cert_type)'
Links to More Info: BT1591813
Component: Access Policy Manager
Symptoms:
Whenever a certificate is updated while fetching the metadata from the metadata URL in SAML automation for creating SP connector, an error occurs:
err mcpd[8894]: 01070712:3: Caught configuration exception (0), file:(/Common/sp_cert.crt) cannot update (cert_type).
Conditions:
- Configure BIG-IP as IDP with SP automation objects (metadata URL as internal virtual server URL)
- Configure a internal virtual server and attach an iRule to get the iFile based on the URI.
(https://1.1.1.1/PS0028JP)
-. Update the iFiles that returns metadata and wait till the SP-automation to update its sp-connector objects
PS0028JP -> ifile that returns metadata of SP with different cert ( self signed to CA and viceversa)
Impact:
Connector automation fails to create SP Connectors with new certificates.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6.1
1591481-4 : CVE-2017-1000381: C-ares Vulnerability iRulesLX
Links to More Info: K000149130, BT1591481
1591249-5 : CVE-2018-6913 perl: heap buffer overflow in pp_pack.c
Links to More Info: K000141301, BT1591249
1591197-4 : Specific JSON enforcement is not working
Links to More Info: BT1591197
Component: Application Security Manager
Symptoms:
An issue was detected with the JSON schema pattern attribute
Conditions:
When something is defined as a pattern in the JSON schema, it's enforcement can be bypassed on a specific scenario
Impact:
A missed JSON schema violation
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.4
1590625-5 : CVE-2023-1667 libssh: NULL pointer dereference vulnerability
Links to More Info: K000148495, BT1590625
1590509-5 : CVE-2023-32573 qt: Uninitialized variable usage in m_unitsPerEm
Links to More Info: K000148690, BT1590509
1589661-5 : CVE-2019-3860 libssh2: Out-of-bounds reads with specially crafted SFTP packets
Links to More Info: K000149288, BT1589661
1589645-5 : CVE-2019-3859 libssh2: Unchecked use of _libssh2_packet_require and _libssh2_packet_requirev resulting in out-of-bounds read
Links to More Info: K000149288, BT1589645
1589269-3 : The maximum value of sys db provision.extramb was reduced from 8192 to 4096 MB★
Links to More Info: BT1589269
Component: SSL Orchestrator
Symptoms:
From version 16.1.0 the maximum value of sys db provision.extramb is 4096 MB, reduced from 8192 MB. It will be automatically set to 4096 during the upgrade if it has a higher setting.
Conditions:
Any BIG-IP device running software version 16.1.0 or higher.
Impact:
It is extremely rare to need values of provision.extramb above 4096 MB.
No impact on upgrade if value of sys db provision.extramb is 4096 or less. After the upgrade, it is not possible to increase the value above 4096.
If greater than 4096 the value will be reduced to 4096 when upgrading to version 16.1.0 or higher. This may leave device with insufficient 4KB page memory (also known as host memory) which may lead to issues due to memory pressure such as oom killer killing processes, poor scheduling of processes which may cause core dumps, and sluggish management access.
Workaround:
None
Behavior Change:
The maximum value of sys db provision.extramb was reduced from 8192 to 4096 MB from version 16.1.0
Fixed Versions:
17.5.1.4
1587453-2 : “default-all” profile is selected by default in “Dynamic LAN address spaces”
Links to More Info: BT1587453
Component: Access Policy Manager
Symptoms:
“default-all” profile is selected by default in “Dynamic LAN address spaces” when a new Network Access Connection is created
Conditions:
Create a new Network access resource
Impact:
Split tunnel will be ignored and the connection will be full tunnel due “default-all” profile being selected by default in “Dynamic LAN address spaces”
Workaround:
Remove "default-all" from “Dynamic LAN address spaces”
Fix:
"default-all" is no longer selected by default in “Dynamic LAN address spaces”
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1587421-2 : GUI issue when creating a new Network Access connection
Links to More Info: BT1587421
Component: Access Policy Manager
Symptoms:
In Basic view, selecting Split Tunnel does not show the LAN Address Space field.
The configuration is saved with default-all and creates a full tunnel.
Moving default-all to Available triggers an error:
LAN Address Space cannot be empty
Conditions:
Creating a new Network Access connection in Basic view with Split Tunnel enabled.
Impact:
Cannot configure Split Tunnel in Basic view.
Leads to full tunnel unless configured via the Advanced view.
Workaround:
Use Advanced view and set IPv4 LAN Address Space manually
Fix:
'IPv4 LAN address space' option is now available in 'Basic' view when split tunnel checkbox is selected
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1586537-3 : CVE-2024-0985 postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL
Links to More Info: K000140188, BT1586537
1585981-2 : High instances of OAuth in TMM memory leak
Links to More Info: BT1585981
Component: Access Policy Manager
Symptoms:
TMM memory increases over the time with OAuth PRP configuration.
Conditions:
BIG-IP is configured for each OAuth request using PRP.
Impact:
Leakage in TMM memory.
Workaround:
None
Fix:
Remove any conditional freeing on refresh and access tokens.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1585277-4 : Libexpat through 2.6.1 allows an XML Entity Expansion attack: CVE-2024-28757
Links to More Info: K000139637, BT1585277
1583745-3 : "Out of bounds" TCL error in VDI iRule
Links to More Info: BT1583745
Component: Access Policy Manager
Symptoms:
You may observe below error logs in /var/log/ltm
“Out of bounds” TCL error
Conditions:
Citrix VDI with an Integration mode.
Impact:
Unable to process VDI traffic.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3, 16.1.6.1
1583261-3 : Saml traffic can rarely cause tmm cores
Links to More Info: BT1583261
Component: Access Policy Manager
Symptoms:
Tmm seg faults in saml_sp_crypto_ctx_init.
Conditions:
This was seen when there was a permissions error loading the service provider key.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8
1582781-6 : CVE-2021-23177 libarchive: extracting a symlink with ACLs modifies ACLs of target
Links to More Info: K000140961, BT1582781
1580369-4 : MCPD thrown exception when syncing from active device to standby device.
Links to More Info: BT1580369
Component: TMOS
Symptoms:
Config sync fails on the secondary blade and MCPD restarts.
In /var/log/ltm:
err mcpd[7906]: 0107134b:3: (rsync: link_stat "/config/filestore/.snapshots_d/custom_urldb_d/:Common:custom_feedlist_348871_3751" (in csync) failed: No such file or directory (2) ) errno(0) errstr().
err mcpd[7906]: 0107134b:3: (rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1518) [Receiver=3.0.9] ) errno(0) errstr().
err mcpd[7906]: 0107134b:3: (syncer /usr/bin/rsync failed! (5888) () Couldn't rsync files for mcpd. ) errno(0) errstr().
err mcpd[7906]: 0107134b:3: (rsync process failed.) errno(255) errstr().
err mcpd[7906]: 01070712:3: Caught configuration exception (0), Failed to sync files..
Conditions:
- A BIG-IP system with multiple blades and multiple slots configured for high availability
- Active device has to download the custom_urldb file from a server
- A config sync occurs
Impact:
Config sync to the secondary blade fails and MCPD throws an exception and restarts on the secondary. The cluster primary blade has the correct custom_urldb file. This will impact incremental syncing to other peers in the device group.
Workaround:
None
Fixed Versions:
17.5.1.4
1580357-2 : CVE-2016-2037 CVE-2015-1197 cpio: out of bounds write
Component: TMOS
Symptoms:
The cpio_safer_name_suffix function in util.c in cpio 2.11 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted cpio file.
Conditions:
Extraction of a crafted archive using the cpio utility.
Impact:
The Vulnerability may lead to out-of-bounds write, potentially causing a crash or arbitrary code execution.
Workaround:
NA
Fix:
Patched cpio to fix the vulnerability.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1579533-3 : Jitterentropy read is restricted to FIPS mode or TMM usage only, for performance reasons★
Links to More Info: BT1579533
Component: Local Traffic Manager
Symptoms:
If jitterentropy-read from CPU jitter is used in all cases, a big performance problem is seen for most cases where BIG-IP works in non-FIPS mode. This can be encountered after upgrading to version 17.x from an earlier BIG-IP version.
Conditions:
The issues occur when BIG-IP operates in non-FIPS or FIPS mode and use jitterentropy to generate seed.
Impact:
Very high CPU utilization is seen when BIG-IP handles traffic while in non-FIPS mode.
Workaround:
None
Fix:
Jitterentropy-read of CPU jitter is now invoked in any one of these situations,
- Either BIG-IP operates in FIPS mode,
- TMM is processing traffic in non-FIPS and FIPS modes. In this case, none of the other components perform the stated jitter read operations and improves performance.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1577161 : BIG-IP tries to resume SSL sessions when session ID only matches partially
Links to More Info: BT1577161
Component: Local Traffic Manager
Symptoms:
After receiving the SSL session ID which partially matches a session ID in the cache VIP with the client SSL profile attempts to resume the session. For example - there is an existing Session ID:
session_id[32]=
28 67 9b 30 dc 8a 6e f4 d1 ef 80 f9 04 93 d6 3d
fb 2e ea b5 ac c2 be f1 6b e7 42 ef 54 a3 a6 cd
When a client sends Client Hello with
resume [32]=
12 11 11 12 12 12 12 12 11 11 80 f9 04 93 d6 3d
fb 2e ea b5 ac c2 be f1 6b e7 42 ef 54 a3 a6 cd
BIG-IP resumes the session.
Conditions:
- Create VIP with client SSL profile.
- Create a new TLS session (for example with 'openssl s_client')
- Try to reuse the existing session with some of the bytes of the session ID altered.
Impact:
The BIG-IP sends a ServerHello with a different Session ID from the one in the ClientHello and then attempts to resume a TLS session.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.4, 16.1.6.1, 15.1.10.8
1576897-4 : CVECVE-2016-9063 firefox: Possible integer overflow to fix inside XML_Parse in Expat
Links to More Info: K000139691, BT1576897
1576125-4 : Node.js vulnerability CVE-2024-27983
Links to More Info: K000139532, BT1576125
1574521-2 : Intermittent high packet latency on R4000 and R2000 tenants
Links to More Info: BT1574521
Component: Performance
Symptoms:
When compared to previous platforms, BIG-IP tenants on R4000 and R2000 platforms may demonstrate higher jitter and packet latency / rtt. This affects pings, tcp, udp, and any other protocols processed by the software data plane (tmm).
This is because the r4000 and r2000 appliances have a slightly different hardware architecture than other appliances.
CPUs on this platform are not dedicated to the tenant and these platforms also run a different class of Intel processing, and do not utilize hyperthreading like the higher end platforms do.
See:
https://clouddocs.f5.com/training/community/rseries-training/html/rseries_performance_and_sizing.html#r4000-vcpu-sizing
Conditions:
BIG-IP tenants on R4000 and R2000 platforms
Impact:
Intermittent high latency and jitter.
Workaround:
None
Fixed Versions:
17.5.1.4
1572145-5 : CVE-2023-29469 libxml2: Hashing of empty dict strings isn't deterministic
Links to More Info: K000139592, BT1572145
1572053-6 : Multiple vulnerabilities patched in SQLite on BIG-IP
Links to More Info: K000141088, BT1572053
1567761-3 : [APM] AccessProfile name is missing in log User '<username>' belongs to domain '<domain_name>'
Links to More Info: BT1567761
Component: Access Policy Manager
Symptoms:
When a user logs in using the VPN using an alternate alias for the domain name, a log message is logged to the apm debug logs. But it does not include the access profile name in the log:
debug apmd[13866]: 0149017b:7: ::c9b6820d: AD module: User 'testuser@mysite.com' belongs to domain 'mysite.net'
Conditions:
User logged in using AD Auth with alternate alias for domain name.
Impact:
The debug log message is ambiguous.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6.1
1566997-5 : CVE-2016-10349 libarchive: Heap-based buffer over-read in the archive_le32dec function
Links to More Info: K000148259, BT1566997
1566533-7 : CVE-2017-18342 PyYAML: yaml.load() API could execute arbitrary code
Links to More Info: K000139901, BT1566533
1555525-4 : WCCP traffic may have its source port changed
Links to More Info: BT1555525
Component: Local Traffic Manager
Symptoms:
WCCP traffic may have its source port changed as it leaves the Linux host. This could cause WCCP sessions to not be established.
Conditions:
-- WCCP configured
-- BIG-IP Virtual Edition platform or r2000 or r4000 tenants.
Impact:
WCCP messages may not be successfully processed by the peer because the source port is not 2048.
Workaround:
Cat >> /config/tmm_init.tcl << EOF
proxy BIGSELF {
listen 0.0.0.0%\${rtdom_any} 2048 netmask 0.0.0.0 {
proto \$ipproto(udp)
srcport strict
idle_timeout 30
transparent
no_translate
no_arp
l2forward
tap enable all
protect
}
profile _bigself
}
EOF
bigstart restart tmm
Fixed Versions:
21.0.0, 17.5.1, 17.1.2, 16.1.6
1554961-2 : APM - Websso leeway time of 60 seconds
Links to More Info: BT1554961
Component: Access Policy Manager
Symptoms:
When JWT is cached, then the error "JWT Expired and cannot be used" is observed.
Conditions:
WebSSO is used with bearer option to generate JWT tokens.
Impact:
JWT fails in upper layer
Workaround:
None
Fix:
Increasing leeway time to 60 sec to accommodate jwt token to be used continuously.
Fixed Versions:
17.5.1.4
1553169-4 : Parsing tcp payload using iRules can be inaccurate because of binary to string conversion
Links to More Info: BT1553169
Component: Local Traffic Manager
Symptoms:
When an iRule is used to parse tcp payload, the value returned as string can be inaccurate.
Conditions:
TCP payload is parsed using iRule.
Impact:
The iRule functionality may not work as expected, as the parsed data can be inaccurate.
Workaround:
None
Fix:
None
Fixed Versions:
21.0.0, 17.5.1.2
1552705-6 : New subsession reads access_token from per-session policy instead of per-request policy.
Links to More Info: BT1552705
Component: Access Policy Manager
Symptoms:
When BIG-IP is configured with OAuth Agents both in per-session policy and per-request policy, OAuth Flow fails to execute successfully.
Conditions:
When new subsessions are created TMM fails to read the access token from subsession variables. Therefore, gets the old token from the main session, i.e. per-session policy.
Impact:
BIG-IP Administrator will not be able to configure BIG-IP as OAuth Client & RS with both per-session policy and per-request policy.
Workaround:
Use OAuth Agents only in the per-request policy, configure per-session policy with just empty allow.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6
1550869-4 : Tmm leak on request-logging or response logging on FTP virtual server
Links to More Info: BT1550869
Component: Local Traffic Manager
Symptoms:
Tmm memory leak is observed.
Conditions:
Either of these conditions:
-- An LTM profile with request-logging enabled
-- response-logging enabled on a virtual server supporting FTP
Impact:
A tmm memory leak occurs.
Workaround:
Disable request/response logging on the FTP virtual server.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1550785-4 : HSB lock up in Syn-Ack generator module
Links to More Info: K000151658
1539997-2 : Secure HA connections cannot be established due to zombie HA flow
Links to More Info: BT1539997
Component: Local Traffic Manager
Symptoms:
Secure HA connections cannot be established due to zombie HA flow.
A timing issue could end up in a zombie flow, leading to subsequent legitimate connections becoming zombie flows instead of being established.
Conditions:
SSL connections and HA configuration
Impact:
No reproduction and only seen while testing in performance test lab
Workaround:
NONE
Fix:
NA
Fixed Versions:
17.5.1.4
1519001-4 : After a crash, tmm may experience memory corruption
Links to More Info: BT1519001
Component: Local Traffic Manager
Symptoms:
On an F5OS tenant on affected platforms, if tmm does not stop gracefully - meaning it crashed or was killed, it may experience memory corruption when it starts again, leading to another crash.
Conditions:
-- F5OS tenant on a VELOS system or an r5000, r10000, or r12000-series appliance.
-- Tmm does not shut down gracefully
r4000 and r2000 series appliances are not affected.
Impact:
Tmm may crash again when it starts up. Traffic disrupted while tmm restarts.
Workaround:
Reboot the tenant, or if tmm is able to start, shut down tmm gracefully and restart.
Fix:
The data mover no longer corrupts memory when tmm is starting after a crash.
Fixed Versions:
21.0.0, 17.5.1.2
1517561-5 : CVE-2023-28484 libxml2: NULL dereference in xmlSchemaFixupComplexType
Links to More Info: K000139641, BT1517561
1510477-4 : RD rule containing zones does not match expected traffic on the Network firewall policy
Links to More Info: BT1510477
Component: Advanced Firewall Manager
Symptoms:
The ICMP packets are dropped based on the default match rule, instead of the RD rule match.
Conditions:
ICMP firewall policies created with Zone include Route Domain (RD) with two or more VLANs in the created Zone.
Impact:
The ICMP packets are dropped based on the default match rule instead of using the RD rule match to drop.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1505813-3 : CVE-2018-16487 lodash: Prototype pollution in utilities
Component: iApp Technology
Symptoms:
A prototype pollution vulnerability was found in lodash <4.17.11 where the functions merge, mergeWith, and defaultsDeep can be tricked into adding or modifying properties of Object.prototype.
Conditions:
NA
Impact:
An attacker can use Function inside of vulnerable versions of lodash to execute malicious code using the Traffic Management User Interface (TMUI) or iControl REST API .it can impact confidentiality,integrity and availability of application.
Workaround:
NA
Fix:
Updated lodash version to 4.17.21
Fixed Versions:
17.5.1.4
1505649-3 : SSL Handshake fall back to full handshake during session resumption, if SNI string is more than 32 characters in length
Links to More Info: BT1505649
Component: Local Traffic Manager
Symptoms:
When the SNI string is longer than 32 characters, the SSL handshake switches to the full handshake when session resumption is attempted.
Conditions:
- SSL resumption should be enabled in the client's SSL profile of their BIG-IP.
- SNI string should be more than 32 characters in length of the SSL client Hello packet received from the user.
Impact:
SSL resumption would fail if the SNI string is more than 32 characters in length.
Workaround:
using strings lesser than 32 characters for SNI
Fixed Versions:
21.0.0, 17.5.1, 17.1.2
1505309-2 : CVE-2021-23337 nodejs-lodash: command injection via template
Links to More Info: K12492858
1505301-2 : CVE-2022-29154 rsync: remote arbitrary files write inside the directories of connecting peers
Component: TMOS
Symptoms:
A flaw was found in rsync that is triggered by a victim rsync user/client connecting to a malicious rsync server. The server can copy and overwrite arbitrary files in the client's rsync target directory and subdirectories. This flaw allows a malicious server, or in some cases, another attacker who performs a man-in-the-middle attack, to potentially overwrite sensitive files on the client machine, resulting in further exploitation.
Conditions:
NA
Impact:
This flaw allows a malicious server, or in some cases, another attacker who performs a man-in-the-middle attack, to potentially overwrite sensitive files on the client machine, resulting in further exploitation.
Workaround:
NA
Fix:
Patched rsync to fix this vulnerability
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1505297-3 : CVE-2020-8203 nodejs-lodash: prototype pollution in zipObjectDeep function
Component: iApp Technology
Symptoms:
A flaw was found in nodejs-lodash in versions 4.17.15 and earlier. A prototype pollution attack is possible which can lead to arbitrary code execution. The primary threat from this vulnerability is to data integrity and system availability.
Conditions:
The vulnerability can be exploited when a vulnerable lodash version (≤ 4.17.15) processes attacker-controlled input using prototype-modifying functions (e.g., merge, defaultsDeep) with malicious keys like __proto__ or constructor.
Impact:
It can allow prototype pollution, leading to data integrity issues, application crashes (DoS), or potentially arbitrary code execution.
Workaround:
Upgrade lodash to a fixed version (≥ 4.17.16), avoid using prototype-modifying functions on untrusted input, and validate or sanitize user-controlled data.
Fix:
Update nodejs-lodash to version 4.17.16 or later
Fixed Versions:
17.5.1.4
1505257-2 : False positive with "illegal base64 value" for Authorization header
Links to More Info: BT1505257
Component: Application Security Manager
Symptoms:
False positive "illegal base64 value" is detected
Conditions:
The given base64 encoded value is legal base64 but the decoded auth-param is unparsable. Such request triggers "HTTP Protocol Compliance" violation when configured to do so and it is indeed triggering, but such request should not trigger "illegal base64 value".
Impact:
A false positive is detected.
Workaround:
None
Fixed Versions:
17.5.1.4
1498949-5 : CVE-2023-2283 libssh: authorization bypass in pki_verify_data_signature
Links to More Info: K000138682
1495381-3 : TMM core with SWG explicit forward proxy or PRP configuration
Links to More Info: BT1495381
Component: Access Policy Manager
Symptoms:
TMM core.
Conditions:
SWG explicit forward proxy or PRP with NTLM or Kerberos or LDAP credentials identification method.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6.1
1494229-5 : CVE-2023-2953 openldap: null pointer dereference in ber_memalloc_x function
Links to More Info: K000138814, BT1494229
1493765-5 : CVE-2021-22884 nodejs: DNS rebinding in --inspect
Component: iApp Technology
Symptoms:
A flaw was found in nodejs. A denial of service is possible when the whitelist includes “localhost6”. When “localhost6” is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS over the network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the “localhost6” domain. As long as the attacker uses the “localhost6” domain, they can still apply the attack described in CVE-2018-7160.
Conditions:
The Node.js application uses a whitelist for DNS rebinding protection that includes “localhost6”.
The system’s /etc/hosts file does not have an entry for "localhost6".
Impact:
The DNS rebinding protection may not function as intended, which could allow unauthorized connections to local resources via the “localhost6” domain.
Workaround:
Remove "localhost6" from the DNS rebinding protection whitelist.
Fix:
drop localhost6 as allowed host
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1492337-4 : TMM fails to start up using Xnet-DPDK-virtio due to out of bounds MTU
Links to More Info: BT1492337
Component: TMOS
Symptoms:
TMM goes into a restart loop and fails to start with an error message that the MTU is out of bounds
Log message:
notice virtio_mtu_set(): MTU should be between 68 and 1500
Conditions:
- Using Xnet-DPDK-virtio driver
- NIC is configured to have an MTU less than NDAL's configured MTU. By default, this is an MTU < 9198
Impact:
TMM goes into a restart loop and fails to start
Workaround:
Create /config/tmm_init.tcl with the following entry
ndal mtu <value> 1af4:1041
Replacing <value> with the corresponding value in the following log line in /var/log/tmm
notice virtio_mtu_set(): MTU should be between 68 and <value>
Fix:
Refactored code to not restart TMM if set MTU operation fails.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1481889-4 : High CPU utilization or crash when CACHE_REQUEST iRule parks.
Links to More Info: BT1481889
Component: Local Traffic Manager
Symptoms:
When CACHE_REQUEST iRule stops, the Ramcache filter stays in CACHE_INIT state when it restarts. This causes the request to be processed twice, which causes high CPU usage or a crash when an incorrect address is encountered.
Conditions:
- HTTP Virtual server
- CACHE_REQUEST iRule with ms delay
- Multiple attempts to request a compressed doc
Impact:
- High CPU on boxes with 4G of valid memory after the key is hashed - on smaller boxes, will crash when an invalid address is encountered.
Workaround:
- Removal of CACHE_REQUEST iRule if avoidable
Fixed Versions:
17.5.1.4
1474877-4 : Unable to download large files through VIP due RST Compression error.
Links to More Info: BT1474877
Component: Local Traffic Manager
Symptoms:
- Download of files exceeding maximum tmm.deflate.memory.threshold fails at client.
- Client receives RSTs (Compression error)
Conditions:
- Virtual server with HTML profile or REWRITE profile.
- Size of decompressed http response from server exceeds max tmm.deflate.memory.threshold value i.e. 4718592 bytes.
Impact:
- Client may lose connection to the server.
Workaround:
- Based on URI matches in the HTTP request, decide which responses should NOT be rewritten (e.g. big downloads) and disable REWRITE profile for the selected responses.
- For example, URI starting with "/headsupp/api/data/compare/measures" :
when HTTP_REQUEST {
if { [HTTP::uri] starts_with "/headsupp/api/data/compare/measures" } {
set no_rewrite 1
}
}
when HTTP_RESPONSE {
if { $no_rewrite == 1 } {
REWRITE::disable
}
}
Fix:
- Raised the max tmm.deflate.memory.threshold to approx. 9MB,
- Changes introduced to allow disabling this threshold altogether if so desired, by changing default value for the same threshold to '0'.
- NOTE: Disabling this threshold altogether can lead to exposure to zip bomb attacks.
Fixed Versions:
17.5.1.4
1473913-6 : Proxy Connections drop due to wrong counting
Links to More Info: BT1473913
Component: Local Traffic Manager
Symptoms:
Proxy Connections are dropped. The reset cause in a package capture indicates "F5RST: Not connected"
Conditions:
Can happen during a DOS attack with standard mitigation mode enabled.
Impact:
Random connections are dropped
Workaround:
Use conservative mitigation mode.
Fix:
No random connection drops
Fixed Versions:
17.5.1.4, 17.1.3, 16.1.6
1470265-5 : DTLS over TCP results in unsupported behavior
Component: Local Traffic Manager
Symptoms:
DTLS traffic can be incorrectly negotiated and processed over a TCP connection.
Conditions:
This issue occurs when DTLS traffic is initiated over a TCP connection instead of UDP.
Impact:
Attempts to use DTLS over TCP will result in unsupported protocol behavior.
Workaround:
Ensure DTLS is used only over UDP.
For secure communication over TCP, use TLS instead of DTLS.
Fix:
It is now ensured that DTLS traffic over TCP connections is rejected, aligning with the protocol's design for DTLS to operate strictly over UDP.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8
1470177-6 : CVE-2023-46218 curl: information disclosure by exploiting a mixed case flaw
Links to More Info: K000138650, BT1470177
1469629-6 : CVE-2023-5981 & CVE-2024-0553: gnutls vulnerability on response times of ciphertexts
Links to More Info: K000138649, BT1469629
1469393-2 : Browser extension can cause Bot-Defense profile screen to misfunction
Links to More Info: BT1469393
Component: Application Security Manager
Symptoms:
One of the ad-blocker browser extensions is reported to cause bot-defense GUI not working properly.
Conditions:
Ad-blocker extension installed in browser
Impact:
Bot-defense screen might not work properly
Workaround:
Disable ad-blocker extension or use private/incognito mode.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1450481-5 : TMSH hardening
Component: TMOS
Symptoms:
TMSH is not following security best practices.
Conditions:
NA
Impact:
Unexpected behaviour
Workaround:
NA
Fix:
TMSH is now following security best practices.
Fixed Versions:
17.5.1.4
1441577-6 : CVE-2023-42795 tomcat: improper cleaning of recycled objects could lead to information leak
Links to More Info: K000138178, BT1441577
1440409-6 : TMM might crash or leak memory with certain logging configurations
Links to More Info: BT1440409
Component: Local Traffic Manager
Symptoms:
TMM might crash or leak memory with certain logging configurations.
Conditions:
Virtual-to-virtual chaining is used for handling syslog messages.
Impact:
Memory leak or Crash.
Workaround:
None
Fix:
None
Fixed Versions:
17.5.1.4
1438801-1 : VLAN name greater than or equal to 32 characters causes VLAN to lose member information
Links to More Info: BT1438801
Component: F5OS Messaging Agent
Symptoms:
If VLAN name is greater than or equal to 32 characters, a tenant running on an r2000 or r4000-series appliance may fail to pass traffic on that VLAN. This occurs because the tenant loses track of the interface/trunk<>VLAN association when attempting to process configuration updates from the F5OS host.
Conditions:
- r2000 or r4000 system
- VLAN member with a name that is 32 characters or longer is assigned to a BIG-IP tenant.
Impact:
Traffic may not pass properly.
Workaround:
Use shorter VLAN names, with a maximum of 31 characters.
Fixed Versions:
21.0.0, 17.5.1.4
1429861-2 : CVE-2019-5737: HTTP or HTTPS Denial of Service in keep-alive mode (NodeJS v6)
Component: Local Traffic Manager
Symptoms:
It was found that the original fix for Slowloris, CVE-2018-12122, was insufficient. It is possible to bypass the server's headersTimeout by sending two specially crafted HTTP requests in the same connection. An attacker could use this flaw to bypass Slowloris protection, resulting in a denial of service.
Conditions:
The server runs a vulnerable Node.js HTTP implementation and accepts persistent connections where an attacker can send two specially crafted HTTP requests on the same connection to bypass headersTimeout.
Impact:
An attacker can bypass Slowloris protections and cause a denial of service by exhausting server connections.
Workaround:
Upgrade to a Node.js version that includes the corrected Slowloris fix and enforce strict request timeouts and connection limits.
Fix:
Upgrade to a Node.js version with the updated Slowloris fix and enforce strict request timeout and connection limits.
Fixed Versions:
17.5.1.4
1403869-5 : CONNFLOW_FLAG_DOUBLE_LB flows might route traffic to a stale next hop
Links to More Info: BT1403869
Component: TMOS
Symptoms:
Pool members configured with IP encapsulation or any type of flow using CONNFLOW_FLAG_DOUBLE_LB flag might take some time to refresh its nexthops.
Conditions:
BIG-IP receives an ECMP route towards a server over two different BGP peers and the server is a pool member with IPIP encapsulation enabled. One of the BGP peers goes down and the route gets removed immediately, but BIG-IP is still forwarding traffic to this peer for the next few seconds, even though tmm.inline_route_update is enabled.
Impact:
The connection is using the old, invalid next hop for a few seconds.
Workaround:
None
Fix:
None
Fixed Versions:
17.5.1.4
1401961-4 : A blade with a non-functional backplane may override the dag context for the whole system
Links to More Info: BT1401961
Component: TMOS
Symptoms:
A blade with a non-functional backplane may override the dag context for the whole system.
Conditions:
- a blade has backplane problems, as evidenced by "shared random" not being ready in `tmctl -d blade tmm/ready_for_world_stat`.
Impact:
The traffic is black-holed into a non-functional blade.
Workaround:
Depending on the nature of the blade fault, a workaround is to either disable or just reboot the non-functional blade.
Fix:
A blade with a non-functional backplane cannot override the dag context for the whole system anymore.
Fixed Versions:
21.0.0, 17.5.1
1400533-5 : TMM core dump include SIGABRT multiple times, on the Standby device.
Links to More Info: BT1400533
Component: Access Policy Manager
Symptoms:
The tmm running on the Standby device is repeatedly killed by sod. There are number of SessionDB ERROR messages on the tmm log.
/var/log/tmm1:
notice session_ha_context_callback: SessionDB ERROR: received invalid or corrupt HA message; dropped message.
Conditions:
-- BIG-IP configured for high availability (HA)
-- Mirroring enabled
-- APM enabled
-- Traffic is being passed on the active device
Impact:
Tmm restarts on the standby device. If a failover occurs while the tmm is restarting, traffic is disrupted.
Workaround:
None
Fix:
Persisting sub-session information only in the active device, after the expiry.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1393733-8 : CVE-2022-43750 kernel: memory corruption in usbmon driver
Links to More Info: K000139700, BT1393733
1390457-6 : CVE-2022-25147 apr-util: out-of-bounds writes in the apr_base64
Links to More Info: K000137702, BT1390457
1382313-5 : TMM might crash under certain conditions
Links to More Info: K000152341, BT1382313
1382181-2 : BIG-IP resets only server-side on idle timeout when used FastL4 profile with loose-* settings enabled★
Links to More Info: BT1382181
Component: Local Traffic Manager
Symptoms:
After upgrading to BIG-IP 17.1.0, observed that some of the client sessions are orphaned, this has caused multiple intermittent connection failures when connecting through BIG-IP.
When the FastL4 profile with loose-* settings enabled is used and an idle timeout of 300 seconds, after idle time of 300 seconds, the server-side connection resets but no reset is sent towards client.
Conditions:
- Use BIG-IP version 17.1.0 and above
- Use Fastl4 profile with loose-* settings enabled.
- Configure idle timeout values.
Impact:
Some client sessions will be orphaned and cause intermittent connection failures when trying to connect through BIG-IP.
Workaround:
If not required for a particular use case, then disable loose-close settings in Fastl4 profile.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1380009-5 : TLS 1.3 server-side resumption resulting in TMM crash due to NULL session
Links to More Info: BT1380009
Component: Local Traffic Manager
Symptoms:
TMM core is observed when TLS 1.3 server-side resumes.
Conditions:
- TLS 1.3 handshake
Impact:
TMM cores, traffic is disrupted.
Workaround:
None
Fixed Versions:
17.5.1.4
1377737-3 : SSL Orchestrator does not pass traffic when MAC masquerading is configured on R4k or R2k systems
Links to More Info: BT1377737
Component: TMOS
Symptoms:
In BIG-IP tenants launched on R4x00/R2x00 systems, configuring a MAC Masquerade address on the SSL Orchestrator (SSL Orchestrator) egress port prevents traffic from passing.
Conditions:
-- R4x00 or R2x00 systems
-- BIG-IP Tenant
-- High availability (HA) configured in BIG-IP
-- MAC Masquerade address configured on SSL Orchestrator egress port
Impact:
Egress traffic on the SSL Orchestrator port will be dropped in the physical NIC card. Hence SSL Orchestrator egress traffic on the port wouldn't be received on L2 device.
Workaround:
None
Fixed Versions:
17.5.1.4, 17.1.3
1365629-5 : FPS signature and engine update fail to access sys db key proxy.password
Links to More Info: BT1365629
Component: Application Security Manager
Symptoms:
FPS signature and engine update via proxy with password authentication fails
Conditions:
FPS signature and engine update via proxy that requires password authentication
Impact:
Automatic updates of FPS signatures and engine do not work when an HTTP proxy is configured.
Workaround:
Manually upload the file
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.2, 15.1.10.8
1359817-3 : The setting of DB variable tm.macmasqaddr_per_vlan does not function correctly
Links to More Info: BT1359817
Component: F5OS Messaging Agent
Symptoms:
TMM is not configuring L2 listener entry for a new MASQUEREDE MAC created from a base MAC and VLAN ID when the DB variable tm.macmasqaddr_per_vlan is true.
Conditions:
- F5OS Tenant
- MAC MASQUEREDE is configured
- DB variable tm.macmasqaddr_per_vlan is true
Impact:
Connectivity issues may occur, pinging a self-IP will fail.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.4
1353609-8 : ZebOS BGP vulnerability CVE-2023-45886
Links to More Info: K000137315, BT1353609
1352649-4 : The trailing semicolon at the end of [HTTP::path] in the iRule is being omitted.
Links to More Info: BT1352649
Component: Local Traffic Manager
Symptoms:
When a http request with URL containing only one semi-colon at the end, it is omitted with HTTP::PATH
Conditions:
Basic http Virtual Server and request URL with ';' at the end
Impact:
[HTTP::PATH] incorrectly omits ';'
Workaround:
None
Fix:
Count on semicolon for HTTP::PATH even when there is no host-extension
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1336185-6 : NodeJS Vulnerability - CVE-2018-12123
Links to More Info: K000137090, BT1336185
1330801-8 : NodeJS Vulnerability CVE-2018-12123, CVE-2018-12121, CVE-2018-12122
Links to More Info: K000137090, BT1330801
1327169-7 : CVE-2023-24329 python: urllib.parse url blocklisting bypass
Links to More Info: K000135921, BT1327169
1326665-6 : CVE-2023-32067 c-ares: 0-byte UDP payload Denial of Service
Links to More Info: K000135831, BT1326665
1325737-1 : Standby tenant cannot access floating traffic group when MAC masquerade is enabled
Links to More Info: BT1325737
Component: TMOS
Symptoms:
A standby BIG-IP tenant running on an r2000 or r4000 appliance cannot access addresses in the floating traffic group if MAC masquerade is enabled. For instance, the standby tenant will not be able to ping the floating self IP address.
External devices can access the floating self IP address without issue.
If the tenants swap HA roles (the active device becomes standby, and the standby device becomes active), the problem follows the standby device -- the newly-standby system is not able to ping the floating self IP address.
Conditions:
-- F5 r2000 or BIG-IP r4000 system
-- BIG-IP tenant with MAC masquerade configured for floating traffic group
Impact:
Standby tenant unable to access resources in the floating traffic group when MAC masquerade is configured.
Workaround:
None
Fix:
A configuration option to disable MAC filter installation has been added.
To disable MAC filters:
echo -e "drvcfg iavf uc_mac_filter 0\ndrvcfg iavf mc_mac_filter 0" >> /config/xnet_init.tcl
bigstart restart tmm
Fixed Versions:
17.5.1.4, 17.1.3
1325649-3 : POST request with "Expect: 100-Continue" and HTTP::collect + HTTP::release is not being passed to pool member
Links to More Info: BT1325649
Component: Local Traffic Manager
Symptoms:
After upgrading from a BIG-IP version prior to v16.1.0 to BIG-IP v16.1.0 or later, one specific virtual-server is not working as expected and unable to forward the POST request towards the pool member.
Conditions:
1) Upgrade to v16.1.0 or later
2) Send a POST request from client with "Expect: 100-Continue".
3) Attach an irule using http::collect plus http::release to the Virtual Server.
Impact:
Cannot send POST requests from client to server
Workaround:
If ASM is provisioned, a transparent ASM policy can be a workaround.
1. Create a transparent ASM policy
At GUI Security >> Application Security: Security Policies
Click Create
Fill in following
Policy name: <unique policy Name>
Policy Type: Security(Default)
Policy Template: Fundamental (Default)
Leaning and Blocking
Enforcement Mode: Transparent
Save
Click the policy name created above, and modify following
Policy Building Learning Mode: Disabled
Save and Apply Policy
2. Enable Application Security Policy with the ASM Policy created above at the LTM Virtul Server Security configuration.
Fixed Versions:
17.5.1.4, 17.1.3
1314333-2 : Patch gnutls library for CVEs CVE-2018-10844, CVE-2018-10845, CVE-2018-10846
Component: TMOS
Symptoms:
These vulnerabilities affect the HMAC and CBC-mode processing in GnuTLS, making it susceptible to Lucky Thirteen-style timing attacks. By measuring response times for crafted TLS/DTLS packets, attackers can infer partial plaintext data. The high complexity of the attack, reliance on network conditions, and mitigations in later TLS versions result in an Attack Complexity (AC) of High.
Conditions:
NA
Impact:
CVE-2018-10844 – Affects HMAC-SHA-256 processing in GnuTLS, leading to possible plaintext recovery via statistical analysis of response times. CVE-2018-10845 – Targets CBC-mode padding handling, potentially exposing additional side-channel leaks. CVE-2018-10846 – Affects DTLS (Datagram TLS), making real-time encrypted communication (e.g., VoIP, VPNs) vulnerable to timing-based attacks.
Workaround:
Disable CBC-mode cipher suites in TLS configurations to prevent this attack vector.
Use TLS 1.3, as it eliminates CBC-mode ciphers and improves security.
Minimize the exposure of GnuTLS-based services to untrusted networks.
Fix:
Patched gnutls to fix the Vulnerability
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1309637-5 : Mac masquerade not working after VLAN movement on host interfaces
Links to More Info: BT1309637
Component: Local Traffic Manager
Symptoms:
Connectivity to the floating IP via the masquerade MAC fails when the VLAN is moved across interfaces.
Conditions:
-- BIG-IP is configured with a floating IP on a traffic group
-- MAC masquerade is enabled
-- The VLAN is assigned to a different interface
Impact:
Connectivity to the floating IP address fails following a failover.
Workaround:
After the VLAN movement, delete and reconfigure the MAC masquerade.
Fixed Versions:
21.0.0, 17.5.1
1306309-4 : CVE-2023-28709 Apache tomcat: Fix for CVE-2023-24998 was incomplete
Links to More Info: K000135262, BT1306309
1306305-2 : CVE-2023-24998 [Apache Tomcat]: FileUpload DoS with excessive parts
Links to More Info: K000133052, BT1306305
1305117-2 : SSL profile "no-dtlsv1.2" option is left disabled while upgrading from v14.x or v15.x to 17.1.0★
Links to More Info: BT1305117
Component: TMOS
Symptoms:
Starting from 16.0.0, given DTLSv1.2 support, "no-dtlsv1.2" option is newly available on SSL profile. Default value is "no-dtlsv1.2" option enabled.
While upgrading from older version to 16.0.0 or later, by default "no-dtlsv1.2" option is to be automatically enabled with following notification message.
> bigip1 warning mcpd[XXXX]: 0107185a:4: Warning generated, for version 16.0.0 or greater : /Common/[SSL-profile-name], default option no-dtlsv1.2 set.
However, when user directly upgrades from v14.x/v15.x to v17.1.0, "no-dtlsv1.2" option may not be automatically enabled on SSL profile.
Conditions:
- roll-forward upgrade from v14.x/v15.x to v17.1.0. upgrade from v16.x to v17.1.0 is not affected.
- custom client|server-ssl profile configured on pre-upgrade version v14.x/v15.x
Impact:
After upgrade to 17.1.0, "no-dtlsv1.2" option may not be enabled on SSL profile.
Workaround:
After upgrade to 17.1.0, manually enable "no-dtlsv1.2" option.
Fixed Versions:
21.0.0, 17.5.1.3
1304081-7 : CVE-2023-2650 openssl: Possible DoS translating ASN.1 object identifiers
Links to More Info: K000135178, BT1304081
1301545-7 : CVE-2023-0568 php: 1-byte array overrun in common path resolve code
Links to More Info: K000134747, BT1301545
1292605-4 : Uncaught ReferenceError: ReferenceError: REquest is not defined
Links to More Info: BT1292605
Component: Access Policy Manager
Symptoms:
The Cache-fm-Modern.js file has a typo.
Conditions:
This issue occurs when using Modern JS support EHF.
Impact:
A Javascript error occurs: "Uncaught ReferenceError: ReferenceError: REquest is not defined".
Workaround:
Correct the typo and give the iRule with iFile workaround.
Fix:
The word "REquest" should be "Request" at all the places where there is a typo error.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8
1282837-4 : DTLS1.2 Handshakes are causing tmm crash with mTLS connection
Links to More Info: K000151309, BT1282837
1273161-5 : Secondary blades are unavailable, clusterd is reporting shutdown, and waiting for other blades
Links to More Info: BT1273161
Component: Local Traffic Manager
Symptoms:
On a multi-slot chassis, VCMP guest, or F5OS tenant, clusterd can enter a shutdown state causing some slots to become unavailable.
The event that can cause this is called a partition and occurs when clusterd stops receiving heartbeat packets from a slot over the mgmt_bp interface but is still receiving them over the tmm_bp interface.
Here is the error that is logged when this occurs:
Mar 17 10:38:28 localhost err clusterd[4732]: 013a0004:3: Marking slot 1 SS_FAILED due to partition detected on mgmt_bp from peer 2 to local 1
When this occurs, clusterd enters a shutdown state and at times will never recover.
Here is an example, tmsh show sys cluster command where clusterd is in the shutdown yet waiting state:
-----------------------------------------
Sys::Cluster: default
-----------------------------------------
Address 172.0.0.160/23
Alt-Address ::
Availability available
State enabled
Reason Cluster Enabled
Primary Slot ID 2
Primary Selection Time 03/17/23 10:38:30
----------------------------------------------------------------------------------
| Sys::Cluster Members
| ID Address Alt-Address Availability State Licensed HA Clusterd Reason
----------------------------------------------------------------------------------
| 1 :: :: unknown enabled false unknown shutdown ShutDown: default/1 waiting for blade 2
| 2 :: :: available enabled true standby running Run
Conditions:
Multi-slot chassis, VCMP guest, or F5OS tenant.
A blade determines there is a partition where it's receiving cluster packets over the tmm_bp interface but not the mgmt_bp interface.
Impact:
The unavailable slots/blades will not accept traffic.
Workaround:
Running tmsh show sys cluster will report the primary slot and all slot statuses.
For all blades reporting shutdown or (less likely) initializing and "waiting for blade(s)", restart clusterd on that slot with bigstart restart clusterd. Ensure you do not restart clusterd on the primary slot.
Fix:
None
Fixed Versions:
21.0.0, 17.5.1.2
1271341-4 : Unable to use DTLS without TMM crashing
Component: Local Traffic Manager
Symptoms:
The TMM crashes when DTLS is used.
Conditions:
- Using DTLS.
Impact:
TMM core is observed, traffic is disrupted while TMM restarts.
Workaround:
Disable 'allow-dynamic-record-sizing' in the client-ssl profile.
Following is an example:
ltm profile client-ssl /Common/otters-ssl {
allow-dynamic-record-sizing disabled
Fixed Versions:
17.5.1.4
1270257-8 : CVE-2023-0662 php: DoS vulnerability when parsing multipart request body
Links to More Info: K000133753, BT1270257
1269709-5 : GUI should throw the error when the VS is configured with both vdi and HTTP/2 profiles
Links to More Info: BT1269709
Component: Access Policy Manager
Symptoms:
As the VDI profile is currently not supported in the HTTP/2 environment for which there is no warning message on the BIG-IP GUI about this limitation.
Conditions:
When both VDI Profile and HTTP/2 Profile is attached to the VS.
Impact:
The customer wants this error to be displayed on the BIGIP GUI if vdi and http/2 profiles both are attached to the VS together.
Workaround:
None
Fix:
Display the warning message on the BIG-IP GUI for the Configuration error: "Virtual server cannot have vdi and http/2 profiles at the same time" when both vdi and http/2 profiles are attached on the VS.
Fixed Versions:
21.0.0, 17.5.1, 17.1.2, 16.1.5
1268373-8 : MRF flow tear down can fill up the hudq causing leaks
Links to More Info: BT1268373
Component: Service Provider
Symptoms:
TMM Memory leaks are observed when MRF flows were torn down at once and the hud queue was full.
Conditions:
When the message queue becomes full.
Impact:
TMM memory leak
Workaround:
None
Fixed Versions:
17.5.1.4
1267221-5 : When TMM starts, Hyper-V shows no RX packets on the ethX interface★
Links to More Info: BT1267221
Component: Local Traffic Manager
Symptoms:
BIG-IP Virtual Edition (VE) running on a Hyper-V host, when TMM starts, it sets the NIC queue count. When this happens, due to a bug in Hyper-V, ingress packets are no longer received on the data plane interfaces.
Packets egressed from TMM are being correctly sent to peer devices on the network.
Conditions:
- After upgrading from BIG-IP version 12, none of the data plane interfaces show ingress counters incrementing and no traffic is seen on the interface. The Management interface works properly.
Impact:
The data plane interfaces does not show ingress counters incrementing and no traffic is seen on the interface.
Workaround:
In Hyper-V manager, save the machine state and then start it back up or use a legacy network adapter.
Fix:
This change provides a workaround to not set the NIC queue counts if they are already set properly. To utilize this workaround the amount of memory should be verified so that the number of TMMs equals the number of CPUs on the VM.
A new log message in /var/log/tmm will log whether or not TMM changed the queue count.
Fixed Versions:
21.0.0, 17.5.1
1266853-8 : CVE-2023-24998 Apache Commons FileUpload: FileUpload DoS with excessive parts
Links to More Info: K000133052, BT1266853
1240373-4 : CVE-2022-37436: Flaw in mod_proxy module of httpd
Links to More Info: K000132665, BT1240373
1209209 : CVE-2022-28733 grub2: Integer underflow in grub_net_recv_ip4_packets
Links to More Info: K000132893, BT1209209
1190753-1 : HTTP/2 Virtual Server ignores customized HTTP known-methods list
Links to More Info: BT1190753
Component: Local Traffic Manager
Symptoms:
An HTTP2 virtual server does not transfer the client request to the backend pool member.
Conditions:
- HTTP profile "Unknown Method : Reject".
- HTTP profile custom "Known Methods" list has non-default values, such as "PATCH".
- HTTP2 profile (and also HTTP profile) is attached to the virtual server.
- Client request is HTTP/2. And HTTP/2 request method is custom one (== method which isn't set as default "known-methods").
Impact:
HTTP2 virtual server traffic is disrupted.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.4
1178225-4 : Scalability issues with F5-VE deployments
Component: TMOS
Symptoms:
Two TMM threads can end up running on the same physical core on hypervisors where any 2 consecutive virtual cores are hyperthreaded siblings running on the same physical core.
Seen on any platform which assigns virtual CPUs in the order given in the example below:
cpu0 - assigned to physical core 0
cpu1 - assigned to physical core 0
cpu2 - assigned to physical core 1
cpu3 - assigned to physical core 1
cpu4 - assigned to physical core 2
cpu5 - assigned to physical core 2
etc.
Conditions:
Virtual Edition (VE) BIG-IP as it does not support split planes
Impact:
Scalability issues with F5-VE deployments which run on infrastructures/hypervisors which provide virtual CPU resources in the order given above.
Workaround:
None
Fixed Versions:
17.5.1.4
1173825-4 : Improper sanitisation in Qkview data
Component: Local Traffic Manager
Symptoms:
It was found that some of the data from Qkview dumps is improperly sanitised.
Conditions:
When using Qkview to dump data
Impact:
Improper sanitisation of data
Fix:
Qkview now properly sanitising the data.
Fixed Versions:
21.0.0, 17.5.1.4
1144673-5 : Persistent Connection Issue in SSO v2 Plugin
Links to More Info: K000148816, BT1144673
1144421-3 : CVE-2019-14866 cpio: improper input validation when writing tar header fields leads to unexpected tar generation
Component: TMOS
Symptoms:
cpio does not properly validate the values written in the header of a TAR file through the to_oct() function. When creating a TAR file from a list of files and one of those is another TAR file with a big size, cpio will generate the resulting file with the content extracted from the input one. This leads to unexpected results as the newly generated TAR file could have files with permissions the owner of the input TAR file did not have or in paths he did not have access to.
Conditions:
Occurs when creating tar archives with unvalidated or specially crafted input filenames.
Impact:
This vulnerability may generate malformed tar files, leading to interoperability issues or unexpected behavior in downstream tools.
Workaround:
NA
Fix:
Patched python to fix the vulnerability.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1144057-8 : BIG-IP and BIG-IQ improvements disclosed by Rapid7
Links to More Info: K05403841
Component: TMOS
Symptoms:
See: https://support.f5.com/csp/article/K05403841
Conditions:
See: https://support.f5.com/csp/article/K05403841
Impact:
See: https://support.f5.com/csp/article/K05403841
Workaround:
See: https://support.f5.com/csp/article/K05403841
Fix:
See: https://support.f5.com/csp/article/K05403841
Fixed Versions:
21.0.0, 17.5.1.4
1137269 : MCPD fails to reply if a request is proxied to another daemon and the connection to that daemon closes
Links to More Info: BT1137269
Component: TMOS
Symptoms:
MCPD does not reply to the request if the publisher's connection closes or fails. In this case, when bcm56xxd
is restarted, the perceivable signs of failure are:
- The snmpwalk failing with a timeout and
- The "MCPD query response exceeding" log messages.
Conditions:
1) Configure SNMP on the BIG-IP to run snmpwalk locally on the BIG-IP.
2) From the first session on the BIG-IP, run a snmpwalk in the while loop.
while true;do date; snmpwalk -v2c -c public 127.0.0.1 sysDot1dbaseStat;sleep 2;done
Sample output:
Sat Aug 21 00:57:23 PDT 2021
F5-BIGIP-SYSTEM-MIB::sysDot1dbaseStatResetStats.0 = INTEGER: 0
F5-BIGIP-SYSTEM-MIB::sysDot1dbaseStatMacAddr.0 = STRING: 0:23:e9:e3:8b:41
F5-BIGIP-SYSTEM-MIB::sysDot1dbaseStatNumPorts.0 = INTEGER: 12
F5-BIGIP-SYSTEM-MIB::sysDot1dbaseStatType.0 = INTEGER: transparentonly(2)
3) From a second session on the BIG-IP restart bcm56xxd
bigstart restart bcm56xxd
4) The snmpwalk will continually report the following:
Timeout: No Response from 127.0.0.1
And snmpd will continually log "MCPD query response exceeding" every 30 seconds in /var/log/ltm.
Impact:
SNMP stopped responding to queries after upgrade.
Workaround:
Restart SNMP.
Fixed Versions:
17.5.1.4
1134257-6 : TMM cores when pingaccess profile is modified multiple times and configuration is loaded
Links to More Info: BT1134257
Component: Local Traffic Manager
Symptoms:
TMM cores.
Conditions:
- The APM pingaccess profile is configured.
- Before configuration load, modify pingaccess profile multiple times.
Impact:
TMM cores.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1132449-6 : Incomplete or missing IPv6 IP Intelligence database results to connection reset and/or high TMM CPU usage
Links to More Info: BT1132449
Component: Advanced Firewall Manager
Symptoms:
The following IPv4 database load message is present in /var/log/ltm:
015c0010:5: Initial load of IPv4 Reputation database has been completed
Note the absence of the IPv6 version of the same message:
015c0010:5: Initial load of IPv6 Reputation database has been completed
Some scenarios can result in elevated TMM CPU utilization, for example, when using IPI in global policy.
The message "Scheduling priority: normal. Nice level: -19" is seen at a rate of about 100 lines per second, per tmm, in the /var/log/tmm* logs:
Conditions:
Failure to download IPv6 database from localdb-ipv6-daily.brightcloud.com.
Impact:
Any of the following:
- TCL error results when IPI is used in an iRule resulting in connection being reset.
- When using IPI in global policy, increased TMM CPU utilization may occur which leads to idle enforcer being triggered, TMM clock advanced messages appearing in LTM logs, or TMM restarting without core when MCPD is unable to communicate with TMM.
Workaround:
Ensure that BIG-IP is able to communicate using https with BrightCloud servers, including localdb-ipv6-daily.brightcloud.com. For more detailed troubleshooting steps, see K03011490 at https://my.f5.com/manage/s/article/K03011490.
Once the IPv6 reputation database has been retrieved and loaded issues should stop.
This line in ltm log shows load has completed:
015c0010:5: Initial load of IPv6 Reputation database has been completed
Fix:
None
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6
1128685-1 : REST API requests using deleted expired tokens returns xml response when authentication fails
Links to More Info: BT1128685
Component: TMOS
Symptoms:
When authentication fails for REST API requests using deleted expired tokens, the response is returned in xml format after including the fix ID1033837
Conditions:
- Token needs to expire and has to be swept from /var/run/pamcache.
- Occurs during authentication attempts with deleted expired tokens after introducing the authentication layer at Apache as part of fix for ID1033837.
Impact:
Few scripts utilized by third party applications are failing because of xml response and expectation is to return a json response.
Workaround:
None
Fix:
To return a json response from REST Layer for requests using deleted expired tokens.
Fixed Versions:
21.0.0, 17.5.1.4
1124865-5 : Removal of LAG member from an active LACP trunk on r2k and r4k systems requires tmm restart
Links to More Info: BT1124865
Component: Local Traffic Manager
Symptoms:
Removal of LAG member from an active LACP trunk stops the traffic flow to the tenant launched on R2x00/R4x00 based appliances.
Conditions:
Removal of LAG member from an active LACP trunk on R2x00 and R4x00 appliances.
Impact:
Traffic flow gets impacted and the system misses the packets routed onto the LACP trunk from where the LAG member was removed.
Workaround:
- Restart tmm on all tenants that are associated with the trunk
Fix:
When removing a LAG member from an Active LACP trunk stops traffic flow on an R2x00/R4x00 appliance system, restarting tmm in the tenants resolves the issue.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3, 15.1.9
1121517-5 : Interrupts on Hyper-V are pinned on CPU 0
Links to More Info: BT1121517
Component: TMOS
Symptoms:
CPU 0 utilization is much higher relative to other CPUs due to high amount of softirq.
Conditions:
BIG-IP is deployed on a Hyper-V platform.
Impact:
Performance is degraded.
Fix:
Interrupts are balanced across all CPUs.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.4, 15.1.10
1100081-3 : Error message "http_process_state_prepend - Invalid action:0x10a091" for version 15 and "http_process_state_prepend - Invalid action:0x107061" for versions 16 and 17 appears in the LTM log★
Links to More Info: K21440462, BT1100081
Component: Access Policy Manager
Symptoms:
The error message "http_process_state_prepend - Invalid action:0x10a091" ("http_process_state_prepend - Invalid action:0x107061") erroneously appears in the /var/log/ltm log file.
The error message "Access encountered error: Access pcb policy result is neither not_started nor inprogress: 3" also appears in the /var/log/apm log file.
Conditions:
An http(s) virtual server that also has an Access profile and per-request-policy configured.
Impact:
There is no impact.
Workaround:
None
Fix:
N/A
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1099369-9 : CVE-2018-25032 [NodeJS]zlib: A flaw found in zlib, when compressing (not decompressing!) certain inputs.
1086325-2 : CVE-2016-4658 libxml2 vulnerability
Links to More Info: K49419538
1083405-7 : "Error connecting to named socket" from zrd
Links to More Info: BT1083405
Component: Global Traffic Manager (DNS)
Symptoms:
After an mcpd restart, zrd may not be able to re-establish a connection to named. This shows up in the /var/log/gtm file or in the GUI with a message similar to the following:
err zrd[27809]: 01150306:3: Error connecting to named socket 'Connection refused'.
(or)
err zrd[16198]: 01150306:3: Error connecting to named socket 'Connection timed out'.
Conditions:
After an mcpd restart
Impact:
Looking up or modifying zone records may fail.
Workaround:
Restart zrd and named
tmsh restart sys service zrd named
Fixed Versions:
17.5.1.4
1081245-3 : [APM] SSO OAuth Bearer passthrough inserts an old access token instead of the latest one.
Links to More Info: BT1081245
Component: Access Policy Manager
Symptoms:
SSO Bearer authorization fails.
Conditions:
APM PRP is configured with just an OAuth Scope and SSO Bearer attached to PSP.
Impact:
Fails to read new token from request and forwards old token in session variables to backend pool after validation.
Workaround:
1. Configure a PSP of type 'OAuth-RS'
a. Add OAuth Scope
b. Add Variable assign with following expression
apm policy agent variable-assign /Common/RStype_AP_act_variable_assign_ag {
variables {
{
expression "mcget {session.oauth.client.last.access_token}"
secure true
varname session.oauth.client./Common/oauth-aad-server.access_token
}
}
}
2. Configure PRP with Gating Criteria (As per your setup)
a. Add a Variable-Assign inside SBR (subroutine)
apm policy agent variable-assign /Common/empty_act_variable_assign_ag {
variables {
{
expression "mcget -secure {subsession.oauth.client.last.access_token}"
secure true
varname session.oauth.client./Common/oauth-aad-server.access_token
}
}
}
Fix:
N/A
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1078713-1 : Windows 11 not included in client OS check and Windows Info agent.
Links to More Info: BT1078713
Component: Access Policy Manager
Symptoms:
Branches/rules are not available for Windows 11 in the access policy.
Conditions:
-- Client OS check.
-- Windows Info agent.
Impact:
Unable to use client OS check and Windows Info agent for Windows 11.
Workaround:
Windows 10 and 11 share the same major and minor version and Windows 11 is differentiated by its build number, 22000.
Adding a "Windows Registry" agent such as this before the "Windows Info" agent do branch off Windows 11 machines.
"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion"."CurrentBuildNumber">="22000"
Fix:
N/A
Fixed Versions:
21.0.0, 17.5.1
1074285-4 : Apmd crashes while handling JWT tokens.
Links to More Info: BT1074285
Component: Access Policy Manager
Symptoms:
An apmd crash might occur while handling JWT tokens.
Conditions:
The payload has invalid JSON during authentication.
Impact:
BIG-IP authorization disrupted while apmd restarts.
Workaround:
None
Fix:
We now validate the received payload format before parsing.
Fixed Versions:
17.5.1.4
1071385-5 : SSL session resumption is incorrectly logging handshake failure messages
Links to More Info: BT1071385
Component: Local Traffic Manager
Symptoms:
Handshake failure messages are logged when the handshake was successful.
Conditions:
-- Client establishes connection with session resumption option
Impact:
Inaccurate information in log.
Workaround:
None
Fix:
None
Fixed Versions:
21.0.0, 17.5.1.3
1069949-8 : CVE-2018-1000007 curl: HTTP authentication leak in redirects
Component: TMOS
Symptoms:
libcurl might accidentally leak authentication data to third parties.
When asked to send custom headers in its HTTP requests, libcurl will send that set of headers first to the host in the initial URL but also, if asked to follow redirects and a 30X HTTP response code is returned, to the host mentioned in URL in the `Location:` response header value.
Sending the same set of headers to subsequent hosts is, in particular, a problem for applications that pass on custom `Authorization:` headers, as this header often contains privacy-sensitive information or data that could allow others to impersonate the libcurl-using client's request.
Conditions:
NA
Impact:
Sensitive information could be disclosed to an unauthorised user
Workaround:
NA
Fix:
Patched curl to fix the vulnerability.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1069341-2 : CVE-2016-4738 libxslt: Heap overread due to an empty decimal-separator
Component: TMOS
Symptoms:
libxslt in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site
Conditions:
NA
Impact:
It can result in DoS.
Workaround:
NA
Fix:
libxslt has been patched to address this vulnerability.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1061485-9 : CVE-2019-19527: Linux kernel vulnerability
Component: TMOS
Symptoms:
A vulnerability was found in hiddev_open in drivers/hid/usbhid/hiddev.c in the USB Human Interface Device class subsystem, where an existing device must be validated prior to its access. The device should also ensure the hiddev_list cleanup occurs at failure, as this may lead to a use-after-free problem, or possibly escalate privileges to an unauthorized user.
Conditions:
NA
Impact:
Unauthorised access to BIGIP device
Workaround:
NA
Fix:
Patched kernel to fix the vulnerability.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1059229-3 : CVE-2019-16994 kernel: Memory leak in sit_init_net() in net/ipv6/sit.c
Component: TMOS
Symptoms:
A flaw was found in the way the sit_init_net function in the Linux kernel handled resource cleanup on errors. This flaw allows an attacker to use the error conditions to crash the system.
Conditions:
Linux kernel versions before 5.0
Impact:
It can result in DoS.
Workaround:
N/A
Fix:
kernel has been patched to address this vulnerability.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1058197-10 : CVE-2019-14973: LibTIFF Vulnerability
Component: TMOS
Symptoms:
_TIFFCheckMalloc and _TIFFCheckRealloc in tif_aux.c in LibTIFF through 4.0.10 mishandle Integer Overflow checks because they rely on compiler behaviour that is undefined by the applicable C standards. This can, for example, lead to an application crash.
Conditions:
NA
Impact:
It could lead to minor disruptions in service (availability impact) and may expose or modify some non-sensitive information (confidentiality and integrity impact)
Workaround:
unauthorized users cannot access the systems
Fix:
Patched LibTIFF to fix the vulnerability.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1057141-7 : CVE-2018-14647 python: Missing salt initialization in _elementtree.c module
Links to More Info: K000151007, BT1057141
1052477-4 : CVE-2020-10751 kernel: SELinux netlink permission check bypass
Component: TMOS
Symptoms:
A flaw was found in the Linux kernel SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.
Conditions:
NA
Impact:
A local attacker could bypass SELinux restrictions, potentially leading to unauthorized access, privilege escalation, or, in some scenarios, a system crash (denial of service).
Workaround:
NA
Fix:
Applied patch to fix the CVE
Fixed Versions:
17.5.1.4
1052445-4 : CVE-2019-19537 kernel: race condition caused by a malicious USB device in the USB character device driver layer
Component: TMOS
Symptoms:
A flaw was found in the Linux kernel, where there is a race condition bug that can be caused by a malicious USB device in the USB character device driver layer. An attacker who can hotplug at least two devices of this class can cause a use-after-free situation.
This affects the generic character device layer devices and not a specific device driver.
Conditions:
NA
Impact:
A flaw was found in the Linux kernel, where there is a race condition bug that can be caused by a malicious USB device in the USB character device driver layer. An attacker who can hotplug at least two devices of this class can cause a use-after-free situation.
This affects the generic character device layer devices and not a specific device driver.
Workaround:
NA
Fix:
Patched kernel to fix the vulnerability
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1052333-8 : CVE-2018-16885: Linux kernel vulnerability
Component: TMOS
Symptoms:
A flaw was found in the Linux kernel that allows the userspace to call memcpy_fromiovecend() and similar functions with a zero offset and buffer length. This can cause a read beyond the buffer boundaries flaw and, in certain cases, cause a memory access fault and a system halt by accessing an invalid memory address.
Conditions:
NA
Impact:
This can cause a read beyond the buffer boundaries flaw.
Workaround:
NA
Fix:
Patched kernel to fix the vulnerability.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1052253-8 : CVE-2018-13095 kernel: NULL pointer dereference in fs/xfs/libxfs/xfs_inode_buf.c
Component: TMOS
Symptoms:
An issue was discovered in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.17.3. A denial of service (memory corruption and BUG) can occur for a corrupted xfs image upon encountering an inode that is in extent format, but has more extents than fit in the inode fork.
Conditions:
Linux kernel version up to including 4.17.3 is vulnerable to this CVE.
Impact:
Exploitation of the vulnerability could cause the system to become unavailable (DoS).
Workaround:
NA
Fix:
Patched kernel to fix the vulnerability.
Fixed Versions:
21.0.0, 17.5.1.4, 17.1.3
1052249-8 : CVE-2018-13094 kernel: NULL pointer dereference in xfs_da_shrink_inode function
Component: TMOS
Symptoms:
An issue was discovered in the XFS filesystem in fs/xfs/libxfs/xfs_attr_leaf.c in the Linux kernel. A NULL pointer dereference may occur for a corrupted xfs image after xfs_da_shrink_inode() is called with a NULL bp. This can lead to a system crash and a denial of service.
Conditions:
NA
Impact:
Exploitation of the vulnerability could cause the system to become unavailable (DoS).
Workaround:
Limit physical or local access to the system
Fix:
Patched kernel to fix the vulnerability.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1052245-9 : CVE-2018-13093 kernel: NULL pointer dereference in lookup_slow function
Component: TMOS
Symptoms:
An issue was discovered in the XFS filesystem in fs/xfs/xfs_icache.c in the Linux kernel. There is a NULL pointer dereference leading to a system panic in lookup_slow() on a NULL inode->i_ops pointer when doing path walks on a corrupted xfs image. This occurs because of a lack of proper validation that cached inodes are free during an allocation.
Conditions:
Linux kernel versions before 4.17.3 are vulnerable
Impact:
It can result in DoS.
Workaround:
N/A
Fix:
kernel has been patched to address this vulnerability.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1052217-8 : CVE-2018-19985 kernel: oob memory read in hso_probe in drivers/net/usb/hso.c
Component: TMOS
Symptoms:
A flaw was found in the Linux kernel in the function hso_probe() which reads if_num value from the USB device (as an u8) and uses it without a length check to index an array, resulting in an OOB memory read in hso_probe() or hso_get_config_data(). An attacker with forged USB device with a physical access to a system (needed to connect such a device) can cause a system crash and a denial-of-service.
Conditions:
NA
Impact:
The primary impact of this vulnerability is a denial-of-service (DoS) due to the kernel crash
Workaround:
NA
Fix:
Patched kernel to fix the vulnerability.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1052181-8 : CVE-2018-7191 kernel: denial of service via ioctl call in network tun handling
Component: TMOS
Symptoms:
In the tun subsystem in the Linux kernel, a local attacker could issue an ioctl to call dev_get_valid_name which is not called before register_netdevice. This allows local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character.
Conditions:
Linux kernel versions before 4.13.14 are vulnerable
Impact:
It can result in DoS.
Workaround:
N/A
Fix:
kernel has been patched to address this vulnerability.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1051869-9 : CVE-2018-20169: Linux kernel vulnerability
Component: TMOS
Symptoms:
A flaw was discovered in the Linux kernel's USB subsystem in the __usb_get_extra_descriptor() function in the drivers/usb/core/usb.c which mishandles a size check during the reading of an extra descriptor data. By using a specially crafted USB device which sends a forged extra descriptor, an unprivileged user with physical access to the system can potentially cause a privilege escalation or trigger a system crash or lock up and thus to cause a denial of service (DoS).
Conditions:
NA
Impact:
Unauthorized access to sensitive information, Unauthorized modification or corruption of data
Workaround:
Limit access to the affected systems to trusted networks or users.
Fix:
Patched kernel to fix the vulnerability.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1051769-8 : CVE-2019-10140 kernel: overlayfs: NULL pointer dereference in ovl_posix_acl_create function in fs/overlayfs/dir.c
Component: TMOS
Symptoms:
An attacker with local access can create a denial of service situation via a NULL pointer dereference in ovl_posix_acl_create function in fs/overlayfs/dir.c. This can allow attackers with the ability to create directories on overlayfs to crash the kernel creating a denial of service (DOS).
Conditions:
Linux kernel versions before 3.10 are vulnerable
Impact:
It can result in DoS.
Workaround:
N/A
Fix:
kernel has been patched to address this vulnerability.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1051697-9 : CVE-2019-11833 kernel: fs/ext4/extents.c leads to information disclosure
Component: TMOS
Symptoms:
A flaw was found in the Linux kernels implementation of ext4 extent management which did not correctly initialize memory regions in the extent tree block which may be exported to a local user to obtain sensitive information by reading empty/uninitialized data from the filesystem.
Conditions:
Linux kernel versions before 5.1.2 are vulnerable
Impact:
It can result in information disclosure
Workaround:
N/A
Fix:
kernel has been patched to address this vulnerability.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1047789-1 : [APM] MCP err msg seen when editing/applying resource assign in VPE
Links to More Info: BT1047789
Component: TMOS
Symptoms:
An error message is found in /var/log/apm
MCP message handling failed in 0xb0ad80 (16973840): Sep 3 09:56:22 on 2 - MCP Message:
Conditions:
When VPE (or via CLI) "Advanced Resource Assign" agent is re-configured
Impact:
No functional impact.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1
1041889-5 : RRSIG missing for CNAME with RDATA in different zone
Links to More Info: BT1041889
Component: Global Traffic Manager (DNS)
Symptoms:
RRSIG missing for CNAME.
Conditions:
-- CNAME record with RDATA in different zone.
-- One zone dynamically signed.
-- The other zone in local BIND (ZoneRunner) with static DNSSEC records.
Impact:
DNSSEC validation failure.
Fixed Versions:
21.0.0, 17.5.1.2
1036645-4 : Running keyswap.sh on a VIPRION or VCMP platform may not complete successfully
Links to More Info: BT1036645
Component: Local Traffic Manager
Symptoms:
When running keyswap.sh to synchronize ssh keys on a multi-bladed system, keyswap.sh may not complete successfully.
Conditions:
-- A multi-bladed environment such as VIPRION or VCMP
-- The keyswap.sh script is run
Impact:
The keyswap.sh script may not complete successfully
Workaround:
Run keyswap.sh on the console
(or)
nohup /usr/bin/keyswap.sh -genkeys
(or)
stop csyncd before running keyswap.sh and then re-start it:
tmsh stop sys service csyncd
keyswap.sh -genkeys
tmsh start sys service csyncd
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1036221-3 : "Illegal parameter value length" is reported with parsing product length.
Links to More Info: BT1036221
Component: Application Security Manager
Symptoms:
"Illegal parameter value length" violation is reported with wrong parameter length.
Conditions:
A JSON parameter is encoded.
Impact:
The decoded value length of the parameter in the JSON payload will be reported instead of its original length.
Workaround:
None
Fix:
The original parameters value length is reported with "Illegal parameter value length" violation.
Fixed Versions:
17.5.1.4
1032001-4 : Statemirror address can be configured on management network or clusterd restarting
Links to More Info: BT1032001
Component: TMOS
Symptoms:
- Able to create statemirror address on the same network as management or cluster network.
- Validation issues when attempting to remove a management address.
- Clusterd process restarts constantly.
Conditions:
- Management/cluster address set up with IPv6 and statemirror address is configured with IPv4.
Impact:
- Unable to make configuration changes to the management or cluster address until the statemirror address is removed.
- Clusterd process restarts constantly causing the blade or cluster to report as offline.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3, 15.1.3.1
1029173-6 : MCPD fails to reply and does not log a valid message if there are problems replicating a transaction to PostgreSQL
Links to More Info: BT1029173
Component: TMOS
Symptoms:
In rare circumstances MCPD fails to reply to a request from TMSH, GUI, or any daemon, for example, SNMPD.
Following is an example error message:
Mar 29 00:03:12 bigip1 err mcpd[15865]: 01070734:3: Configuration error: MCPProcessor::processRequestNow: std::exception
If snmpd is the daemon that is impacted you might see this warning message:
warning snmpd[15561]: 010e0004:4: MCPD query response exceeding 270 seconds
Conditions:
- AFM is provisioned.
- MCPD fails to connect PostgreSQL.
Impact:
TMSH command save sys config might be hung.
SNMPD stops replying to SNMP GET requests.
Workaround:
If there are any hung TMSH commands, then quit.
If SNMPD stops responding to SNMP requests, then use the command bigstart restart snmpd to restart SNMPD.
Fixed Versions:
21.0.0, 17.5.1.4
1028701-12 : CVE-2019-9947 python: CRLF injection via the path part of the url passed to urlopen()
Links to More Info: K000151516, BT1028701
1028541-9 : CVE-2018-18384: Unzip Vulnerability
Component: TMOS
Symptoms:
Info-ZIP UnZip 6.0 has a buffer overflow in list.c, when a ZIP archive has a crafted relationship between the compressed-size value and the uncompressed-size value, because a buffer size is 10 and is supposed to be 12.
Conditions:
NA
Impact:
Exploitation requires high-privileged local user access and user interaction, causing only a limited availability impact (denial of service).
Workaround:
NA
Fix:
Patched unzip to resolve the vulnerability
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1027237-5 : Cannot edit virtual server in GUI after loading config with traffic-matching-criteria
Links to More Info: BT1027237
Component: TMOS
Symptoms:
After creating a virtual server with a traffic-matching-criteria and then loading the configuration, you are unable to make changes to it in the GUI. Attempting to do so results in an error similar to:
0107028f:3: The destination (0.0.0.0) address and mask (::) for virtual server (/Common/test-vs) must be be the same type (IPv4 or IPv6).
Conditions:
-- A virtual server that has traffic-matching-criteria (i.e., address and/or port lists).
-- The configuration has been saved at least once.
-- Attempting to edit the virtual server in the GUI.
Impact:
Unable to use the GUI to edit the virtual server.
Workaround:
Use TMSH to modify the virtual server.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3, 16.1.6.1, 15.1.10.8
1014361 : Config sync fails after provisioning APM or changing BIG-IP license
Links to More Info: BT1014361
Component: TMOS
Symptoms:
Clustered high availability (HA) devices cannot establish ConfigSync connection, and the prompt status reports disconnected.
MCPD is logging a message similar to this repeatedly, even though all TMMs are up and running:
err mcpd[4247]: 0107142f:3: Can't connect to CMI peer 192.0.2.1, TMM outbound listener not yet created
Conditions:
This can occur in either of the following conditions:
-- Some provisioning operations (i.e. provisioning APM), when TMM restarts during the provisioning. This has primarily been seen with BIG-IP instances running in Google Cloud.
-- Changing the license of a BIG-IP VE when the new license changes the number of TMM instances that will run on the BIG-IP (i.e. upgrading from a 1Gbps to 3Gbps VE license)
Impact:
BIG-IP devices are not able to perform ConfigSync operations.
Workaround:
Restart MCPD on the affected system.
Note: This will disrupt traffic while system services restart.
Fix:
Enhanced MCPD logic to maintain the connected state when a license change event occurs.
Fixed Versions:
21.0.0, 17.5.1.3
1009161-5 : SSL mirroring protect for null sessions
Links to More Info: BT1009161
Component: Local Traffic Manager
Symptoms:
Possible tmm crash during ssl handshake with connection mirroring enabled.
Conditions:
14.1 after changes applied for ID760406 and ssl handshake dropped during ssl handshake session state.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Disable connection mirroring
Fix:
Prevent possible crash on ssl connection mirroing in 14.1
Fixed Versions:
21.0.0, 17.5.1.4, 15.1.5.1, 14.1.4.5
1008885-3 : Sessiondump CPU is showing unknown for Mac OS and BIG-IP platform
Links to More Info: BT1008885
Component: Access Policy Manager
Symptoms:
After APM session, when a user creates an access session using Mac OS based clients, the session dump shows CPU as unknown in session.client.cpu value.
Conditions:
Mac OS based client is used.
Impact:
If session.client.cpu variable is used for any access policy decisions, it will fail as CPU is unknown.
Workaround:
None
Fix:
CPU should be shown properly like x86_64 or any other.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3, 16.1.6.1
1004953-7 : HTTP does not fall back to HTTP/1.1★
Links to More Info: BT1004953
Component: Local Traffic Manager
Symptoms:
After upgrading, the BIG-IP system's HTTP profile no longer falls back to HTTP/1.1 if a client sends a corrupted URI.
Conditions:
-- Client sends a corrupted URI (for example a URI containing a space).
Impact:
The BIG-IP system treats the URI as an HTTP/0.9 request (as per RFC) and forwards only the first request line. In previous releases, the BIG-IP system treated the URI as a HTTP/1.1 request.
Workaround:
None.
Fix:
Added db variable tmm.http.rfc.allowinsecureverfallback to allow insecure fallback to HTTP/1.1. Default is 'disable'.
Fixed Versions:
17.5.1.4
Known Issues in BIG-IP v17.5.x
TMOS Issues
| ID Number | Severity | Links to More Info | Description |
| 2200053 | 1-Blocking | Virtual interfaces inside the F5OS tenant are going into uninitialization state for few slot's when setup is in idle state on F5 CX1610 chassis with BX520 blade. | |
| 2141205-2 | 1-Blocking | BT2141205 | Tpm-status returns: "System Integrity: Invalid" for some Engineering Hotfixes |
| 1991485 | 1-Blocking | BT1991485 | Re-adding a tunnel with the exact same name might result in tunnel ingress traffic getting dropped. |
| 967769-4 | 2-Critical | BT967769 | During reset of high-speed interfaces, TMMs may mistakenly continue hardware watchdog checks |
| 962729-4 | 2-Critical | BT962729 | New User automatically unlocked when "Automatically enable locked-out users after" is not configured |
| 780437-10 | 2-Critical | BT780437 | Upon rebooting a VIPRION chassis provisioned as a vCMP host, some vCMP guests can return online with no configuration. |
| 777389-8 | 2-Critical | BT777389 | In rare occurrences related to PostgreSQL monitor, the mcpd process restarts |
| 742764-5 | 2-Critical | BT742764 | If two racoon daemon are spawned on startup, one fails and cores. |
| 721591-4 | 2-Critical | K000141369, BT721591 | Java crashes with core during with high load on REST API |
| 671545-6 | 2-Critical | BT671545 | MCPD core while booting up device with error "Unexpected exception caught" |
| 566756-3 | 2-Critical | BT566756 | VCMP 4 cores on 3 blades : mcpd core when delete 255 dos profiles via tmsh command while machine is idle |
| 2185485-2 | 2-Critical | BT2185485 | The value of /proc/sys/vm/min_free_kbytes might be too big on Hyper-V and Azure VEs with multiple cores and multiple NICs★ |
| 2154089-1 | 2-Critical | "Test" button for monitor object is missing. | |
| 2154057-4 | 2-Critical | BT2154057 | MCPD validations not throwing error when snmpv3 password contains more than 77 characters★ |
| 2139893-1 | 2-Critical | BT2139893 | vCMP guest may become unresponsive for several minutes due to kernel soft lockup |
| 2130913-1 | 2-Critical | BT2130913 | PUT request errors when trying to modify a firewall rule-list and firewall management-ip-rules |
| 2064413-3 | 2-Critical | BT2064413 | UCS file download failure via REST API |
| 1983145-1 | 2-Critical | BT1983145 | Memory Corruption due to xnet-DPDK★ |
| 1921217-1 | 2-Critical | BT1921217 | Incremental build breaks due to library mismatch |
| 1812349-5 | 2-Critical | BT1812349 | IPsec phase 2 (IKEv1 Quick Mode) will not start after upgrade★ |
| 1757585-4 | 2-Critical | BT1757585 | Unable to install a license on an AWS BIG-IP VE |
| 1678105-3 | 2-Critical | BT1678105 | F5OS tenant, TMM crashing after loading a UCS |
| 1571817-4 | 2-Critical | BT1571817 | FQDN ephemeral pool member user-down state is not synced to the peer device |
| 1395349-1 | 2-Critical | BT1395349 | The httpd service shows inactive/dead after "bigstart restart httpd" |
| 1330213-6 | 2-Critical | BT1330213 | SIGABRT is sent when single quotes are not closed/balanced in TMSH commands |
| 1327649-4 | 2-Critical | BT1327649 | Invalid certificate order within cert-chain associated to JWK configuration |
| 1321697-1 | 2-Critical | BT1321697 | Moving VLANs or interfaces between LAGs on F5OS 1.8.0 (R2600) results in loss of connectivity on tenant Self-IP |
| 1277389-1 | 2-Critical | BT1277389 | HSB transmitter lockup |
| 1093717-6 | 2-Critical | BT1093717 | BGP4 SNMP traps are not working. |
| 1077789-7 | 2-Critical | BT1077789 | System might become unresponsive after upgrading.★ |
| 1027961-4 | 2-Critical | BT1027961 | Changes to an admin user's account properties may result in MCPD crash and failover |
| 1006449-5 | 2-Critical | BT1006449 | High CPU utilization and slow SNMP response after upgrade★ |
| 977953-7 | 3-Major | BT977953 | Show running config interface CLI could not fetch the interface info and crashes the imi |
| 941961-6 | 3-Major | BT941961 | Upgrading system using WAM TCP profiles may prevent the configuration from loading |
| 923745-6 | 3-Major | BT923745 | Ctrl-Alt-Delete in virtual console reboots BIG-IP Virtual Edition |
| 921069-6 | 3-Major | BT921069 | Neurond cores while adding or deleting rules |
| 905749-8 | 3-Major | BT905749 | imish crash while checking for CLI help string in BGP mode |
| 904401-7 | 3-Major | BT904401 | Guestagentd or devmgmtd core |
| 895845-7 | 3-Major | BT895845 | Implement automatic conflict resolution for gossip-conflicts in REST |
| 883149-9 | 3-Major | BT883149 | The fix for ID 439539 can cause mcpd to core. |
| 880473-6 | 3-Major | BT880473 | Under certain conditions, the virtio driver may core during shutdown |
| 867549-7 | 3-Major | BT867549 | LCD touch panel reports "Firmware update in progress" indefinitely★ |
| 851837-6 | 3-Major | BT851837 | Mcpd fails to start for single NIC VE devices configured in a trust domain |
| 844925-7 | 3-Major | BT844925 | Command 'tmsh save /sys config' fails to save the configuration and hangs |
| 809089-7 | 3-Major | BT809089 | TMM crash after sessiondb ref_cnt overflow |
| 791365-7 | 3-Major | BT791365 | Bad encryption password error on UCS save |
| 775845-9 | 3-Major | BT775845 | Httpd fails to start after restarting the service using the iControl REST API |
| 759258-9 | 3-Major | BT759258 | Instances shows incorrect pools if the same members are used in other pools |
| 739904-6 | 3-Major | BT739904 | /var/log/ecm log is not rotated |
| 664816-1 | 3-Major | BT664816 | The Neuron SDK rejects rule delete requests with -5 error |
| 637827-4 | 3-Major | BT637827 | VADC: after re-deploying a single-nic VM with multiple nics, a load can fail due to stp member 1.0 |
| 554506-5 | 3-Major | K47835034, BT554506 | PMTU discovery from the management interface does not work |
| 469724-6 | 3-Major | BT469724 | When evaluation/demonstration features expire, features enabled by both evaluation and perpetual licenses also expire |
| 2201877-2 | 3-Major | BT2201877 | SCTP multihoming fails with ICMP unreachable for alternate paths. |
| 2199541-1 | 3-Major | BT2199541 | BIG-IP GUI auth-pam-idle-timeout behaves as if capped at 1200 seconds when configured with higher values |
| 2197289-2 | 3-Major | BT2197289 | Enabling SSH access via the GUI blocks MCPD for 90 seconds |
| 2186009-1 | 3-Major | BT2186009 | Increased TX IQ size for netvsc |
| 2184897 | 3-Major | BT2184897 | Tenant disk size modification is ineffective for var/log folder |
| 2183241-1 | 3-Major | BT2183241 | Trunk egress traffic is not balanced on some platforms. |
| 2182061-2 | 3-Major | BT2182061 | Management routes not installed on reboots when interface route is recursively required. |
| 2162997-2 | 3-Major | BT2162997 | AS3 becomes unresponsive after upgrade from 17.1.2.1 to 17.1.2.2 Build 0.311.1★ |
| 2153421-1 | 3-Major | BT2153421 | iControl REST /mgmt/toc endpoint and object browser pages are not functioning on BIG-IP v17.x |
| 2152257-2 | 3-Major | BT2152257 | [BGP] remove-private-AS does not work with extended ASN numbers |
| 2143109-2 | 3-Major | BT2143109 | BIG-IP VE with more CPU cores than licensed enters TMM restart loop (TMM PU (<num_cores>) >= number of PUs (<num_licensed_cores>)) after mcpd restart |
| 2141373 | 3-Major | BT2141373 | MCPD crash during dossier validation when /shared/vadc/.hypervisor_type contains invalid or empty (DossierValidator::get_cloud_type) |
| 2140213-1 | 3-Major | BT2140213 | Xnet-netvsc driver crash |
| 2131833-4 | 3-Major | BT2131833 | F5OS/rSeries r2xxx/r4xxx BIG-IP Tenant management interface not reachable |
| 2058541-2 | 3-Major | BT2058541 | [BGP] BIG-IP does not follow updated section of rfc4724.html#section-4.2 when handling a new connection from peer. |
| 2053489-1 | 3-Major | BT2053489 | Config Sync events may not be recorded in audit log |
| 2047429-3 | 3-Major | BT2047429 | PostgreSQL should dump a corefile when not exiting |
| 2038429-1 | 3-Major | BT2038429 | Issue with ike_ctx causes memory corruption |
| 2038425-1 | 3-Major | BT2038425 | Issue with ike_ctx causes memory corruption |
| 2038421-1 | 3-Major | BT2038421 | Issue with ike_ctx causes memory corruption |
| 2038417-1 | 3-Major | BT2038417 | Issue with ike_ctx causes memory corruption |
| 2014597-2 | 3-Major | BT2014597 | Async session db ops are missing flow control |
| 1993081-3 | 3-Major | BT1993081 | SNMP traps are not being generated for bigipExternalLinkDown (.1.3.6.1.4.1.3375.2.4.0.218) and bigipExternalLinkUp (.1.3.6.1.4.1.3375.2.4.0.219). |
| 1989033-2 | 3-Major | BT1989033 | IPsec IKEv2 tunnel may fail to initiate or respond due to ERR_PORT |
| 1974845-1 | 3-Major | BT1974845 | Missing routes in 1nic allows access to GUI via self IP |
| 1972465-1 | 3-Major | BT1972465 | LTM Syncookie always SW mode for a wildcard virtual server |
| 1972273-2 | 3-Major | BT1972273 | [F5OS tenant] Adjusting VLAN mtu (or description) throws MCP validation error VLAN /Common/vlan has an id of X, and customer-tag of none and it cannot be used by VLAN /Common/vlan |
| 1967589-2 | 3-Major | BT1967589 | Using tmsh to query iControl REST (tmsh list mgmt ...) commands consume an auth token and does not get removed immediately |
| 1958033-1 | 3-Major | BT1958033 | MCPD validates only one ssl profile when a virtual server attached to http/2 profile with enforce-tls-requirements enabled along with multiple clientssl profiles with anyone has renegotiation option enabled |
| 1943669 | 3-Major | BT1943669 | "Automatic Update Check & Automatic Phone Home features" settings is changed upon running 'load sys config current-partition' in other partition |
| 1938345 | 3-Major | BT1938345 | F5 on AWS : Unable to Launch F5 BIG-IP instance with latest firmware 17.5.0 in AWS★ |
| 1937545-1 | 3-Major | BT1937545 | Disabling ipsec.if.checkpolicy lead to premature connection termination for a tunneled traffic |
| 1936469-1 | 3-Major | BT1936469 | Multiple Ctrl-Alt-Delete signals in virtual console reboots BIG-IP Virtual Edition |
| 1933105-3 | 3-Major | BT1933105 | TMM does not fragment the output before encapsulating the payload |
| 1927521-1 | 3-Major | BT1927521 | DPDK has dependency on SSSE3 |
| 1922617-3 | 3-Major | BT1922617 | BGP Multipath selection might be unpredictable. |
| 1893989-1 | 3-Major | BT1893989 | NTP truncates symmetric keys to 30 bytes |
| 1890749-2 | 3-Major | BT1890749 | In a multi-user scenario, the system is allowing users to create more authentication tokens than the maximum limit allowed per user. |
| 1881569-4 | 3-Major | BT1881569 | Programs invoked by tmsh when session is interrupted may remain running |
| 1854353-3 | 3-Major | BT1854353 | Users with Resource admin role are not able to save the UCS. |
| 1826273-2 | 3-Major | BT1826273 | Mysql client uses TLS1.1 when connecting to mysql server running 5.7 |
| 1788193-3 | 3-Major | BT1788193 | [MCP] Request logging should only be allowed with supported protocol profiles |
| 1784137-1 | 3-Major | BT1784137 | Net stp-globals object config-name back to default value upon reboot |
| 1759261-4 | 3-Major | BT1759261 | OSPF might fail to install external routes after topology change. |
| 1753489-2 | 3-Major | BT1753489 | BFD Commands Missing in ZebOS Config After Reboot or Restart for large configurations |
| 1708957-2 | 3-Major | BT1708957 | Excessive debug logs can cause key management daemon failure |
| 1670625-3 | 3-Major | BT1670625 | Incorrect set of TCAM rules |
| 1644497-4 | 3-Major | BT1644497 | TMM retains old Certificate Revocation List (CRL) data in memory until the existing connections are closed |
| 1615081-4 | 3-Major | BT1615081 | Remove SHA and AES Constraint Checks in SNMPv3 |
| 1602629-4 | 3-Major | BT1602629 | Tmm_mcpmsg_print can trigger SOD |
| 1602209-4 | 3-Major | BT1602209 | The bigipTrafficMgmt.conf file is not copied from UCS to /config/snmp★ |
| 1599841-1 | 3-Major | BT1599841 | Partition access is not synced to Standby device after adding a remote user locally. |
| 1596409-2 | 3-Major | BT1596409 | Low thresholds for tcp-ack-ts vector caused outage after upgrade to v17.1★ |
| 1596313-2 | 3-Major | BT1596313 | Deleting and re-adding a LAG on F5OS causes a validation failure in mcpd, therefore the trunk on the tenant has no interfaces |
| 1586745-2 | 3-Major | BT1586745 | LACP trunk status became DOWN due to bcm56xxd failure |
| 1560449-2 | 3-Major | BT1560449 | Rest_logintegrity does not suppress output to stderr |
| 1552517-2 | 3-Major | BT1552517 | When F5OS tenants are part of a GTM sync group, rebooting one device may cause monitor flapping on the other |
| 1497061-4 | 3-Major | BT1497061 | Added support for VLANs above 512 with xnet-IAVF driver |
| 1489817-4 | 3-Major | BT1489817 | Fix crash due to number of VLANs |
| 1455805-2 | 3-Major | BT1455805 | MCPD unstable/inoperative after copying SNMP configuration from another BIG-IP |
| 1322413-5 | 3-Major | BT1322413 | After config sync, FQDN node status changes to Unknown/Unchecked on peer device |
| 1316481-4 | 3-Major | BT1316481 | Large CRL file update fails with memory allocation failure |
| 1312225-6 | 3-Major | BT1312225 | System Integrity Status: Invalid with some Engineering Hotfixes |
| 1304849-3 | 3-Major | K000140512, BT1304849 | iSeries LCD displays "Host inaccessible or in diagnostic mode" |
| 1302101-4 | 3-Major | BT1302101 | Sflow receiver flows are not established at TMM startup on sDAG platforms due to sDAG delay |
| 1301897-6 | 3-Major | BT1301897 | DAG transition does not complete when TMM starts in FORCED_OFFLINE mode |
| 1291121-3 | 3-Major | BT1291121 | BIG-IP tenants on F5OS r5000, r10000, and r12000 platforms don't pass traffic properly while in forced offline state |
| 1283721-4 | 3-Major | BT1283721 | Vmtoolsd memory leak |
| 1281929-4 | 3-Major | BT1281929 | The BIG-IP system's time zone database does not reflect recent changes implemented by Mexico in regard to DST |
| 1271941-4 | 3-Major | BT1271941 | Tomcat CPU utilization increased after upgrading to 15.1.6 and higher versions.★ |
| 1256757-1 | 3-Major | BT1256757 | Suspect keymgmtd memory leak while using dynamic CRL. |
| 1230109-1 | 3-Major | BT1230109 | Mcpd memory and CPU increase while getting route stats |
| 1183901-9 | 3-Major | BT1183901 | VLAN name greater than 31 characters results in invalid F5OS tenant configuration |
| 1183529-3 | 3-Major | BT1183529 | OCSP request burst when cert-ldap authentication is enabled |
| 1168245-1 | 3-Major | BT1168245 | Browser is intermittently unable to contact the BIG-IP device |
| 1126505-1 | 3-Major | BT1126505 | HSB and switch pause frames impact data traffic |
| 1106489-5 | 3-Major | BT1106489 | GRO/LRO is disabled in environments using the TMM raw socket "sock" driver. |
| 1090313-6 | 3-Major | BT1090313 | Virtual server may remain in hardware SYN cookie mode longer than expected |
| 1062901-6 | 3-Major | BT1062901 | The 'trap-source' and 'network' SNMP properties are ineffective, and SNMP traps may be sent from an unintended interface. |
| 1052057-2 | 3-Major | BT1052057 | FCS errors on switch/HSB interface impacts networking traffic |
| 1040277-8 | 3-Major | BT1040277 | Syslog-ng issue may cause logging to stop and possible reboot of a system |
| 1036217-4 | 3-Major | BT1036217 | Secondary blade restarts as a result of csyncd failing to sync files for a device group |
| 1022997-6 | 3-Major | BT1022997 | TCP segments with an incorrect checksum are transmitted when the sock driver is used in AWS deployments (e.g., 1NIC) |
| 1016273-2 | 3-Major | BT1016273 | Standby TMM can core or cause incorrect mirroring during upgrade when session mirroring is enabled★ |
| 1015093-6 | 3-Major | BT1015093 | The "iq" column is missing from the ndal_tx_stats table |
| 1013793-2 | 3-Major | BT1013793 | Pool members may flap on BIG-IP VE with provision.1nic set to forced_enable |
| 1013209-7 | 3-Major | BT1013209 | BIG-IP components relying on ca-bundle.crt may stop working after upgrade★ |
| 1010301-2 | 3-Major | BT1010301 | Long-Running iCall script commands can result in iCall script failures or ceasing to run |
| 1009337-7 | 3-Major | BT1009337 | LACP trunk down due to bcm56xxd send failure |
| 1003225-5 | 3-Major | BT1003225 | 'snmpget F5-BIGIP-LOCAL-MIB::ltmWebAccelerationProfileStat* returns zeroes |
| 995653-3 | 4-Minor | BT995653 | Bigtop command is showing inaccurate 'Conn' value for NODE ip:port |
| 939517-7 | 4-Minor | BT939517 | DB variable scheduler.minsleepduration.ltm changes to default value after reboot |
| 929173-8 | 4-Minor | BT929173 | Watchdog reset due to CPU stall detected by rcu_sched |
| 928665-6 | 4-Minor | BT928665 | Kernel nf_conntrack table might get full with large configurations. |
| 824953-2 | 4-Minor | BT824953 | The sFlow sample collection for VLAN does not work with VLAN groups |
| 747823-4 | 4-Minor | BT747823 | Drd utility can hang when generating qkview |
| 745125-4 | 4-Minor | BT745125 | Network Map page Virtual Servers with associated Address/Port List have a blank address. |
| 714705-10 | 4-Minor | BT714705 | Excessive 'The Service Check Date check was skipped' log messages. |
| 694765-9 | 4-Minor | BT694765 | Changing the system's admin user causes vCMP host guest health info to be unavailable |
| 658943-8 | 4-Minor | BT658943 | Errors when platform migration process is loading UCS using trunks on vCMP guest/F5OS Tenants |
| 423304-4 | 4-Minor | Sync issues with certain objects' parameters. | |
| 2196569-2 | 4-Minor | BT2196569 | Multiple SSL Certificates get consolidated in the SSL Certificate List |
| 2163277-1 | 4-Minor | BT2163277 | Updating the management route via the GUI fails |
| 2151505-2 | 4-Minor | BT2151505 | Cmp_dest_velos is automatically installed on system startup. |
| 2150869-2 | 4-Minor | BT2150869 | Incorrect information for count of failed login for a user |
| 2141305-1 | 4-Minor | BT2141305 | SSH Proxy Profile Properties page does not render |
| 2131701-1 | 4-Minor | BT2131701 | The Virtual Server setting serverssl-use-sni can't be configured from the Configuration Utility |
| 2131597-2 | 4-Minor | BT2131597 | BGP graceful restart might not accept a new connection immediatelly post neighbor failover. |
| 2099441-1 | 4-Minor | BT2099441 | Garbled character in warning message when HA peer is added |
| 2064373 | 4-Minor | iApp menu appears on YK (Yunke OEM) | |
| 2064225-1 | 4-Minor | BT2064225 | FQDN nodes created when creating FQDN pool member have "address-family" set to "all" |
| 2064209-1 | 4-Minor | BT2064209 | FQDN node created from pool member via tmsh does not inherit "autopopulate" value |
| 2050389-2 | 4-Minor | BT2050389 | VIPRION cluster management IP may not appear in SNMP IP-MIB table |
| 2047069-1 | 4-Minor | BT2047069 | Issue observed in Checkmarx scan |
| 2011341 | 4-Minor | BT2011341 | The address list file fails to load during an SCF file merge★ |
| 1976689 | 4-Minor | BT1976689 | Memory Leak in publishing did information |
| 1972321-2 | 4-Minor | BT1972321 | "IP Reputation" option does not show up when creating a rule in LTM policy |
| 1968193-1 | 4-Minor | BT1968193 | Management Route name displayed incorrectly via API when the route name contains a forward slash (/) |
| 1967293-3 | 4-Minor | BT1967293 | Re-configuring BFD multihop for a BGP peer does not work reliably. |
| 1966053-1 | 4-Minor | BT1966053 | MCPD memory leak in firewall |
| 1959785-2 | 4-Minor | BT1959785 | BIG-IP incorrectly marked as "Managed by BIG-IQ" by its BIG-IP HA peer |
| 1934941-3 | 4-Minor | BT1934941 | Assertion failure in aspath_intern for BGPD. |
| 1934457-4 | 4-Minor | BT1934457 | Cursor in BIG-IP Configuration Utility iRule editor appears in the incorrect position |
| 1828005-1 | 4-Minor | BT1828005 | Syslog message does not carry log level when destination is remote |
| 1778901-2 | 4-Minor | BT1778901 | PPTP-GRE proxy need tmstat table for connection error analysis |
| 1688545-2 | 4-Minor | BT1688545 | PVA-processed traffic is not included in the route-domain stats via SNMP |
| 1682101-2 | 4-Minor | BT1682101 | Restjavad CPU goes close to 100% during telemetry pollers collect stats |
| 1677409-2 | 4-Minor | BT1677409 | Show auth login-failures does not show failures when remote auth falls back to local auth |
| 1635013-6 | 4-Minor | BT1635013 | The "show sys service" command works only for users with Administrator role |
| 1589421-1 | 4-Minor | BT1589421 | LTM Monitor not shown in Pool Member "Health Monitors" if Transparent attribute changes |
| 1462337-5 | 4-Minor | BT1462337 | Intermittent false PSU status (not present) through SNMP |
| 1331037-5 | 4-Minor | BT1331037 | The message MCP message handling failed logs in TMM with FQDN nodes/pool members |
| 1301317-4 | 4-Minor | BT1301317 | Update Check request using a proxy will fail if the proxy inserts a custom header |
| 1295217-1 | 4-Minor | BT1295217 | When provision.1nic is set to forced_enable the mgmt interface does not respond to ICMP |
| 1282421-4 | 4-Minor | BT1282421 | IS-IS protocol may discard Multi-Topology Reachable IPv6 Prefixes |
| 1121169-6 | 4-Minor | BT1121169 | Unable to resize the /appdata: /dev/mapper/vg--db--sda-dat.appdata when in use |
| 1089625-3 | 4-Minor | BT1089625 | Java core dump with SIGABRT while high cpu load in BIG-IP |
| 1969873-2 | 5-Cosmetic | BT1969873 | IP reputation status is only available on primary blade |
| 1361021-4 | 5-Cosmetic | BT1361021 | The management interface media on a BIG-IP Tenant on F5OS systems does not match the chassis |
Local Traffic Manager Issues
| ID Number | Severity | Links to More Info | Description |
| 1967005-2 | 1-Blocking | BT1967005 | TMM crash on R2x00/R4x00 platforms |
| 994973-4 | 2-Critical | BT994973 | TMM crash with do_drivers_probe() |
| 886045-8 | 2-Critical | BT886045 | Multi-NIC instances fail to come up when trying to use memory-mapped virtio device |
| 824437-10 | 2-Critical | BT824437 | Chaining a standard virtual server and an ipother virtual server together can crash TMM. |
| 797573-5 | 2-Critical | BT797573 | TMM assert crash with resulting in core generation in multi-blade chassis |
| 758491-7 | 2-Critical | BT758491 | When using NetHSM integration, after upgrade to 14.1.0 or later (or creating keys using fipskey.nethsm), BIG-IP cannot use the keys |
| 632553-8 | 2-Critical | K14947100, BT632553 | DHCP: OFFER packets from server are intermittently dropped |
| 2208821-2 | 2-Critical | BT2208821 | VIPRION cluster becomes INOPERATIVE and fails to load configuration after software upgrade★ |
| 1965329-1 | 2-Critical | BT1965329 | TMM may crash when re-declaring an LTM policy with a data-group |
| 1937589-1 | 2-Critical | BT1937589 | LTM v17.x f5-irule.crt is valid only until Jul 2027 |
| 1921085-1 | 2-Critical | BT1921085 | Core file generated when using FTP::ftps_mode require without SSL profile in TCP filter |
| 1921049-1 | 2-Critical | BT1921049 | When L7 policy is updated, existing HTTP/2 connection using it gets a RST_STREAM |
| 1854137-1 | 2-Critical | BT1854137 | Verified accept and pool reselect-tries may cause TCP proxy to core |
| 1598405-5 | 2-Critical | BT1598405 | Intermittent TCP RST error 'HTTP internal error (bad state transition)' occurs for larger files when the Explicit Proxy virtual server uses HTTP_REQUEST_SEND iRule event |
| 1100249-6 | 2-Critical | BT1100249 | SNAT with FLOW_INIT firewall rule may core TMM due to wrong type of underlying flow structure |
| 1091021-7 | 2-Critical | BT1091021 | The BIG-IP system may not take a fail-safe action when the bigd daemon becomes unresponsive. |
| 1073897-5 | 2-Critical | BT1073897 | TMM core due to memory corruption |
| 978953-5 | 3-Major | BT978953 | The value of the sys db variable vlan.backplane.mtu intermittently out-of-sync with the value of the MTU of the kernel interface tmm_bp during the initial boot up |
| 976853-2 | 3-Major | BT976853 | SNAT pool traffic-group setting may override non-floating self IP's traffic-group |
| 967353-9 | 3-Major | BT967353 | HTTP proxy should trim spaces between a header field-name and colon in its downstream responses. |
| 928445-9 | 3-Major | BT928445 | HTTPS monitor is down when server_ssl profile cipher string is configured to TLSv1_2 |
| 912293-8 | 3-Major | BT912293 | Persistence might not work properly on virtual servers that utilize address lists★ |
| 905477-8 | 3-Major | BT905477 | The sdmd daemon cores during config sync when multiple devices configured for iRules LX |
| 898389-8 | 3-Major | BT898389 | Traffic is not classified when adding port-list to virtual server from GUI |
| 881937-6 | 3-Major | BT881937 | TMM and the kernel choose different VLANs as source IPs when using IPv6. |
| 870349-5 | 3-Major | BT870349 | Continuous restart of ntlmconnpool after the license reinstallation★ |
| 867985-8 | 3-Major | BT867985 | LTM policy with a 'shutdown' action incorrectly allows iRule execution |
| 857769-5 | 3-Major | BT857769 | FastL4+HTTP or FastL4+Hash-Persistence virtual servers do not work correctly in DSR mode. |
| 812693-7 | 3-Major | BT812693 | Connection in FIN_WAIT_2 state may fail to be removed |
| 779137-9 | 3-Major | BT779137 | Using a source address list for a virtual server does not preserve the destination address prefix |
| 751451-6 | 3-Major | BT751451 | When upgrading to v14.0.0 or later, the 'no-tlsv1.3' option is missing from HTTPS monitors automatically created server SSL profiles |
| 739475-9 | 3-Major | BT739475 | Site-Local IPv6 Unicast Addresses support. |
| 687044-8 | 3-Major | BT687044 | Tcp-half-open monitors might mark a node up or down in error |
| 673060-2 | 3-Major | BT673060 | SSL handshake failure with Session Ticket enabled on the backend server |
| 637613-9 | 3-Major | K24133500, BT637613 | Cluster blade status immediately returns to enabled/green after it is disabled. |
| 2217093-2 | 3-Major | BT2217093 | L2 traffic to masquarade MAC on Standby might be flooded when multiple interfaces are used |
| 2211133-2 | 3-Major | BT2211133 | ICMP error length does not follow RFC 812 guidance |
| 2209157-2 | 3-Major | BT2209157 | FastL4 late binding does not proxy MSS when establishing server-side connection. |
| 2201813-2 | 3-Major | BT2201813 | BIG-IP enforces maximum concurrent streams limit immediately over HTTP/2 connection |
| 2199469-2 | 3-Major | BT2199469 | Serverssl-use-sni not working in HTTP2 to HTTP gateway setups. |
| 2197321-2 | 3-Major | BT2197321 | BIG-IP does not select FFDHE key share provided by the client on session resumption. |
| 2197305-2 | 3-Major | BT2197305 | BIG-IP generates invalid SSL key share |
| 2186933-2 | 3-Major | ILX Plugin may not work after use of npm install command on workspace. | |
| 2183917-2 | 3-Major | BT2183917 | BIG-IP might fail to update received TCP window when tm.tcpstopblindinjection is enabled |
| 2182045-4 | 3-Major | BT2182045 | The iavf driver might drop some IPv6 packets that contain destination option or routing type 2 headers |
| 2181929-2 | 3-Major | BT2181929 | Cipher suite order changes in cipher group after upgrading from v17.1.1.1 to v17.1.3★ |
| 2151885-2 | 3-Major | BT2151885 | When using service-down-action reset/drop on a pool attached to a DHCP virtual TMM might experience a crash. |
| 2149253-1 | 3-Major | BT2149253 | QUIC connection stalls with early data |
| 2144309-2 | 3-Major | BT2144309 | TMM might experience a crash when using a fix for Bug783077 |
| 2141297-2 | 3-Major | BT2141297 | In TLSv1.3, BIG-IP enforces the use of FFDHE key share if it is preferred over other DH groups★ |
| 2141233-1 | 3-Major | BT2141233 | Client authentication profile as "Request" in FIPS-CC mode causes connection termination without certificate★ |
| 2139637-2 | 3-Major | BT2139637 | TMM crash because of invalid context |
| 2135621-2 | 3-Major | BT2135621 | Poor TCP performance on Hyper-V non-accelerated deployments with Cisco VIC interfaces |
| 2132209-1 | 3-Major | BT2132209 | TMM crash while sending ACKs in invalid context |
| 2064505-1 | 3-Major | BT2064505 | TLS 1.2 handshake failure with cipher rule configured using hybrid KEM algorithms first |
| 2035277-3 | 3-Major | BT2035277 | Modifying virtual-address 'enabled' setting might lead to unpredictable virtual-server availability |
| 2033781-1 | 3-Major | BT2033781 | Memory allocation failed: can't allocate memory to extend db size |
| 1989125-1 | 3-Major | BT1989125 | TSval value of Ack packets sent by BIG-IP may roll back in time |
| 1988981-2 | 3-Major | BT1988981 | TMM crashes after detaching and reattaching a DoS profile on the DNS virtual server |
| 1977037-1 | 3-Major | K000153024, BT1977037 | TMM Virtual Edition on Azure goes into crash loop due to missing kernel driver★ |
| 1972541-1 | 3-Major | BT1972541 | Tmsh load sys config verify leaks compiled ltm (CPM) policies |
| 1969889 | 3-Major | BT1969889 | Expired certificates sent to clients by tmm due to network time synchronization |
| 1962813-4 | 3-Major | BT1962813 | The csyncd daemon on one or more of the cluster's secondary blades does not synchronise RRD files from the primary★ |
| 1959629-1 | 3-Major | BT1959629 | CSR generation via the GUI removes Subject Alternative Name (SAN) string. Also, when SAN is configured with small prefix chars "dns:", no error is thrown. |
| 1943257-1 | 3-Major | BT1943257 | HTTP monitor "last error" string sends incorrect response |
| 1935713-2 | 3-Major | BT1935713 | TMM crash when handling traffic over vlangroup with autolasthop disabled |
| 1934157-2 | 3-Major | BT1934157 | Http2 monitor fails if a pool is used for routing to pool members |
| 1930897-1 | 3-Major | BT1930897 | Tmm core due to overflow of ifc ref counts with flow forwarding |
| 1929045-3 | 3-Major | BT1929045 | TMM may core after HTTP::respond used for first request on iSession connection |
| 1928169-1 | 3-Major | BT1928169 | HTTP2 RST_STREAM NO_ERROR received by BIG-IP not interpreted correctly |
| 1921069-2 | 3-Major | BT1921069 | The error ERR_ARG occurs when using iRule HTTP::collect command without the parameter value in HTTP_REQUEST_DATA |
| 1889861-3 | 3-Major | BT1889861 | Passive monitoring with ASM might not log the server response. |
| 1889741-2 | 3-Major | Need for the SYS DB variable to toggle ssl_crypto::queue_max | |
| 1849029 | 3-Major | BT1849029 | Debug TMM crashes in FIPS/CC mode |
| 1824521-2 | 3-Major | BT1824521 | GUI: VLAN names are not populated while creating the vlan-group under Network Quick configuration |
| 1818137-2 | 3-Major | BT1818137 | Tmm IPv4 fragmentation handling distribution |
| 1788105-2 | 3-Major | BT1788105 | TLS1.3 connections between BIG-IP and server hangs with an APM policy that is invoked after the server's SSL handshake finishes★ |
| 1788065-1 | 3-Major | BT1788065 | The rule cannot be deleted because it is in use by a rule |
| 1778793-5 | 3-Major | BT1778793 | Database health monitors may use the wrong connection when attempting to connect to database |
| 1624557-3 | 3-Major | BT1624557 | HTTP/2 with RAM cache enabled could cause BIG-IP to return HTTP 304 with content |
| 1598381-1 | 3-Major | BT1598381 | Unable to set the key-usage setting while renewing the CSR |
| 1596637-2 | 3-Major | BT1596637 | TLS1.3 with c3d and ocsp handshake failure |
| 1589629-4 | 3-Major | BT1589629 | An ICMPv6 Neighbor Solicitation sent to the last address on an IPv6 subnet uses the wrong Destination MAC address |
| 1585153-1 | 3-Major | BT1585153 | SSL handshake failures with error message Profile <name> cannot load key/cert/chain |
| 1581685-4 | 3-Major | BT1581685 | iRule 'members' command counts FQDN pool members. |
| 1549397-4 | 3-Major | BT1549397 | Pool member from statically-configured node deleted along with ephemeral pool member using same IP address |
| 1497633-4 | 3-Major | BT1497633 | TMC incorrectly set /32 mask for virtual-address 0.0.0.0/0 when attached to a VS |
| 1463089-1 | 3-Major | BT1463089 | TMM crash because of corrupted MQTT queue |
| 1411365-1 | 3-Major | BT1411365 | CMP forwarded flows can be removed by other CMP forwarded flows incorrectly |
| 1352213-4 | 3-Major | BT1352213 | Handshake fails with FFDHE key share extension |
| 1316821-3 | 3-Major | BT1316821 | SSL::enable not allowed after HTTP::respond |
| 1311053-4 | 3-Major | BT1311053 | Invalid response may be sent to a client when a http compression profile and http analytics profile attached to a virtual server |
| 1284589-4 | 3-Major | BT1284589 | HTTP CONNECT request from client is not successful with the iRule 'HTTP::disable discard' command |
| 1284413-4 | 3-Major | BT1284413 | After upgrade to 16.1.3.2 from 16.0.1.1, BIG-IP can send CONNECT requests when no proxy select agent is used★ |
| 1231889-5 | 3-Major | BT1231889 | Mismatched VLAN names (or VLANs in non-Common partitions) do not work properly BIG-IP tenants running on r2000 / r4000-series appliances |
| 1196505-2 | 3-Major | BT1196505 | BIG-IP might RST HTTP2 connection with [F5RST:mrhttp_proxy bad transition] when ASM is in use. |
| 1189909-1 | 3-Major | BT1189909 | Active SSL Connections Curve is always kept at Zero on Performance Graph |
| 1137521-2 | 3-Major | BT1137521 | TLSv1.3 connections dropped when SSL Persistence is enabled |
| 1128033-4 | 3-Major | BT1128033 | Neuron client constantly logs errors when TCAM database is full |
| 1125381-5 | 3-Major | BT1125381 | Extraneous warnings recorded in when using only intermediate certificates |
| 1110485-7 | 3-Major | BT1110485 | SSL handshake failures with invalid profile error |
| 1091785-7 | 3-Major | BT1091785 | DBDaemon restarts unexpectedly and/or fails to restart under heavy load |
| 1087569-7 | 3-Major | BT1087569 | Changing max header table size according HTTP2 profile value may cause stream/connection to terminate |
| 1086473-7 | 3-Major | BT1086473 | BIG-IP resumes a TLS session on the client-side but then proceeds to do a full handshake |
| 1075045-6 | 3-Major | BT1075045 | Proxy initialization failed, Defaulting to DENY, after applying additional profile to a virtual server |
| 1060541-5 | 3-Major | BT1060541 | Increase in bigd CPU utilization from 13.x when SSL/TLS session resumption is not utilized by HTTPS pool members due to Open SSL upgrade |
| 1043985-6 | 3-Major | BT1043985 | After editing an iRule, the execution order might change. |
| 1033937-6 | 3-Major | BT1033937 | HTTP message router stats do not increment for virtual servers and pools |
| 1026781-6 | 3-Major | BT1026781 | Standard HTTP monitor send strings have double CRLF appended |
| 1019641-6 | 3-Major | BT1019641 | SCTP INIT_ACK not forwarded |
| 1014633-6 | 3-Major | BT1014633 | Transparent / gateway monitors may fail if there is no route to a node |
| 1012009-5 | 3-Major | BT1012009 | MQTT Message Routing virtual may result in TMM crash |
| 1002969-7 | 3-Major | BT1002969 | Csyncd can consume excessive CPU time★ |
| 932553-9 | 4-Minor | BT932553 | An HTTP request is not served when a remote logging server is down |
| 896565-5 | 4-Minor | Clusterd.peermembertimeout to set peer member timeout does not work all the time | |
| 804089-4 | 4-Minor | BT804089 | iRules LX Streaming Extension dies with Uncaught, unspecified error event |
| 603380-9 | 4-Minor | BT603380 | Very large number of log messages in /var/log/ltm with ICMP unreachable packets. |
| 2151601-2 | 4-Minor | BT2151601 | No tmsh command to remove the stateless directive from a virtual server |
| 2144029-2 | 4-Minor | BT2144029 | DB monitor does not use the correct timezone present in the system |
| 2077569-1 | 4-Minor | BT2077569 | Transparent DNS monitors incorrectly marks the status of a pool as offline |
| 2077357-2 | 4-Minor | BT2077357 | Virtual-wire with proxy listener may generate packets with 00:00:00:00:00:00 source MAC. |
| 2038309-1 | 4-Minor | BT2038309 | After the full config sync, FQDN template node status changes to ‘fqdn-checking’ (Unknown) untill the DNS query is triggered |
| 1964933-2 | 4-Minor | BT1964933 | HTTP2 RST flood detection should allow for legitimate case |
| 1933965-2 | 4-Minor | BT1933965 | Unable to associate multiple cert/keys of different types to Certificate Key Chain via TMSH |
| 1930841-1 | 4-Minor | BT1930841 | Tmsh show sys conn virtual-server may report an incomplete set of flows after a virtual server modification |
| 1928437-5 | 4-Minor | BT1928437 | False traffic spikes in Throughput graphs |
| 1926733-1 | 4-Minor | BT1926733 | Tmm memory leak with L7 response policy |
| 1921025-1 | 4-Minor | BT1921025 | Need more information when http2 RST STREAM |
| 1341093-5 | 4-Minor | BT1341093 | MCPD returns configuration error when attaching a client SSL profile containing TLS 1.3 to a virtual server with HTTP/2 profile |
| 1329509-4 | 4-Minor | BT1329509 | TCL error 'ERR_VAL (line 1) invoked from within "HTTP::path"'. |
| 1053561-2 | 4-Minor | BT1053561 | TLS 1.3 Handshake fails when 0RTT enabled on the client-side SSL and iRule is specified |
Global Traffic Manager (DNS) Issues
| ID Number | Severity | Links to More Info | Description |
| 2044381-3 | 2-Critical | BT2044381 | Gtmd SIGSEGV core due to monitor status change |
| 1962713-2 | 2-Critical | BT1962713 | Limit on BIND maximum records per type★ |
| 1031945-6 | 2-Critical | BT1031945 | DNS cache configured and TMM is unresponsive in 'not ready' state indefinitely after TMM restart or reboot★ |
| 936777-9 | 3-Major | BT936777 | Old local config is synced to other devices in the sync group. |
| 821589-6 | 3-Major | BT821589 | DNSSEC does not insert NSEC3 records for NXDOMAIN responses |
| 751540-7 | 3-Major | BT751540 | GTM Sync group not syncing properly with multiple self IP addresses configured on one VLAN but not all configured for GTM server |
| 705869-7 | 3-Major | BT705869 | TMM crashes as a result of repeated loads of the GeoIP database |
| 222220-11 | 3-Major | K11931 | Distributed application statistics are not passed correctly. |
| 2200389-2 | 3-Major | BT2200389 | CDS and CDNSKEY not included in DNSX zone transfer data |
| 2200217-2 | 3-Major | BT2200217 | DNSSEC validation failures due to missing DS records in zone transfers |
| 2172041-1 | 3-Major | BT2172041 | Zone transfer fails for dnsx when the zone file contains TLSA records |
| 2150493-2 | 3-Major | BT2150493 | BIG-IP DNS (GTM) may associate LTM virtual server names with the wrong GTM virtual-servers |
| 2137661-1 | 3-Major | BT2137661 | GTM link object is deleted automatically after being added |
| 2078233-1 | 3-Major | BT2078233 | DNS iRule TCL error encountered on receiving a DNS response of type 65 |
| 1983209-2 | 3-Major | BT1983209 | Zone does not sync correctly when record is modified |
| 1970969-1 | 3-Major | BT1970969 | Stale Record Answers counter increments for SERVFAIL responses from DNS resolver cache |
| 1966405-2 | 3-Major | BT1966405 | Changes to DNS cache resolver may cause service disruption on BIG-IP DNS v17.1.2.1★ |
| 1953273-1 | 3-Major | BT1953273 | Big3d high CPU with thousands of https monitors with SNI |
| 1824113-3 | 3-Major | BT1824113 | GTM iRule : [active_members <poolname>] command ignores any status effects applied by a parent. |
| 1824009-3 | 3-Major | BT1824009 | When DNS64 is enabled, resolver cache passes SERVFAIL responses to the client |
| 1782137-2 | 3-Major | BT1782137 | Management of Wide IPs using the GUI may fail when multiple monitors exist |
| 1757537-4 | 3-Major | BT1757537 | RCA tmm core with ** SIGSEGV ** inside pick_qos |
| 1756389-2 | 3-Major | CA certs could get deleted from server.crt after running bigip_add | |
| 1612201-3 | 3-Major | BT1612201 | Malformed certificates found in local /config/httpd/conf/ssl.crt/server.crt |
| 1602345 | 3-Major | BT1602345 | Resource records are not always created when wideips are created in a bundle |
| 1379649-5 | 3-Major | BT1379649 | GTM iRule not verifying WideIP type while getting pool from TCL command |
| 1082197-3 | 3-Major | BT1082197 | RNAME and MNAME field order reversed for Synthetic SOAs sent for negative response |
| 464708-6 | 4-Minor | BT464708 | DNS logging does not support Splunk format log |
| 264701-8 | 4-Minor | K10066, BT264701 | The zrd exits on error from bind about .jnl file error |
| 2186625-2 | 4-Minor | BT2186625 | Zone transfer from dns express with dnssec enabled includes extra RRSIG |
| 2130329-1 | 4-Minor | BT2130329 | [GTM] Deletion of topology records makes MCPD memory ramp up |
| 1711813-4 | 4-Minor | BT1711813 | Incorrect SOA serial number shown in zxfrd logs during zone transfer |
| 1642301-4 | 4-Minor | BT1642301 | Loading single large Pulse GeoIP RPM can cause TMM core |
| 1082169-1 | 4-Minor | BT1082169 | Bogus synthetic SOA records are returned for wideip with RCODE enabled |
| 1014761-6 | 4-Minor | BT1014761 | [DNS][GUI] Not able to enable/disable pool member from pool member property page |
Application Security Manager Issues
| ID Number | Severity | Links to More Info | Description |
| 2053893-1 | 2-Critical | BT2053893 | Incompletely-synced ASM configuration can be synced back to the original device or group |
| 1952821-2 | 2-Critical | BT1952821 | WAF guided configuration shows a warning message instead list of available configurations★ |
| 1934373-2 | 2-Critical | BT1934373 | DoS attack is blocking while transparent |
| 1039633-2 | 2-Critical | BT1039633 | A signature match is not highlighted correctly under certain conditions |
| 919917-8 | 3-Major | BT919917 | File permission errors during bot-signature installation |
| 902445-5 | 3-Major | BT902445 | ASM Policy Event Logging stops working after 'No space in shmem' error disconnection mitigation |
| 2208709-2 | 3-Major | BT2208709 | Failure to match specific WAF signatures |
| 2200537-1 | 3-Major | BT2200537 | Audio captcha script error |
| 2200405-2 | 3-Major | BT2200405 | Live Update proxy.host value requires brackets around IPv6 Addresses |
| 2187385-2 | 3-Major | BT2187385 | Brute force set to CAPTCHA also raises a violation and blocks traffic |
| 2185537-2 | 3-Major | BT2185537 | Application Security Administrator role cannot edit the General Settings of parent policies from the GUI |
| 2143305-1 | 3-Major | Tmm crash | |
| 2038277-2 | 3-Major | BT2038277 | Double memory release in the enforcer |
| 2016465-1 | 3-Major | BT2016465 | Policy auto merge does not work for Base64 Decoding |
| 1992569-2 | 3-Major | BT1992569 | Request body held despite "do nothing" content profile setting |
| 1976705-1 | 3-Major | BT1976705 | Threat Campaign installation fails due to timeout after an hour |
| 1938101-1 | 3-Major | BT1938101 | Performance issue on specific parameters extractions |
| 1938085-1 | 3-Major | Performance issue on specific parameters extractions | |
| 1933373-3 | 3-Major | BT1933373 | Newly added Threat Campaigns are missing REST ID |
| 1922661-3 | 3-Major | BT1922661 | JSON profile settings not displayed in REST API after attaching schema files |
| 1920637-1 | 3-Major | BT1920637 | Duplicate user-defined Signature Set based on Attack Type is created upon policy import during upgrade★ |
| 1856513-2 | 3-Major | BT1856513 | Tomcat fails to write log messages to /usr/share/tomcat/logs/liveupdate.log |
| 1848541-2 | 3-Major | BT1848541 | Invalid regular expression causing bd restart loop |
| 1827821-2 | 3-Major | BT1827821 | isBase64 params and headers not blocking Attack Signatures |
| 1825057-2 | 3-Major | BT1825057 | 'vs_name' field truncated at 64 characters with ASM's remote logging |
| 1814413-3 | 3-Major | BT1814413 | Dynamic parameters are not extracted and cookies are not generated |
| 1813717-4 | 3-Major | BT1813717 | Some blocked requests are not logged when filtered by response status codes |
| 1772353-4 | 3-Major | BT1772353 | Defaults for Associated Violations are re-added to a policy |
| 1755113-4 | 3-Major | BT1755113 | BD crash with specific JSON schema |
| 1632385-1 | 3-Major | BT1632385 | Non-ASCII UTF-8 characters are mangled in JSON policy export |
| 1623669-2 | 3-Major | BT1623669 | False “Illegal dynamic parameter value” violations when extracting parameters from links (HREF) |
| 1601517-1 | 3-Major | BT1601517 | BD daemon crash on specific scenario |
| 1583381-2 | 3-Major | BT1583381 | "Insert Secure Attribute" must be enabled and "Insert SameSite Attribute" must be set to "Lax" for pure wildcard cookie in all templates by default |
| 1429813-5 | 3-Major | BT1429813 | ASM introduce huge delay from time to time |
| 1350485-2 | 3-Major | BT1350485 | When the parameter value contains '@', domain name is not properly extracted |
| 1280813-4 | 3-Major | BT1280813 | 'Illegal URL' violation may trigger after upgrade |
| 1021201-2 | 3-Major | BT1021201 | JSON parser is not fully UTF-8 compliant |
| 974409-6 | 4-Minor | False Positive "Surfing Without Human Interaction" | |
| 638863-3 | 4-Minor | BT638863 | Attack Signature Detected Keyword is not masked in the logs |
| 2199485-2 | 4-Minor | BT2199485 | Export and re-import of a security policy in XML format fails due to invalid 'openapi-array' user_input_format value |
| 2162873-2 | 4-Minor | Pipe and backslash characters are not escaped in ArcSight CEF remote logging | |
| 2150449-2 | 4-Minor | BT2150449 | Lack of pipe escaping with ArcSight logging |
| 2149333-2 | 4-Minor | BT2149333 | BD_XML logs memory usage at TS_DEBUG level |
| 2099449-1 | 4-Minor | BT2099449 | Cannot configure websocket profile on a performance virtual server from the GUI |
| 2078277-1 | 4-Minor | BT2078277 | BD crash with an inappropriate configuration for request_max_chunks_number |
| 2012801-2 | 4-Minor | BT2012801 | "parser parameters" is enabled even though json schema is attached to the profile |
| 2007429 | 4-Minor | BT2007429 | Captcha button label displays in lowercase |
| 1974837-1 | 4-Minor | BT1974837 | MAIN|EROR|dosl7_hold_message:1004|trying to hold message already held |
| 1970193-2 | 4-Minor | BT1970193 | Case WAF policy IP address exception list on GUI: Missing Route Domain ID in the IP address |
| 1933061-1 | 4-Minor | BT1933061 | Changing "bot category" of an user-defined bot-signature should be validated and denied when the change is not appropriate |
| 1900621-2 | 4-Minor | BT1900621 | Missing client ip |
| 1890997-1 | 4-Minor | BT1890997 | TCP connection stall in TMM conn table with ASM policy and no websocket profile |
| 1821353-2 | 4-Minor | BT1821353 | Error on long wildcard configuration |
| 1782057-2 | 4-Minor | BT1782057 | BD crash related to dns lookup |
| 1572045-2 | 4-Minor | BT1572045 | Login page config parameters are still case-sensitive with a case insensitive policy |
| 1036289-1 | 4-Minor | BT1036289 | Signature ID not displayed in Attack Signature details |
| 1980601-1 | 5-Cosmetic | BT1980601 | Number of associated signatures for a signature-set appears zero |
Application Visibility and Reporting Issues
| ID Number | Severity | Links to More Info | Description |
| 1932965-1 | 2-Critical | BT1932965 | AVRD may crash at startup due to non-thread-safe version of BOOST json Spirit parser |
| 1848577-2 | 2-Critical | BT1848577 | VCMP guest stats are not visible on vCMP host GUI nor CLI |
| 939933-8 | 3-Major | BT939933 | Monpd restarts every few seconds due to missing of AVR database |
| 1937717-1 | 3-Major | BT1937717 | AVR increases the Content-Length header but fails to inject the CSPM script into the payload |
| 1294141-6 | 3-Major | BT1294141 | ASM Resources Reporting graph displays over 1000% CPU usage |
| 868801-5 | 4-Minor | BT868801 | BIG-IP still sends STARTTLS if the 'No encryption' SNMP option is enabled |
| 1298225-1 | 4-Minor | BT1298225 | Avrd generates core when dcd becomes unavailable due to some reason |
Access Policy Manager Issues
| ID Number | Severity | Links to More Info | Description |
| 945469-3 | 2-Critical | [APM][tmm core detected oauth_send_response in APM Oauth Token generation | |
| 2186185-2 | 2-Critical | BT2186185 | Apmd occasionally fails to process a request if SecurID agent is present |
| 2171921 | 2-Critical | BIG-IP APN and VPN - ACCESS can leak HUDEVT_REQUEST_DONE after responding | |
| 2162861-2 | 2-Critical | BT2162861 | 'Connectors' creation screen does not appear |
| 2138077-2 | 2-Critical | BT2138077 | SAML redirect signature validation fails when RelayState is present with want-detached-signature=true in BIG-IP APM 17.1.x |
| 2047445 | 2-Critical | BT2047445 | A VPN connection may fail when an Access policy or a Virtual Server is configured in a route domain |
| 1991297-1 | 2-Critical | BT1991297 | [APD][SAML-SSO]high memory due to SAML SSO leak |
| 1819857-1 | 2-Critical | BT1819857 | [APM][PRP] Session variables are not able to access within Oauth Client agent intermittently |
| 1670041-1 | 2-Critical | [SWG] VCMP all secondary slots restart when URL categories are modified/deleted | |
| 1397001-2 | 2-Critical | BT1397001 | Memory leak in websense when RTU is updated |
| 1020881-3 | 2-Critical | BT1020881 | TMM crashes while passing APM traffic. |
| 995877-2 | 3-Major | BT995877 | Edge Client 'Save Password'' checkbox not visible when 'Allow Password Caching' method is 'memory' |
| 981777-2 | 3-Major | BT981777 | APM can sometimes reset client connections with POST body greater than 64k bytes |
| 893801-4 | 3-Major | BT893801 | Launching resources that are published on an APM Webtop from multiple VMware servers will fail when the Native View client is selected |
| 666845-6 | 3-Major | K08684622, BT666845 | Rewrite plugin can accumulate memory used for patching very large files |
| 527119-11 | 3-Major | BT527119 | An iframe document body might be null after iframe creation in rewritten document. |
| 2198589-2 | 3-Major | BT2198589 | BIG-IP allows enabling deprecated Network Access compression, causing intermittent tunnel traffic drops with Edge Client |
| 2183233-1 | 3-Major | BT2183233 | TMM crash due to extra trailing CR/LF in iSession reconnects |
| 2181777 | 3-Major | BT2181777 | Aced crash observed during RSA SecurID Authentication failure |
| 2162509-1 | 3-Major | BT2162509 | Large number of glob-matches can cause high CPU usage. |
| 2152545 | 3-Major | BT2152545 | [APM][SAML] High TMM memory sso_saml leak |
| 2137909-1 | 3-Major | BT2137909 | Portal Access: unwanted decoding html entities in attribute values of HTML tags★ |
| 2053289-3 | 3-Major | BT2053289 | Increased OAuth instances in TMM memory |
| 2047137-2 | 3-Major | BT2047137 | TMM core may occur while using APM VDI with Blast UDP |
| 1993737-1 | 3-Major | BT1993737 | [APM][SSO]TMM Core in the SSO decompress operation |
| 1976557-2 | 3-Major | BT1976557 | [APM][OAUTH][LOGGING]Error log needed misconfigured "audience" for apm oauth jwt-config |
| 1968169-2 | 3-Major | BT1968169 | [APM][CitrixIntegration]Apps do not launch unless "Accounts" is selected in Citrix Workspace App |
| 1967261-3 | 3-Major | BT1967261 | RDP Parameter "enablerdsaadauth" when added to RDP setting causes file to be corrupted |
| 1965257-1 | 3-Major | BT1965257 | Upgrade to 17.5.0 results in Invalid subscription request from (%localdbmgr) unknown class/struct tag (4576) error is seen in ltm log★ |
| 1928157-1 | 3-Major | BT1928157 | [APM][SAML] constant SIGSEGV "in saml_sp_finish_message_signing" after upgrade to 17.1.x★ |
| 1848565-2 | 3-Major | BT1848565 | Error during updating device details: Internal error (Json parser error) |
| 1818949-2 | 3-Major | BT1818949 | [APM] BIG-IP as OAuth AS sending invalid grant error when refresh token expired. |
| 1787909-2 | 3-Major | BT1787909 | Sys db variable security.configpassword value is changed to not null when ng_export is interrupted |
| 1772317-3 | 3-Major | BT1772317 | [APM][SAML SP] sp fails authentication with error "SAML assertion is invalid, error: NameID is missing" |
| 1715153 | 3-Major | BT1715153 | Log message "The connected network is vulnerable to tunnel crack as LocalIP falls under the public IP" |
| 1621977-2 | 3-Major | BT1621977 | Rewrite memoryleak with "REWRITE::disable" irule |
| 1600229-2 | 3-Major | BT1600229 | Sometimes, admin is unable to apply policies until failover |
| 1586405-3 | 3-Major | BT1586405 | "/f5-h-$$/" repeatedly appened to URL's path every refresh of the page |
| 1489941-2 | 3-Major | PKCE 'code_challenge_methods_supported" to be included in openid-configuration well-know-uri | |
| 1485557-2 | 3-Major | BT1485557 | OAuth token not found for OAuth server with Bearer SSO |
| 1290937-2 | 3-Major | 'contentWindow' of a dynamically genereated iframe becomes null | |
| 1166929-2 | 3-Major | BT1166929 | [AdminUI][Rewrite Profile][PA] Add "*://*" to to rewrite list if an RCL has been entered |
| 1136905-2 | 3-Major | BT1136905 | Request for Portal Access Hosted Content are RST with "No available SNAT addr" |
| 1071021-4 | 3-Major | BT1071021 | Some URLs such as *cdn.onenote.net configured in the Office 365 dynamic address space are not processed by APM |
| 1022361-2 | 3-Major | BT1022361 | Edge Client shows HTML encoding for non-English endpoint inspection message |
| 893161-2 | 4-Minor | BT893161 | Internal request to volatile.html used for cookie transport in Portal Access is sometime rewritten |
| 869541-5 | 4-Minor | BT869541 | Series of unexpected <aborted> requests to same URL |
| 869121-5 | 4-Minor | BT869121 | Logon Page configured after OAuth client in access policy VPE, get error message Access policy evaluation is already in progress for your current session |
| 800377-1 | 4-Minor | BT800377 | Support for Referrer-Policy: origin to correctly return backend origin in virtual server requests |
| 745645-4 | 4-Minor | BT745645 | Portal Access does not rewrite the script element with textNode children |
| 349706-6 | 4-Minor | NetworkAccess assigns 1.1.1.1 address to remote ppp endpoint APM VPN | |
| 2131941 | 4-Minor | Edge Client with default system browser when used with access policy that redirects to other VS, access profile scope needs to be Named / Global | |
| 2119453 | 4-Minor | BT2119453 | SAML Auth for Edge Client using Firefox browser is not successful for some Windows systems |
| 2107221 | 4-Minor | BT2107221 | Edge Client VPN disconnect observed when trying to access the updated ACL policy |
| 2077625-2 | 4-Minor | BT2077625 | Changes in API Protection Profile not updated in Per Request Policy |
| 2049881 | 4-Minor | BT2049881 | Allow customization of Windows Edge Client F5 icons |
| 2046521 | 4-Minor | BT2046521 | On webtop default description of Desktops and Apps should be "Horizon Desktop" and "Horizon Application" |
| 1856425-1 | 4-Minor | BT1856425 | Old EPSEC images keeps coming back on standby device after reboot |
| 1825249-1 | 4-Minor | BT1825249 | read_until: end of file |
| 1787701-2 | 4-Minor | BT1787701 | [APM]Customization in German contains French language |
| 1350417-3 | 4-Minor | BT1350417 | "Per IP in-progress sessions limit (xxx) exceeded" message occurs before number of "In-Progress session" reaches the limit |
Service Provider Issues
| ID Number | Severity | Links to More Info | Description |
| 2187429-2 | 2-Critical | BT2187429 | TMM might crash when using MRF framework. |
| 2077553-1 | 3-Major | BT2077553 | SIP message in quote containing special character after two backslashes will be generate a SIP error message |
| 1971909-1 | 3-Major | BT1971909 | TMM SIGFPE "master shouldn't receive a CMP nexthop" after Clusterd seeing 1 of 2 blades down |
| 2153897-2 | 4-Minor | BT2153897 | BIG-IP closes the transport connection immediately after sending a DPA to a peer |
Advanced Firewall Manager Issues
| ID Number | Severity | Links to More Info | Description |
| 2196597 | 1-Blocking | BT2196597 | TMM generates core when large firewall policy is attached to multiple virtual servers due to SOD watchdog timeout |
| 680804-5 | 2-Critical | BT680804 | TMM restart due to delayed keep alives |
| 2150669-2 | 2-Critical | BT2150669 | TCP Packet loss after upgrade with AFM provisisoned★ |
| 2144397-2 | 2-Critical | BT2144397 | Problems compiling firewall policies when they contain rules using huge address lists |
| 2139965-4 | 2-Critical | BT2139965 | AFM DNS DOS logging protocol_dns_dos_nxdomain_field_attack_name() |
| 2014373-2 | 2-Critical | BT2014373 | Fix for TMM Core SIGSEGV in spva_gl_ddos_find_tuples Due to NULL Grey List Flood Entry |
| 1671149-4 | 2-Critical | BT1671149 | Timestamp cookies may cause issue for PVA-accelerated connections |
| 1410441-3 | 2-Critical | BT1410441 | Large file transfer over SFTP/SSH proxy failure |
| 2218157-2 | 3-Major | IP Intelligence database load log displayed periodically | |
| 2151145 | 3-Major | BT2151145 | Unable to view 'shared address list' from the rule list. |
| 2077525-3 | 3-Major | BT2077525 | Incomplete or missing IP Intelligence databases result in connection reset, high TMM CPU usage and/or TMM crash |
| 2064333-2 | 3-Major | BT2064333 | [AFM] pccd cores during the service restart |
| 2015973-2 | 3-Major | BT2015973 | Enabling tcp-ak-ts dos vector causes file transfer failure★ |
| 1976925 | 3-Major | BT1976925 | Device dos whitelist not working properly for DNS dos protection when BA enabled |
| 1969945-2 | 3-Major | BT1969945 | Stats_rate changes along with Detection Threshold for NXDOMAIN DoS vector |
| 1965497 | 3-Major | BT1965497 | Firewall Policy is not effective when the same rule list is attached to two different firewall policies. |
| 1957977-2 | 3-Major | BT1957977 | Auto-learned DoS Vector attack is detected even with low rate of traffic on HA Pair during Failover★ |
| 1943593-2 | 3-Major | BT1943593 | Inconsistent DoS Attack Status between tmctl/event logs and GUI |
| 1818861-2 | 3-Major | BT1818861 | Timestamp cookies are not compatible with fastl4 mirroring. |
| 1786805-4 | 3-Major | BT1786805 | TMM might crash immediately after going active for the first time after a reboot |
| 1365769-2 | 3-Major | BT1365769 | When multiple vlans are in the zone, only some vlans match the ACL-Policy |
| 1282029-1 | 3-Major | BT1282029 | Logging suspicious vector feature is not supported for tcp-flags-uncommon vector on upgrade to BIG-IP 17.1.0★ |
| 760355-7 | 4-Minor | BT760355 | Firewall rule to block ICMP/DHCP from 'required' to 'default'★ |
| 2217793 | 4-Minor | I5800 AFM 17.5.1.3 - After upgrade to 17.5.1.3, unable to reorder rules under AFM policy. | |
| 1917677-4 | 4-Minor | BT1917677 | "show security ip-intelligence info address" may fail to query legacy IP Reputation database |
| 1880441-2 | 4-Minor | BT1880441 | Security log profile IPI options are visible for configuration in UI but not allowed |
| 1366269-5 | 4-Minor | BT1366269 | NAT connections might not work properly when subscriber-id is confiured. |
Policy Enforcement Manager Issues
| ID Number | Severity | Links to More Info | Description |
| 2200009-2 | 3-Major | BT2200009 | PEM HA failover may cause traffic drops for new connections |
| 2198757-1 | 3-Major | BT2198757 | PEM: use-after-free of mw_msg in session_del_msg_entries hash |
| 1976001-1 | 3-Major | BT1976001 | PEM::session TCL commands can cause cores |
| 1932161-3 | 3-Major | BT1932161 | PEM iRule usage memory leak |
| 2195709-2 | 4-Minor | BT2195709 | TCP fingerprint tethering detection does not work when a subscriber's traffic comes from a tethering Mac OS system. |
Carrier-Grade NAT Issues
| ID Number | Severity | Links to More Info | Description |
| 1971641 | 2-Critical | BT1971641 | CGNAT PBA: Negative or incorrect "Active Port Blocks" statistics displayed in fw_lsn_pool_pba_stat |
| 1128429-8 | 4-Minor | BT1128429 | Rebooting one or more blades at different times may cause traffic imbalance results High CPU |
Anomaly Detection Services Issues
| ID Number | Severity | Links to More Info | Description |
| 1010717-5 | 3-Major | BT1010717 | Default DoS profile creation from tmsh is incorrectly interpreted by DoS profile GUI |
Traffic Classification Engine Issues
| ID Number | Severity | Links to More Info | Description |
| 2141109-1 | 2-Critical | BT2141109 | The URL categorisation daemon's DNS cache is never refreshed |
| 2048325-4 | 3-Major | BT2048325 | Excessive log entries in wr_urldbd.out was caused by queries for URLs with an asterisk character |
| 1976429-2 | 3-Major | BT1976429 | Webroot database file updates are failing to apply, preventing the creation of a new version of the database file |
| 1824965-1 | 3-Major | Implement iRule support to fetch SNI from SSL, HTTP and QUIC traffic | |
| 1820573-2 | 3-Major | BT1820573 | PEM Traffic Classification signatures are classifying the youtube videos with quic enabled as udp.quic instead of udp.quic.youtube.youtube_video.youtube_video_abr on windows using the latest chrome web browser |
Device Management Issues
| ID Number | Severity | Links to More Info | Description |
| 996129-7 | 3-Major | BT996129 | The /var partition is full as cleanup of files on secondary is not executing |
| 942521-9 | 3-Major | BT942521 | Certificate Managers are unable to move certificates to BIG-IP via REST |
| 717174-7 | 3-Major | BT717174 | WebUI shows error: Error getting auth token from login provider★ |
Protocol Inspection Issues
| ID Number | Severity | Links to More Info | Description |
| 1590517-1 | 2-Critical | BT1590517 | High CPU utilization when enabling IPS + HTTP/2 Profile |
| 2144053-3 | 3-Major | IPS hitless upgrade results in TMM clock advance★ | |
| 2048001-2 | 3-Major | BT2048001 | Memory leak in icrd_child process |
| 1983029-2 | 3-Major | BT1983029 | IPS Upgrade: err mcpd[5374]: 01070734:3: Configuration error: DB validation exception, unique constraint violation on table★ |
| 1967213-2 | 3-Major | BT1967213 | Active contexts accumulate while HTTP is waiting for response |
| 1854461-2 | 3-Major | BT1854461 | Unable to delete file from "Available to Deploy" when removed from "Available to Install" |
| 1069977-1 | 3-Major | BT1069977 | Repeated TMM SIGABRT during ips_flow_process_data |
| 1975945-1 | 4-Minor | BT1975945 | IPS signatures and compliance not loaded until the configuration is saved using tmsh save sys config |
In-tmm monitors Issues
| ID Number | Severity | Links to More Info | Description |
| 1019261-6 | 3-Major | BT1019261 | In-TMM HTTPS monitor with SSL Profile set to None does not use serverssl profile. |
SSL Orchestrator Issues
| ID Number | Severity | Links to More Info | Description |
| 2181633-2 | 3-Major | BT2181633 | Large BIG-IP SSL Orchestrator deployments can cause tmm crash |
| 2138273-2 | 3-Major | BT2138273 | Named service fails to start after an upgrade due to unsupported attributes in the named.conf file★ |
| 1927829-1 | 3-Major | BT1927829 | SSL Orchestrator resets connection with connection abort waiting for data from an inline service |
| 1849829-2 | 3-Major | BT1849829 | Deprecation of dnssec-lookaside and dnssec-enable Directives in latest BIND release |
| 1934845-1 | 4-Minor | BT1934845 | Transparent proxy loses APM session variables in SSL Orchestrator service |
Bot Defense Issues
| ID Number | Severity | Links to More Info | Description |
| 1820833-1 | 3-Major | BT1820833 | General Database Error when creating a new profile |
| 1549341-2 | 3-Major | BT1549341 | BD: block response body is truncated at 1024Bytes |
| 2077329-1 | 4-Minor | BT2077329 | IBD profile is injecting the Javascript tag in non html pages |
| 1552913-2 | 4-Minor | BT1552913 | For advanced/premium deployment of BD profile, incomplete single js download may lead to blocking Protected URIs. |
F5OS Messaging Agent Issues
| ID Number | Severity | Links to More Info | Description |
| 2190373 | 2-Critical | platform_agent core found while tmstats updation. | |
| 1881509-1 | 3-Major | BT1881509 | Platform Agent not logging Trunk changes from F5OS |
| 1690005-2 | 3-Major | BT1690005 | Masquerade Mac is not removed when F5OS is rebooted |
| 1603541-2 | 3-Major | BT1603541 | Platform_agent crashes |
| 2008409-3 | 4-Minor | BT2008409 | MAC masquerade does not work on an F5OS tenant if there are no floating self-ips configured on the VLAN |
| 1881537-1 | 5-Cosmetic | BT1881537 | Platform Agent does not log diff of Feature Info Attributes |
| 1280141-4 | 5-Cosmetic | BT1280141 | Platform agent to log license info when received from platform |
Known Issue details for BIG-IP v17.5.x
996129-7 : The /var partition is full as cleanup of files on secondary is not executing
Links to More Info: BT996129
Component: Device Management
Symptoms:
The system does not boot because the /var partition is full.
You see a large number of "storageXXXX.zip" files in /var/config/rest/
Conditions:
This may be observed on multi-blade vCMP guests and hosts, as well as on multi-blade tenants.
Impact:
The partition housing /var/config/ may become 100% full, impacting future disk IO operation and it may cause unexpected traffic disruption.
Workaround:
Important: This workaround is temporary, and may need to be periodically performed either manually or from a script.
Impact of Workaround: While these steps are performed, the BIG-IP REST API will be temporarily inaccessible, and higher disk IO may be seen.
Run the following commands, in sequence:
bigstart stop restjavad
rm -rf /var/config/rest/storage*.zip
rm -rf /var/config/rest/*.tmp
bigstart start restjavad
Manual application of these workaround steps clears the 100% utilized space condition and allows the partition to resume normal operation.
995877-2 : Edge Client 'Save Password'' checkbox not visible when 'Allow Password Caching' method is 'memory'
Links to More Info: BT995877
Component: Access Policy Manager
Symptoms:
The 'Save Password' checkbox is not displayed.
Conditions:
-- 'Allow Password Caching' is selected in the connectivity profile.
-- The 'Allow Password Caching' method is 'memory'.
-- From the Edge Client, access the virtual server.
Impact:
The 'Save Password' option does not exist on the logon page.
Workaround:
Use the 'disk' option in 'Allow Password Caching' instead of 'memory'.
995653-3 : Bigtop command is showing inaccurate 'Conn' value for NODE ip:port
Links to More Info: BT995653
Component: TMOS
Symptoms:
In bigtop output, "Conn" value for "NODE ip:port" seen under "bits in prior n seconds" shows the same value as "Conn" value seen under "bits since" and "Total Connections" in show ltm node output.
Conditions:
There were connections established on server-side toward pool member.
Impact:
"Conn" value is not refreshed according to "bits in prior n seconds" interval.
Workaround:
None
994973-4 : TMM crash with do_drivers_probe()
Links to More Info: BT994973
Component: Local Traffic Manager
Symptoms:
During the TMM shutdown time, TMM crashes. And the TMM core is created by SIGABRT using the xnet drivers. SIGABRT source is located within the do_drivers_probe()function.
Conditions:
Occurs while,
-- using the xnet drivers
-- rebooting TMM
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
981777-2 : APM can sometimes reset client connections with POST body greater than 64k bytes
Links to More Info: BT981777
Component: Access Policy Manager
Symptoms:
Clients trying to send POST messages with a body greater than 64k bytes get reset from APM.
Conditions:
POST Body sent by the client is greater than 64k.
Impact:
Clients are unable to send POST requests greater than 64k bytes of data.
Workaround:
None
978953-5 : The value of the sys db variable vlan.backplane.mtu intermittently out-of-sync with the value of the MTU of the kernel interface tmm_bp during the initial boot up
Links to More Info: BT978953
Component: Local Traffic Manager
Symptoms:
During the initial boot of the device the MTU of the tmm_bp kernel interface is out-of-sync with the value of sys db vlan.backplane.mtu as well as out-of-sync with the MTU displayed by the following command:
tmsh show /net vlan all-properties -hidden.
tmsh list net vlan tmm_bp all-properties -hidden.
Additionally, running the following command:
modify sys db vlan.backplane.mtu value <some value> (within the range accepted), and saving the configuration change does not last through a reboot.
Conditions:
This issue occurs on the first boot intermittently.
Impact:
When the values are seen at non-sync, after the modification of the backplane vlan mtu and saving the config, changing the mtu config value does not last through a reboot.
Workaround:
Rebooting the device resolves the issue
977953-7 : Show running config interface CLI could not fetch the interface info and crashes the imi
Links to More Info: BT977953
Component: TMOS
Symptoms:
The confd command 'show running-config' does not display interface information if nsm and bgpd are the only processes running.
If you run 'show running-config interface', imi crashes.
Conditions:
1. nsm and bgpd are the daemons running.
2. Run the "show running-config" command
Impact:
Imish cannot retrieve interface information from the show running-config command.
Workaround:
* Enable OSPF. For example,
# tmsh modify /net route-domain 0 routing-protocol add { BGP OSPFv3 }
# ps -ef | egrep -i ospf
root 11954 4654 0 11:25 ? S 0:00 ospf6d%0
976853-2 : SNAT pool traffic-group setting may override non-floating self IP's traffic-group
Links to More Info: BT976853
Component: Local Traffic Manager
Symptoms:
A non-floating self IP fails to respond to ARP on the standby system.
Conditions:
An LTM SNAT translation address has been created which matches a non-floating self IP on the system, and the SNAT is configured in a floating traffic group.
Impact:
A standby device does not respond to ARP requests for floating IP addresses. If a SNAT is configured on the same IP as a non-floating self-ip on the standby, ARP responses will be disabled for that self-ip.
Even after deleting the snat, or configuring it for another IP, ARP response for that self-ip will remain disabled.
The effect of this will be that other IP devices will be unable to communicate with the self-ip after the ARP entry times out.
For example:
-- BIG-IP does not respond to ARP requests for the non-floating self-ip
-- ConfigSync no longer working (if the affected self IP is the ConfigSync address)
-- Health check traffic fails
Note that simply deleting the SNAT translation will not restore service to the self-ip.
Workaround:
Delete the SNAT address, and then move the self-ip back to the non-floating traffic group, and disable and re-enable the arp setting by creating a virtual-address with the same IP in the non-floating traffic-group, and then deleting it.
tmsh create ltm virtual-address <self-ip> arp enabled traffic-group traffic-group-local-only
tmsh modify ltm virtual-address <self-ip> arp disabled
tmsh delete ltm virtual-address <self-ip>
Alternatively, after deleting the SNAT translation, reboot the device (or at least restart tmm). When using this approach on multi-blade chassis devices, all blades need to be restarted.
974409-6 : False Positive "Surfing Without Human Interaction"
Component: Application Security Manager
Symptoms:
When using Bot Defense profile, and an application contains many HTML pages which are not qualified (not even accept: text/html), a "Surfing Without Human Interaction" anomaly is mis-counted and falsely raised.
Conditions:
-- Bot Defense Profile is attached to a virtual server.
-- The application contains many HTML pages which can be detected as such from the request.
Impact:
Real clients might or might not be blocked, it depends on the environment.
Workaround:
None.
967769-4 : During reset of high-speed interfaces, TMMs may mistakenly continue hardware watchdog checks
Links to More Info: BT967769
Component: TMOS
Symptoms:
Tmm crashes and restarts. The following panic message is found in /var/log/tmm:
notice panic: ../dev/hsb/if_hsb.c:6129: Assertion "HSB lockup, see ltm and tmm log files" failed.
Conditions:
-- Some error or glitch is detected on the high-speed bus (HSB).
-- Software commands a reset of the HSB and interface hardware.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
967353-9 : HTTP proxy should trim spaces between a header field-name and colon in its downstream responses.
Links to More Info: BT967353
Component: Local Traffic Manager
Symptoms:
Client receives no response along with a connection reset by the BIG-IP system.
Conditions:
-- HTTP profile is enabled on the BIG-IP system.
-- Server sends HTTP response with one or more header field names separated with the trailing colon by a space.
Impact:
HTTP responses that should be delivered to the client by the proxy are not being sent out.
Workaround:
None
962729-4 : New User automatically unlocked when "Automatically enable locked-out users after" is not configured
Links to More Info: BT962729
Component: TMOS
Symptoms:
"Automatically enable locked-out users after" option takes effect even if it is not configured.
Conditions:
- There is a locked-out user in the BIG-IP system
- The option "Automatically enable locked-out users after" is not selected but there is a value present in it, the value being other than 0
Impact:
Locked-out users are automatically enabled to log-in even when the "Automatically enable locked-out user" option is not selected
Workaround:
In GUI:
Set 'Automatically enable locked-out users after X seconds' duration to 0 if the 'Manually enable locked-out user' feature is enabled.
In TMSH:
Set db variable password.unlock_time to 0 if systemauth.disablemanualunlock is false.
945469-3 : [APM][tmm core detected oauth_send_response in APM Oauth Token generation
Component: Access Policy Manager
Symptoms:
Tmm crashes while passing APM traffic.
Conditions:
OAuth is configured and is used for Token generation.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
942521-9 : Certificate Managers are unable to move certificates to BIG-IP via REST
Links to More Info: BT942521
Component: Device Management
Symptoms:
You cannot upload a cert/key via the REST API if you are using a certificate manager account
Conditions:
-- Using the REST API to upload a certificate and/or key
-- User is logged in as a Certificate Manager
Impact:
Unable to upload certificates as Certificate Manager
Workaround:
Use admin account instead of using Certificate Manager account to upload certs and keys
941961-6 : Upgrading system using WAM TCP profiles may prevent the configuration from loading
Links to More Info: BT941961
Component: TMOS
Symptoms:
If a BIG-IP is on version 13.1.0 through 15.1.x and has profiles in use that use wam-tcp-wan-optimized and/or wam-tcp-lan-optimized as parent profiles, then when the configuration is upgraded to 16.0.0, the configuration fails to load, with an error similar to:
err mcpd[10087]: 01020036:3: The requested parent profile (/Common/wam-tcp-wan-optimized) was not found.
On devices that are provisioned with not just the LTM module this may lead to an out of memory condition as the config load failure prevents memory provisioning completing leaving too little 4KB page (host) memory and too much huge page memory.
If suffering memory pressure then management access to device will be sluggish or not possible.
Conditions:
-- Upgrading from version 13.1.0 through 15.1.x.
-- Using profiles derived from wam-tcp-wan-optimized and/or wam-tcp-lan-optimized.
Impact:
Configuration does not load.
Workaround:
Remove these profiles and adjust the configuration elements that use them accordingly. If it is difficult to work on the device it may be necessary to rollback to earlier version and make changes there. Usually it would be better then to delete newer software volume and reinstall it at which point the modified config will be copied across and installed on newer volume.
Here are two examples:
-- Copy the definition of 'wam-tcp-wan-optimized' from /defaults/wam_base.conf into /config/bigip.conf, and then reload the configuration.
-- Change the references to wam-tcp-wan-optimized to something else in your config file (e.g., tcp-wan-optimized), and then reload the configuration.
939933-8 : Monpd restarts every few seconds due to missing of AVR database
Links to More Info: BT939933
Component: Application Visibility and Reporting
Symptoms:
Monpd reports that it is constantly restarting. A message similar to the following will appear at the console:
logger[2849]: Re-starting monpd
Conditions:
- There is a provisioned module that requires monpd
- Another module is de-provisioned which wipes the mysql database.
- May occur after an upgrade.
Impact:
Modules that rely on monpd will not be fully functioning.
Workaround:
Clearing AVR database will remove all existing statistics data.
1. Stop monpd: bigstart stop monpd
2. Clean data base: touch /var/avr/init_avrdb
3. Clean the statistics file are waiting to be loaded:
cd /var/avr/loader
rm -rf *
4. Start monpd: bigstart start monpd
939517-7 : DB variable scheduler.minsleepduration.ltm changes to default value after reboot
Links to More Info: BT939517
Component: TMOS
Symptoms:
Running the command 'tmsh list /sys db scheduler.minsleepduration.ltm'
shows that the value is -1.
The db variable 'scheduler.minsleepduration.ltm' is set to -1 on mcpd startup.
This overwrites a custom value.
Conditions:
-- The db variable 'scheduler.minsleepduration.ltm' has a non-default value set.
-- A reboot occurs.
Impact:
The db variable 'scheduler.minsleepduration.ltm' reverts to the default value. When the db variable reverts to the default value of unset -1, tmm may use either more or less CPU cycles when idle depending on whether the original DB variable value is bigger or less than the default value.
Workaround:
None
936777-9 : Old local config is synced to other devices in the sync group.
Links to More Info: BT936777
Component: Global Traffic Manager (DNS)
Symptoms:
Newly added DNS/GTM device may sync old local config to other devices in the sync group.
Conditions:
Newly added DNS/GTM device has a more recent change than other devices in the sync group.
Impact:
Config on other DNS/GTM devices in the sync group are lost.
Workaround:
You can use either of the following workarounds:
-- Make a small DNS/GTM configuration change before adding new devices to the sync group.
-- Make a small DNS/GTM configuration change on the newly added device to re-sync the correct config to other DNS/GTM devices.
932553-9 : An HTTP request is not served when a remote logging server is down
Links to More Info: BT932553
Component: Local Traffic Manager
Symptoms:
BIG-IP systems provide an option to sanitize HTTP traffic via the http_security profile. When the profile is configured to alarm on a violation, it is possible that a connection to the violating client is reset if a remote logging server is marked down.
Conditions:
-- A BIG-IP system has an HTTP profile and and an http_security profile with the alarm option set.
-- A remote logging server is configured via a BIG-IP pool.
-- The pool has a monitor that marks all the pool members down.
-- A request with an HTTP violation is processed and triggers an alarm configured in the http_security profile.
Impact:
-- A TCP connection to a client is reset by the BIG-IP system.
-- The web page may not render, or may not render as expected.
-- Data are not delivered to a server with a POST request.
Workaround:
None.
929173-8 : Watchdog reset due to CPU stall detected by rcu_sched
Links to More Info: BT929173
Component: TMOS
Symptoms:
Rcu_sched detected CPU stall, which can cause vCMP host reboot. The device reboots without core and records "Host Watchdog timeout."
Typically there will logs in kern.log similar to:
err kernel: : [526684.876928] INFO: rcu_sched detected stalls on CPUs/tasks: ...
Conditions:
Host undergoing a watchdog reset in a vCMP environment.
Impact:
CPU RCU stalls and host watchdog reboots
928665-6 : Kernel nf_conntrack table might get full with large configurations.
Links to More Info: BT928665
Component: TMOS
Symptoms:
Linux host connections are unreliable, and you see warning messages in /var/log/kern.log:
warning kernel: : [182365.380925] nf_conntrack: table full, dropping packet.
Conditions:
This can occur during normal operation for configurations with a large number of monitors, for example, 15,000 or more active entries.
Impact:
Monitors are unstable/not working at all.
Workaround:
1. Modify /etc/modprobe.d/f5-platform-el7-conntrack-default.conf
increasing the hashsize value:
options nf_conntrack hashsize=262144
2. Save the file.
3. Reboot the system.
928445-9 : HTTPS monitor is down when server_ssl profile cipher string is configured to TLSv1_2
Links to More Info: BT928445
Component: Local Traffic Manager
Symptoms:
HTTPS monitor is down when the Server SSL profile associated with the monitor utilises a cipher string containing a keyword such as '!TLSv1_1' or '!TLSv1_2' to disable TLS protocol version.
A configured cipher string, such as TLSv1_2 or TLSv1_1 is rejected by OpenSSL.
Conditions:
-- Pool member is attached to the HTTPS monitor.
-- HTTPS monitor is configured with a Server SSL profile.
-- Server SSL profile is configured with cipher string containing a keyword such as '!TLSv1_2' and/or '!TLSv1_1' to disable TLS protocol version.
Impact:
Pool status is down.
Workaround:
-- Enable 'in-tmm' monitoring.
-- Use the 'Options List' setting available in the Server SSL profile to disable TLS protocol version instead of cipher string.
-- Use the same cipher string with cipher group / cipher rule that is attached to the SSL profile.
923745-6 : Ctrl-Alt-Delete in virtual console reboots BIG-IP Virtual Edition
Links to More Info: BT923745
Component: TMOS
Symptoms:
A device reboot occurs upon sending a Ctrl-Alt-Del signal to the console of a BIG-IP Virtual Edition (VE) virtual machine.
Conditions:
This occurs when pressing Ctrl-Alt-Del or sending the command to a BIG-IP Virtual Edition (VE) virtual console.
This signal may be sent in different ways according to the interface used to connect to the console of the BIG-IP virtual machine.
Impact:
Accidental reboots of the BIG-IP VE instance are possible. You should not reboot a BIG-IP VE instance using Ctrl-Alt-Del.
Workaround:
To disallow the effect of this key chord, run the following command from the advanced shell (bash):
systemctl mask ctrl-alt-del.target
921069-6 : Neurond cores while adding or deleting rules
Links to More Info: BT921069
Component: TMOS
Symptoms:
Neurond cores if it receives error while adding or deleting rules in neuron hardware.
Conditions:
Adding or deleting rules in neuron hardware
Impact:
Neurond cores
Workaround:
None
919917-8 : File permission errors during bot-signature installation
Links to More Info: BT919917
Component: Application Security Manager
Symptoms:
When you install Bot-Sig IM file through LU, /var/log/ltm shows file permission errors.
Cannot open lock file (/var/run/config_lock), permission denied.
Cannot open command history file (/root/.tmsh-history-root), Permission denied : framework/CmdHistoryFile.cpp, line 92.
Conditions:
Installing bot-signature.
Impact:
If the BIG-IP device is rebooted, or the mcpd process is restarted, following an automatic bot-signature installation, without the config first being saved, the bot-signature installation will be reverted.
Workaround:
Save the BIG-IP configuration manually after the automatic bot-signature update has completed.
912293-8 : Persistence might not work properly on virtual servers that utilize address lists★
Links to More Info: BT912293
Component: Local Traffic Manager
Symptoms:
-- Connections to the virtual server might hang.
-- Increased tmm CPU utilization. This can occur after upgrading.
Conditions:
-- A virtual server is configured with a traffic-matching-criteria that utilizes a source-address-list and/or destination-address-list.
-- The virtual server utilizes certain persistence one of the following persistence types:
+ Source Address (but not hash-algorithm carp)
+ Destination Address (but not hash-algorithm carp)
+ Universal
+ Cookie (only cookie hash)
+ Host
+ SSL session
+ SIP
+ Hash (but not hash-algorithm carp)
Impact:
-- High tmm CPU utilization.
-- Stalled connections.
Workaround:
Enable match-across-virtuals in the persistence profile.
Note: Enabling match-across-virtuals might affect the behaviour of other virtual servers in the configuration that utilise persistence.
905749-8 : imish crash while checking for CLI help string in BGP mode
Links to More Info: BT905749
Component: TMOS
Symptoms:
imish crashes while checking the help strings of '(no) neighbor x.x.x.x fall-over bfd ?' when Border Gateway Protocol (BGP) is configured.
Conditions:
-- Configure BGP.
-- Check for help strings in imish using the '?' (question mark) character in the specific command "neighbour x.x.x.x fall-over bfd ?".
Impact:
imish crash.
Although imish crashes, BGP functionality is not impacted.
Workaround:
Avoid using '?' while entering the command "neighbour x.x.x.x fall-over bfd ?".
905477-8 : The sdmd daemon cores during config sync when multiple devices configured for iRules LX
Links to More Info: BT905477
Component: Local Traffic Manager
Symptoms:
The iRules LX workspaces belong on only one device in a Device Service Cluster (DSC) (config sync device-group). If you have the same iRules LX workspace configured on multiple devices and then perform a config sync operation, the sdmd daemon cores.
Conditions:
-- Multiple devices configured with the same iRules LX workspace in a DSC.
-- Change one of the devices such that the configuration requires a config sync.
-- Perform the config sync.
Impact:
The sdmd daemon cores. Although having multiple devices configured with the same iRules LX workspace is an incorrect configuration, sdmd should not core.
Workaround:
When the iRules LX workspace is correctly configured, i.e., on only one device in a DSC, there is no need to config sync, so this issues does not occur.
904401-7 : Guestagentd or devmgmtd core
Links to More Info: BT904401
Component: TMOS
Symptoms:
Guestagentd or devmgmtd crashes on a vCMP guest.
Conditions:
This can occur during normal operation in a vCMP environment.
Impact:
Guestagentd crashes on the vCMP guest, and the vCMP host does not have accurate guest information, such as version, provisioning, high availability (HA) status, and tmm status.
Or if it is Devmgmtd that crashed on vCMP guest, the device management daemon will not establishes and maintains device trust group functionality.
Workaround:
None.
902445-5 : ASM Policy Event Logging stops working after 'No space in shmem' error disconnection mitigation
Links to More Info: BT902445
Component: Application Security Manager
Symptoms:
ASM event logging stops working.
Conditions:
This can occur during normal ASM operation. It occurs after ASM executes 'No space in shmem' error disconnection mitigation, and this error is logged.
Impact:
ASM Policy Event Logging stop working; new event is not saved.
Workaround:
Restart asmlogd and pabnagd:
pkill asmlogd
pkill pabnagd
898389-8 : Traffic is not classified when adding port-list to virtual server from GUI
Links to More Info: BT898389
Component: Local Traffic Manager
Symptoms:
Traffic is not matching to the virtual server.
Conditions:
Using the GUI to configure traffic-matching-criteria by adding port-list to the virtual server.
Impact:
Traffic loss.
Workaround:
Creating traffic-matching-criteria from the command line
root@(localhost)(cfg-sync Standalone)(Active)(/Common)(tmos)# create ltm traffic-matching-criteria tmc_name_here destination-address-inline <IP ADDR>%10 route-domain <Route domain name>
896565-5 : Clusterd.peermembertimeout to set peer member timeout does not work all the time
Component: Local Traffic Manager
Symptoms:
Clusterd.peermembertimeout timeout does not work all the time. The default value (10s) might be used instead.
Conditions:
Clusterd.peermembertimeout is modified to a value other than default.
Impact:
New value of clusterd.peermembertimeout is not in use.
895845-7 : Implement automatic conflict resolution for gossip-conflicts in REST
Links to More Info: BT895845
Component: TMOS
Symptoms:
The devices in a high availability (HA) environment are out of sync in strange ways; config sync status indicates 'In Sync', but iApps such as SSL Orchestrator are out of sync.
Conditions:
-- high availability (HA) environment with two or more devices.
-- Gossip used for config sync. (Note: Gossip sync is used by BIG-IQ for BIG-IP config sync by iAppLX.)
-- A gossip conflict occurs for some reason.
You can detect gossip conflicts at the following iControl REST endpoint:
/mgmt/shared/gossip-conflicts
You can check gossip sync status at the following iControl REST endpoint:
/mgmt/shared/gossip
Impact:
If there are gossip conflicts, the devices requires manual intervention to get back in sync.
Workaround:
When two devices are out of sync with different generation numbers due to gossip conflict, you can use the following guidance to resolve the conflict:
1. Update devices info to use the same generation number.
2. This info found on REST Storage worker. Storage worker uses the selflink plus a generation number as the key to a given set of data.
3. Add the data from the unit with the highest generation number to the other unit.
4. Must also take care to increase the generation number on the new data to match that of the highest generation
Commands used:
1. Look for GENERATION_MISSING and gossip-conflict objects:
tmsh list mgmt shared gossip-conflicts
2. Get the 'selflink in remoteState' attribute. This self link is same across all devices and checks on the browser with each device to discover the device that is on the highest generation number:
tmsh list mgmt shared gossip-conflicts <OBJECT_ID>
3. Now you know what device contains the most recent version of your data, run this command to get up-to-date data:
restcurl /shared/storage?key=<everything after 'https://localhost/mgmt/' on selflink>
4. Make a post to the out-of-date device that includes the info from the up-to-date device as the post body:
restcurl -X POST /shared/storage -d '{<data from above command>}'
893801-4 : Launching resources that are published on an APM Webtop from multiple VMware servers will fail when the Native View client is selected
Links to More Info: BT893801
Component: Access Policy Manager
Symptoms:
If APM is configured to publish multiple VMware resources (VCS servers) on an APM Webtop, and you select the Native View Client when you launch a resource, you can launch desktops and applications only from the first resource. Attempts to launch desktop or applications from other resources result in an error.
Conditions:
-- APM is configured to protect multiple VMware resources (VCS servers) and publish those resources on an APM Webtop.
-- You attempt to launch a desktop or application specifying the native VMware client on Linux and Mac.
Impact:
Cannot access desktops and applications from multiple VMware back-ends.
Workaround:
Use HTML5 client instead.
893161-2 : Internal request to volatile.html used for cookie transport in Portal Access is sometime rewritten
Links to More Info: BT893161
Component: Access Policy Manager
Symptoms:
Request to volatile.html gets rewritten which reaches the backend server causing error responses from backend server.
Conditions:
Re-definition of XMLHttpREquest.prototype.open in the web application.
Impact:
Error response from the back end server since volatile.html is internal to Portal Access
Workaround:
Custom iRule, there is no generic irule but it can be implemented depending on the web application requirement.
Sample iRule:
XXXXX is web application path
#
# workaround for rewritten request for /volatile.html
# (remove link to opener if opener is full webtop)
#
when REWRITE_REQUEST_DONE {
if {
[HTTP::path] ends_with "XXXXX"
} {
# log "URI=([HTTP::path])"
# Found the file to modify
REWRITE::post_process 1
set do_fix 1
}
}
when REWRITE_RESPONSE_DONE {
if {[info exists do_fix]} {
unset do_fix
set str {if(typeof(F5_flush)!=='function')}
set strt [string first $str [REWRITE::payload]]
if {$strt > 0} {
REWRITE::payload replace 0 $strlen {
if (window.opener && window.opener.name === 'F5_Opener') window.opener=null;
}
}
}
886045-8 : Multi-NIC instances fail to come up when trying to use memory-mapped virtio device
Links to More Info: BT886045
Component: Local Traffic Manager
Symptoms:
Multi-NIC instances fail to come up while using memory-mapped virtio device.
Running the command 'lspci -s <pci-id> -vv' results in the 'region' field reporting 'Memory at xxxxx'.
Conditions:
TMM crashes as soon as the BIG-IP system tries to come up.
Impact:
The BIG-IP system fails to attach to the underlying virtio devices.
Workaround:
Switch to the sock driver by overriding tmm_init.tcl.
For instructions on how to enable the sock driver, see the workaround in K74921042: BIG-IP VE may fail to process traffic after upgrading the VMware ESXi 6.7 host to Update 2 (or later), available at https://support.f5.com/csp/article/K74921042.
883149-9 : The fix for ID 439539 can cause mcpd to core.
Links to More Info: BT883149
Component: TMOS
Symptoms:
Mcpd cores during config sync.
Conditions:
This occurs on rare occasions when the device transitions from standby to active, and the connection between the BIG-IP peers stalls out.
Impact:
Mcpd cores. Traffic disrupted while mcpd restarts.
Workaround:
None
881937-6 : TMM and the kernel choose different VLANs as source IPs when using IPv6.
Links to More Info: BT881937
Component: Local Traffic Manager
Symptoms:
IPv6 traffic generated from the host, either from a host daemon, monitors, or from the command line, can use a MAC and IPv6 source address from different VLANs.
Conditions:
-- Multiple VLANs configured with IPv6 addresses.
-- Multiple routes to the same destination, either the same or more specific, default routes, etc., that cover the traffic destination.
-- Changes are made to routes that cause the traffic to the destination to shift from one VLAN and gateway to another. This can be typically observed with dynamic routing updates.
- The db key snat.hosttraffic is set to disable.
Impact:
Traffic to the destination may fail because the incorrect source IPv6/MAC address is used, which might cause monitor traffic to fail.
Workaround:
Tmsh list sys db snat.hosttraffic
tmsh modify sys db snat.hosttraffic value enable
tmsh save sys config
880473-6 : Under certain conditions, the virtio driver may core during shutdown
Links to More Info: BT880473
Component: TMOS
Symptoms:
If the virtio driver fails to initialize, it may core during shutdown.
Conditions:
-- Using the virtio VE driver.
-- The virtio driver fails initialization and shuts down instead.
Impact:
TMM cores during driver shutdown.
870349-5 : Continuous restart of ntlmconnpool after the license reinstallation★
Links to More Info: BT870349
Component: Local Traffic Manager
Symptoms:
The ntlmconnpool process continuously restarts after reinstalling the license. The system reports a message in the BIG-IP console:
Re-starting ntlmconnpool.
The BIG-IP may show as 'Disconnected', and 'TMM outbound listener not yet created' messages may be present in /var/log/ltm.
Conditions:
This occurs when you upgrade your license such that the new license changes the number of available TMMs.
Impact:
The system requires a reboot and reports a ‘Re-starting ntlmconnpool’ message continuously in the BIG-IP console.
Workaround:
To resolve the issue, it is necessary to reboot. Once the system restarts, it operates as expected.
869541-5 : Series of unexpected <aborted> requests to same URL
Links to More Info: BT869541
Component: Access Policy Manager
Symptoms:
Series of unexpected <aborted> requests to same URL
Conditions:
Web-app using special code pattern in JavaScript.
For example:
loc = window.location;
obj = {}
for (i in loc) {
obj[i] = loc[i];
}
Impact:
Page load is aborted
Workaround:
Following iRule can be used with customized SPECIFIC PAGE_URL value:
when REWRITE_REQUEST_DONE {
if {
[HTTP::path] ends_with "SPECIFIC_PAGE_URL"
} {
# log "URI=([HTTP::path])"
# Found the file we wanted to modify
REWRITE::post_process 1
set do_fix 1
}
}
when REWRITE_RESPONSE_DONE {
if {[info exists do_fix]} {
unset do_fix
set strt [string first {<script>try} [REWRITE::payload]]
if {$strt > 0} {
REWRITE::payload replace $strt 0 {
<script>
(function () {
var dl = F5_Deflate_location;
F5_Deflate_location = function (o) {
if (o.F5_Location) Object.preventExtensions(o.F5_Location)
return dl(o);
}
})()
</script>
}
}
}
}
869121-5 : Logon Page configured after OAuth client in access policy VPE, get error message Access policy evaluation is already in progress for your current session
Links to More Info: BT869121
Component: Access Policy Manager
Symptoms:
When 'Logon Page' agent is configured after 'OAuth client' in access policy VPE, you see an error message that says 'Access policy evaluation is already in progress for your current session'
Conditions:
In access VPE, Logon page after OAuth client agent in standard customization type.
Impact:
Cannot process further to reach resources.
Workaround:
Try to configure the access policy in Modern customization if it's not already configured that way.
When message box configured after OAuth client and observing the same above Access policy evaluation error message
Workaround:
Use a 'Logon Page' agent instead of the 'Message Box' agent and configure it such as:
all fields Type will be set to 'none'
message for the users will be mentioned in the 'Form Header text' field
Logon Button value will be changed from 'Logon' to 'Continue'
This should simulate exactly the look and feel of a message box but will prevent the issue from happening.
868801-5 : BIG-IP still sends STARTTLS if the 'No encryption' SNMP option is enabled
Links to More Info: BT868801
Component: Application Visibility and Reporting
Symptoms:
The SMTP 'No Encryption' configuration option is not honored by the BIG-IP device.
Conditions:
The 'No Encryption' option is selected under the SMTP configuration object.
Impact:
BIG-IP disregards its SMTP configuration and attempts to initiate TLS.
Workaround:
None
867985-8 : LTM policy with a 'shutdown' action incorrectly allows iRule execution
Links to More Info: BT867985
Component: Local Traffic Manager
Symptoms:
BIG-IP systems provide manipulation tools over a connection with an LTM policy and/or iRule. LTM policy takes precedence over iRules and has an option to shutdown a connection based on satisfied conditions. When a connection is closing, an iRule should not be executed under the same conditions.
Conditions:
-- The BIG-IP system has a virtual server with an LTM policy and an iRule.
-- The LTM policy has action 'shutdown connection' under certain conditions.
-- The iRule has an event which is triggered under the same conditions.
Impact:
The iRule is executed before the connection is being reset.
Workaround:
None.
867549-7 : LCD touch panel reports "Firmware update in progress" indefinitely★
Links to More Info: BT867549
Component: TMOS
Symptoms:
After a software upgrade that includes an LCD firmware update, the LCD touch panel may remain stuck reporting an error indefinitely / for longer than 30 minutes:
Firmware update in Progress may take up to 30 minutes.
Conditions:
This issue occurs when all of the following conditions are met:
-- You have one of the following BIG-IP platforms:
* i850
* i2x00
* i4x00
* i5x00
* i7x00
* i10x00
* i11x00
* i15x00
* HRC-i2x00
* HRC-i5x00
* HRC-i10x00
-- You perform a software upgrade that updates the firmware on the LCD touch panel, e.g. upgrading from BIG-IP v13.1.x to BIG-IP v14.1.x or newer.
Impact:
The system is functional, but the LCD displays the firmware update screen indefinitely. The LCD cannot be used while it is frozen on the firmware update warning screen.
Workaround:
Important: Before attempting this workaround, check that there are no indications the system is still performing a firmware update (such as a terminal prompt), and that the following messages can be found in /var/log/ltm after the most recent boot:
notice chmand[6302]: 012a0005:5: firmware update succeeded.
notice chmand[6302]: 012a0005:5: Firmware check finished.
These messages indicates that the firmware update has finished, and the LCD is displaying the warning screen in error, so it is safe to perform the workaround.
Reboot the BIG-IP system to return the LCD to normal operation.
After a reboot of the BIG-IP operating system, the LCD touch panel should be responsive.
857769-5 : FastL4+HTTP or FastL4+Hash-Persistence virtual servers do not work correctly in DSR mode.
Links to More Info: BT857769
Component: Local Traffic Manager
Symptoms:
Given a long-lived TCP connection that can carry multiple client requests (for example, but not limited to, HTTP requests), the BIG-IP system fails to forward requests after the forty-eighth one.
The client will try re-transmitting the answered request, but the BIG-IP system will persist in dropping it.
Conditions:
This issue occurs when all of the following conditions are met:
1) The virtual server uses the FastL4 profile.
2) The virtual server also uses the HTTP or Hash-Persistence profiles.
3) The virtual server operates in DSR (Direct Server Return) mode (also known as N-Path).
Impact:
The BIG-IP system fails to forward traffic.
Workaround:
Do not use the HTTP or Hash-Persistence profiles with a FastL4 virtual server operating in DSR mode.
Note: It is fine to use an iRule that calls hash persistence commands (for example, "persist carp [...]") as long as the Hash-Persistence profile is not associated to the virtual server. This technique will allow you to persist on a hash based on L4 information that you can extract at CLIENT_ACCEPTED time. For example, the following iRule correctly persists a specific client socket to a pool member in a FastL4 DSR configuration:
when CLIENT_ACCEPTED {
persist carp [IP::client_addr]:[TCP::client_port]
}
851837-6 : Mcpd fails to start for single NIC VE devices configured in a trust domain
Links to More Info: BT851837
Component: TMOS
Symptoms:
Single NIC BIG-IP Virtual Edition (VE) devices configured in a trust domain (e.g., in high availability (HA)) cannot reload a running configuration when restarted and/or when mcpd fails to load the config, and reports a validation error:
err mcpd[25194]: 0107146f:3: Self-device config sync address cannot reference the non-existent Self IP ([IP ADDR]); Create it in the /Common folder first.
Conditions:
Single NIC VE devices configured in a trust domain (e.g., HA)
Impact:
The mcpd process fails to start, and the configuration does not load.
Workaround:
Manually copy and paste the self IP configuration snippet into the /config/bigip_base.conf file:
1. Connect to the CLI.
2. Edit bigip_base.conf, and add the following:
net self self_1nic {
address 10.0.0.1/24
allow-service {
default
}
traffic-group traffic-group-local-only
vlan internal
}
Note: replace 10.0.0.1 with the IP indicated in the error message
3. Save the changes and exit.
4. Load the configuration using the command:
tmsh load sys config
5. If APM or ASM is provisioned/configured, then also restart services with this command:
bigstart restart
844925-7 : Command 'tmsh save /sys config' fails to save the configuration and hangs
Links to More Info: BT844925
Component: TMOS
Symptoms:
The 'tmsh save /sys config' command hangs and fails to save the configuration if there is a memory allocation failure when creating the reply.
Conditions:
-- A large number of iApps: in the thousands.
-- Each iApp has tens of variables.
Impact:
Because tmsh cannot save the configuration, if the BIG-IP system reboots, any changes made since the last successful save are lost.
Workaround:
Run the command:
tmsh save /sys config binary
This does not save the configuration to files in /config, but it does at least allow you to save the binary configuration.
That way, you can reboot the BIG-IP system and not lose the configuration.
Note: It is possible that a reboot will provide sufficient memory to save to configuration files. It depends on the configuration of virtual memory at the time of the save. It is possible that every time you want to save the config, you must use the binary option.
824953-2 : The sFlow sample collection for VLAN does not work with VLAN groups
Links to More Info: BT824953
Component: TMOS
Symptoms:
The sFlow FLOW packets containing traffic samples for a VLAN are not generated and not sent to the receiver, although CNTR telemetry packets are sent.
Conditions:
-- The VLAN is a member of a VLAN group.
-- The VLAN has sFlow packet sampling configured and enabled.
Impact:
No traffic samples are available from the VLANs that are part of VLAN groups.
Workaround:
Although there is no workaround for VLANs that are part of VLAN groups, the sFlow traffic samples work with VLANs that are not part of VLAN groups.
824437-10 : Chaining a standard virtual server and an ipother virtual server together can crash TMM.
Links to More Info: BT824437
Component: Local Traffic Manager
Symptoms:
TMM crashes with a SIGFPE and restarts. The TMM logs contain the following panic message:
Assertion "xbuf_delete_until successful" failed.
Conditions:
This issue occurs when the following conditions are met:
-- The system has been configured with a standard virtual server and an Any IP (ipother) virtual server chained together. This can be done explicitly using an iRule that features the 'virtual' command to connect the two virtual servers, or implicitly with certain APM configurations.
-- The pool member on the server-side asks this specific virtual server configuration on the BIG-IP system to retransmit data.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Ensure the target virtual server in the chain configuration does not use the ipother profile.
821589-6 : DNSSEC does not insert NSEC3 records for NXDOMAIN responses
Links to More Info: BT821589
Component: Global Traffic Manager (DNS)
Symptoms:
DNSSEC does not insert NSEC3 records for NXDOMAIN responses.
Conditions:
-- "process-xfr yes" is set for the dns profile associated with the listener;
And
-- There is no "Zone Transfer Clients" nameserver configured for that zone.
And
-- There is no wideip configured.
Impact:
DNSSEC does not respond NSEC3 for non-existent domain.
Workaround:
1. Change this setting for dns profile from "process-xfr yes" to "process-xfr no";
Or
2. Add a nameserver for "Zone Transfer Clients" of that zone.
Or
3. Add a wideip.
812693-7 : Connection in FIN_WAIT_2 state may fail to be removed
Links to More Info: BT812693
Component: Local Traffic Manager
Symptoms:
If a connection that has a fully closed client-side, but a server-side still in FIN_WAIT_2, receives a SYN matching the same connflow, the idle time is reset. This can result in the fin-wait-2-timeout never being reached. The SYN will be responded to with a RST - 'TCP Closed'
Conditions:
- Client side connection has been fully closed. This may occur if a client SSL profile is in use and an 'Encrypted Alert' has been received.
- Server side has sent a FIN which has been ACK'd, but no FIN has been received from the server.
- SYN received matching the existing connflow before the FIN-WAIT-2-timeout has been reached (300 default).
Impact:
Connection may fail to be removed in a timely manner. New connection attempts are RST with 'TCP Closed'
Workaround:
You can use either of the following:
-- Ensure servers are sending FIN's so as not to leave the connection in a FIN_WAIT_2 state.
-- Mitigate the issue by lowering the FIN-WAIT-2-timeout to a smaller value, e.g., FIN-WAIT-2-timeout 10.
809089-7 : TMM crash after sessiondb ref_cnt overflow
Links to More Info: BT809089
Component: TMOS
Symptoms:
Log message that indicates this issue may happen:
session_reply_multi: ERROR: unable to send session reply: ERR_BOUNDS
[...] valid s_entry->ref_cnt
Conditions:
-- Specific MRF configuration where a single router is configured and shared by ~500 virtual servers
-- also the traffic is routed by iRules similar to the following iRule: MR::message route peer "peer-[IP::local_addr]-[TCP::local_port]" that sends traffic to the same destination IP, 500 destination ports that could lead to a huge number of session entries owned by a single tmm.
-- High rate of session lookups with a lot of entries returned.
Note: This issue does not affect HTTP/2 MRF configurations.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
- Create unique MRF routers and assign a different MRF router to each virtual server
- Use different destination IP address
Note: while this issue seems to be a generic sessionDB issue, above provided workaround is when it is only evident that MRF config seems to be causing the issue.
804089-4 : iRules LX Streaming Extension dies with Uncaught, unspecified error event
Links to More Info: BT804089
Component: Local Traffic Manager
Symptoms:
You are using a virtual with an ilx profile generated from an iRules LX Streaming extension and observed the following error or similar.
Sep 05 09:16:52 pid[5850] Error: Uncaught, unspecified "error" event. (ETIMEDOUT)
Sep 05 09:16:52 pid[5850] at ILXFlow.emit (events.js:163:17)
Sep 05 09:16:52 pid[5850] at ILXFlowWrap.ilxFlowErrorCb [as onIlxError] (/var/sdm/plugin_store/plugins/<pluginName>/extensions/<workspaceName>/node_modules/f5-nodejs/lib/ilx_flow.js:108:10)
Conditions:
Virtual server with an ilx profile generated from an iRules LX Streaming extension. The problem is aggravated if a web-acceleration profile is configured.
Impact:
Traffic may be disrupted until the sdmd daemon has respawned another node.js process.
800377-1 : Support for Referrer-Policy: origin to correctly return backend origin in virtual server requests
Links to More Info: BT800377
Component: Access Policy Manager
Symptoms:
When a Virtual Server (VS) includes a Referrer-Policy: origin response header and sends a request that relies on the Referrer header (e.g., to a .php file), the system incorrectly returns the client-side origin instead of the backend origin.
Conditions:
Issue occurs when Using portal access and has a resource that has a Referrer-Policy: origin response header.
Impact:
Virtual Server (VS) pages may encounter incorrect Referrer header values when using resources that depend on accurate backend origin data. Instead of the backend origin being returned as expected, the client (visitor) origin is returned.
Workaround:
None
797573-5 : TMM assert crash with resulting in core generation in multi-blade chassis
Links to More Info: BT797573
Component: Local Traffic Manager
Symptoms:
TMM crashes while changing settings.
Conditions:
Seen on multi-blade chassis with either one of the options:
-- Running system with DoS and other traffic.
-- Create a new vCMP guest and deploy it.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None.
791365-7 : Bad encryption password error on UCS save
Links to More Info: BT791365
Component: TMOS
Symptoms:
When a user with the admin role attempts to save a UCS with a passphrase, the following error is encountered:
[resource-admin@inetgtm1dev:Active:Standalone] ucs # tmsh save sys ucs /var/local/ucs/test-ucs passphrase password
Saving active configuration...
Error: Bad encryption password. <=========
Operation aborted.
/var/tmp/configsync.spec: Error creating package
WARNING:There are error(s) during saving.
Not everything was saved.
Be very careful when using this saved file!
Error creating package
Error during config save.
Unexpected Error: UCS saving process failed.
Conditions:
1) Log into the BIG-IP system as a user with admin role that has Advanced Shell access.
2) Attempt to create a UCS with a passphrase.
Impact:
Unable to save UCS with a passphrase.
Workaround:
This affects users logged in with the Admin role; you will be able to create a UCS with a passphrase while logged in firstly as root user and then use 'resource-admin' user to save a ucs with passphrase.
780437-10 : Upon rebooting a VIPRION chassis provisioned as a vCMP host, some vCMP guests can return online with no configuration.
Links to More Info: BT780437
Component: TMOS
Symptoms:
It is possible for a vCMP host to scan the /shared/vmdisks directory for virtual disk files while the directory is unmounted.
As such, virtual disk files that existed before the reboot will not be detected, and the vCMP host will proceed to create them again.
The virtual disks get created again, delaying the guests from booting. Once the guests finally boot, they have no configuration.
Additionally, the new virtual disk files are created on the wrong disk device, as /shared/vmdisks is still unmounted.
Symptoms for this issue include:
-- Running the 'mount' command on affected host blades and noticing that /shared/vmdisks is not mounted.
-- Running the 'tmsh show vcmp guest' command on affected host blades (early on after the reboot) and noticing some guests have status 'installing-vdisk'.
-- Running the 'lsof' command on affected and unaffected host blades shows different device numbers for the filesystem hosting the virtual disks, as shown in the following example (note 253,16 and 253,1):
qemu-kvm 19386 qemu 15u REG 253,16 161061273600 8622659 /shared/vmdisks/s1g2.img
qemu-kvm 38655 qemu 15u REG 253,1 161061273600 2678798 /shared/vmdisks/s2g1.img
-- The /var/log/ltm file includes entries similar to the following example, indicating new virtual disks are being created for one of more vCMP guests:
info vcmpd[x]: 01510007:6: VDisk (s2g1.img/2): Adding.
info vcmpd[x]: 01510007:6: VDisk (s2g1.img/2): Syncing with MCP - [filename:s2g1.img slot:2 installed_os:0 state:0]
notice vcmpd[x]: 01510006:5: Guest (s2g1): Creating VDisk (/shared/vmdisks/s2g1.img)
info vcmpd[x]: 01510007:6: VDisk (s2g1.img/2): Syncing with MCP - [filename:s2g1.img slot:2 installed_os:0 state:1]
info vcmpd[x]: 01510007:6: Guest (s2g1): VS_ACQUIRING_VDISK->VS_WAITING_INSTALL
info vcmpd[x]: 01510007:6: Guest (s2g1): VS_WAITING_INSTALL->VS_INSTALLING_VDISK
notice vcmpd[x]: 01510006:5: Guest (s2g1): Installing image (/shared/images/BIGIP-12.1.2.0.0.249.iso) to VDisk (/shared/vmdisks/s2g1.img).
info vcmpd[x]: 01510007:6: VDisk (s2g1.img/2): Syncing with MCP - [filename:s2g1.img slot:2 installed_os:0 state:2]
Conditions:
-- VIPRION chassis provisioned in vCMP mode with more than one blade in it.
-- Large configuration with many guests.
-- The VIPRION chassis is rebooted.
-- A different issue, of type 'Configuration from primary failed validation' occurs during startup on one or more Secondary blades. By design, MCPD restarts once on affected Secondary blades, which is the trigger for this issue. An example of such a trigger issue is ID 563905: Upon rebooting a multi-blade VIPRION or vCMP guest, MCPD can restart once on Secondary blades.
Impact:
-- Loss of entire configuration on previously working vCMP guests.
-- The /shared/vmdisks directory, in its unmounted state, may not have sufficient disk space to accommodate all the virtual disks for the vCMP guests designated to run on that blade. As such, some guests may fail to start.
-- If you continue using the affected guests by re-deploying configuration to them, further configuration loss may occur after a new chassis reboot during which this issue does not happen. This occurs because the guests would then be using the original virtual disk files; however, their configuration may have changed since then, and so some recently created objects may be missing.
Workaround:
There is no workaround to prevent this issue. However, you can minimize the risk of hitting this issue by ensuring you are running a software version (on the host system) where all known 'Configuration from primary failed validation' issues have been resolved.
If you believe you are currently affected by this issue, please contact F5 Networks Technical Support for assistance in recovering the original virtual disk files.
779137-9 : Using a source address list for a virtual server does not preserve the destination address prefix
Links to More Info: BT779137
Component: Local Traffic Manager
Symptoms:
Configuring a network virtual server with a source address list causes the system to treat the virtual server as a host.
Conditions:
-- Configure a source address list on the virtual server.
-- Configure a network address for the destination of the virtual server (not an address list).
Impact:
Traffic does not flow to the virtual server as expected.
Workaround:
See K58807232
777389-8 : In rare occurrences related to PostgreSQL monitor, the mcpd process restarts
Links to More Info: BT777389
Component: TMOS
Symptoms:
Possible indications include the following:
-- Errors such as the following may appear in ltm/log:
- notice postgres[10872]: [466-1] WARNING: pgstat wait timeout.
- notice sod[27693]: 01140041:5: Killing /usr/bin/mcpd pid 7144.
- BD_CONF|ERR| ...failed to connect to mcpd after 5 retries, giving up...
- BD_CONF|ERR| ...can't read message from mcp conn, status:16908291.
- BD_MISC|CRIT| ...Received SIGABRT - terminating.
-- Errors such as the following may appear in the dwbld/log:
- Couldn't send BLOB notification - MCP err 16908291.
- Got a terminate/abort signal - terminating ...
- Terminating mcp_bridge thread.
-- Processes may restart unexpectedly, including mcpd, bd, and postgresql.
Conditions:
-- The 'mcpd' process attempts to read monitoring data from the PostgreSQL server, but no data is available.
-- A contributing factor might be that the AFM module is licensed but not configured.
Impact:
Failing to receive a monitoring response from the SQL server, MCPD goes into an infinite loop and skips the heartbeat report, resulting in its restart. While MCPD is restarting, the system is offline and does not process traffic. After restart, system operation returns to normal.
Workaround:
The chance of occurrence can be minimized by making sure that control-plane processes have sufficient memory to run efficiently.
775845-9 : Httpd fails to start after restarting the service using the iControl REST API
Links to More Info: BT775845
Component: TMOS
Symptoms:
After restarting httpd using the iControl REST API, httpd fails to start, even with a subsequent restart of httpd at the command line.
Similar to the following example:
config # restcurl -u admin:admin /tm/sys/service -X POST -d '{"name":"httpd", "command":"restart"}'
{
"kind": "tm:sys:service:restartstate",
"name": "httpd",
"command": "restart",
"commandResult": "Stopping httpd: [ OK ]\r\nStarting httpd: [FAILED]\r\n(98)Address already in use: AH00072: make_sock: could not bind to address n.n.n.n:n\nno listening sockets available, shutting down\nAH00015: Unable to open logs\n"
}
config # tmsh restart sys service httpd
Stopping httpd: [ OK ]
Starting httpd: [FAILED]
Conditions:
Restarting httpd service using iControl REST API.
Impact:
Httpd fails to start.
Workaround:
To recover from the failed httpd state, you can kill all instances of the httpd daemon and start httpd:
killall -9 httpd
tmsh start sys service httpd
760355-7 : Firewall rule to block ICMP/DHCP from 'required' to 'default'★
Links to More Info: BT760355
Component: Advanced Firewall Manager
Symptoms:
If a firewall is configured on the management port with an ICMP rule, after upgrading to v14.1.x or later, the ICMP rule does not work.
Conditions:
- Firewall is configured on the management port.
- Firewall is configured with an ICMP rule to block.
- Firewall is configured with an ICMP rule to allow.
Impact:
ICMP packets cannot be blocked with a firewall rule to drop on the management port. ICMP packets are allowed from the management port and will not increase the counter even if explicitly allowed by a rule.
Workaround:
Run the following commands after upgrading to v14.1.x or later from earlier versions.
# /sbin/iptables -N id760355
# /sbin/iptables -I INPUT 1 -j id760355
# /sbin/iptables -A id760355 -i mgmt -p icmp --icmp-type 8 -s 172.28.4.32 -j DROP
759258-9 : Instances shows incorrect pools if the same members are used in other pools
Links to More Info: BT759258
Component: TMOS
Symptoms:
Monitor 'Instances' tab shows incorrect pools if the same members are used in other pools.
Conditions:
Steps to Reproduce:
1. Create custom monitor or use system default.
2. Assign that monitor to a test pool.
3. Navigate to Local Traffic :: Monitors, click the test monitor, then select the Instances tab.
Impact:
The test pool is displayed, as well any other pools that use the same member or members (but with other monitors assigned).
Workaround:
None.
758491-7 : When using NetHSM integration, after upgrade to 14.1.0 or later (or creating keys using fipskey.nethsm), BIG-IP cannot use the keys
Links to More Info: BT758491
Component: Local Traffic Manager
Symptoms:
For Thales:
The ltm/log shows SSL handshake failures with similar lines (this is for Diffie-Hellman Key Exchange):
-- warning bigip1 tmm1[28813] 01260013 SSL Handshake failed for TCP 192.0.2.1:5106 -> 192.0.2.200:5607
-- warning bigip1 tmm1[28813] 01260009 Connection error: ssl_hs_vfy_sign_srvkeyxchg:13583: sign_srvkeyxchg (80)
-- debug bigip1 tmm1[28813] 01260036 FIPS acceleration device error: fips_poll_completed_reqs: req: 4 status: 0x1 : Cancel
-- err bigip1 pkcs11d[26259] 01680002 Key table lookup failed. error.
After enabling pkcs11d debug, the pkcs11d.debug log shows:
-- 2019-10-03 11:21:50 [6399] t00075a9a462b0000: pkcs11: 000008D9 D obj_match_attribute class CKO_PRIVATE_KEY attribute CKA_CLASS
-- 2019-10-03 11:21:50 [6399] t00075a9a462b0000: pkcs11: 000008D9 D obj_match_attribute type CKA_CLASS matches
-- 2019-10-03 11:21:50 [6399] t00075a9a462b0000: pkcs11: 000008D9 D obj_match_attribute class CKO_PRIVATE_KEY attribute CKA_ID
-- 2019-10-03 11:21:50 [6399] t00075a9a462b0000: pkcs11: 000008D9 D obj_match_attribute type CKA_ID does not match <===
For Safenet:
-- warning tmm1[17495]: 01260009:4: Connection error: ssl_hs_vfy_sign_srvkeyxchg:13544: sign_srvkeyxchg (80)
-- warning tmm1[17495]: 01260013:4: SSL Handshake failed for TCP 10.1.1.11:6009 -> 10.1.1.201:443
-- err pkcs11d[5856]: 01680002:3: Key table lookup failed. error.
Conditions:
1. Keys were created on earlier versions of BIG-IP software, no matter if using tmsh (Safenet) or using fipskey.nethsm (Thales, Safenet) and the device was upgraded to 14.1.0 or later.
2. Keys were created on BIG-IP v14.1.0 or later directly, using fipskey.nethsm (Thales). For Safenet, fipskey.nethsm was deprecated in 14.0.0.
Impact:
SSL handshake failures.
Workaround:
There are two workarounds:
-- Re-create the keys using tmsh command.
IMPORTANT: This workaround is suitable for deployments that are new and not in production.
-- Re-import the keys from nethsm using:
tmsh install sys crypto key <key_label> from-nethsm
You can find the key_label here:
-- The rightmost string in the output of the Thales command:
nfkminfo -l
-- The string after label= in the 'cmu list' command for Safenet.
751540-7 : GTM Sync group not syncing properly with multiple self IP addresses configured on one VLAN but not all configured for GTM server
Links to More Info: BT751540
Component: Global Traffic Manager (DNS)
Symptoms:
GTM changes in some devices are not synced to other GTM-configured devices in the same syncgroup.
Conditions:
-- There are multiple self IP addresses configured on one VLAN.
-- Some, but not all, self IP addresses are configured for GTM server.
Impact:
GTM Sync group not syncing properly.
Workaround:
Configure all self IP addresses in the syncgroup for GTM server.
751451-6 : When upgrading to v14.0.0 or later, the 'no-tlsv1.3' option is missing from HTTPS monitors automatically created server SSL profiles
Links to More Info: BT751451
Component: Local Traffic Manager
Symptoms:
If there are HTTPS monitor objects that were created using BIG-IP software v12.x, when the BIG-IP is upgraded directly to v14.0.0 or later, the operation automatically creates server SSL profiles for the HTTPS monitors as needed. Those server SSL profile objects do not have 'no-tlsv1.3' included in their 'options' configuration.
Conditions:
-- Having HTTPS monitors configured in v12.x before upgrading.
-- Directly upgrading from v12.x to v14.0.0 or later
Impact:
TLSv1.3 gets enabled on the server SSL profiles.
Workaround:
-- To avoid this issue, upgrade from v12.x to v13.x, and then upgrade to v14.0.0 or later
-- To mitigate this issue, modify the affected profile to disable TLSv1.3.
747823-4 : Drd utility can hang when generating qkview
Links to More Info: BT747823
Component: TMOS
Symptoms:
"qkview -v" shows qkview generation got stuck on qkafm.so module while executing /usr/sbin/drd:
Executing Module: [qkafm.so]
Executing /usr/bin/du -h /var/lib/mysql/logdb/ ...
Result: [0] Elapsed: 0.064386
Executing /usr/sbin/drd --readlong=/usr/sbin/readlong --all ...
Conditions:
AFM module is provisioned
Impact:
Impossible to create qkview.
Workaround:
# mount -o remount,rw /usr
# sed -i '/output.wait()/d; s/return output.stdout.readlines()/return output.communicate()[0].splitlines(True)/g' /usr/sbin/drd
# mount -o remount,ro /usr
745645-4 : Portal Access does not rewrite the script element with textNode children
Links to More Info: BT745645
Component: Access Policy Manager
Symptoms:
Web-application defining script element with textNode children are not rewritten by Portal Access. This can cause the web application to fail to load.
Conditions:
Web-application defining script element with textNode children which requires client-side dynamic script rewriting
Impact:
- Web application may fail to load.
- Non-rewritten HTTP request
Workaround:
Custom iRule to rewrite the content of textNode. There is no generic iRule but it can be implemented depending on the web application requirement.
745125-4 : Network Map page Virtual Servers with associated Address/Port List have a blank address.
Links to More Info: BT745125
Component: TMOS
Symptoms:
On the Local Traffic > Network Map page, some virtual servers have a blank address.
Conditions:
An address list or port list is associated with the virtual server
Impact:
The Network Map will display a blank address field.
742764-5 : If two racoon daemon are spawned on startup, one fails and cores.
Links to More Info: BT742764
Component: TMOS
Symptoms:
When a BIG-IP system becomes Active, tmipsecd starts a racoon daemon for each route domain, including the default RD 0.
If for any reason racoon fails to fully start, tmipsecd will start another instance of racoon.
When this occurs, one or both of them may crash and create a core file.
Conditions:
-- BIG-IP becomes Active or racoon is (re)started.
-- IPsec does not have to be configured for this failure to occur.
Impact:
IPsec IKEv1 tunnels might delay starting while racoon restarts.
Workaround:
N/A
739904-6 : /var/log/ecm log is not rotated
Links to More Info: BT739904
Component: TMOS
Symptoms:
/var/log/ecm log is not rotated.
Conditions:
Log file /var/log/ecm exists in the /var/log directory.
Impact:
Log rotate does not work. May fill disk with logs over time.
Workaround:
Use tmsh sys log-rotate command to modify the logrotate settings to add /var/log.ecm.
The syntax is:
tmsh modify sys log-rotate common-include '"
/var/log/ecm {
compress
missingok
notifempty
}"'
739475-9 : Site-Local IPv6 Unicast Addresses support.
Links to More Info: BT739475
Component: Local Traffic Manager
Symptoms:
No reply to Neighbor Advertisement packets.
Conditions:
Using FE80::/10 addresses in network.
Impact:
Cannot use FE80::/10 addressees in network.
Workaround:
None
721591-4 : Java crashes with core during with high load on REST API
Links to More Info: K000141369, BT721591
Component: TMOS
Symptoms:
Java crashes with core.
Conditions:
This is a random crash and there are no known conditions for reproducing it.
Impact:
This crash occurs randomly during normal operation and has following impact:
-- Stats are not available.
Workaround:
-- Restart the Java service with "bigstart restart restjavad" or "tmsh restart sys service restjavad".
-- Restart the BIG-IP system.
717174-7 : WebUI shows error: Error getting auth token from login provider★
Links to More Info: BT717174
Component: Device Management
Symptoms:
Occasionally, the BIG-IP Admin Utility TMUI fails to function correctly and produces the following error:
Error getting auth token from login provider.
This occurs when the BIG-IP REST Daemon restjavad fails to start up properly.
Conditions:
This error most often occurs on the first or second boot after upgrade, and more often on Virtual Edition BIG-IP platforms running on oversubscribed or slow hypervisors.
Impact:
TMUI and any other BIG-IP system components that rely on REST Workers such as: OpenID Connect key rotation discovery, portions of the TMOS Web Configuration Utility, and Guided Configuration (AGC and WGC) fail to function properly.
Workaround:
Restarting the BIG-IP REST daemons restjavad and restnoded will usually correct the problem. To do so, connect to the SSH console and issue the following two commands:
bigstart restart restjavad
bigstart restart restnoded
714705-10 : Excessive 'The Service Check Date check was skipped' log messages.
Links to More Info: BT714705
Component: TMOS
Symptoms:
Large numbers of these warnings are logged into the "ltm" file:
warning httpd[12345]: 0118000a:4: The Service Check Date check was skipped.
The message appears whenever a new "httpd" instance is launched.
Conditions:
The BIG-IP instance has been installed with a "no service check" license. These licenses are sometimes provided with cloud pre-licensed VE software images.
Impact:
Log files are saturated with many useless warnings. This can hide actual problems and impede their diagnosis.
Workaround:
During manual troubleshooting, commands such as the following may be used to filter the excess warnings:
# grep -v 'Service Check Date check was skipped' ltm | less
The syslog-ng 'include' filter mechanism is another possibility, but this should be attempted only with assistance of the F5 Support team.
705869-7 : TMM crashes as a result of repeated loads of the GeoIP database
Links to More Info: BT705869
Component: Global Traffic Manager (DNS)
Symptoms:
TMM crash due to the repeated loading of the GeoIP database.
Conditions:
Repeatedly loading the GeoIP database in rapid succession.
Impact:
Traffic is disrupted while TMM restarts.
Workaround:
Avoid repeated loading of the GeoIP Database.
694765-9 : Changing the system's admin user causes vCMP host guest health info to be unavailable
Links to More Info: BT694765
Component: TMOS
Symptoms:
On the host, 'tmsh show vcmp health' does not display guest info.
The iControl REST log at /var/log/icrd contains entries similar to the following:
notice icrd_child[32206]: 01420003:5: Cannot load user credentials for user "admin" Current session has been terminated.
Conditions:
The default admin user "admin" has been changed.
Note: You changed the default admin user by following the steps in the Article K15632: Disabling the admin and root accounts using the BIG-IP Configuration utility or the Traffic Management Shell: https://my.f5.com/manage/s/article/K15632.
Impact:
Many REST APIs do not function, and functionality such as vCMP guest health that depend on REST fails.
Workaround:
Rename the default system admin back to 'admin':
tmsh modify /sys db systemauth.primaryadminuser value admin
Note: If you are using the default 'admin' account, make sure you change the password as well.
687044-8 : Tcp-half-open monitors might mark a node up or down in error
Links to More Info: BT687044
Component: Local Traffic Manager
Symptoms:
The tcp-half-open monitor might mark a node or pool member up when it is actually down, or down when it is actually up, when multiple transparent monitors within multiple 'bigd' processes probe the same IP-address/port.
Conditions:
All of the following are true:
-- There are multiple bigd processes running on the BIG-IP system.
-- There are multiple tcp-half-open monitors configured to monitor the same IP address.
-- One or more of the monitored objects are up and one or more of the monitored objects are down.
Impact:
The BIG-IP system might occasionally have an incorrect node or pool-member status, where future probes may fix an incorrect status.
Workaround:
You can use any of the following workarounds:
-- Configure bigd to run in single process mode by running the following command:
tmsh modify sys db bigd.numprocs value 1
-- Use a tcp monitor in place of the tcp-half-open monitor.
-- Configure each transparent monitor for different polling cycles to reduce the probability that an 'up' response from the IP address/port is mistakenly viewed as a response to another monitor that is currently 'down' (or vice-versa).
680804-5 : TMM restart due to delayed keep alives
Links to More Info: BT680804
Component: Advanced Firewall Manager
Symptoms:
TMM killed with SIGABRT by the SOD process that monitors all process's health. TMM misses the keep alive, hence the restart.
The stack trace shows that tmm was killed when it was waiting on a memory map (sys_mmap_obj) call.
Conditions:
The memory map call is known to take a long time to complete when the disk IO sub-system is very slow.
High IO can also be a result of memory starvation accompanied by intensive paging
Impact:
Traffic disrupted while TMM restarts.
Workaround:
This problem is not likely to persist after a TMM service restart. So no user intervention is required.
If this problem happens repeatedly, it would be required to take a look at IO Resources in use at time of the database load or reload, and see if a way to lower IO can be found.
673060-2 : SSL handshake failure with Session Ticket enabled on the backend server
Links to More Info: BT673060
Component: Local Traffic Manager
Symptoms:
SSL handshake failure occurs as a certificate is not issued (no certificate).
Conditions:
- Server SSL profile is enabled with the Session Ticket feature
- Backend server also supports Session Ticket
Impact:
- Service is disrupted because of a handshake failure.
- SSL handshake fails with no certificate issue.
Workaround:
Disable the Session Ticket feature on the Server SSL Profile or the backend server.
671545-6 : MCPD core while booting up device with error "Unexpected exception caught"
Links to More Info: BT671545
Component: TMOS
Symptoms:
Mcpd crashes.
Conditions:
The file-store path is missing with specific configuration file which is needed by mcpd while booting.
Impact:
Traffic and control plane disrupted while mcpd restarts.
666845-6 : Rewrite plugin can accumulate memory used for patching very large files
Links to More Info: K08684622, BT666845
Component: Access Policy Manager
Symptoms:
Rewrite plugin memory usage is significantly higher than normal (up to 200 MB RSS) and does not decrease.
Conditions:
This happens because the plugin caches and reuses already allocated chunks of memory instead of releasing them to the operating system.
Impact:
Out-of-memory crashes on systems with low amounts of memory.
Workaround:
Use one or both of the following workarounds:
-- Restart rewrite when memory usage is too high.
-- Disable patching for large (15-20 MB uncompressed) files.
664816-1 : The Neuron SDK rejects rule delete requests with -5 error
Links to More Info: BT664816
Component: TMOS
Symptoms:
Neurond cores if it receives an error while adding or deleting rules in neuron hardware.
Conditions:
Adding or deleting rules in neuron hardware
Impact:
Neurond cores
Workaround:
None
658943-8 : Errors when platform migration process is loading UCS using trunks on vCMP guest/F5OS Tenants
Links to More Info: BT658943
Component: TMOS
Symptoms:
During the platform migration from a physical BIG-IP system to a BIG-IP vCMP guest/F5OS Tenant, the load fails with one of the following messages:
01070687:3: Link Aggregation Control Protocol (LACP) is not supported on this platform. Unexpected Error: Loading configuration process failed.
01070338:3: Cannot create trunk [name of trunk], maximum limit reached Unexpected Error: Loading configuration process failed.
Conditions:
-- The source device is a physical BIG-IP device with one or more trunks with or without LACP in its configuration.
-- The destination device is a vCMP guest/F5OS Tenant.
Impact:
The platform migration fails and the configuration does not load.
Workaround:
You can use one of the following workarounds:
-- Remove all trunks from the source configuration prior to generation of the UCS.
-- Before loading the UCS archive onto the target BIG-IP, edit the archive and remove the trunk configuration from ./config/bigip_base.conf, and then repack the UCS.
-- After the UCS load fails, edit the configuration manually on the destination to remove trunk references, and then reload the configuration.
-- K50152613
638863-3 : Attack Signature Detected Keyword is not masked in the logs
Links to More Info: BT638863
Component: Application Security Manager
Symptoms:
Attack Signature Detected Keyword is not masked in the logs
Conditions:
When the signature is matching a full request, and there is a sensitive keyword around the signature location, in some cases the signature appears in the logs and is not masked.
Impact:
Sensitive data may appear in the logs
Workaround:
None
637827-4 : VADC: after re-deploying a single-nic VM with multiple nics, a load can fail due to stp member 1.0
Links to More Info: BT637827
Component: TMOS
Symptoms:
The configuration fails to load with the following message:
01070523:3: No Vlan association for STP Interface Member 1.0
Unexpected Error: Loading configuration process failed.
Conditions:
In single-nic mode, the interface 1.0 exists and can be saved as a VLAN member. Upon re-deploying the virtual-machine from single nic mode to multi-nic, the 1.0 interface becomes pending and should no longer impact any configuration. However, a condition exists after a VLAN delete, where the associated (automatically created) stp member is not removed from the running config and can cause a load error.
Impact:
Load fails and requires manual intervention. Otherwise, the STP member is benign because vADC does not support STP.
Workaround:
Remove the STP interface member 1.0 and reload.
637613-9 : Cluster blade status immediately returns to enabled/green after it is disabled.
Links to More Info: K24133500, BT637613
Component: Local Traffic Manager
Symptoms:
In some scenarios, disabling a blade will result in the blade immediately returning to online.
Conditions:
This can occur intermittently under these conditions:
- 2 chassis in an HA pair configured with min-up-members (for example, 2 chassis, 2 blades each, and min-up-members=2)
- You disable a primary blade on the active unit, causing the cluster to failover due to insufficient min-up-members.
Impact:
Disabling the primary blade fails and it remains the primary blade with a status of online.
Workaround:
This is an intermittent issue, and re-trying may work. If it does not, you can configure min-up-members to a lower value or disable it completely while you are disabling the primary blade. The issue is triggered when the act of disabling the primary blade would cause the number of members to drop below min-up-members.
632553-8 : DHCP: OFFER packets from server are intermittently dropped
Links to More Info: K14947100, BT632553
Component: Local Traffic Manager
Symptoms:
With a DHCP relay virtual server, OFFER packets from DHCP server are intermittently not forwarded to the client and dropped on BIG-IP system.
Conditions:
It is not known exactly what triggers this condition, but it occurs intermittently when the DHCP relay virtual server is in use.
Impact:
Client machines joining the network do not receive DHCP OFFER messages.
Workaround:
Manually delete the serverside to force it to be recreated by the next DHCP request.
For example, if the flow to the DHCP server 10.0.66.222 is broken, issue the following tmsh command:
tmsh delete sys connection ss-server-addr 10.0.66.222 cs-server-port 67
603380-9 : Very large number of log messages in /var/log/ltm with ICMP unreachable packets.
Links to More Info: BT603380
Component: Local Traffic Manager
Symptoms:
With ICMP unreachable packets, every packet generates a log message in /var/log/ltm. This results in a very large number of log messages, which takes up space without providing additional information.
Conditions:
You have a DNS virtual server with DNS resolver cache configured. The virtual server receives ICMP unreachable in response to the DNS query.
Impact:
You will see messages similar to the following in /var/log/ltm.
err tmm[5021]: comm_point_tmm_recv_from failed: Software caused connection abort
Workaround:
None.
566756-3 : VCMP 4 cores on 3 blades : mcpd core when delete 255 dos profiles via tmsh command while machine is idle
Links to More Info: BT566756
Component: TMOS
Symptoms:
Mcpd crashes.
Conditions:
1.create 4 cores vcmp guest on vic 1+ with 3 blades
This platform has 15GB of mem
2. provision asm + ltm + AVR +FPS
3. create via script 255 dos profiles ( script attached)
4. delete it via tmsh command : delete security dos profile dos_*
5. result : Sometimes MCPD will crash
Impact:
Traffic and control plane disrupted while mcpd restarts.
Workaround:
None
554506-5 : PMTU discovery from the management interface does not work
Links to More Info: K47835034, BT554506
Component: TMOS
Symptoms:
Network connectivity issues to the BIG-IP management interface.
The management interface 'auto lasthop' feature (not to be confused with the auto lasthop setting on a virtual server) allows the BIG-IP to route responses to packets received on the management interface back to the MAC address of the layer-3 device that sent them, removing the need for static management-routes to be configured on the BIG-IP for communication beyond the management subnet.
The operation of the lasthop module interferes with the management interface's ability to dynamically learn Path MTU (PTMU) through ICMP unreachable messages.
Conditions:
The MTU on one section of the network path between a client device and BIG-IP management interface is lower than the BIG-IP management interface's configured MTU (for example, part of the path passes through a tunnel), and an intermediary router is sending 'ICMP unreachable, fragmentation required' packets back to the BIG-IP to instruct it to send smaller datagrams.
Impact:
Unable to complete a TLS handshake to the management interface IP, or other similar operations that require large frames.
Workaround:
BIG-IP management interface auto lasthop functionality can be disabled to allow the interface to function normally.
For more information see K52592992: Overview of the Auto Last Hop feature on the management interface, available at
https://support.f5.com/csp/article/K52592992.
527119-11 : An iframe document body might be null after iframe creation in rewritten document.
Links to More Info: BT527119
Component: Access Policy Manager
Symptoms:
Cannot use certain page elements (such as the Portal Access menu) in Google Chrome, and it appears that JavaScript has not properly initialized, and results in JavaScript errors on the following kinds of code:
iframe.contentDocument.write(html)
iframe.contentDocument.close()
<any operation with iframe.contentDocument.body>
Conditions:
-- The body of a dynamically created iframe document might be initialized asynchronously after APM rewriting.
-- Using the Chrome browser.
Impact:
Some JavaScript applications might not work correctly when accessed through Portal Access. For example, one of applications known to contain such code and fail after APM rewriting is TinyMCE editor.
Workaround:
Revert rewriting of the document.write call with a post-processing iRule.
The workaround iRule will be unique for each affected application.
469724-6 : When evaluation/demonstration features expire, features enabled by both evaluation and perpetual licenses also expire
Links to More Info: BT469724
Component: TMOS
Symptoms:
Evaluation features cause perpetual features to expire when the evaluation license expires.
Conditions:
-- Perpetual license with an evaluation/demonstration add-on feature.
-- The add-on license expires or is expired.
Impact:
When an evaluation/demonstration add-on license expires, features included in both the evaluation add-on as well as the regular, perpetual license stop working.
This behavior is covered in F5 article K4679: BIG-IP evaluation and demonstration licenses do expire :: https://support.f5.com/csp/article/K4679.
Workaround:
To work around this issue, activate the license from the command line:
When reactivating an existing license, and deactivating an expired evaluation license key, specify the base registration key and add-on (if any), and use the -i option for the expired evaluation license key in the get_dossier command.
For example, if the expired evaluation license key is ABCDEFG-ZZZZZZZ, use the following command:
get_dossier -b ABCDE-ABCDE-ABCDE-ABCDE-ABCDEFG -a ABCDEFG-ABCDEFG -i ABCDEFG-ZZZZZZZ
You can find these steps detailed in K2595: Activating and installing a license file from the command line :: https://support.f5.com/csp/article/K2595. This part in particular is required to work around this issue
464708-6 : DNS logging does not support Splunk format log
Links to More Info: BT464708
Component: Global Traffic Manager (DNS)
Symptoms:
DNS logging does not support Splunk format logging. It fails to log the events, instead logging err messages:
hostname="XXXXXXXXXXXXX.XX",errdefs_msgno="01230140:3:
Conditions:
DNS logging configured for Splunk format.
Impact:
DNS logging does not log Splunk format to HSL.
Workaround:
Use an iRule to send Splunk-formatted messages to the Splunk server.
For example:
ltm rule dns_logging_to_splunk {
when DNS_REQUEST {
set ldns [IP::client_addr]
set vs_name [virtual name]
set q_name [DNS::question name]
set q_type [DNS::question type]
set hsl [HSL::open -proto UDP -pool splunk-servers]
HSL::send $hsl "<190>,f5-dns-event=DNS_REQUEST,ldns=$ldns,virtual=$vs_name,query_name=$q_name,query_type=$q_type"
}
when DNS_RESPONSE {
set ldns [IP::client_addr]
set vs_name [virtual name]
set q_name [DNS::question name]
set q_type [DNS::question type]
set answer [DNS::answer]
set hsl [HSL::open -proto UDP -pool splunk-servers]
HSL::send $hsl "<190>,f5-dns-event=DNS_RESPONSE,ldns=$ldns,virtual=$vs_name,query_name=$q_name,query_type=$q_type,answer=\"$answer\""
}
}
423304-4 : Sync issues with certain objects' parameters.
Component: TMOS
Symptoms:
Synchronized configuration objects may contain invalid parameters after you delete an object and create a different object type with the same name.
Conditions:
This issue occurs when all of the following conditions are met: --
The BIG-IP systems are configured as part of a Device Group. -- You delete a configuration object of one type and then create a different type of object that uses the same name. -- The new object's configuration is synchronized to the other systems of the Device Group.
Impact:
An invalid configuration on the box that is synced to, and no obvious warning signs.
Workaround:
Use either of the following methods: -- Synchronize the configuration after you delete the original object and before you create the new object. -- Use a different name for the new configuration object.
349706-6 : NetworkAccess assigns 1.1.1.1 address to remote ppp endpoint APM VPN
Component: Access Policy Manager
Symptoms:
Network access sends 1.1.1.1 as X-VPN-serer-IP and Edge client reserves this IP for PPP communication with APM server.
Conditions:
-- VPN is configured on BIG-IP.
-- Edge Client/webtop is used to connect to VPN.
Impact:
If VPN is connected:
1. The user may not access the 1.1.1.1 address from the client machine.
2. if 1.1.1.1 is used as a dns server ip in Network Access configuration, DNS resolution may fail on the client machine.
Workaround:
NA
264701-8 : The zrd exits on error from bind about .jnl file error
Links to More Info: K10066, BT264701
Component: Global Traffic Manager (DNS)
Symptoms:
The zrd process exits and cannot be restarted.
Conditions:
This issue occurs when the journal is out-of-sync with the zone.
Impact:
The zrd process cannot be restarted.
Workaround:
Ensure that no one else is making configuration changes, it is recommended to make changes making changes during a maintenance window.
On a working system, perform the following steps:
1. Run command # rndc freeze $z
(Do this for all nonworking zones. Do not perform the thaw until you finish copying all reuqired files to the nonworking system.)
2. Run command # tar zcvf /tmp/named.zone.files namedb/db.[nonworking zones].
3. Run command # rndc thaw $z
On each non-working system, perform the following steps:
1. Run command # bigstart stop zrd; bigstart stop named.
2. Copy the non-working /tmp/named.zone.files from a working GTM system.
3. Run command # bigstart start named; bigstart start zrd.
Note: Before continuing, review /var/log/daemon.log for named errors, and review /var/log/gtm for zrd errors0.
Repeat these steps until all previously non-working systems are working.
On a working GTM system, run the following command:
# touch /var/named/config/named.conf.
222220-11 : Distributed application statistics are not passed correctly.
Links to More Info: K11931
Component: Global Traffic Manager (DNS)
Symptoms:
Distributed application statistics include only requests passed to its first wide IP.
For BIG-IP versions 12.0.0 and later, distributed application statistics are always zero.
Conditions:
Viewing distributed application statistics on configurations with multiple wide-IP members.
Impact:
The system does not pass statistics for requests to all wide-IP members in the distributed application.
Note: For BIG-IP versions 12.0.0 and later, the system does not pass statistics for requests to any wide-IP-members in the distributed application.
Workaround:
None
2218157-2 : IP Intelligence database load log displayed periodically
Component: Advanced Firewall Manager
Symptoms:
IP Intelligence database load log is displayed periodically in TMM log files.
Conditions:
- Configuration refers to IP intelligence feature.
- No active subscription for IP intelligence.
- IP intelligence database load fails periodically.
Impact:
TMM log files contain messages similar to:
<13> Sep 24 09:55:01 bigip1 notice Failed to open /var/IpRep/F5IpRep.dat
<13> Sep 24 09:55:01 bigip1 notice Failed to open /var/IpRep/F5IpV6Rep.dat
Workaround:
None.
2217793 : I5800 AFM 17.5.1.3 - After upgrade to 17.5.1.3, unable to reorder rules under AFM policy.
Component: Advanced Firewall Manager
Symptoms:
AFM firewall rule reorder functionality fails in webUI when "Inline Rule Editor" is disabled (afm.inlineruleeditor=false) after upgrading to version v17.5.1.3.
Conditions:
BIG-IP AFM versions 17.5.1.3, or 21.0.0 with sys db key afm.inlineruleeditor set to false.
Impact:
AFM firewall rules cannot reordered using webUI drag-and-drop interface.
Workaround:
Configure using TMSH or enable Inline Rule Editor.
2217093-2 : L2 traffic to masquarade MAC on Standby might be flooded when multiple interfaces are used
Links to More Info: BT2217093
Component: Local Traffic Manager
Symptoms:
On platforms without the switch (i2000/i4000) configured with multiple interfaces under a single VLAN, traffic to masquarade MAC address will be flooded to all available interfaces and will not follow FDB entries.
Conditions:
- Switchless platform (like i2000/i4000).
- Multiple interfaces configured under a single VLAN. For example:
net vlan vlan2 {
interfaces {
2.0 {
tagged
}
trunk1 {
tagged
}
}
}
- traffic to masquarade MAC is misdirected to Standby unit.
Impact:
Unnecessary flooding occurs.
Workaround:
None.
2211133-2 : ICMP error length does not follow RFC 812 guidance
Links to More Info: BT2211133
Component: Local Traffic Manager
Symptoms:
Only 8 bytes of original payload is included in ICMP error message sent from BIG-IP. RFC 1812 section 4.3.2.3 indicates systems should include as much as possible, up to 576 bytes total.
Conditions:
ICMP error message sent from BIG-IP.
Impact:
With only 8 bytes included in the ICMP error message, provides limited context for debugging. The TCP and UDP headers are truncated mid-header.
Workaround:
None.
2209157-2 : FastL4 late binding does not proxy MSS when establishing server-side connection.
Links to More Info: BT2209157
Component: Local Traffic Manager
Symptoms:
FastL4 late binding does not proxy MSS when establishing server-side connection.
Conditions:
FastL4 profile with late-binding option enabled.
Impact:
Sub-optimal connection performance.
Workaround:
MSS-overwrite option can be used to manually adjust server-side MSS.
2208821-2 : VIPRION cluster becomes INOPERATIVE and fails to load configuration after software upgrade★
Links to More Info: BT2208821
Component: Local Traffic Manager
Symptoms:
After upgrading BIG-IP software on a VIPRION system, the device may fail to load the configuration and enter an INOPERATIVE state. The system remains stuck during the configuration load phase, preventing normal operation.
Conditions:
1. VIPRION platform with clustered configuration.
2. Performing a BIG-IP software upgrade.
3. System attempts to load post-upgrade configuration during boot or blade role transition
Impact:
The VIPRION cluster becomes INOPERATIVE and is unable to load the configuration. Traffic is impacted as the system cannot process or pass traffic until the issue is resolved.
Workaround:
Restarting the system with a different blade set as primary, or reverting to the previously working software version, allows the configuration to load successfully. In some cases, re-attempting the upgrade after correcting the blade role transition also resolves the issue.
2208709-2 : Failure to match specific WAF signatures
Links to More Info: BT2208709
Component: Application Security Manager
Symptoms:
A signature is not matched as expected.
Conditions:
Specific configuration and traffic.
Impact:
A false negative on a specific scenario.
Workaround:
None.
2201877-2 : SCTP multihoming fails with ICMP unreachable for alternate paths.
Links to More Info: BT2201877
Component: TMOS
Symptoms:
SCTP multihoming fails with ICMP protocol unreachable for alternate paths.
Conditions:
- SCTP profile with multihoming and alternate addresses configured.
- Alternate address is a self-ip configured on a system.
Impact:
Unable to establish alternate path connection.
Workaround:
None
2201813-2 : BIG-IP enforces maximum concurrent streams limit immediately over HTTP/2 connection
Links to More Info: BT2201813
Component: Local Traffic Manager
Symptoms:
BIG-IP negotiates a number of concurrent streams over HTTP/2 connection per RFC requirement. It immediately enforces this limitation once the protocol is agreed and first SETTINGS frame is issued.
Conditions:
BIG-IP has a virtual with http2 profile.
A client connects to the virtual and negotiates or starts HTTP/2 connection.
Impact:
The client may send more requests than the limit set by BIG-IP over the established HTTP/2 connection and it causes the BIG-IP system to reset the extra streams. If Reset Stream Protection is enabled, it may result in the connection being shutdown by the BIG-IP system.
Workaround:
None.
2200537-1 : Audio captcha script error
Links to More Info: BT2200537
Component: Application Security Manager
Symptoms:
A script error in audio captcha on specific browsers
Conditions:
-- Audio captcha is required.
-- The user is using Internet Explorer on Windows 11
Impact:
Error in the captcha page. Unable to use captcha causing client side enforcement to fail.
Workaround:
None
2200405-2 : Live Update proxy.host value requires brackets around IPv6 Addresses
Links to More Info: BT2200405
Component: Application Security Manager
Symptoms:
Curl calls used to download Live Update files will fail if using a proxy.host with an IPv6 address that does not include brackets.
Conditions:
Live Update is configured through a proxy.host that is using IPv6 and does not include brackets around the IPv6 value.
E.g. "[IPv6]"
Impact:
Live Update necessitates an IPv6 proxy.host have brackets, while IP Reputation necessitates that it does not have brackets. This discrepancy results in one or the other continually failing when attempting to use an IPv6 proxy.host.
Workaround:
If possible, utilize a proxy.host value that is not an IPv6 Address.
2200389-2 : CDS and CDNSKEY not included in DNSX zone transfer data
Links to More Info: BT2200389
Component: Global Traffic Manager (DNS)
Symptoms:
CDS and CDNSKEY not included in DNSX zone transfer data
Conditions:
Dnssec zone with "Publish CDS/CDNSKEY" option is enabled
Impact:
Missing CDS/CDNSKEY in zone transfer
Workaround:
None
2200217-2 : DNSSEC validation failures due to missing DS records in zone transfers
Links to More Info: BT2200217
Component: Global Traffic Manager (DNS)
Symptoms:
DNSSEC validation failures occur when querying child zones despite proper DNSSEC configuration, caused by missing DS records in parent zone transfers. The issue affects child zone delegations that use nameservers located outside the child zone itself, such as external nameservers or nameservers under the parent zone. Only delegations where nameservers are within the child zone's own domain hierarchy work correctly. This breaks the DNSSEC chain of trust between parent and child zones, preventing secure DNS resolution for affected delegations.
Conditions:
- DNSSEC is enabled on both parent and child zones.
- Child zones have DS records configured in the system.
- Child zone delegations use nameservers that are either external or located under the parent zone.
-Zone transfers are being performed for the parent zone.
Impact:
DNSSEC chain of trust broken.
Workaround:
None
2200053 : Virtual interfaces inside the F5OS tenant are going into uninitialization state for few slot's when setup is in idle state on F5 CX1610 chassis with BX520 blade.
Component: TMOS
Symptoms:
Some virtual network interfaces were stuck in the “uninit” state on the active BIG-IP tenant.
Conditions:
Reboot standby BIG-IP first, then wait for one minute and reboot active BIG-IP tenant.
Impact:
Concern about BIG-IP cluster functionality.
Workaround:
None.
2200009-2 : PEM HA failover may cause traffic drops for new connections
Links to More Info: BT2200009
Component: Policy Enforcement Manager
Symptoms:
All traffic belonging to some connections established to the new Active unit immediately after a failover between PEM units could be dropped.
Conditions:
- PEM units in HA pair.
- New connections established to the new Active unit immediately after a failover.
Impact:
All traffic belonging to new connections established immediately after a failover could be dropped.
Workaround:
None
2199541-1 : BIG-IP GUI auth-pam-idle-timeout behaves as if capped at 1200 seconds when configured with higher values
Links to More Info: BT2199541
Component: TMOS
Symptoms:
BIG-IP GUI users are logged out after 1200 seconds of inactivity, regardless of the configured value of sys httpd auth-pam-idle-timeout when the value exceeds 1200 seconds.
HTTPD / mod_auth_pam debug logs explicitly report:
AUTHCACHE Error processing cookie XXXXX - Cookie Expired (idle_timeout=1200)
Conditions:
Sys httpd auth-pam-idle-timeout is configured to a value greater than 1200 seconds.
Impact:
GUI users are logged out after 1200 seconds of inactivity.
Workaround:
Login back with the same credentials once after getting logged out
2199485-2 : Export and re-import of a security policy in XML format fails due to invalid 'openapi-array' user_input_format value
Links to More Info: BT2199485
Component: Application Security Manager
Symptoms:
Import fails with error: Field 'parameter/user_input_format' may not contain the value 'openapi-array'.
Conditions:
URL level parameter configured with Parameter value type: User-input value and Data type: URI
Impact:
Import of security policy in XML format fails.
Workaround:
Manually change user_input_format from openapi-array to uri in the xml file before importing.
2199469-2 : Serverssl-use-sni not working in HTTP2 to HTTP gateway setups.
Links to More Info: BT2199469
Component: Local Traffic Manager
Symptoms:
Virtual server's 'serverssl-use-sni' setting does not work when virtual server has HTTP2 profile attached on the client-side and HTTP profile on the server-side.
Conditions:
HTTP2 to HTTP gateway config with 'serverssl-use-sni' option enabled.
Impact:
Incorrect serverssl profile might be selected when establishing server-side connection.
Workaround:
iRule can be used to select the profile based on presented SNI, for example:
when CLIENTSSL_CLIENTHELLO {
binary scan [SSL::extensions -type 0] @9a* sni
log local0. "SNI: $sni"
}
when SERVER_CONNECTED {
switch -glob [string tolower $sni] {
"foo.com" {
SSL::profile foo-serverssl
}
"bar.com" {
SSL::profile bar-serverssl
}
}
}
2198757-1 : PEM: use-after-free of mw_msg in session_del_msg_entries hash
Links to More Info: BT2198757
Component: Policy Enforcement Manager
Symptoms:
There is a rare scenario where tmm crashes while passing PEM traffic.
Conditions:
-- PEM is licensed and enabled.
-- Policies are assigned from the PCRF. Subscriber additions and deletions are happening regularly.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None.
2198589-2 : BIG-IP allows enabling deprecated Network Access compression, causing intermittent tunnel traffic drops with Edge Client
Links to More Info: BT2198589
Component: Access Policy Manager
Symptoms:
Intermittent tunnel traffic drops when Network Access compression is enabled
Tunnel stability is restored when Compression is disabled
No client-side errors clearly indicating unsupported configuration
Admins can still enable compression via BIG-IP UI/CLI despite deprecation
Conditions:
-- BIG-IP APM with Network Access resource configured
-- Compression enabled on Network Access resource
-- Edge Client version 7.2.6 or later
-- VPN tunnel established
-- Intermittent traffic flow over the tunnel
Impact:
-- Intermittent VPN tunnel instability
-- Hard-to-diagnose issues, potentially leading to unknowingly enabling unsupported configurations
Workaround:
Disable compression in the BIG-IP Network Access config and connectivity profile config
2197321-2 : BIG-IP does not select FFDHE key share provided by the client on session resumption.
Links to More Info: BT2197321
Component: Local Traffic Manager
Symptoms:
Connection terminates if the client does not allow secure renegotiation, otherwise renegotiation occurs.
Conditions:
ClientSSL that uses FFDHEgroups and has session tickets enabled.
The client tries to resume an SSL session with an FFDHE key share that used FFDHE previously.
Impact:
Connection terminates if the client does not allow secure renegotiation, otherwise renegotiation occurs.
Workaround:
None
2197305-2 : BIG-IP generates invalid SSL key share
Links to More Info: BT2197305
Component: Local Traffic Manager
Symptoms:
SSL handshakes fail on the client due to an Illegal Parameter alert.
Conditions:
ClientSSL that mixes both FFDHE and Non-FFDHE groups and has session tickets enabled.
The client tries to resume an SSL session with a Non-FFDHE key share that used FFDHE previously.
Impact:
SSL handshake fails and the connection terminates
Workaround:
None
2197289-2 : Enabling SSH access via the GUI blocks MCPD for 90 seconds
Links to More Info: BT2197289
Component: TMOS
Symptoms:
- Disconnections from the GUI occur (no responses to color advisory probe)
- SNMP query timeouts
- iQuery interruptions
Conditions:
-- SSH access is disabled via the GUI
-- SSH access is then enabled via the GUI
Impact:
-- MCPD is blocked for 90 seconds
-- sshd service does not come up for the first 90 seconds after enabling SSH access
Workaround:
None
2196597 : TMM generates core when large firewall policy is attached to multiple virtual servers due to SOD watchdog timeout
Links to More Info: BT2196597
Component: Advanced Firewall Manager
Symptoms:
-- TMM processes generate core dumps (SIGABRT) when activating firewall policies with high rule counts (20,000+ rules) across multiple virtual servers (20+)
--- SOD (System Oversight Daemon) sends SIGABRT signal to TMM processes
--- Observe the ltm log "sod[10802]: 01140041:5: Killing tmm.0 pid 23754."
Conditions:
1, Deploy couple of tenants with 8 slots on each Chasis
2, Set up an HA pair (Active/Standby).
3, Provision the system with LTM, AFM, and AVR modules.
4, Create a Network Firewall policy containing approximately 20,000 rules.
5, Attach the firewall policy to a virtual server.
6, Create 20 or more virtual servers, attaching the same firewall policy to each.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Disable SOD Heartbeat Monitoring for all TMMs
--- tmsh modify sys daemon-ha tmm heartbeat disabled.
2196569-2 : Multiple SSL Certificates get consolidated in the SSL Certificate List
Links to More Info: BT2196569
Component: TMOS
Symptoms:
Two different certificates are consolidated under one SSL certificate
Conditions:
Two different certificates with similar names exists, for ex. 'test' and 'test.crt'
Impact:
Certificates have a chance of getting overwritten mistakenly
Workaround:
Change the names of the SSL certificates so they have different names
2195709-2 : TCP fingerprint tethering detection does not work when a subscriber's traffic comes from a tethering Mac OS system.
Links to More Info: BT2195709
Component: Policy Enforcement Manager
Symptoms:
TCP fingerprinting tethering detection does not work when a subscriber's traffic comes from a tethering Mac OS system.
Conditions:
- PEM tethering detection, is configured in a PEM policy rule like this one:
pem policy policy-01 {
rules {
detect-01 {
dtos-tethering {
dtos-detect enabled
report {
dest {
hsl {
publisher default-ipsec-log-publisher
}
}
}
tethering-detect enabled
}
precedence 1000
}
}
transactional enabled
}
- The subscriber connects through a Windows, Android or IoS phone, and the phone OS is recognised in the PEM "Device OS" PEM session field, for example:
Device Name Nokia_Corporation-Nokia_Lumia_710
Device OS Windows_Mobile_8
- An iRule to detect tethering is configured in the relevant virtual server, for example:
ltm rule tethering-detection {
when CLIENT_ACCEPTED {
set ip [IP::client_addr]
set tether [PEM::session info tethering detected $ip]
if {$tether eq "1"} {
log local0. "Tethering detected !"
} else {
log local0. "no tethering detected"
}
}
}
- The subscriber is tethering through the phone using a MacOS operating system.
Impact:
Tethering from a MacOS operating system is never detected.
Workaround:
None
2190373 : platform_agent core found while tmstats updation.
Component: F5OS Messaging Agent
Symptoms:
Rare occurrence. No symptoms.
Conditions:
No specific conditions.
Impact:
No impact on functionality.
Workaround:
None.
2187429-2 : TMM might crash when using MRF framework.
Links to More Info: BT2187429
Component: Service Provider
Symptoms:
TMM might crash when using MRF framework.
Conditions:
Configurations that include message routing framework.
Impact:
Traffic disrupted while tmm restarts.
2187385-2 : Brute force set to CAPTCHA also raises a violation and blocks traffic
Links to More Info: BT2187385
Component: Application Security Manager
Symptoms:
Brute force is raised, but the config is set to CAPTCHA. Brute force contributes to the violation rating, and traffic is blocked by the violation rating, instead of triggering a CAPTCHA.
Conditions:
Brute force and violation Rating threat detected are both enabled.
Impact:
CAPTCHA does not occur as expected.
Workaround:
None
2186933-2 : ILX Plugin may not work after use of npm install command on workspace.
Component: Local Traffic Manager
Symptoms:
After using the 'npm install' command on the workspace.
The below message will be logged in ltm logs after plugin reload:
err sdmd[21349]: 018e0018:3: pid[17783] plugin[<plugin-name>.<extension-name>] Error: Cannot find module 'f5-nodejs'
err sdmd[21349]: 018e0010:3: Extension <plugin-name>.<extension-name> exceeded the maximum number of restarts (5) over the last 60 seconds and has been disabled
Conditions:
1. The ILX plugin is in use with node version 6.
2. ILX workspace has been modified with npm install command.
3. Plugin has been reloaded after 'npm install'
Impact:
Traffic processing on virtual server with plugin attached will fail with the following logs:
Could not find ILX extension <extension-name> in path <workspace-name>
Workaround:
To prevent the issue:
1. Use NPM install command with '--no-package-lock' flag.
- npm install --no-package-lock <package-name>
If already Encountered the issue:
1. Restore package.json from /usr/share/packages
- tar -xzf /usr/share/packages/nodejs/f5-nodejs-6.tgz -C /var/ilx/workspaces/Common/<workspace-name>/extensions/<extension-name>/node_modules
2. Update package.json at path /var/ilx/workspaces/Common/<workspace-name>/extensions/<extension-name>/
- Set the "f5-nodejs" version to "1.0.0" instead of "0.0.3".
3. Reload the plugin.
2186625-2 : Zone transfer from dns express with dnssec enabled includes extra RRSIG
Links to More Info: BT2186625
Component: Global Traffic Manager (DNS)
Symptoms:
AXFR zone transfer includes extra RRSIG for A/AAAA records.
Conditions:
When delegated NS record includes multiple name servers.
Impact:
Extra RRSIGs added to records that do not need RRSIG.
Workaround:
None
2186185-2 : Apmd occasionally fails to process a request if SecurID agent is present
Links to More Info: BT2186185
Component: Access Policy Manager
Symptoms:
Apm logs reports errors similar to following:
apmd[32302]: 01490000:3: ApmD.cpp func: "process_apd_request()" line: 2101 Msg: Error 3 reading/parsing response from socket 1023. strerror: Too many open files, queue size 0, time since accept 0 apm 2025-11-10 09:12:49.000 -07:00 Error
apmd[32302]: 01490000:3: HTTPParser.cpp func: "readFromSocket()" line: 117 Msg: epoll_create() failed [Too many open files].
Conditions:
SecuridAuth agent is enabled
Impact:
APMD stops processing further traffic and users are denied access
Workaround:
Restart APMD using the following command:
bigstart restart aced
bigstart restart apmd
2186009-1 : Increased TX IQ size for netvsc
Links to More Info: BT2186009
Component: TMOS
Symptoms:
In some environments, during periods of high traffic, messages could build up in the TX internal queue due to xnet-DPDK being slow to inform that messages were sent. If this goes for long enough, the internal queue will fill up and become stuck.
Conditions:
1) Using xnet-DPDK driver
2) Azure or Hyper-V
3) Sustained high (multi-GB/s) traffic rate
Impact:
Internal queue gets stuck preventing BIG-IP from being able to send messages and causing traffic disruption.
Workaround:
Create '/config/tmm_init.tcl' and add the following line
ndal tx_iq_sz 1024 f5f5:f550
Afterwards, restart tmm with 'bigstart restart tmm' to apply change.
2185537-2 : Application Security Administrator role cannot edit the General Settings of parent policies from the GUI
Links to More Info: BT2185537
Component: Application Security Manager
Symptoms:
When attempting to edit a parent ASM policy through the GUI, options under the General Settings tab will be greyed out or disabled.
Conditions:
A user with the Application Security Administrator role is logged in and attempting to edit the General Settings of a parent ASM policy through the GUI.
Impact:
Accounts with the Application Security Administrator role will be unable to edit the General Settings of a parent ASM policy through the GUI
Workaround:
By using REST calls instead of the GUI, Application Security Administrators can still make the necessary edits.
2185485-2 : The value of /proc/sys/vm/min_free_kbytes might be too big on Hyper-V and Azure VEs with multiple cores and multiple NICs★
Links to More Info: BT2185485
Component: TMOS
Symptoms:
After a software upgrade to one of the affected versions, the value of /proc/sys/vm/min_free_kbytes might too big on Hyper-V and Azure VEs with multiple cores and multiple NICs.
This can prevent the Virtual Edition from booting into the new software volume installed with one of the affected versions.
Conditions:
BIG-IP VE running on Hyper-V hypervisor or on Azure with:
- more than 4 cores and more than 4 NICs configured
- 16GB of RAM or less allocated
Attempt to upgrade to one of the affected versions.
Impact:
After an upgrade to one of the affected versions, the BIG-IP VE boot process hangs, or the VE takes hours to boot into the new volume and is so slow to result unusable.
Workaround:
There are two possible workarounds:
(1)
Before booting into the new volume, shutdown the VE and increase the total allocated RAM to 32GB.
(2)
- Install the new software volume.
- Take note of the current value <KBYTES> of /proc/sys/vm/min_free_kbyte :
# cat /proc/sys/vm/min_free_kbyte
- Before rebooting into the new software volume, mount the "vg--db--vda-set.<N>.root" disk volume on a temporary directory, where <N> is the number of the new volume after the dot.
E.G.: if the new volume is "HD1.2", then <N> is 2.
# mkdir /mnt/temp
# mount /dev/mapper/vg--db--vda-set.<N>.root /mnt/temp/
- Edit the /etc/rc.sysinit.f5 file:
# vi /mnt/temp/etc/rc.sysinit.f5
- Replace this line:
echo $VADC_MIN_FREE_KB > /proc/sys/vm/min_free_kbytes
with this line (use the <KBYTES> value noted before):
echo <KBYTES> > /proc/sys/vm/min_free_kbytes
- Unmount the disk volume:
# umount /mnt/temp/
- Reboot into the new software volume
2184897 : Tenant disk size modification is ineffective for var/log folder
Links to More Info: BT2184897
Component: TMOS
Symptoms:
Due to insufficient free disk space on the VM, the /var/log resize operation could not be applied on reboot.
Conditions:
When available disk space on the VM is insufficient for the requested directory resizing.
Impact:
You will not know if resizing will succeed/fail ahead of time.
Workaround:
Manually calculate and allocate disk space within the range of available disk space.
2183917-2 : BIG-IP might fail to update received TCP window when tm.tcpstopblindinjection is enabled
Links to More Info: BT2183917
Component: Local Traffic Manager
Symptoms:
BIG-IP might fail to update received TCP window when tm.tcpstopblindinjection db variable is enabled (CVE-2025-58424).
Conditions:
The tm.tcpstopblindinjection db variable is enabled (CVE-2025-58424 ).
This does not always occur.
Impact:
TCP transfer might stall.
Workaround:
None
2183241-1 : Trunk egress traffic is not balanced on some platforms.
Links to More Info: BT2183241
Component: TMOS
Symptoms:
Trunk egress traffic (out) distribution might not be balanced on the following platforms:
- C117 iSeries i2000
- C117 iSeries i850 (Japan)
- C115 iSeries i4000
Conditions:
- Trunk configured.
- Platform on the affected list:
C117 iSeries i2000
C117 iSeries i850 (Japan)
C115 iSeries i4000
Impact:
Trunk egress (out) traffic is not balanced.
Workaround:
None
2183233-1 : TMM crash due to extra trailing CR/LF in iSession reconnects
Links to More Info: BT2183233
Component: Access Policy Manager
Symptoms:
On BIG-IP APM systems, a Traffic Management Microkernel (TMM) crash may occur when a client device sends an extra trailing carriage return/line feed (CR/LF) during an iSession tunnel reconnect. This issue was observed to be triggered by a specific client device and user scenario, where the Edge Client installation was a hybrid of multiple versions, resulting in the transmission of unexpected CR/LF characters after the iSession request.
Conditions:
iSession tunnels in use.
Client device sends an extra CR/LF after the iSession request, often due to a hybrid or corrupted Edge Client installation.
Impact:
Traffic disrupted while tmm restarts.
Disruption of user sessions.
The issue is highly specific to certain client configurations and is not expected to be widespread.
Workaround:
None.
2182061-2 : Management routes not installed on reboots when interface route is recursively required.
Links to More Info: BT2182061
Component: TMOS
Symptoms:
Management routes might not be installed on reboots or config loads when interface route is recursively required.
Conditions:
Have an interface mgmt route, similar to:
sys management-route /Common/mgmt_gw {
network 10.10.10.10/32
type interface
}
And a mgmt route that uses a hop defined by an interface route:
sys management-route r1{
gateway 10.10.10.10
network 10.10.20.1/32
}
Impact:
Some management routes are not installed properly post reboot or config load.
Workaround:
None
2182045-4 : The iavf driver might drop some IPv6 packets that contain destination option or routing type 2 headers
Links to More Info: BT2182045
Component: Local Traffic Manager
Symptoms:
Some IPv6 packets that contain a destination option header and/or a routing type 2 header are processed by the BIG-IP.
A tcpdump on the BIG-IP does not show the packets.
The tmm/xnet_rx_stats:cd_empty stat is incremented
The tmm/xnet/iavf/per_q_stats:rx_sw_drop might be incremented.
Conditions:
A platform that utilizes the iavf driver:
R2800
R4800
VE with SR-IOV with an Intel 810 NIC
IPv6 traffic is sent to the BIG-IP that contains a destination option or routing type 2 header.
Impact:
Packets are dropped and not processed.
Workaround:
None
2181929-2 : Cipher suite order changes in cipher group after upgrading from v17.1.1.1 to v17.1.3★
Links to More Info: BT2181929
Component: Local Traffic Manager
Symptoms:
After upgrading from v17.1.1.1 to v17.1.3, client connections begin negotiating with unexpected lower-priority cipher suites.
Applications sensitive to cipher strength (e.g., credit card payment systems) experience transaction failures or service disruption.
Conditions:
BIG-IP system running v17.1.1.1 is upgraded to v17.1.3
or
When MCPD reload
After the upgrade or MCPD reload, the internal ordering of cipher rules within the cipher group is modified.
Impact:
Failed service due to wrong Ciphers being used by the LTM VS/ Client Profile
Workaround:
Change the group order from Default to Strength in Local Traffic ›› Ciphers : Groups
2181777 : Aced crash observed during RSA SecurID Authentication failure
Links to More Info: BT2181777
Component: Access Policy Manager
Symptoms:
During RSA SecurID authentication failure, aced crash is observed due to too many open FDs
Conditions:
RSA Authentication enabled and VPN resource attached
Impact:
Aced crash is observed along with RSA SecurID failure.
Workaround:
Fail over to the standby device.
2181633-2 : Large BIG-IP SSL Orchestrator deployments can cause tmm crash
Links to More Info: BT2181633
Component: SSL Orchestrator
Symptoms:
When a large number of virtual servers are configured on a BIG-IP and traffic is processed by SSL Orchestrator inspection service, TMM can crash if traffic hits the main virtual server before the service virtual server is loaded by TMM.
Conditions:
- BIG-IP SSL Orchestrator deployment has deployed a large number of virtual servers and inspection services.
- BIG-IP loads the entire config simultaneously or TMM is restarted when connections are being continuously sent to the BIG-IP.
- Client connection hits the main SSL Orchestrator virtual server before service virtual server has finished loading the config in TMM.
Impact:
TMM crash occurs intermittently. Traffic disrupted while tmm restarts.
Workaround:
Before reloading a large SSL Orchestrator BIG-IP config or restarting TMM, mark the public virtual servers as disabled.
Enable the public virtual servers individually after reload or TMM restart is successful.
2172041-1 : Zone transfer fails for dnsx when the zone file contains TLSA records
Links to More Info: BT2172041
Component: Global Traffic Manager (DNS)
Symptoms:
Dns express zone transfer fails.
Conditions:
Zone containing TLSA records.
Impact:
Zone not able to be transferred to dns express.
Workaround:
None
2171921 : BIG-IP APN and VPN - ACCESS can leak HUDEVT_REQUEST_DONE after responding
Component: Access Policy Manager
Symptoms:
When the new DNS record is added to the BIG-IP APM, the Access is crashed in the BIG-IP which results in traffic disruption.
Conditions:
Issue is observed when the New DNS record added/updated to the BIG-IP.
Impact:
TMM crashes thereby impacting traffic.
Workaround:
None.
2163277-1 : Updating the management route via the GUI fails
Links to More Info: BT2163277
Component: TMOS
Symptoms:
You are able to change the management route's field in System >> Platform, but the management route remains the same after clicking the Update button.
Conditions:
Changing the management route via the GUI
Impact:
You are unable to use the GUI to make changes to the management route.
Workaround:
Use tmsh command to update the management route -
tmsh modify sys management-route default gateway <gateway>
2162997-2 : AS3 becomes unresponsive after upgrade from 17.1.2.1 to 17.1.2.2 Build 0.311.1★
Links to More Info: BT2162997
Component: TMOS
Symptoms:
After upgrading, AS3 queries are not accepted
AS3 responds with:
{
"code": 404,
"message": "",
"referer": "172.18.23.178",
"errorStack": []
}
Conditions:
Upgraded from 17.1.2.1 to 17.1.2.2 Build 0.311.12
Impact:
After the upgrade, AS3 services become unavailable and attempts to access them return a 404 error
Workaround:
Uninstall the existing AS3 package and Reinstall the AS3 package
2162873-2 : Pipe and backslash characters are not escaped in ArcSight CEF remote logging
Component: Application Security Manager
Symptoms:
Pipe and backslash characters are not escaped in ArcSight CEF remote logging.
Conditions:
A logging profile is configured with ArcSight CEF remote logging format. A log field contains a pipe in the CEF header (such as an Attack Signature name), or a backslash in any log field.
Impact:
Logging records may not be correctly read by ArcSight or other log collector.
Workaround:
None
2162861-2 : 'Connectors' creation screen does not appear
Links to More Info: BT2162861
Component: Access Policy Manager
Symptoms:
When you click Access > Authentication from the WebUI, select AAA Server By Type > Connectors & Configurations from the pull-down menu, and click the Create button, the creation screen does not appear.
Conditions:
Connectors & Configurations from AAA Server by Type
Impact:
Creation screen does not appear.
Workaround:
None
2162509-1 : Large number of glob-matches can cause high CPU usage.
Links to More Info: BT2162509
Component: Access Policy Manager
Symptoms:
High CPU usage which is correlated with spikes in the number of active connections.
Conditions:
* Large number url-db glob-matches that require tmm to use regular expressions (e.g. more than a thousand).
* Typically glob matches that require regular expressions look like:
"\*.example.com/"
"\*www.example.com"
Glob matches that don't require regular expressions (and are therefore unaffected by this bug) include:
"\*://\*.example.com/"
"\*://\*www.example.com"
Impact:
Tmm may not be able to keep up with incoming traffic.
Workaround:
Often the glob-matches can be rewritten to use a more efficient form.
2154089-1 : "Test" button for monitor object is missing.
Component: TMOS
Symptoms:
Local Traffic >> Monitors >> select monitor >> fill in IP and port >> "Test" button is missing.
Conditions:
Need to test BIG-IP monitors via GUI.
Impact:
Impossible to test monitor from GUI.
Workaround:
Use tmsh instead of GUI for testing the monitor:
K60677941: Verifying monitor configurations using the tmsh utility
2154057-4 : MCPD validations not throwing error when snmpv3 password contains more than 77 characters★
Links to More Info: BT2154057
Component: TMOS
Symptoms:
After upgrading, mcpd goes into a restart loop. /var/log/ltm contains the following:
err mcpd[13691]: 0107102b:3: Master Key decrypt failure - decrypt failure - final
notice mcpd[13691]: 01071029:5: Master decrypt final
notice mcpd[13691]: 01071027:5: Master key OpenSSL error: 4006860532:error:0606506D:digital envelope routines:EVP_DecryptFinal_ex:wrong final block length:evp_enc.c:653:
notice mcpd[13691]: 01b00001:5: Processed value is empty: class name (usmuser) field name ()
err mcpd[13691]: 01071684:3: Unable to encrypt application variable (/Common/snmpv3user auth_password usmuser /Common/snmpd).
Conditions:
-- SNMPv3 configuration that uses a password containing more than 77 characters
-- An upgrade is performed
This also occurs within a release by saving the config and then forcing a load from text files (`touch /service/mcpd/forceload && pkill mcpd`)
This may also occur with auth-password or privacy-password values that are 78 characters in length or longer
Impact:
- SNMP configuration does not function.
- If the device is rebooted or MCPD is restarted, the system will remain INOPERATIVE or MCPD will be in a restart loop.
Workaround:
If a device is currently in an inoperative state and affected by this issue:
- Create a backup copy of /config/bigip_base.conf
- Manually edit bigip_base.conf and remove the SNMPv3 users and traps
- If the system does not recover automatically, restart MCPD or reboot the device once.
2153897-2 : BIG-IP closes the transport connection immediately after sending a DPA to a peer
Links to More Info: BT2153897
Component: Service Provider
Symptoms:
With Diameter MRF setup, when the BIG-IP receives a diameter DPR message (Disconnect-Peer-Request), it sends a DPA to the peer (Disconnect-Peer-Answer) and then immediately closes the transport connection.
According to RFC6733, ("Diameter Base Protocol") the transport connection should be closed by the remote peer instead.
Conditions:
- BIG-IP configured with a MRF Diameter setup
- BIG-IP receives a Diameter DPR message
Impact:
The BIG-IP system closes the transport connection instead of waiting for the remote peer to close it.
Workaround:
None
2153421-1 : iControl REST /mgmt/toc endpoint and object browser pages are not functioning on BIG-IP v17.x
Links to More Info: BT2153421
Component: TMOS
Symptoms:
When accessing https://<BIG-IP IP address>/mgmt/toc the browser returns the below error
{"code":400,"message":"URI path /mgmt/logmein.html not registered. Please verify URI is supported and wait for /available suffix to be responsive.","referer":"https://10.1.255.175/mgmt/toc","restOperationId":45299775,"kind":":resterrorresponse"}
Conditions:
Access https://<BIG-IP IP address>/mgmt/toc
Impact:
In v17.x returns a blank page instead of object data.
Workaround:
None
2152545 : [APM][SAML] High TMM memory sso_saml leak
Links to More Info: BT2152545
Component: Access Policy Manager
Symptoms:
Tmm crashes due to out of memory while passing SAML-SSO traffic
Conditions:
-- Configure a BIG-IP as SAML-SP with ACS binding.
-- Configure SSO for IDP.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
2152257-2 : [BGP] remove-private-AS does not work with extended ASN numbers
Links to More Info: BT2152257
Component: TMOS
Symptoms:
Remove-private-AS does not work with extended (4-byte) ASN numbers
Conditions:
Remove-private-AS used in peer configuration.
Impact:
Private AS numbers are not removed.
Workaround:
None
2151885-2 : When using service-down-action reset/drop on a pool attached to a DHCP virtual TMM might experience a crash.
Links to More Info: BT2151885
Component: Local Traffic Manager
Symptoms:
When using service-down-action reset/drop on a pool attached to a DHCP virtual TMM might experience a crash.
Conditions:
DCHP virtual-server with a pool member using service-down-action feature set to 'reject' or 'drop'.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Re-configure service-down-action on a pool member to 'none'.
2151601-2 : No tmsh command to remove the stateless directive from a virtual server
Links to More Info: BT2151601
Component: Local Traffic Manager
Symptoms:
Cannot remove the stateless directive from a virtual server using tmsh, would need to delete and create the virtual again to achieve the same.
Conditions:
1) A stateless virtual server is present
2) Try making it not stateless using tmsh
Impact:
Virtual server remains stateless
Workaround:
Modify the virtual using GUI
2151505-2 : Cmp_dest_velos is automatically installed on system startup.
Links to More Info: BT2151505
Component: TMOS
Symptoms:
/var/run/cmp_dest_velos is automatically installed on tenant startup.
You no longer need to download it from the host containers.
Conditions:
A need to use the VELOS version of the cmp_dest utility.
Impact:
Previously, the cmp_dest utility had to be manually downloaded from the host containers.
Workaround:
Manually download cmp_dest from the host containers.
2151145 : Unable to view 'shared address list' from the rule list.
Links to More Info: BT2151145
Component: Advanced Firewall Manager
Symptoms:
Unable to view 'shared address list' definition from the configured rule list and instead it goes to create new address list.
Conditions:
1. Create shared address list(Shared Objects ›› Address Lists) Ex: shared_addr_list_1
2. Create new rule list(Security ›› Network Firewall : Rule Lists ›› test_rule_1)Ex: Click on "test_rule_1" and add shared address list in Address List.
3. Click on "test_rule_1"
4. Click on "shared_addr_list_1" in the firewall rule.
5. Notice it goes to "Shared Objects >> Address List >> New Address List" and shows the page to create a new shared object.
Impact:
Can't view address list from rule list
Workaround:
Can see the address list by navigating through "Shared Objects ›› Address Lists"
2150869-2 : Incorrect information for count of failed login for a user
Links to More Info: BT2150869
Component: TMOS
Symptoms:
/var/log/secure and /var/log/audit show incorrect information for the count of failed logins for a user
Conditions:
A user fails to login either through CLI or GUI
Impact:
Incorrect information in logs can be misleading
Workaround:
None
2150669-2 : TCP Packet loss after upgrade with AFM provisisoned★
Links to More Info: BT2150669
Component: Advanced Firewall Manager
Symptoms:
After an upgrade, disabled hardware DOS vectors may use old values.
Conditions:
-- F5OS tenant
-- Upgrade
-- AFM provisioned
Impact:
DOS thresholds may be incorrectly set or set too low resulting in packet loss that causes poor throughput.
Workaround:
Disable and re-enable the disabled DOS vectors.
Log into the BIG-IP GUI and navigate to
Security ›› DoS Protection : Device Protection
Filter attack vectors: tcp
click the "Network" text
Enable all the disabled vectors by clicking on the vector name and changing state from "disabled" to "mitigate".
Then disable the vectors by clicking on the vector name and changing state from "mitigate" to "disabled".
2150493-2 : BIG-IP DNS (GTM) may associate LTM virtual server names with the wrong GTM virtual-servers
Links to More Info: BT2150493
Component: Global Traffic Manager (DNS)
Symptoms:
Gtmd may display incorrectly associated the name of a virtual server, as known to the LTM device, with more than one virtual-server defined in the GTM configuration
This can lead to inconsistent probe results and misleading service availability information in GTM, where a gtm virtual server may reflect the status of a different LTM virtual server.
Conditions:
This issue occurs when multiple gtm server ... virtual-servers { ... } objects are configured with the same external address but distinct internal (translation) addresses. For this configuration to be effective, there must be logic in the network's NAT function that performs address translation based on the content of the incoming request, for example by using the SNI value of a TLS handshake, so that multiple internal virtual servers can share the same external IP address.
In such cases, the ltm_name learned from a big3d probe reply for one virtual server may be incorrectly associated with all virtual servers sharing that external IP.
As a result, subsequent <vip> probes may use the wrong ltm_name and reflect the status of an incorrect LTM virtual server.
Impact:
Incorrect virtual server state from gtmd's point of view, which may show services up that are actually down or down which are actually up.
Workaround:
Specify the ltm-name on each virtual server, so that the learned ltm_name from the big3d reply is never used:
tmsh modify gtm server gtmserver1 virtual-servers modify { gtm_name_vs1 { ltm-name ltm_name_vs1 } gtm_name_vs2 { ltm-name ltm_name_vs2 } gtm_name_vs3 { ltm-name ltm_name_vs3 } }
Note that the "ltm name" field can only be set using tmsh or API calls - it is not exposed in the BIG-IP GUI configuration utility.
2150449-2 : Lack of pipe escaping with ArcSight logging
Links to More Info: BT2150449
Component: Application Security Manager
Symptoms:
Pipe characters are not escaped with backslash
Conditions:
Using ArcSight remote logging
Impact:
Some receiver might get confused
Workaround:
None
2149333-2 : BD_XML logs memory usage at TS_DEBUG level
Links to More Info: BT2149333
Component: Application Security Manager
Symptoms:
There are two messages in BD_XML logs that the system reports at the TS_DEBUG log level, but they should be logged as TS_INFO.
BD_XML|DEBUG |Sep 10 14:51:19.335|1456|xml_validation.cpp:1687|after create of profile 754. (xml memory 5111702493 bytes)
BD_XML|DEBUG |Sep 10 14:51:19.335|1456|xml_validation.cpp:1586|add profile 755. name: /ws/replanifierIntervention_V1-0 is soap? 1 (xml memory before add 5111702493 bytes)
Conditions:
These messages can occur when XML/JSON profiles are configured.
Impact:
Messages that should be logged at the TS_INFO level are logged at the TS_DEBUG level. These are informational log messages.
Workaround:
None
2149253-1 : QUIC connection stalls with early data
Links to More Info: BT2149253
Component: Local Traffic Manager
Symptoms:
When QUIC client connect with early data, connection stalled.
Conditions:
Configure virtual server with quic + client-ssl with Data 0-RTT enabled (w/ anti-replay).
QUIC client connects with existing session and early data.
Impact:
Failed QUIC/HTTP3 connections.
Workaround:
Disable client-ssl Data 0-RTT.
2144397-2 : Problems compiling firewall policies when they contain rules using huge address lists
Links to More Info: BT2144397
Component: Advanced Firewall Manager
Symptoms:
Firewall rule compilation hangs indefinitely with high CPU usage, when large address lists (~100k entries) are used. With significant number of duplicate firewall policies.
Conditions:
Occurs on BIG-IP AFM (17.1.2) when firewall policies reference very large address lists as rule sources.
Impact:
Prevents deployment or updates of firewall policies, blocking operations.
Workaround:
None
2144309-2 : TMM might experience a crash when using a fix for Bug783077
Links to More Info: BT2144309
Component: Local Traffic Manager
Symptoms:
TMM might experience a crash when using a fix for Bug783077.
Conditions:
- Running a fix Bug783077.
- Performing operations on IPv6 routes that use nexthop over link-local address.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
2144053-3 : IPS hitless upgrade results in TMM clock advance★
Component: Protocol Inspection
Symptoms:
IPS hitless upgrade results in TMM clock advance.
Conditions:
New IPS package is deployed in AFM.
Impact:
In some cases some degree of packet loss has been reported during a second.
Workaround:
None
2144029-2 : DB monitor does not use the correct timezone present in the system
Links to More Info: BT2144029
Component: Local Traffic Manager
Symptoms:
JDBC uses an incorrect timezone rather than the one configured on the system through 'sys ntp timezone'.
In a PostgreSQL-based health monitor, an error similar to the following may occur, for example when 'sys ntp timezone' is set as America/Los_Angeles' (default):
org.postgresql.util.PSQLException: FATAL: invalid value for parameter "TimeZone": "US/Pacific-New"
In an Oracle health monitor, an error similar to the following may occur, for example when 'sys ntp timezone' is set as 'UTC' when the client presents a timezone of 'Zulu':
java.sql.SQLException: ORA-00604: error occurred at recursive SQL level 1
ORA-01882: timezone region not found
Conditions:
1. A DB monitor is in use (eg. PostgreSQL, Oracle).
2. The current timezone of the system is set with a timezone that has multiple equivalent and possibly deprecated aliases, for example:
- America/Los_Angeles [US/Pacific-New, posix/US/Pacific-New ]
- UTC [ Zulu, posix/Zulu ]
3. System has /etc/localtime as a normal file instead of a symbolic link.
4. The remote database does not support the presented time zone parameter.
Impact:
Monitor incorrectly marks the pool member down when the remote database server does not recognize the time zone presented by the DB monitor.
Workaround:
Delete the file /etc/localtime:
rm /etc/localtime
Create a symbolic link for the file pointing to the desired timezone as listed in /usr/share/zoneinfo:
For example, if you have 'sys ntp timezone UTC', the command would be:
ln -sf /usr/share/zoneinfo/UTC /etc/localtime
If you have 'sys ntp timezone America/Los_Angeles', the command would be:
ln -sf /usr/share/zoneinfo/America/Los_Angeles /etc/localtime
2143305-1 : Tmm crash
Component: Application Security Manager
Symptoms:
TMM may crash when a policy dynamically disables and re-enables L7 DoS through multiple rules.
Conditions:
-- A policy containing multiple rules that disable and then re-enable L7 DoS is attached to a virtual server.
-- An L7 DoS profile is attached to the same virtual server.
-- The policy rule that re-enables L7 DoS does not specify the from-profile attribute.
-- Traffic passes through tmm.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Modify the policy rules that enable L7 DoS to explicitly include the from-profile attribute referencing the attached DoS profile.
2143109-2 : BIG-IP VE with more CPU cores than licensed enters TMM restart loop (TMM PU (<num_cores>) >= number of PUs (<num_licensed_cores>)) after mcpd restart
Links to More Info: BT2143109
Component: TMOS
Symptoms:
Mcpd crash or restart causes TMM to enter a restart loop.
Log - notice TMM PU (7) >= number of PUs (4)
Device becomes unreachable in the data plane.
Conditions:
BIG-IP VE with more vCPUs than licensed cores.
Example: 8-core Azure instance with a 4-core VE license.
Modules: AFM (nominal) and AVR (minimum) provisioned.
Occurs after mcpd restart or crash.
Impact:
System enters a TMM restart loop and remains offline.
Traffic processing and configuration access are unavailable until manual correction.
Workaround:
Manually set the provision.tmmcount DB variable to match the licensed core count, then restart services or reboot.
For example on an 8-core instance which is licensed for only 4-cores:
tmsh modify sys db provision.tmmcount value 4
2141373 : MCPD crash during dossier validation when /shared/vadc/.hypervisor_type contains invalid or empty (DossierValidator::get_cloud_type)
Links to More Info: BT2141373
Component: TMOS
Symptoms:
Mcpd crashes repeatedly during startup.
/shared/vadc/.hypervisor_type is empty or contains invalid data.
Conditions:
-- The BIG-IP system is deployed in GCP
-- The system is licensed via BIG-IP CM version 8.3.0
Impact:
System fails to license, mcpd crashes repeatedly. System disrupted while mcpd restars.
Workaround:
Move the file /shared/vadc/.hypervisor_type to a temp directory
2141305-1 : SSH Proxy Profile Properties page does not render
Links to More Info: BT2141305
Component: TMOS
Symptoms:
The 'Properties' button of a ssh proxy security profile does not correctly render the profile's page
Conditions:
- AFM provisioned
- Security ›› Protocol Security : Security Profiles : SSH Proxy : SSH
- Right-click on 'Properties' and open in new tab.
Impact:
You are unable to view the SSH Proxy security profile properties.
Workaround:
None
2141297-2 : In TLSv1.3, BIG-IP enforces the use of FFDHE key share if it is preferred over other DH groups★
Links to More Info: BT2141297
Component: Local Traffic Manager
Symptoms:
The BIG-IP system sends back an FFDHE key share that forces the client to also use FFDHE, even if the client sent a key share that is still acceptable to the BIG-IP.
Conditions:
The BIG-IP system is configured to prefer an FFDHE DH group and the client sends the same FFDHE DH group as supported but sends a key share for a different DH group.
Impact:
Clients are forced to use the FFDHE group for its key share even if the client sent a key share that is still acceptable to the BIG-IP
Workaround:
Either remove the FFDHE groups, or reorder DH group preferences so that FFDHE groups are not preferred over other groups.
2141233-1 : Client authentication profile as "Request" in FIPS-CC mode causes connection termination without certificate★
Links to More Info: BT2141233
Component: Local Traffic Manager
Symptoms:
SSL handshakes timeout instead of finishing.
Conditions:
1. Clientssl profile configured with Client Authentication enabled with "Request" option
2. BIG-IP is in FIPS-CC mode
3. Client does not provide a certificate
or
1. Clientssl profile configured with Client Authentication enabled with "Ignore" option
2. BIG-IP is in FIPS-CC mode
3. Access Policy applied to the Virtual Server contains an OnDemand Cert Auth agent.
4. Client does not provide a certificate
Impact:
SSL handshakes do not finish but instead timeout.
Workaround:
Workaround 1:
Disable Client authentication.
Workaround 2:
Configure CRL on the Client SSL profile
Workaround 3:
Enable Client Certificate Constrained Delegation (c3d) feature on the SSL profiles(requires Server-SSL profile and this feature forges client cert to server upon cert request from app-server).
2141205-2 : Tpm-status returns: "System Integrity: Invalid" for some Engineering Hotfixes
Links to More Info: BT2141205
Component: TMOS
Symptoms:
The 'tmsh run sys integrity status-check -a -v' or 'tpm-status' commands incorrectly report system integrity status as 'Invalid' even when the system software has not been modified.
Detailed output of the "tpm-status -v 3 -q" command includes the following messages:
A SIRR database is invalid.
/shared/lib/sirr/v1.0/SIRR validity: 1
/usr/lib/sirr/SIRR validity: 0
Conditions:
This occurs if all of the following conditions are true:
-- Engineering Hotfix built on or after October 15, 2025, based on BIG-IP software v17.5.1.3, v17.1.3, v16.1.6.1, v15.1.10.8 or later version.
-- Engineering Hotfix installed on TPM-supported BIG-IP platform.
-- The Engineering Hotfix contains an updated 'sirr-tmos' package.
Impact:
Incorrect presentation of system software status; the status shows INVALID when it is actually valid.
Workaround:
None.
2141109-1 : The URL categorisation daemon's DNS cache is never refreshed
Links to More Info: BT2141109
Component: Traffic Classification Engine
Symptoms:
When the URL categorisation daemon (wr_urldbd) starts or restarts, it queries the DNS resolver for the Brightcloud online service domains that are used for some of the real-time URL queries, and populates the DNS Cache with the results.
After populating the cache, it never refreshes or updates it.
When Brightcloud change the DNS records of their service domains, all the new SSL handshakes from the URL categorisation daemon, needed for the real-time URL categorisation queries, fail with these errors in wr_urldbd.out:
WR_URLDBD: Sep 30 12:01:08.836:Tid(41843):async_lookupCallback:702 Error processing URL:*.example.com and Status Code:S_ErrArg
BC_SDK: 2025-09-30 12:01:08 ERROR: SslIO::StartSSLHandshake::SSL_connect() failed::SSL error: 1
BC_SDK: 2025-09-30 12:01:08 ERROR: SSL error: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
BC_SDK: 2025-09-30 12:01:08 ERROR: SslIO::StartSSLHandshake::SSL_connect() failed::SSL error: 1
Conditions:
- URL categorisation license installed on the system, and URL categorisation configured and in use.
Impact:
Some time after the URL categorisation daemon starts or restarts, all URL categorisation real-time queries for URLs not already in the local database fail.
Workaround:
When the real-time queries start failing with the error described above, restart the wr_urldbd daemon with:
"bigstart restart wr_urlrdbd"
2140213-1 : Xnet-netvsc driver crash
Links to More Info: BT2140213
Component: TMOS
Symptoms:
TMM crashes due to lack of memory to configure subchannels needed for queues in DPDK which ultimately results in a NULL pointer exception.
The lack of memory occurs when the product of (number of TMMS)*(number of NICs) becomes very large due to memory footprint each TMM needs to operate so many NICs.
In /var/log/tmm:
notice hn_nvs_alloc_subchans(): nvs subch alloc failed: 0x2
notice hn_dev_configure(): subchannel configuration failed
notice Port5 dev_configure = -5
Conditions:
1) xnet-netvsc driver (HyperV or Azure)
2) (number of TMMs)*(number of NICs) is big; confirmed with 8 TMMs and 4 NICs on Azure F8s v2 instance.
Impact:
TMM goes into restart loop and never becomes Active, disrupting traffic.
Workaround:
A) Reduce the number of NICs in the environment
B) Reduce the number of TMMs by running the following and then restarting with 'bigstart restart tmm'
tmsh modify sys db provision.tmmcount value <tmm_count>
2139965-4 : AFM DNS DOS logging protocol_dns_dos_nxdomain_field_attack_name()
Links to More Info: BT2139965
Component: Advanced Firewall Manager
Symptoms:
Tmm crashes are observed for specific configurations where log_data_autodos or related settings (log_data_dos_nxdomain) are used.
The crash occurs for every 1 to 2 hours after DNS NXDOMAIN learning begins.
Logs from the crash may indicate issues in protocol_dns_dos_nxdomain_field_attack_name() function or references to log_data_dos_nxdomain.
DNS NXDOMAIN learning fails entirely and does not function as expected, preventing proper logging or learning.
Conditions:
This can occur 1-2 hours after enabling log_data_autodos or log_data_dos_nxdomain
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Set the dos.dnsnxdomain.learnperiod parameter to a larger value that is more comfortable for the situation.
2139893-1 : vCMP guest may become unresponsive for several minutes due to kernel soft lockup
Links to More Info: BT2139893
Component: TMOS
Symptoms:
A vCMP guest may become unresponsive for approximately 600 seconds, during which time:
- Odd-numbered CPUs assigned to the guest (for example, CPUs 1, 3, 5, 7, 9, 11) show 100% utilization.
- No logs, statistics, or management-plane responses are generated.
- Kernel logs report NMI watchdog soft lockup messages indicating a kernel deadlock.
- The issue triggers a failover event and a restart of all services on the affected guest.
Kernel logs indicate the lockup occurs on control-plane CPUs and is associated with memory management and TLB flush operations.
Conditions:
This issue may occur under the following conditions:
-- vCMP guest running on a BIG-IP system.
-- Guest operating under a Linux 3.10-based kernel.
-- High control-plane activity involving memory operations (for example, process creation, termination, or memory unmapping).
-- Issue observed in virtualized environments (for example, KVM-based platforms).
-- Exact steps to reproduce are currently unknown.
Impact:
-- Temporary loss of management and control-plane responsiveness for the vCMP guest.
-- Automatic failover to a standby unit may occur.
-- Restart of BIG-IP services on the affected guest.
-- Potential disruption to traffic handling during failover, depending on deployment architecture.
Workaround:
None.
2139637-2 : TMM crash because of invalid context
Links to More Info: BT2139637
Component: Local Traffic Manager
Symptoms:
Tmm crashes during QUIC packet loss handling due to invalid context.
Conditions:
LTM configured with UDP and QUIC.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
2138273-2 : Named service fails to start after an upgrade due to unsupported attributes in the named.conf file★
Links to More Info: BT2138273
Component: SSL Orchestrator
Symptoms:
Named fails to start with the following error after upgrading from older versions to 17.0 or newer releases due to the dnssec-lookaside and dnssec-enable options in the named.conf configuration file, which have been deprecated and are no longer supported in the latest BIND versions.
Logs in /var/log/daemon.log :
Oct 22 14:08:00 localhost.localdomain err named[16313]: /config/named.conf:35: option 'dnssec-lookaside' no longer exists
Oct 22 14:08:00 localhost.localdomain crit named[16313]: loading configuration: failure
Oct 22 14:08:00 localhost.localdomain crit named[16313]: exiting (due to fatal error)
Oct 22 14:08:00 localhost.localdomain notice systemd[1]: named.service: main process exited, code=exited, status=1/FAILURE
Oct 22 14:08:00 localhost.localdomain notice systemd[1]: Unit named.service entered failed state.
Oct 22 14:08:00 localhost.localdomain warning systemd[1]: named.service failed.
Conditions:
-- SSL Orchestrator System Settings >> DNS settings have been specified.
-- SSL Orchestrator L3 Explicit Topology Configured using the default SSL Orchestrator DNS resolver.
-- Check the BIND Version: Use the following command:
Example:
For example :
# named -v
BIND 9.11.36 (Extended Support Version) <id:68dbd5b>
Notes:
-- Starting with BIND 9.9, the dnssec-lookaside validation (DLV) feature was deprecated. By BIND 9.11, this feature was removed entirely.
-- Beginning with BIND 9.16, the dnssec-enable option was deprecated and subsequently removed.
Impact:
SSL Orchestrator will fail to resolve hostnames for the L3 Explicit topology causing end-to-end traffic to fail.
Workaround:
- Redeploy the affected L3 Explicit topology - this will use the native DNS resolver implementation and will no longer rely on BIND or named service, ensuring that end-to-end SSL Orchestrator traffic functions properly.
To fix the named service:
-- Remove the deprecated directives dnssec-lookaside and dnssec-enable from the BIND configuration file located at:
/var/named/config/named.conf.
-- After making these changes, restart the named service to apply the updated configuration by running the following command: bigstart restart named
2138077-2 : SAML redirect signature validation fails when RelayState is present with want-detached-signature=true in BIG-IP APM 17.1.x
Links to More Info: BT2138077
Component: Access Policy Manager
Symptoms:
SAML authentication fails with errors such as “Invalid signature” or “Signature verification failed”
Conditions:
SAML SP is configured with:
is-authn-request-signed = true
sso-binding = http-redirect
want-detached-signature = true
A RelayState parameter is included in the SAML AuthnRequest.
Occurs on BIG-IP APM versions 17.1.x and above.
Impact:
End users are unable to log in using SSO due to authentication errors
Workaround:
Remove the RelayState parameter from the SAML AuthnRequest configuration, if possible.
This restores successful signature validation.
Example: remove relay-state from the SP AAA SAML object configuration.
Alternatively, use HTTP-POST binding instead of HTTP-Redirect.
There is no configuration-based workaround if RelayState is required and Redirect binding must be used.
2137909-1 : Portal Access: unwanted decoding html entities in attribute values of HTML tags★
Links to More Info: BT2137909
Component: Access Policy Manager
Symptoms:
HTML Entities in Attribute values in HTML tags are decoded when they shouldn't be.
Conditions:
Portal Access is enabled
Impact:
Unwanted Application errors
Workaround:
None
2137661-1 : GTM link object is deleted automatically after being added
Links to More Info: BT2137661
Component: Global Traffic Manager (DNS)
Symptoms:
GTM link is deleted.
Conditions:
Link auto discovery is enabled on GTM server object.
Impact:
GTM link is falsely deleted by the system.
Workaround:
Disable link auto discovery on GTM server object.
2135621-2 : Poor TCP performance on Hyper-V non-accelerated deployments with Cisco VIC interfaces
Links to More Info: BT2135621
Component: Local Traffic Manager
Symptoms:
TCP retransmits occur on Hyper-V deployments with Cisco VIC networks (SR-IOV disabled).
The problem is related to large segments processing (TSO packets)
Conditions:
- Hyper-V VM with Network adapter on top of Cisco VIC interface
- SR-IOV is not enabled
- Virtual server uses TCP profile
Impact:
Poor TCP performance for virtual servers with TCP profile
Workaround:
- Disable TSO feature:
tmsh modify sys db tm.tcpsegmentationoffload value disable
- Other workaround is to switch to sock driver:
https://my.f5.com/manage/s/article/K000153024
2132209-1 : TMM crash while sending ACKs in invalid context
Links to More Info: BT2132209
Component: Local Traffic Manager
Symptoms:
Tmm crashes while QUIC is trying to send an ACK in invalid context.
Conditions:
LTM configured with UDP and QUIC.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
2131941 : Edge Client with default system browser when used with access policy that redirects to other VS, access profile scope needs to be Named / Global
Component: Access Policy Manager
Symptoms:
When you use the Connect option on Edge Client, after successful authentication, Edge Client shows the status as disconnected and the message ""You do not have access to the Network Access Connections. Please contact your system administrator."
Conditions:
- VPN is configured using 2 virtual servers where the first one does a redirect to a second VS which provides the webtop.
- Default system browser flow is enabled on the Connectivity profile of the first virtual server
- Profile scope on either of the access profile is set to 'Profile' or 'Virtual Server'
Impact:
Access session created on second virtual server cannot be strictly tied to this specific virtual server for additional security.
Workaround:
Configure the profile scope of the access profiles on both virtual servers to be 'Named' with a unique name.
2131833-4 : F5OS/rSeries r2xxx/r4xxx BIG-IP Tenant management interface not reachable
Links to More Info: BT2131833
Component: TMOS
Symptoms:
On F5OS/rSeriers r2xxx/r4xxx , in rare conditions the management interface is not reachable due to a timing and ordering issue probing network interfaces
In the BIG-IP Tenant, the network interfaces eth0 or mgmt are missing
Conditions:
This condition is rare and when it does its usually seen on tenant first boot.
Impact:
Unable to reach BIG-IP Tenant management address.
Workaround:
Reboot tenant
2131701-1 : The Virtual Server setting serverssl-use-sni can't be configured from the Configuration Utility
Links to More Info: BT2131701
Component: TMOS
Symptoms:
There's no configuration option for serverssl-use-sni in the GUI under "Local Traffic" --> "Virtual Servers" --> "Virtual Server List" --> virtual server name --> Configuration (Advanced).
Conditions:
Use the Configuration Utility to configure a virtual server's serverssl-use-sni setting.
Impact:
It's not possible to configure the Virtual Server setting serverssl-use-sni using the Configuration Utility.
Workaround:
Use tmsh (1) or iControl REST (2) to change the serverssl-use-sni setting.
(1)
root@(bigip-a)(cfg-sync Standalone)(Active)(/Common)(tmos)# modify ltm virtual <vs_name> serverssl-use-sni <TAB>
Values:
disabled enabled
(2)
[root@bigip-a:Active:Standalone] config # curl -sku <user>:<password> https://localhost/mgmt/tm/ltm/virtual/<vs_name> | jq .serversslUseSni
"disabled"
[root@bigip-a:Active:Standalone] config # curl -sku <user>:<password> -X PATCH https://localhost/mgmt/tm/ltm/virtual/<vs_name> -H "Content-Type: application/json" -d '{"serversslUseSni":"enabled"}' | jq .serversslUseSni
"enabled"
2131597-2 : BGP graceful restart might not accept a new connection immediatelly post neighbor failover.
Links to More Info: BT2131597
Component: TMOS
Symptoms:
When remote peer restarts and BGP graceful restart mechanism was advertised and received, BIG-IP might not immediately accept a new connection from a restarting peer.
Conditions:
- BIG-IP system is licensed for Routing Bundle.
- BGP graceful restart mechanism was advertised and received.
- Remote peer restarting.
Impact:
New connection might take longer to establish.
Workaround:
You can work the problem around by making sure BIG-IP local router-ID is lower than re-connecting peer ID.
2130913-1 : PUT request errors when trying to modify a firewall rule-list and firewall management-ip-rules
Links to More Info: BT2130913
Component: TMOS
Symptoms:
Attempting to update a firewall rule-list or firewall management-ip-rules with a PUT request won't work and an error will be returned.
Conditions:
Doing a PUT request to an existing firewall rule-list or to firewall management-ip-rules.
Impact:
A PUT request to a firewall rule-list and firewall management-ip-rules returns an error.
Workaround:
Using a PATCH request or a TMSH modify command to update the firewall rule-list or firewall management-ip-rules will work.
2130329-1 : [GTM] Deletion of topology records makes MCPD memory ramp up
Links to More Info: BT2130329
Component: Global Traffic Manager (DNS)
Symptoms:
The MCPD memory ramp-up might result in being killed by sod or out of memory.
Conditions:
Delete thousands of GTM topology records in a short period of time, and the full GTM sync is triggered.
Impact:
The MCDP memory is stuck or being killed by sod.
Workaround:
Do not delete a large number of GTM topology records in a short period of time.
2119453 : SAML Auth for Edge Client using Firefox browser is not successful for some Windows systems
Links to More Info: BT2119453
Component: Access Policy Manager
Symptoms:
Firefox is closed during SAML authentication in some Windows systems and never opened for Authentication.
Conditions:
Firefox browser used during SAML Authentication.
Impact:
Browser not started after closure during SAML Authentication process and Edge Client SAML authentication is not successful
Workaround:
Kill the Firefox process using Task Manager.
2107221 : Edge Client VPN disconnect observed when trying to access the updated ACL policy
Links to More Info: BT2107221
Component: Access Policy Manager
Symptoms:
Edge client logs off when trying to establish VPN after updating the ACL policy.
Conditions:
A policy is updated but not applied in the VPE
Impact:
VPN disconnects with "Unknown ACL creation error"
Workaround:
Apply the ACL
2099449-1 : Cannot configure websocket profile on a performance virtual server from the GUI
Links to More Info: BT2099449
Component: Application Security Manager
Symptoms:
If a performance (fastL4) virtual server is selected it's impossible to configure the client or server side WebSocket profile.
After selecting WebSocket profile and clicking update, the configuration is not applied and the profile field displays "None".
, this option is available for configuration in the GUI, but once it's pushed (i.e. "Update" button pressed), the config is not applied, and the websocket profile is removed from the select field.
Conditions:
Performance (fastL4) profile is selected instead of Standard type.
Impact:
Configuration of WebSocket profiles does not work via GUI.
Workaround:
WebSocket profiles can be configured via tmsh:
modify ltm virtual http-vs profiles add { websocket }
2099441-1 : Garbled character in warning message when HA peer is added
Links to More Info: BT2099441
Component: TMOS
Symptoms:
Garbled character in warning message
Conditions:
When adding HA peer
Impact:
Unexpected behavior
Workaround:
None
2078277-1 : BD crash with an inappropriate configuration for request_max_chunks_number
Links to More Info: BT2078277
Component: Application Security Manager
Symptoms:
BD crash
Conditions:
BD internal variable request_max_chunks_number has been configured with inappropriate value (above 200,000)
Impact:
ASM traffic disrupted while bd restarts.
Workaround:
Revert request_max_chunks_number to the default value, 1000
2078233-1 : DNS iRule TCL error encountered on receiving a DNS response of type 65
Links to More Info: BT2078233
Component: Global Traffic Manager (DNS)
Symptoms:
iRule fails with TCL errors when processing type 65 (SVCB/HTTPS) DNS responses.
-err tmm1[1527]: 01220001:3: TCL error: /Common/Loga1 <DNS_RESPONSE> - ldns wire2pkt failure invoked from within "DNS::ptype"
-err tmm1[1527]: 01220001:3: TCL error: /Common/Loga1 <DNS_RESPONSE> - Packet alloc for section failure. invoked from within "DNS::answer"
Conditions:
Occurs when a DNS iRule processes a response containing type 65 (SVCB/HTTPS) records.
Impact:
iRules may trigger TCL errors for type 65 DNS responses, but responses are still correctly delivered to clients and traffic is unaffected.
Workaround:
None
2077625-2 : Changes in API Protection Profile not updated in Per Request Policy
Links to More Info: BT2077625
Component: Access Policy Manager
Symptoms:
Currently there is no implementation for the update and delete operation of the Classify API Request (RCA).
Conditions:
The path modified inside an API Protection profile are not updated in the Per Request Policy
Steps to Reproduce:
-- Navigate to Access > API Protection > Profiles
-- Create a profile "Test"
-- Inside the profile, create a path to /Document and save
-- Verify Access Control tab -> Per Request Policy > Edit
-- Close the visual tab and reopen "Paths" tab
-- Edit the /Document path to /Document/test/*
-- Save
Impact:
Unable to see the changes
Workaround:
None
2077569-1 : Transparent DNS monitors incorrectly marks the status of a pool as offline
Links to More Info: BT2077569
Component: Local Traffic Manager
Symptoms:
Pools being monitored with a transparent DNS monitor will appear to be offline, regardless of the response
Conditions:
1. A transparent DNS monitor is created
2. This created transparent DNS monitor is used to monitor the health of a pool
Impact:
The pool is marked offline
Workaround:
None
2077553-1 : SIP message in quote containing special character after two backslashes will be generate a SIP error message
Links to More Info: BT2077553
Component: Service Provider
Symptoms:
Tmm resets connections with "SIP parser error (Illegal value)"
Conditions:
In the SIP message sent by the client, there is a string in quotes that contains two backslashes followed by a UTF8 character.
Impact:
Rejection of valid SIP message
Workaround:
Encode all characters with %
as in
%D0%A4%5C%5C%D0%A9%20
instead of
"Ф\\Щ "
2077525-3 : Incomplete or missing IP Intelligence databases result in connection reset, high TMM CPU usage and/or TMM crash
Links to More Info: BT2077525
Component: Advanced Firewall Manager
Symptoms:
Both of the following messages are frequently (several times per second) logged to /var/log/tmm*:
<13> Sep 24 09:55:01 bigip1 notice Failed to open /var/IpRep/F5IpRep.dat
<13> Sep 24 09:55:01 bigip1 notice Failed to open /var/IpRep/F5IpV6Rep.dat
Heavy log file writing can result in a possible tmm SIGABRT due to a heartbeat failure.
Conditions:
ip-intelligence is configured, and both the IPv4 and IPv6 intelligence databases are missing. IP intelligence is a optional subscription feature that can be configured in various BIG-IP modules, such as AFM, ASM, and APM, and irules.
Impact:
A frequent log message might slow TMM.
This might result in TMM missing a heartbeat, which will trigger a tmm SIGABRT and resulting core. Traffic disrupted while tmm restarts.
Workaround:
Unconfigure ip-intelligence and remove any configuration that refers to IP reputation, or ensure that the ip-intelligence databases are available.
2077357-2 : Virtual-wire with proxy listener may generate packets with 00:00:00:00:00:00 source MAC.
Links to More Info: BT2077357
Component: Local Traffic Manager
Symptoms:
In a case where a proxy listener intercepts traffic going over a virtual-wire and there is no server-side traffic (TCP re-transmit timeout), a RST generated towards the server might have 00:00:00:00:00:00 source MAC.
Conditions:
Proxy listener intercepts traffic going over a virtual-wire.
There is no server-side traffic for the flow.
Impact:
RST might not be delivered to the server.
Workaround:
None
2077329-1 : IBD profile is injecting the Javascript tag in non html pages
Links to More Info: BT2077329
Component: Bot Defense
Symptoms:
Setup IBD profile
Set up a backend server to serve js file with some HTML tags in string format
Example Javascript
function PrintPreview(htmlpage) {
var page = "<script>function Print(){window.document.getElementById(\"printtool\").setAttribute(\"style\",\"display:none\");window.print();window.document.getElementById(\"printtool\").setAttribute(\"style\",\"\");}; function Close(){close();}</script>";
htmlpage = "<html><head></header><body>" +htmlpage+ scp+ "</body></html>";
myWindow.document.write(htmlpage);
}
Able to see js tags injected with non html pages with content-type= application/javascript in response
Conditions:
Virtual server with the IBD profile and a Javascript file with some HTML tags in string format
Impact:
Javascript tag injection is happening for response pages with content-type= application/javascript instead of happening with html pages with content-type = html or xhtml.
Workaround:
None
2064505-1 : TLS 1.2 handshake failure with cipher rule configured using hybrid KEM algorithms first
Links to More Info: BT2064505
Component: Local Traffic Manager
Symptoms:
When a TLS 1.2 connection is initiated with https virtual server using a cipher rule with hybrid KEM algorithms listed first, the connection handshake fails.
Conditions:
Cipher rule is configured with hybrid KEM algorithms before their related classic DH-group algorithms. Issue does not occur if classic DH-group algorithms precede hybrid KEM algorithms in the cipher rule.
Fail:
ltm cipher rule group1 {
cipher rule1
dh-groups X25519MLKEM768:X25519
}
Works:
ltm cipher rule group1 {
cipher rule1
dh-groups X25519:X25519MLKEM768
}
Impact:
TLS 1.2 connections secure key exchange fail when hybrid KEM algorithms listed first in the cipher rule configurations.
Workaround:
Issue does not occur if classic DH-group algorithms precede hybrid KEM algorithms in the cipher rule.
ltm cipher rule group1 {
cipher rule1
dh-groups X25519:X25519MLKEM768
}
2064413-3 : UCS file download failure via REST API
Links to More Info: BT2064413
Component: TMOS
Symptoms:
When downloading UCS files using the BIG-IP REST API with clients such as PowerShell 7, downloaded files are larger than expected and contain duplicate or corrupted data. The MD5 checksum of the downloaded file does not match the source UCS file on the BIG-IP system.
Conditions:
Downloading UCS files over the REST API (using HTTP Range headers) from BIG-IP.
Most commonly seen when using PowerShell 7 and other clients that download files in chunks.
Not observed with PowerShell 5 or when using SCP/SFTP.
Impact:
UCS file downloads via REST API are incomplete and corrupted.
MD5 checksum mismatch prevents UCS archive validation or restore.
Automated backups or migrations using REST API may fail.
Potential risk of data loss if corrupted UCS files are used for restore.
Workaround:
Use alternate file transfer methods such as SCP or SFTP to download UCS files directly from /var/local/ucs/ on the BIG-IP system.
2064373 : iApp menu appears on YK (Yunke OEM)
Component: TMOS
Symptoms:
iApp menu appears on YK (Yunke OEM)
Conditions:
Applies to the YK OEM product only.
Impact:
Enabled iApps menu visibility for Yunke OEM customers by removing existing display constraints.
Workaround:
None.
2064333-2 : [AFM] pccd cores during the service restart
Links to More Info: BT2064333
Component: Advanced Firewall Manager
Symptoms:
Pccd core occurs while the service restarts. The core file may be generated when upgrading BIG-IP.
Conditions:
- AFM provisioned
- pccd is restarted
Impact:
Pccd core is generated during process restart or upgrade, but it does not appear to persist after the initial event.
Workaround:
None
2064225-1 : FQDN nodes created when creating FQDN pool member have "address-family" set to "all"
Links to More Info: BT2064225
Component: TMOS
Symptoms:
When creating an FQDN pool member and referencing an FQDN node that does not already exist, the FQDN node is created implicitly using values specified for the FQDN pool member.
In this scenario, the FQDN node is always created with its "address-family" option set to "all".
It is not possible to specify an "address-family" value for the FQDN node in this scenario.
Conditions:
This occurs when:
-- Creating an FQDN pool member, either via the tmsh command-line interface (CLI) or the TMUI GUI, and
-- Referencing a new (not existing) FQDN node.
Impact:
The FQDN node created cannot be configured with an "address-family" option set to anything but "all" (such as "ipv4" or "ipv6"). As a result, ephemeral nodes may be created with either IPv4 or IPv6 addresses (depending on DNS query results) which are not desired.
Workaround:
You can,
-- First, create the FQDN node with the desired "address-family" value.
-- Then create the FQDN pool member, referencing the previously-created FQDN node.
To correct the configuration of the FQDN node, the FQDN node and pool member must be deleted and re-created:
1. Delete FQDN pool member
2. Delete FQDN node
3. Create FQDN node with desired configuration
4. Create FQDN pool member with desired configuration
2064209-1 : FQDN node created from pool member via tmsh does not inherit "autopopulate" value
Links to More Info: BT2064209
Component: TMOS
Symptoms:
When using the tmsh command-line interface (CLI) to create an FQDN pool member, an FQDN node is created implicitly using values specified for the FQDN pool member.
However, if the "autopopulate" value is specified as "enabled" (instead of the default "disabled"), the FQDN node is created with the "autopopulate" value set to "disabled" (default).
Conditions:
This occurs when:
-- Creating an FQDN node implicitly by explicitly creating an FQDN pool member
-- Using the tmsh interface to perform this action.
-- Specifying a non-default value of "enabled" for the "autopopulate" option
Impact:
The FQDN node will be created with an "autopopulate" value of "disabled", which means that only a single ephemeral node will be created based on DNS resolution of the FQDN name.
Since only a single ephemeral node is created, only a single ephemeral pool member will be created, and the "autopopulate" option will not exhibit the "enabled" behavior.
Workaround:
To work around this issue using tmsh command-line interface (CLI):
-- First create the FQDN node with the desired configuration values.
-- Then create the FQDN pool member, referencing the previously-created FQDN node.
To correct the configuration of the FQDN node, the FQDN node and pool member must be deleted and re-created:
1. Delete FQDN pool member
2. Delete FQDN node
3. Create FQDN node with desired configuration
4. Create FQDN pool member with desired configuration
2058541-2 : [BGP] BIG-IP does not follow updated section of rfc4724.html#section-4.2 when handling a new connection from peer.
Links to More Info: BT2058541
Component: TMOS
Symptoms:
BIG-IP does not follow the updated section (https://www.rfc-editor.org/rfc/rfc4724.html#section-4.2) when handling a new connection from a peer. Instead, section https://datatracker.ietf.org/doc/html/rfc4271#section-6.8 is followed.
This leads to a new connection from a peer being dropped when Graceful Restart happens.
Conditions:
BGP is configured with graceful restart.
Peer restarts.
Impact:
BIG-IP will drop a new connection request and try to open a new connection right away.
Workaround:
None
2053893-1 : Incompletely-synced ASM configuration can be synced back to the original device or group
Links to More Info: BT2053893
Component: Application Security Manager
Symptoms:
The incomplete ASM configuration on the new device may be synced to the device group, overwriting the original and complete ASM configuration when an ASM configuration is in the process of being synced from an existing device or group to a new device joined to the group, and there is a request to sync the new device to the group.
Conditions:
This may occur when,
-- Multiple device groups are configured, including:
-- a (non-ASM) Sync Failover device group
-- an ASM Sync-Only device group
-- Both device groups are configured for Manual Full Sync.
-- The ASM configuration is large enough to require several minutes to apply the complete configuration.
-- A new device has joined the cluster and device groups, which has no existing ASM configuration (or, a much smaller subset of the cluster's existing ASM configuration.
-- The configuration is synced from an existing device to the non-ASM device group (and thus to the new device).
-- After the ASM configuration is synced from an existing device to the ASM device group (and thus to the new device).
-- After the ASM configuration is synced from the new device to the ASM device group (and thus to the existing devices).
Impact:
Depending on the size of the ASM configuration, system performance and network throughput, the ASM configuration may take a long time to sync to the new device, and may appear to be only partially synced in the meantime.
Depending on timing and other non-deterministic conditions, this partially-synced ASM configuration may be synced back to the device group.
When this occurs, the existing ASM configuration may be overwritten by the partial ASM configuration on the new device, resulting in a loss of ASM functionality.
Workaround:
To avoid this issue when multiple device groups are configured, which include both an ASM and non ASM device group, and both groups are configured for Manual Full Sync:
-- Sync the ASM device group first.
-- Wait to confirm that the full ASM configuration has been synced to the new device before initiating any further sync operations.
-- Be careful not to inadvertently select the new device (with incomplete ASM configuration) as the device to sync to the device group.
2053489-1 : Config Sync events may not be recorded in audit log
Links to More Info: BT2053489
Component: TMOS
Symptoms:
When a command is issued on a BIG-IP system to sync configuration to a Device Group from a given Device in the Device Group, the config sync command may not be recorded in the audit log on the device where the command was issued.
The audit log may not record this command, even though subsequent log messages in other log files may indicate successful completion of the config sync action.
Conditions:
This may occur when:
-- Issuing the command to sync configuration from a Device to a Device Group in which it is a member.
-- Issuing such a command from either the command-line interface (tmsh) or from the BIG-IP GUI (tmui).
-- Accepting the default/offered suggestion for the Device whose configuration is to be synced to the Device Group.
For example:
-- In the GUI, accepting the default selection indicated by the active radio button for which Device to sync to the Device Group, and clicking Sync.
-- In the CLI, issuing the "tmsh run cm config-sync" command with the "to-group" option from the Device which is suggested by the "tmsh show cm sync-status" command.
Impact:
When attempting to diagnose issues that occur in the context of syncing configuration across Devices in a Device Group, it may not be clear where, when, and by whom the command to initiate the config sync was issued.
2053289-3 : Increased OAuth instances in TMM memory
Links to More Info: BT2053289
Component: Access Policy Manager
Symptoms:
In a successful OAuth attempt a single M_OAUTH instance leak is observed.
Conditions:
OAuth Agents are configured in a per-request policy.
Impact:
Increased TMM memory usage.
Workaround:
None
2050389-2 : VIPRION cluster management IP may not appear in SNMP IP-MIB table
Links to More Info: BT2050389
Component: TMOS
Symptoms:
When a cluster management IP address (sys cluster default address x.x.x.x) is configured without also configuring individual blade IP addresses (sys cluster default members # { address x.x.x.x }), neither address with appear in the IP-MIB ipAddressIfIndex table.
Conditions:
A cluster management IP is configured, but individual blade management addresses are not.
Impact:
Unable to retrieve the cluster management IP from the VIPRION system using SNMP
Workaround:
Configure cluster management IP addresses on the individual blades. Doing so will allow the floating cluster management IP address to be populated into the IP MIB (as well as the individual blade IP addresses)
2049881 : Allow customization of Windows Edge Client F5 icons
Links to More Info: BT2049881
Component: Access Policy Manager
Symptoms:
From Windows Edge Client 7.2.6, the network port icon that was visible in multiple Edge Client windows and in the Edge Client application (visible in the Windows start menu) has been replaced with the default F5 icon.
It cannot be customized on the BIG-IP.
Also, the Edge Client customization preview page on the BIG-IP still shows the outdated network port icon.
Conditions:
Edge Client 7.2.6 or later is installed.
Impact:
It is not possible to change that default F5 icon, even when using customization.
Workaround:
None
2048325-4 : Excessive log entries in wr_urldbd.out was caused by queries for URLs with an asterisk character
Links to More Info: BT2048325
Component: Traffic Classification Engine
Symptoms:
Every time a query with an asterisk character ('*') is sent to the BrightCloud online service, for example, *.example.com, an error occurs. The error is returned by BrightCloud and logged in /var/log/wr_urldbd.out as,
WR_URLDBD: Sep 09 06:13:33.035:Tid(4810):async_lookupCallback:702 Error processing URL:*.example.com and Status Code:S_ErrArg
Although the query is successful.
Conditions:
A query with an asterisk character ('*') is sent to the BrightCloud online service, either by a client device or using tmsh:
$ tmsh show ltm urlcat-query '\*.example.com'
Impact:
Unnecessary error logs in the /var/log/wr_urldbd.out log file.
An error is logged even when the domain exists, and the BrightCloud query is successful.
Workaround:
None
2048001-2 : Memory leak in icrd_child process
Links to More Info: BT2048001
Component: Protocol Inspection
Symptoms:
Memory leak in icrd_child caused by listing Inspection Profiles using GUI.
Conditions:
Configuring about 40 IPS profiles and open IPS profiles in multiple browsers.
Impact:
Out of memory and killing the icrd_child process.
Workaround:
Use a single tab in the GUI
2047445 : A VPN connection may fail when an Access policy or a Virtual Server is configured in a route domain
Links to More Info: BT2047445
Component: Access Policy Manager
Symptoms:
When the Access policy is configured in a route domain using the "Route Domain and SNAT Selection" agent, or when a virtual server is configured in any route domain, a VPN connection may fail with the error: "iSession: Connection error: isession_handle_syn:3740: No peer:4". This issue is applicable only to Windows-based Edge clients and Browser clients.
Conditions:
1. Windows client is used
2. Access policy is configured in route domain or Route domain is configured on VS
3. User tries to establish VPN connection
Impact:
VPN connection may fail
Workaround:
Any of the following workarounds can be applied:
-- Configure route domain with parent as default route domain. In some cases we may need to disable "strict isolation", In addition to parent as default route domain.
-- Disable ipv6 using "tmsh modify sys db ipv6.enabled value false"
-- tmsh modify sys db isession.ctrl.apm value disable
2047429-3 : PostgreSQL should dump a corefile when not exiting
Links to More Info: BT2047429
Component: TMOS
Symptoms:
When PostgreSQL does not exit gracefully, it does not create a core file.
Conditions:
PostgreSQL crashes.
Impact:
Diagnostic data missing.
Workaround:
None
2047137-2 : TMM core may occur while using APM VDI with Blast UDP
Links to More Info: BT2047137
Component: Access Policy Manager
Symptoms:
User may fail to access the remote desktop using APM vmware VDI, if a TMM core occurs due to the unavailability of one of the internal database variable.
Conditions:
The user attempts to connect to the desktop or app using VMware Client or a browser via the Blast protocol over UDP, and the session variable is deleted due to a timeout.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
2047069-1 : Issue observed in Checkmarx scan
Links to More Info: BT2047069
Component: TMOS
Symptoms:
Some special characters are included in the file name on the dashboard page.
Conditions:
When the user gives special characters for file names in the dashboard page.
Impact:
The user will not be able to retrieve the files if they are saved incorrectly.
Workaround:
None
2046521 : On webtop default description of Desktops and Apps should be "Horizon Desktop" and "Horizon Application"
Links to More Info: BT2046521
Component: Access Policy Manager
Symptoms:
When vmware VDI is used, on webtop user observe "VMware View Desktop" and "VMware View Application." as names, instead of Omnissa Desktop/App.
Conditions:
APM Vmware VDI is used with webtop
Impact:
User still see vmware even after rebranding is done.
Workaround:
None
2044381-3 : Gtmd SIGSEGV core due to monitor status change
Links to More Info: BT2044381
Component: Global Traffic Manager (DNS)
Symptoms:
Gtm cored
Conditions:
-- Three GTMs in a sync group
-- A GTM pool has a monitor with "require 1 from 2 probes" configured
-- Resources are marked down due to iQuery traffic disruption between two of the GTMs, then come back up
Impact:
GSLB traffic disrupted while gtmd restarts.
Workaround:
None
2038429-1 : Issue with ike_ctx causes memory corruption
Links to More Info: BT2038429
Component: TMOS
Symptoms:
1. Instead of crashing, TMM logs repeated Oops messages (ike_ctx tag invalid, ike_ctx_addr near NULL, traffic_selector_cfg sp_out required).
2. Can cause core, under low memory conditions, when multiple TMM threads run out of memory
3. Tunnel connections fail with thousands of logs.
4. BIG-IP does not crash, but repeatedly skips processing tunnel connections.
Conditions:
Occurs on systems with long uptimes and when IPsec is configured.
Impact:
Tunnel connections fail repeatedly and can cause core, under low memory conditions, when multiple TMM threads run out of memory. Traffic disrupted while tmm restarts.
Workaround:
None
2038425-1 : Issue with ike_ctx causes memory corruption
Links to More Info: BT2038425
Component: TMOS
Symptoms:
1. Instead of crashing, TMM logs repeated Oops messages (ike_ctx tag invalid, ike_ctx_addr near NULL, traffic_selector_cfg sp_out required).
2. Can cause core, under low memory conditions, when multiple TMM threads run out of memory
3. Tunnel connections fail with thousands of logs.
4. BIG-IP does not crash, but repeatedly skips processing tunnel connections.
Conditions:
Occurs on systems with long uptimes and when IPsec is configured.
Impact:
Tunnel connections fail repeatedly and can cause core, under low memory conditions, when multiple TMM threads run out of memory. Traffic disrupted while tmm restarts.
Workaround:
None
2038421-1 : Issue with ike_ctx causes memory corruption
Links to More Info: BT2038421
Component: TMOS
Symptoms:
1. Instead of crashing, TMM logs repeated Oops messages (ike_ctx tag invalid, ike_ctx_addr near NULL, traffic_selector_cfg sp_out required).
2. Can cause core, under low memory conditions, when multiple TMM threads run out of memory
3. Tunnel connections fail with thousands of logs.
4. BIG-IP does not crash, but repeatedly skips processing tunnel connections.
Conditions:
Occurs on systems with long uptimes and when IPsec is configured.
Impact:
Tunnel connections fail repeatedly and can cause core, under low memory conditions, when multiple TMM threads run out of memory. Traffic disrupted while tmm restarts.
Workaround:
None
2038417-1 : Issue with ike_ctx causes memory corruption
Links to More Info: BT2038417
Component: TMOS
Symptoms:
1. Instead of crashing, TMM logs repeated Oops messages (ike_ctx tag invalid, ike_ctx_addr near NULL, traffic_selector_cfg sp_out required).
2. Can cause core, under low memory conditions, when multiple TMM threads run out of memory
3. Tunnel connections fail with thousands of logs.
4. BIG-IP does not crash, but repeatedly skips processing tunnel connections.
Conditions:
Occurs on systems with long uptimes and when IPsec is configured.
Impact:
Tunnel connections fail repeatedly and can cause core, under low memory conditions, when multiple TMM threads run out of memory. Traffic disrupted while tmm restarts.
Workaround:
None
2038309-1 : After the full config sync, FQDN template node status changes to ‘fqdn-checking’ (Unknown) untill the DNS query is triggered
Links to More Info: BT2038309
Component: Local Traffic Manager
Symptoms:
The node’s availability changes to unknown, even though the DNS server is reachable and should have valid resolution data.
The FQDN resolver does not immediately send a DNS query upon receiving the sync, which delays recovery of the node status.
Node status returns to fqdn-up only after the next scheduled DNS query interval (For example, 240 seconds).
Conditions:
-- BIG-IP devices configured with FQDN template nodes.
-- Performing config sync with the force-full-load-push option.
The issue occurs on the sync receiver only. It does not reproduce without force-full-load-push.
Impact:
Temporary service visibility issue:
FQDN nodes incorrectly display 'fqdn-checking' or 'availability unknown' until the next DNS resolution cycle.
This can exist till the next FQDN interval configuration (For example, 4 minutes).
May confuse administrators monitoring node status.
Workaround:
To work around this issue, either:
-- After initiating the config sync force-full-load-push, initiate on the standby/sync receiver:
bigstart restart dynconfd
or:
-- Configure the FQDN template node with a shorter 'interval' value, so that the next DNS query occurs more quickly after the full config sync operation.
2038277-2 : Double memory release in the enforcer
Links to More Info: BT2038277
Component: Application Security Manager
Symptoms:
Possible bd cores due to ignore positional parameter configurations
Conditions:
Positional parameters configured with ignore value flag enabled.
Impact:
Error in logs, and possible crash and core. Traffic disrupted while bd restarts.
Workaround:
None
2035277-3 : Modifying virtual-address 'enabled' setting might lead to unpredictable virtual-server availability
Links to More Info: BT2035277
Component: Local Traffic Manager
Symptoms:
Virtual-server passes traffic when virtual-address is disabled.
The virtual-address 'enabled' setting is not always properly reflected on depending virtual-server configuration objects
Conditions:
-- Using traffic-matching-criteria.
-- Destination specified in traffic-matching-criteria list is the same as defined virtual-address.
remove the virtual server and re-add it or simply restart the TMM
Impact:
Virtual-server still passes traffic when virtual-address is disabled and inconsistent behavior is observed.
Workaround:
None
2033781-1 : Memory allocation failed: can't allocate memory to extend db size
Links to More Info: BT2033781
Component: Local Traffic Manager
Symptoms:
When tmm cannot expand the eXtremeDB database, it logs an error in /var/log/tmm:
err tmm1[21087]: 01010004:3: Memory allocation failed: can't allocate memory to extend db size
Conditions:
-- BIG-IP in operation
-- A configuration change is made that causes tmm to allocate more memory to eXtremeDB. Examples include:
- Adding a clientssl or serverssl profile
- Modifying a datagroup
- A bot defense sync occurs
Impact:
Tmm does not crash but the eXtremeDB state is inconsistent with other tmms and could lead to unpredictable behavior such as virtual servers not working, iRules failing to work, bot defense failing to work
Workaround:
None
2016465-1 : Policy auto merge does not work for Base64 Decoding
Links to More Info: BT2016465
Component: Application Security Manager
Symptoms:
If an entity (Parameters, Cookies, Headers) in two policies have differing values for how to handle Base64 values (enabled, disabled, required), policy diff does not merge the values correctly.
Conditions:
An entity (Parameters, Cookies, Headers) in two policies have differing values for how to handle Base64 values (enabled, disabled, required), policy diff does not merge the values correctly.
Impact:
Expected changes may not be made to the merged policy resulting in unexpected Base64 value handling.
Workaround:
The values can be changed manually through GUI or REST.
2015973-2 : Enabling tcp-ak-ts dos vector causes file transfer failure★
Links to More Info: BT2015973
Component: Advanced Firewall Manager
Symptoms:
After upgrading, large file transfers to S3 endpoints start failing
Conditions:
-- Tcp-ack-ts with tscookie is enabled
-- You transfer a large file via the virtual server
Impact:
TLS connections to S3 endpoints are disrupted, resulting in stalled or failed connections
Workaround:
Disable the tscookie option in tcp-ack-ts
2014597-2 : Async session db ops are missing flow control
Links to More Info: BT2014597
Component: TMOS
Symptoms:
Tmm crash while hanling SSL traffic
Conditions:
-- SSL traffic
-- Heavy load
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
2014373-2 : Fix for TMM Core SIGSEGV in spva_gl_ddos_find_tuples Due to NULL Grey List Flood Entry
Links to More Info: BT2014373
Component: Advanced Firewall Manager
Symptoms:
TMM core analysis suggests that spva code received a FSD from HSB with type 14 (sPVA FSD). When the code was processing FSD, TMM crashed as the grey list flood entry was NULL. This entry was NULL on all TMM threads.
Conditions:
The issue occurs when sPVA code receives an FSD of type 14 from HSB, and during processing, the corresponding grey list flood entry is NULL across all TMM threads, causing a TMM crash.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
2012801-2 : "parser parameters" is enabled even though json schema is attached to the profile
Links to More Info: BT2012801
Component: Application Security Manager
Symptoms:
"parser parameters" is enabled even though json schema is attached to the profile. The GUI shows the option as disabled and greyed out; however, internally it is enabled.
Conditions:
Unknown
Impact:
JSON is extracted and enforced as parameters because of the "parser parameters" setting being enabled. This results in unexpected enforcement even when a valid JSON body is sent.
Workaround:
Making and saving a spurious change to the profile corrects the unexpected state.
2011341 : The address list file fails to load during an SCF file merge★
Links to More Info: BT2011341
Component: TMOS
Symptoms:
Getting the error while merging the shared-objects address-list using an SCF file after upgrading to V17.5.1
Syntax Error: "fw-ip-address-list" component cannot be loaded because it is not a valid component
Conditions:
1. Create an address list
2. Save the address list as scf file
3. Merge the saved scf file and configuration
load sys config merge file test.scf
Impact:
The saved scf address list file fails to load
Workaround:
None
2008409-3 : MAC masquerade does not work on an F5OS tenant if there are no floating self-ips configured on the VLAN
Links to More Info: BT2008409
Component: F5OS Messaging Agent
Symptoms:
Network traffic fails on a VLAN that is shared by multiple tenants.
Conditions:
-- F5OS tenants sharing a VLAN
-- MAC masquerade enabled on both tenants
-- No floating self-ips configured
Impact:
MAC masquerade may not work properly causing traffic failures such as packets not arriving on the tenant. Or excessive DLFs on the network.
Workaround:
Add floating self-ips to all traffic VLANs that are using MAC masquerade.
2007429 : Captcha button label displays in lowercase
Links to More Info: BT2007429
Component: Application Security Manager
Symptoms:
The CAPTCHA challenge displays a "submit" button with lowercase text, which may not align with UI expectations.
Conditions:
-- CAPTCHA challenges triggered by bot defense or brute force protection modules.
-- Bot Defense with Captcha mitigation is attached to a virtual server
OR
-- WAF policy with brute force using captcha mitigation is attached to a virtual server.
Impact:
Minor UI inconsistency that may affect user experience preferences.
Workaround:
None
1993737-1 : [APM][SSO]TMM Core in the SSO decompress operation
Links to More Info: BT1993737
Component: Access Policy Manager
Symptoms:
The TMM core backtrace shows a SIGSEGV in saml_sso_from_assigned_resources_and_profile, specifically a memcmp() call with a NULL meta_data pointer.
The underlying issue appears to be a race condition or logic error where a decompress callback is triggered after the SSO state (metadata) has already been freed, possibly due to concurrent handling of decompress operations and redirect responses.
Conditions:
SAMl SSO is configured
Impact:
Traffic disrupted while tmm and apmd restarts.
Workaround:
None
1993081-3 : SNMP traps are not being generated for bigipExternalLinkDown (.1.3.6.1.4.1.3375.2.4.0.218) and bigipExternalLinkUp (.1.3.6.1.4.1.3375.2.4.0.219).
Links to More Info: BT1993081
Component: TMOS
Symptoms:
Two SNMP traps bigipExternalLinkDown (.1.3.6.1.4.1.3375.2.4.0.218) and bigipExternalLinkUp (.1.3.6.1.4.1.3375.2.4.0.219) were added as part of ID807957 fix. However, currently, these two traps are not being generated.
Instead of bigipExternalLinkDown or bigipExternalLinkUp trap, when alertd.nokia.linktraps db key and alertd.nokia.alarm db key is both set to disabled (default), bigipExternalLinkChange trap (.1.3.6.1.4.1.3375.2.4.0.37) is being generated upon link status change (up/down).
When alertd.nokia.linktraps db key and alertd.nokia.alarm db key is both set to enable, Nokia specific snmp traps (.1.3.6.1.4.1.94.7.1.4.2.1) is generated upon link status change (down/up) and Nokia Alarm database is correctly updated with those snmp traps. Fix for ID807957 is still valid here.
Conditions:
- Running software version that has fix for ID807957 (16.1.0 or later / 17.x).
- SNMP trap destination is configured and link status change happens.
- alertd.nokia.linktraps db key and alertd.nokia.alarm db key is both disabled (default value).
Impact:
BigipExternalLinkDown trap and bigipExternalLinkUp trap is not being generated.
Workaround:
None.
1992569-2 : Request body held despite "do nothing" content profile setting
Links to More Info: BT1992569
Component: Application Security Manager
Symptoms:
Requests configured with the "Do Nothing" content profile may still have their body held until fully received, rather than being streamed directly to the server.
Conditions:
ASM is configured with the "Do Nothing" option and large or slow requests are sent.
Impact:
May lead to increased latency or timeouts for server-side applications expecting real-time data delivery, and unnecessary resource usage due to repeated ingress event handling.
Workaround:
None
1991485 : Re-adding a tunnel with the exact same name might result in tunnel ingress traffic getting dropped.
Links to More Info: BT1991485
Component: TMOS
Symptoms:
Re-adding a tunnel with the exact same name might result in tunnel ingress traffic getting dropped.
Conditions:
Deleting and re-adding a tunnel with exactly same name as the tunnel that was just deleted.
Impact:
Tunnel might no longer pass traffic indicating 'Incoming Discard' drops.
Workaround:
Use a different name for the tunnel.
1991297-1 : [APD][SAML-SSO]high memory due to SAML SSO leak
Links to More Info: BT1991297
Component: Access Policy Manager
Symptoms:
Tmm crashes due to out of memory while passing SAML-SSO traffic
Conditions:
SAML SSO configured with saml artifact sign.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
1989125-1 : TSval value of Ack packets sent by BIG-IP may roll back in time
Links to More Info: BT1989125
Component: Local Traffic Manager
Symptoms:
After BIG-IP replies to a SYN-ACK with one value of TSval in TCP timestamp, the next packet sent by BIG-IP might have a TSval that is behind. This results in some clients resetting the connection or timing out.
Conditions:
The syncookie mode protection has been activated due to a SYN flood.
Impact:
Connectivity issue
Workaround:
None
1989033-2 : IPsec IKEv2 tunnel may fail to initiate or respond due to ERR_PORT
Links to More Info: BT1989033
Component: TMOS
Symptoms:
In very rare circumstances the BIG-IP may fail to initiate or respond to an IKEv2 tunnel.
When debug2 is enabled, the following log messages in the tmm log indicates a potential match for this bug. ERR_PORT is a critical indicator of the failure condition.
<13> <date> <hostname> notice ike_connect/3154: @F: ike flow created 172.16.61.100:172.16.61.200 rd: 0 owner=0.2 me=0.2
<13> <date> <hostname> notice ike_connect/3218: @F: ISAKMP_CONN local=172.16.61.100:500 remote=172.16.61.200:500
<13> <date> <hostname> notice ike_proxy_connect/1510: @E: flow_connect() ERR ERR_PORT
<13> <date> <hostname> notice ike_connect/3241: @E: ERR ERR_PORT
<13> <date> <hostname> notice pfkey_isakmp_reconnect/5231: @E: can't create isakmp flow to 172.16.61.100:500 172.16.61.200:500 %0, err ERR_PORT.
<13> <date> <hostname> notice pfkey_isakmp_reconnect/5241: @E: ERR ERR_PORT
The ipsec.log will contain different messages.
ipsec.log - BIG-IP attempts to start the connection, the INTERNAL_ERR is a critical indicator:
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: rcf_remote_cite: (remote why='@B:deepcopy:MAKE' me=0x4000c6cbaa08#4035 pa=2643 name='/Common/<ike peer name>' ip='<remote IP>[500]')
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INTERNAL_ERR]: ikev2_allocate_sa: ERR Invalid BIG-IP flow context for <local IP>[500]-><remote IP>[500] peer='/Common/<ike peer name>'
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_allocate_sa: @A: Insert ike_sa 0x4000c7aa2c88, SPI 1c96e4465b82fc39 0000000000000000 in list (peer='/Common/<ike peer name>')
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_state_transition: [ikev2_dh_generate] @I:ike_sa 0x4000c7aa2c88 SPI=1c96e4465b82fc39 0000000000000000 state IDLING -> DH_REQ
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_state_transition: [ikev2_dh_generate_callback] @I:ike_sa 0x4000c7aa2c88 SPI=1c96e4465b82fc39 0000000000000000 state DH_REQ -> DH_DONE
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_next_request_id: @A: send message (id 0) sa=0x4000c7aa2c88 (loc=<local IP>[500] rem=<remote IP>[500])
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_state_transition: [ikev2_set_state] @I:ike_sa 0x4000c7aa2c88 SPI=1c96e4465b82fc39 0000000000000000 state DH_DONE -> INI_IKE_SA_INIT_SENT
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] (req at='@M:PUSH:ikev2_send_request' SPI='1c96e4465b82fc39 0000000000000000' gen=0x1 MID=0 pkt=0x4000c7ec9558)
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] (payloads dir=SEND at=ikev2_send_request payl=0x4000c442ca88 len=432 crc=0x47699687
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] @ . (v2_head i_spi=0x1c96e4465b82fc39 r_spi=0x0000000000000000 next=33:PAYLOAD_SA
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] @ . . . ver=0x20 exch=34:IKE_SA_INIT flags=0x8:I-Q id=0 len=432 crc=0x47699687)
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] @ . (hd type=33:PAYLOAD_SA next=34:PAYLOAD_KE byte=0 len=48 off=0x1c)
...
ipsec.log - BIG-IP retransmits a few more times:
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_retransmit: @M: retransmit 0x4000c7d77b78 pkt 0x4000c7ec9558 msg_id=0 req 0x4000c7d77b08 SPI 1c96e4465b82fc39 0000000000000000 count 0
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_retransmit: @M: retransmit 0x4000c7d77b78 pkt 0x4000c7ec9558 msg_id=0 req 0x4000c7d77b08 SPI 1c96e4465b82fc39 0000000000000000 count 1
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_retransmit: @M: retransmit 0x4000c7d77b78 pkt 0x4000c7ec9558 msg_id=0 req 0x4000c7d77b08 SPI 1c96e4465b82fc39 0000000000000000 count 2
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_retransmit: @M: retransmit 0x4000c7d77b78 pkt 0x4000c7ec9558 msg_id=0 req 0x4000c7d77b08 SPI 1c96e4465b82fc39 0000000000000000 count 3
ipsec.log - BIG-IP cancels the negotiation after a timeout:
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_negotiation_timeout_callback: ikev2_negotiation_timeout_callback1 ike_sa rmconf : 3335236104
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_negotiation_timeout_callback: ikev2_negotiation_timeout_callback2 rmconf ikev2 : 3343372872
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_negotiation_timeout_callback: ikev2_negotiation_timeout_callback3 ikev2 plog : 0
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_negotiation_timeout_callback: negotiation timeout: ike_sa (ick=0x1c96e4465b82fc39, rck=0x0000000000000000)
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [PROTO_ERR]: __ikev2_abort: ike_sa=0x4000c7aa2c88 ABORT, ERR errno='110', SPI 1c96e4465b82fc39 0000000000000000
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_state_transition: [ikev2_set_state] @I:ike_sa 0x4000c7aa2c88 SPI=1c96e4465b82fc39 0000000000000000 state INI_IKE_SA_INIT_SENT -> DYING
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] (req at='@M:POP:ikev2_cancel_retransmit_req' SPI='1c96e4465b82fc39 0000000000000000' gen=0x1 MID=0 pkt=0x4000c7ec9558)
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_state_transition: [ikev2_set_state] @I:ike_sa 0x4000c7aa2c88 SPI=1c96e4465b82fc39 0000000000000000 state DYING -> DEAD
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_ha_send_sa_delete: high availability (HA) SA is already deleted from Session DB
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: rcf_remote_cite: (remote why='@B:clean:FREE' me=0x4000c6cbaa08#4035 pa=2643 name='/Common/<ike peer name>' ip='<remote IP>[500]')
Conditions:
-- IPsec IKEv2
-- Tunnel may be newly configured
-- BIG-IP does not transmit or respond to any packets related to the configured tunnel.
Impact:
When this occurs, the tunnel will be down permanently.
Workaround:
If this is a High Availability (HA) peer and the config is sync'd with the Standby, failing over to the Standby may bring the tunnel up.
However, a second failover (fail back to the original high availability (HA) device) will lead to the tunnel down again. The original device once Active again, is still in the same failure mode.
One workaround is to failover, check the tunnel is up and then reboot or 'bigstart restart' the failing Standby device.
After that, the IKE SA should appear correctly mirrored on the Standby, use 'tmsh show net ipsec ike-sa' and check there is an SA with the peer's IP.
The second workaround is to delete all IPsec config objects, self IP and route-domain associated with the tunnel. In the case where the IPsec config, self IPs and routes exist entirely in route-domain 0 this is not a reasonable solution and rebooting is the most sensible recovery step.
1988981-2 : TMM crashes after detaching and reattaching a DoS profile on the DNS virtual server
Links to More Info: BT1988981
Component: Local Traffic Manager
Symptoms:
-- TMM stops functioning and crashes.
-- A core dump file is generated on the system.
Conditions:
During an ongoing DDoS attack, the DoS profile associated with a virtual server is detached, modified, and then reattached.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Avoid detaching, modifying, or reattaching the DoS profile to the virtual server while the BIG-IP is actively detecting or mitigating a DDoS attack, if possible.
1983209-2 : Zone does not sync correctly when record is modified
Links to More Info: BT1983209
Component: Global Traffic Manager (DNS)
Symptoms:
BIND zones do not synchronize properly across devices in a sync group when the synchronization involves a large configuration.
Conditions:
BIG-IP GTM sync setup with a large BIND configuration
Modification of resource records in BIND zones
Impact:
The zone synchronization issue causes BIG-IP to serve outdated or stale DNS data.
1983145-1 : Memory Corruption due to xnet-DPDK★
Links to More Info: BT1983145
Component: TMOS
Symptoms:
TMM crashes due to data corruption caused by xnet-DPDK. This can occur after upgrading from version 17.5.0 to version 17.5.1.
Conditions:
1) Using xnet-DPDK driver
2) DPDK v20.11 is being used (BIG-IP v17.5.x or higher)
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
1983029-2 : IPS Upgrade: err mcpd[5374]: 01070734:3: Configuration error: DB validation exception, unique constraint violation on table★
Links to More Info: BT1983029
Component: Protocol Inspection
Symptoms:
Err mcpd[5374]: 01070734:3: Configuration error: DB validation exception, unique constraint violation on table (ips_inspection_sig) object ID (/Common/linux_kernel_messenger_v2_c_segment_length_signedness_error_cve_2023_44466_1). A duplicate value was received for a non-primary key unique index field. DB exception text (Cannot update_indexes/checkpoint DB object, class:ips_inspection_sig status:13)
Conditions:
Upgrade bigip15.1.x to 17.1.x, the AFM Protocol Security was installed with PI update file pi_updates_15.1.0-20230301.1045.im
Impact:
IM package installation fails.
Workaround:
This is not a workaround, but rather a cautionary note to consider before performing an upgrade.
1. Deploy a newer version of PI update file prior to the upgrade
Ex: pi_updates_15.1.0-20230301.1045.im to pi_updates_15.1.0-20250324.1115 or Latest.
2. Then proceed with an upgrade to v17.1.2.1.
Workaround - 2
==========
1. Create ucs
2. Modify bigip.conf file in ucs using https://my.f5.com/manage/s/article/K13830181
3. Remove below signature's lines >> Re-packaged as ucs
microsoft_windows_dns_server_integer_overflow_1
4. Load sys config default
4. Load the modified ucs
5. Deploy newer IM package.
1980601-1 : Number of associated signatures for a signature-set appears zero
Links to More Info: BT1980601
Component: Application Security Manager
Symptoms:
Number of associated signatures for a signature-set appears zero in REST API and GUI.
/mgmt/tm/asm/signature-sets/{UUID} returns 'signatureCount' of which value is incorrectly shown zero.
Signature set screen in the GUI shows list of signature-sets with number of signatures of each sets. This number is incorrectly displayed zero.
Security ›› Options : Application Security : Attack Signatures
This is a cosmetic issue. Signature enforcement is performed for the affected signature-set even though the number is reported as zero. By selecting an affected signature-set in the GUI, you can see the associated signatures.
Conditions:
Via REST API you sent PATCH request to the endpoint /mgmt/tm/asm/signature-sets/{UUID}
The JSON body is badly structured or you sent the same PATCH request twice.
Impact:
Number of signatures is reported as zero for an affected signature-set
Workaround:
Update the endpoint with correctly structured JSON, and change one of the attribute value.
1977037-1 : TMM Virtual Edition on Azure goes into crash loop due to missing kernel driver★
Links to More Info: K000153024, BT1977037
Component: Local Traffic Manager
Symptoms:
- TMM goes into crash loop
- Repeated logs similar to the following can be seen from /var/log/tmm*
notice dpdk[001dd800-2e3d-001d-d800-2e3d001dd800]: DPDK internal port_id 2
notice dpdk: Error: DMA mapping of application heap failed with rte_error Operation not supported
notice dpdk: Error: app_heap_dma_map: app heap DMA mapping failed with rte_errno Operation not supported
notice dpdk[001dd800-2e3d-001d-d800-2e3d001dd800]: Error: DMA mapping application heap
notice dpdk: Error: Removing heap memory (0x40016a600000, 67108864 bytes): Device or resource busy
notice xnet_lib [vmbus:eth2]: Error: Failed to initialize driver
notice xnet[00:e2.0]: Error: Unable to attach to xnet dev
notice xnet(1.2)[00:e2.0]: Error: Unable to initialize device
notice xnet(1.2)[00:e2.0]: Waiting for tmm1 to reach state 4...
notice ndal Error: Restarting TMM
Conditions:
- BIG-IP Virtual Edition is running on Microsoft HyperV on Azure Cloud
- Mellanox ConnectX-3 NIC is used
- XNET driver is being used
Impact:
TMM is unable to successfully start. Device is unable to process traffic.
Workaround:
Configure BIG-IP Virtual Edition to use the sock driver by entering the following command:
echo "device driver vendor_dev f5f5:f550 sock" >> /config/tmm_init.tcl
Reboot the BIG-IP VE instance by entering the following command:
reboot
1976925 : Device dos whitelist not working properly for DNS dos protection when BA enabled
Links to More Info: BT1976925
Component: Advanced Firewall Manager
Symptoms:
-- When VLANs are configured in the network-whitelist, TCP traffic was properly bypassed, and DOS attack alarms were not triggered.
-- DNS traffic, despite being sent from whitelisted VLANs, still trigger DOS attack alarms.
Conditions:
-- VLANs assigned to the network-whitelist.
-- Virtual wire mode (vWire) configured with the configured VLAN tags.
-- Behavioral Analysis (BA) is enabled alongside DNS A Query and DNS AAAA Query attack vectors.
Impact:
Despite being whitelisted, DNS queries (e.g., high-volume traffic) trigger DOS detection and mitigation due to improper whitelist logic handling. DNS resolution is disrupted.
Workaround:
None
1976705-1 : Threat Campaign installation fails due to timeout after an hour
Links to More Info: BT1976705
Component: Application Security Manager
Symptoms:
Threat Campaign installation fails. /var/log/tomcat/live_update_upload.log contains a timeout error:
apply_threat_campaigns|INFO|Jun 17 15:30:45.034|29563|F5::LiveUpdate::PayloadHandler::upload,,Start Threat Campaigns
apply_threat_campaigns|ERR|Jun 17 16:30:45.174|29563|F5::LiveUpdate::PayloadHandler::clean_fail,,Fail load update files: TSocket: timed out reading 1024 bytes from 127.0.0.1:9781
Conditions:
- Threat Campaign is licensed
- The larger configuration size it has, the longer the installation process takes, which can lead it reaching 1 hour and timeout
- High load to system resource can contribute as well
Impact:
Threat Campaign fails to be installed
Workaround:
# mount -o remount,rw /usr
# cp /usr/local/share/perl5/F5/ASMConfig/EasyClient.pm /usr/local/share/perl5/F5/ASMConfig/EasyClient.pm.bk
# sed -i 's/recvTimeout => 3600000,/recvTimeout => 7200000,/' /usr/local/share/perl5/F5/ASMConfig/EasyClient.pm
# mount -o remount,ro /usr
# pkill -f asm_config_server
1976689 : Memory Leak in publishing did information
Links to More Info: BT1976689
Component: TMOS
Symptoms:
There was a memory leak in publishing did information - tmm/sdaglib_did_info tmstat table.
Conditions:
This happens during normal operation whenever there's a cmp state transition.
Impact:
Sometimes, -1 npus is outputted in tmctl -d blade tmm/sdaglib_did_info.
Workaround:
None
1976557-2 : [APM][OAUTH][LOGGING]Error log needed misconfigured "audience" for apm oauth jwt-config
Links to More Info: BT1976557
Component: Access Policy Manager
Symptoms:
When "audience" for apm oauth jwt-config misconfigured, oauth scope fails with error log :
OAuth Scope: failed for jwt-provider-list '/Common/JWTProvider' , error: None of the configured JWK keys match the received JWT token, JWT Header:
This log does not provide the correct reason for failure.
Conditions:
OAuth with JWT keys configured.
1)configure wrong audience in apm oauth jwt-config
apm oauth jwt-config /Common/auto_jwt_Provider {
allowed-keys {
/Common/auto_jwk_Provider1 { }
/Common/auto_jwk_Provider2 { }
/Common/auto_jwk_Provider3 { }
}
allowed-signing-algorithms { RS256 }
audience { da21849e-b50c-4673-917f-cb11ef9a0891 } <------------wrong------------
auto-generated true
issuer <issuer_uri>
jwks-uri <jwks_uri>
}
Impact:
Logging clarity
Workaround:
None
1976429-2 : Webroot database file updates are failing to apply, preventing the creation of a new version of the database file
Links to More Info: BT1976429
Component: Traffic Classification Engine
Symptoms:
The Webroot database file version does not change because the Webroot database is partially updated and fails (even if the expectation is to update every 24 hours).
Conditions:
Webroot database file issue.
Impact:
The Webroot database is missing partial updates.
Any URL added, deleted, or updated as part of a partial update is not added to the Webroot database file.
Any security issue fixed in the Webroot database will also be absent from the database.
Workaround:
None but fix is available. Open a case and request for EHF.
1976001-1 : PEM::session TCL commands can cause cores
Links to More Info: BT1976001
Component: Policy Enforcement Manager
Symptoms:
Tmm cores, with a segmentation fault.
Conditions:
Occurs when
* PEM::session commands are used in an iRule.
* tmm is busy, and the queue_drops field in tmm/cmp stat table is not zero.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
1975945-1 : IPS signatures and compliance not loaded until the configuration is saved using tmsh save sys config
Links to More Info: BT1975945
Component: Protocol Inspection
Symptoms:
Signatures and compliances are not updated properly in bigip.conf
Conditions:
- Check the signatures and compliances count in bigip.conf
- Upgrade/downgrade IPS im package
- Check the signatures and compliances count in bigip.conf
Impact:
Updated signatures are not used until the configuration is saved.
Workaround:
Manually save the configuration:
tmsh save sys config
1974845-1 : Missing routes in 1nic allows access to GUI via self IP
Links to More Info: BT1974845
Component: TMOS
Symptoms:
Can connect to GUI via self IP(s) when this should not be allowed.
Conditions:
1) BIG-IP VE using 1nic
Impact:
Able to connect to GUI from a location that should not be able to do normally
Workaround:
Manually add or reload the missing route
> list sys management-route
sys management-route default {
gateway 10.155.255.254
network default
}
1974837-1 : MAIN|EROR|dosl7_hold_message:1004|trying to hold message already held
Links to More Info: BT1974837
Component: Application Security Manager
Symptoms:
Error log messages appear /var/log/tmm:
tmm log "MAIN|EROR|dosl7_hold_message:1004|trying to hold message already held"
Conditions:
-- Bot defense profile is attached to a virtual server
-- A request is sent with a trusted bot signature and requires a rDNS.
-- During the verification, the connection is closed.
Impact:
Errors in logs.
Workaround:
None.
1972541-1 : Tmsh load sys config verify leaks compiled ltm (CPM) policies
Links to More Info: BT1972541
Component: Local Traffic Manager
Symptoms:
When LTM (CPM) policies are in use on virtual servers and 'tmsh load sys config verify' is used, memory in /dev/shm is leaked each time the verify command is used.
With multiple uses and many virtual servers with policies this could lead to the BIG-IP system having low memory and suffering from low memory symptoms (see impact).
df -h may show /dev/shm/ having abnormally high use.
cat /proc/meminfo may show abnormally high shmem, and low memory indicated by low MemAvailable. These statistics are also available in qkviews loaded on iHealth.
Conditions:
-- LTM (CPM) policy attached to one or more virtual servers
-- Use of 'tmsh load sys config verify'
Impact:
The amount of shared memory leaked at each use of 'tmsh load sys config verify' is typically:
Number of virtual servers with attached policies * 4KB.
Very large or complex policies may be a multiple of 4KB.
The number of compiled LTM policies in shared memory is:
ls -1 /dev/shm | grep loipc_vs_ | wc -l
There should be one for each virtual server with LTM policies.
Low memory symptoms can include:
- sluggishness to loss of contact when managed via GUI (web interface) or tmsh/bash over ssh
- poor process scheduling which may lead to daemons being aborted by software watchdog leading to production of core files.
- oom killer activity, where processes are terminated by kernel to free memory as an emergency measure
- loss of service
- reboot if symptoms develop fully into protracted thrashing
Workaround:
Reboot of the system will clear the leaked memory.
1972465-1 : LTM Syncookie always SW mode for a wildcard virtual server
Links to More Info: BT1972465
Component: TMOS
Symptoms:
LTM Syncookie mode is stuck in software only for a virtual server.
Conditions:
- LTM provisioned, no AFM
- Two identical virtual servers listening on different VLANs
- SYN flood on both virtuals
Impact:
One virtual server is in hardware SYN cookie mode, the other is in software SYN cookie mode.
Workaround:
tmsh modify sys db pvasyncookies.preferhwlmode value true
reboot
1972321-2 : "IP Reputation" option does not show up when creating a rule in LTM policy
Links to More Info: BT1972321
Component: TMOS
Symptoms:
The dropdown menu does not contain the option "IP Reputation" when creating a rule in LTM policy from the GUI.
Conditions:
License shows "IPI" as the active module instead of "IP Intelligence".
Impact:
The user is unable to select "IP Reputation" when creating a rule in an LTM policy from the GUI.
Workaround:
The rule can still be created through tmsh.
create ltm policy Drafts/test rules add { rule1 { conditions add { 0 { iprep all client-accepted values { "Spam Sources" } } } } }
1972273-2 : [F5OS tenant] Adjusting VLAN mtu (or description) throws MCP validation error VLAN /Common/vlan has an id of X, and customer-tag of none and it cannot be used by VLAN /Common/vlan
Links to More Info: BT1972273
Component: TMOS
Symptoms:
Attempting to adjust the MTUs (or any other attribute) of VLANs in a virtual-wire on an F5OS tenant fails with an error message:
VLAN /Common/vlan has an id of X, and customer-tag of none, so it cannot be used by VLAN /Common/vlan
With both VLAN objects mentioned being the same VLAN.
Conditions:
Virtual-wire configuration on F5OS tenant.
Impact:
Unable to operationally manage device and add descriptions or adjust MTUs in virtual-wire configurations on the tenant due to MCPD validation.
Workaround:
Save the configuration, edit bigip_base.conf and add a "mtu <value>" in each of the VLANs, and then load the configuration.
1971909-1 : TMM SIGFPE "master shouldn't receive a CMP nexthop" after Clusterd seeing 1 of 2 blades down
Links to More Info: BT1971909
Component: Service Provider
Symptoms:
Tmm crashes while passing traffic. The stack trace has an error "master shouldn't receive a CMP nexthop".
/var/log/ltm contains an error
err clusterd[9555]: 013a0004:3: Local slot 1: not getting clusterd pkts from slot 2; timed out on mgmt_bp after 10 seconds. Marking peer slot 2 SS_FAILED
err clusterd[9555]: 013a0014:3: Blade 1: blade 2 FAILED
Conditions:
-- BIG-IP running as a tenant on VELOS
-- The VELOS system is running a version that fixes ID 1556173 and 1559525
https://cdn.f5.com/product/bugtracker/ID1556173.html
https://cdn.f5.com/product/bugtracker/ID1559525.html
Impact:
Traffic disrupted while tmm restarts.
Workaround:
The workaround for this core not to happen is to upgrade to F5OS-C-1.6.2-37604.EHF-8.
1971641 : CGNAT PBA: Negative or incorrect "Active Port Blocks" statistics displayed in fw_lsn_pool_pba_stat
Links to More Info: BT1971641
Component: Carrier-Grade NAT
Symptoms:
Tmctl fw_lsn_pool_pba_stat shows an incorrect negative value for active_port_blocks (for example, -320268).
port_block_deallocations exceeds port_block_allocations, causing active_port_blocks (derived as allocations − deallocations) to go negative.
Other counters (for example, active_clients_reached_limit) may appear inconsistent with actual usage.
Behaviour indicates data plane/NAT functionality is unaffected; the issue is limited to statistics/visibility.
Conditions:
NAT configuration using CGNAT Port Block Allocation (PBA) with:
PAT mode: pba
Mapping: address-pooling-paired
Port-block parameters (example):
block-size 256
client-block-limit 3
block-idle-timeout 120
block-lifetime 86400
Observed in environments with very high port block churn (hundreds of millions of allocations and deallocations).
Impact:
The active_port_blocks counter does not reflect the actual number of active port blocks and may display negative values.
This is a stats/visibility issue only; traffic translation and NAT functionality continue to work as expected.
May cause operational confusion or misreporting in monitoring/automation systems relying on this counter.
Workaround:
None
1970969-1 : Stale Record Answers counter increments for SERVFAIL responses from DNS resolver cache
Links to More Info: BT1970969
Component: Global Traffic Manager (DNS)
Symptoms:
Stale Record Answers counter increments incorrectly when no stale record is served and a SERVFAIL is sent.
Conditions:
-- Configure DNS cache resolver with a forwarder.
-- Make sure forwarder does not respond to DNS queries.
-- Enable 'ltm dns cache global-settings serve-expired'
-- Send a few DNS requests to DNS cache for a record which is to be handled by not responding forwarder.
-- Observe 'Stale Record Answers' counter for DNS cache.
Impact:
Leads to incorrect Stale Record Answers stat, potentially misleading monitoring, troubleshooting, and operational decisions.
Workaround:
None
1970193-2 : Case WAF policy IP address exception list on GUI: Missing Route Domain ID in the IP address
Links to More Info: BT1970193
Component: Application Security Manager
Symptoms:
WAF policy misses route domain ID in IP exception addresses list on the GUI.
Conditions:
Different WAF policies belonging to different partitions have route domain ID associated with IP addresses.
Impact:
Cosmetic, route domain ID not available in IP address exception list on GUI.
Workaround:
None
1969945-2 : Stats_rate changes along with Detection Threshold for NXDOMAIN DoS vector
Links to More Info: BT1969945
Component: Advanced Firewall Manager
Symptoms:
Lowering the threshold reduces the stats_rate, and increasing the threshold increases the stats_rate.
Conditions:
The detection threshold for the NXDOMAIN Query vector is modified (e.g., from 2000 to 200 or vice versa).
Constant DNS traffic is being generated and sent to the BIG-IP device (e.g., using dnsperf)
Impact:
Inaccurate stats_rate values for the NXDOMAIN Query vector
Workaround:
None
1969889 : Expired certificates sent to clients by tmm due to network time synchronization
Links to More Info: BT1969889
Component: Local Traffic Manager
Symptoms:
Clients are receiving certificates that are expired or invalid, leading to SSL handshake failures accompanied by security warnings.
Conditions:
-- A virtual server configured with ClientSSL and ServerSSL profiles, both having SSL forward proxy enabled, experiences a change in system time (time advanced) due to a network glitch or issue.
Impact:
Clients receiving expired/invalid certificates causes traffic disruption.
Workaround:
From TMSH, Running the following command will delete the cached certificates associated with the specified virtual server and client SSL profile.
(tmos)# delete ltm clientssl-proxy cached-certs virtual <name> clientssl-profile <name>
1969873-2 : IP reputation status is only available on primary blade
Links to More Info: BT1969873
Component: TMOS
Symptoms:
When executing the tmsh show sys iprep command on secondary blades in a VIPRION setup, it does not show output. However, running the same command on the primary blade shows IP reputation statistics as expected.
Secondary blades are expected to act as workers, with all reporting intended to occur on the primary blade.
Conditions:
1) The system is configured for IP reputation database downloads.
2) The tmsh show sys iprep command is executed on secondary blades where the /var/tmstat/blade/iprepd_stats file is not available.
Impact:
On secondary blades, users cannot see the iprep status
Workaround:
IP reputation status can be checked on the primary blade.
1968193-1 : Management Route name displayed incorrectly via API when the route name contains a forward slash (/)
Links to More Info: BT1968193
Component: TMOS
Symptoms:
Management route names that include a forward slash (/) are displayed incorrectly when queried through the API, showing only the netmask instead of the full name. However, the route name displays correctly when viewed using tmsh.
Conditions:
- A management route is created with a name that contains a forward slash (/), commonly seen when incorporating the network and subnet mask into the name, such as "10.10.10.0/24". Any other attempt to specify forward slash in the name will return a validation error.
- When queried via API, the name is inaccurately truncated to display only the netmask rather than the full route name.
Impact:
This issue does not affect the operational functionality of the management route. However, administrative challenges may arise due to the API returning an incomplete route name.
Workaround:
To avoid this issue, refrain from using a forward slash (/) in the name when defining a management route.
1968169-2 : [APM][CitrixIntegration]Apps do not launch unless "Accounts" is selected in Citrix Workspace App
Links to More Info: BT1968169
Component: Access Policy Manager
Symptoms:
After entering credentials, the Citrix app does not launch unless clients select the "Account" in the Citrix Workspace App "Settings".
Conditions:
-- APM and Citrix integraton
-- Accessing Citrix Workspace app
-- The client is rebooted or changes networks
Impact:
Citrix apps are not downloading.
Workaround:
Clients that are affected can log out and back in.
You can work around this on the BIG-IP system by applying an iRule which adds the header "X-Citrix-Gateway: <value>" to the server side
when HTTP_REQUEST {
if {[HTTP::header exists "X-Citrix-Gateway"]} {
set origin_header [HTTP::header value "X-Citrix-Gateway"]
} else {
set origin_header ""
}
}
when HTTP_REQUEST_SEND {
if {$origin_header ne ""} {
HTTP::header insert "X-Citrix-Gateway" $origin_header
HTTP::header insert "X-Citrix-Via" $origin_header
}
}
1967589-2 : Using tmsh to query iControl REST (tmsh list mgmt ...) commands consume an auth token and does not get removed immediately
Links to More Info: BT1967589
Component: TMOS
Symptoms:
Executing tmsh commands that interact with the REST configuration module (e.g. "tmsh list mgmt ...") consume a REST token. These tokens are not released automatically by tmsh once the command finishes executing.
Running commands like "tmsh list mgmt shared authz tokens" repeatedly can cause all 100 tokens to be consumed.
Conditions:
Execute command on terminal "tmsh list mgmt shared authz tokens"
Impact:
Once the token limit is exhausted, they will only expire after 20 minutes. If a configured token limit is reached, no users can log in until those tokens expire.
Workaround:
Workaround #1: use the REST API.
curl -sku user:password -X GET https://aa.bb.cc.dd/mgmt/shared/authz/tokens | jq .
Workaround #2:
Run the commands in an interactive tmsh session.
1967293-3 : Re-configuring BFD multihop for a BGP peer does not work reliably.
Links to More Info: BT1967293
Component: TMOS
Symptoms:
When changing the BFD multihop configuration of a BGP peer, the previously existing BFD session might not be cleared properly preventing a new session from getting established.
Conditions:
Change the BFD multihop configuration of a BGP peer.
Impact:
Unable to establish BFD session.
Workaround:
Remove the BFD completely, then apply a new config.
1967261-3 : RDP Parameter "enablerdsaadauth" when added to RDP setting causes file to be corrupted
Links to More Info: BT1967261
Component: Access Policy Manager
Symptoms:
When RDP parameter "enablerdsaadauth:i:1" is added to RDP custom settings in Remote desktop resource configuration, user is unable to access VDI resources due to signature validation failure on client.
Conditions:
1. APM VDI is configured for MSRDP
2. Custom parameter "enablerdsaadauth:i:1" is added in Remote desktop resource configuration.
Impact:
User is unable to access remote desktop using Microsoft RDP file, through APM.
Workaround:
None
1967213-2 : Active contexts accumulate while HTTP is waiting for response
Links to More Info: BT1967213
Component: Protocol Inspection
Symptoms:
Tmm crashes while processing 100-Continue.
Conditions:
This can occur while processing a 100-continue server response.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
1967005-2 : TMM crash on R2x00/R4x00 platforms
Links to More Info: BT1967005
Component: Local Traffic Manager
Symptoms:
Tmm crashes repeatedly.
Conditions:
1. BIG-IP tenant running on R2x00/R4x00 platforms.
2. More than 510 multicast MAC addresses are configured on VF MAC filters.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
If a config backup file is being loaded, remove a few entries of IPv6 address (either VIPs or Selfips) to make sure the entries does not exceed 510.
If this occurs after configuring more than 510 multicast MAC addresses, remove the configuration related to the IPv6 addresses.
1966405-2 : Changes to DNS cache resolver may cause service disruption on BIG-IP DNS v17.1.2.1★
Links to More Info: BT1966405
Component: Global Traffic Manager (DNS)
Symptoms:
All DNS PTR queries are forwarded to the configured forward zone. If any change is made to the local zones, such as adding a new local zone; the system begins responding to PTR queries with NXDOMAIN.
Conditions:
Occurs on BIG-IP DNS version 17.1.2 and above
Triggered when changes are made to local zones
Impact:
Queries respond with NXDOMAIN.
Workaround:
Restart tmm:
bigstart restart tmm
1966053-1 : MCPD memory leak in firewall
Links to More Info: BT1966053
Component: TMOS
Symptoms:
Viewing virtual server firewall policy rules leaks some memory in MCPD.
Conditions:
- BIG-IP AFM is provisioned
- Virtual server firewall policy rules are viewed, e.g. by running one of the following commands
'tmsh show security firewall policy rules { }'
Impact:
A memory leak occurs when the command is run.
Workaround:
None
1965497 : Firewall Policy is not effective when the same rule list is attached to two different firewall policies.
Links to More Info: BT1965497
Component: Advanced Firewall Manager
Symptoms:
Two Network Firewall Policies (with the same rulelist) being attached to two different VIPs are behaving differently.
Conditions:
1. Create 2 virtual servers
2. Define 1 Rule list on network firewall policy that involves "Zone" config
3. Define 2 network firewall policies and refer the Rule list that created on previous step
4. Configure each network firewall policy on each IP forward virtual
5. Check connectivity from a client. One of the virtual rejects the request.
Impact:
The firewall policy shows varied enforcement behavior on the Virtual Server.
Workaround:
Use different rules in each rule list and add for different firewall policies.
Or
In any one of the Firewall Policy add dummy rule at the end.
Or
Update the configuration on a working Virtual Server.
Ex:
a. Navigate to Local Traffic ›› Virtual Servers : Virtual Server List ›› VS
b. Toggle Network Firewall Enforcement Mode to disabled.
c. Hit update button.
d. Toggle Network Firewall Enforcement Mode back to enabled.
1965329-1 : TMM may crash when re-declaring an LTM policy with a data-group
Links to More Info: BT1965329
Component: Local Traffic Manager
Symptoms:
TMM may crash when re-declaring an LTM policy with a data-group.
Conditions:
-- AS3 declaration that has a VIP with an LTM policy that uses a data-group.
-- The policy is re-declared while there is traffic on the VIP
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Declare while no traffic is on the VIP
Use iRules instead of LTM policies to access the data-group
1965257-1 : Upgrade to 17.5.0 results in Invalid subscription request from (%localdbmgr) unknown class/struct tag (4576) error is seen in ltm log★
Links to More Info: BT1965257
Component: Access Policy Manager
Symptoms:
Error log in /var/log/ltm:
Invalid subscription request from (%localdbmgr) unknown class/struct tag (4576)
Conditions:
BIG-IP's version is 17.5.0 or greater
Impact:
This is a cosmetic issue. The logs can be safely ignored
Workaround:
None
1964933-2 : HTTP2 RST flood detection should allow for legitimate case
Links to More Info: BT1964933
Component: Local Traffic Manager
Symptoms:
In some cases, an HTTP2 client might get its TCP connection terminated.
Conditions:
Client is sending RST STREAM with error code CANCEL for example, but it is sent after the server has completed sending its data for the associated stream.
All RST STREAM are subject to RESET stream flood detection.
Impact:
Performance impact.
Workaround:
None
1962813-4 : The csyncd daemon on one or more of the cluster's secondary blades does not synchronise RRD files from the primary★
Links to More Info: BT1962813
Component: Local Traffic Manager
Symptoms:
Following a boot into a different software volume, occasionally csyncd on one or more secondary blades stops syncing most of the RRD files from the primary blade's /var/rrd/ directory to the local /var/rrd/ .
The RRD files are used to generate the graphs in the BIG-IP GUI.
Conditions:
- Cluster running one of the affected versions.
- Boot into a newly installed software volume, or into an already existing but different software volume.
- Primary blade ownership change after the boot.
Impact:
Some of the RRD files stop being synchronised from the primary blade to one or more of the secondary blades.
After a primary blade ownership change, graphing data from the other blades (up to the point when the secondary blade became primary) is unavailable in the GUI and whenever a qkview is generated.
Workaround:
Restart the statsd daemon from the primary blade with:
"bigstart restart statsd".
1962713-2 : Limit on BIND maximum records per type★
Links to More Info: BT1962713
Component: Global Traffic Manager (DNS)
Symptoms:
Zones with over 100 records of the same type trigger an error during loading after upgrading to 17.1.2 or higher release, similar to the following:
error: dns_master_load: db.external.example.f5.com.:378: record1.example.f5.com.: too many records
zoneload: error: zone example.f5.com/IN/external: loading from master file db.example.f5.com. failed: too many records
zoneload: error: zone example.f5.com/IN/external: not loaded due to errors.
Conditions:
Occurs when "max-records-per-type" in a zone exceeds the default limit of 100.
Upgrading to 17.1.2 or higher release, given the BIND version upgrade that comes along with it, especially if configured for a single GTM pool with more than 100 members or cumulative pools exceeding 100 members.
Configuration changes to "max-records-per-type" won’t be accepted prior to the upgrade given that new BIND version (9.18.28) is not yet installed.
Impact:
BIND refuses to load zones, resulting in service disruption for affected zones.
Workaround:
After upgrading to v17.1.2 or higher, increase the max-records-per-type value as required. For instructions on how to do that, follow the steps documented in this article: https://my.f5.com/manage/s/article/K000150564
1959785-2 : BIG-IP incorrectly marked as "Managed by BIG-IQ" by its BIG-IP HA peer
Links to More Info: BT1959785
Component: TMOS
Symptoms:
Managed by BIG-IQ" message on Standby BIG-IP is incorrectly displayed on the standby device that is not managed by BIG-IQ.
Conditions:
Steps to Reproduce:
- On BIG-IQ, navigate to "Devices >> BIG-IP DEVICES", only add the active BIG-IP device.
- The standby device will be marked as "Managed by BIG-IQ" on the top left corner of the GUI.
Expected Results:
When active device only managing by the BIG-IQ, standby device should not by shown as "Managed by BIG-IQ"
Impact:
The "Managed by BIG-IQ" message on Standby BIG-IP is misleading since it has not been added/managed by CM.
Workaround:
None
1959629-1 : CSR generation via the GUI removes Subject Alternative Name (SAN) string. Also, when SAN is configured with small prefix chars "dns:", no error is thrown.
Links to More Info: BT1959629
Component: Local Traffic Manager
Symptoms:
1) The GUI does not throw an error when subject alternative name is set with lower case prefix "dns:".
2) The GUI does not set SAN strings while generating CSR on GUI. (this does not occur on 17.1.2.2)
Conditions:
-- Use the GUI to create a CSR which is to be signed by other CA, setting "Subject Alternative Name (SAN)" strings with prefix "dns:" in lower case instead of "DNS:".
In this case, the CSR is generated but an error should occur.
-- Use the GUI to create a CSR with a SAN string containing the correct prefix with capitalized "DNS:".
In this case, CSR generation finishes with no error. However, looking at generated CSR, the SAN field is omitted.
Impact:
An invalid certificate is created.
Workaround:
Create the CSR via tmsh (tmsh create sys crypto csr) instead of the GUI
1958033-1 : MCPD validates only one ssl profile when a virtual server attached to http/2 profile with enforce-tls-requirements enabled along with multiple clientssl profiles with anyone has renegotiation option enabled
Links to More Info: BT1958033
Component: TMOS
Symptoms:
Configuration of HTTP/2 profile with enforce-tls-requirements enabled and a client-ssl profile with renegotiation enabled is sometimes allowed, when it should throw an error.
When 'Enforce TLS Requirements' in a HTTP/2 profile is configured on a virtual server, the 'TLS Renegotiation' option needs to be disabled in the SSL profiles on that virtual server.
But in some cases, the configuration is accepted without error even when renegotiation option is enabled on the SSL profile.
Conditions:
-- Virtual server with HTTP/2, HTTP, and client SSL profiles (any one of the profiles has renegotiation enabled).
1. Enable the 'Enforce TLS Requirements' option in the HTTP/2 profile (by default it is enabled).
2. Add multiple client SSL profile with 'TLS Renegotiation' enabled.
3. Save the configuration.
Its not throwing the error.
Impact:
Configuration of http/2 profile with enforce-tls-requirements enabled and client SSL profile with renegotiation enabled and when these profiles are added to the virtual server, a configuration error occurs:
01070734:3: Configuration error: In Virtual Server (/Common/testVS) an http2 profile with enforce-tls-requirements enabled is incompatible with client ssl profile '/Common/testssl2'; renegotiation must be disabled
Workaround:
None
1957977-2 : Auto-learned DoS Vector attack is detected even with low rate of traffic on HA Pair during Failover★
Links to More Info: BT1957977
Component: Advanced Firewall Manager
Symptoms:
After upgrading BIG-IP AFM from 15.1.8 to 17.1.2, DoS vectors (especially "Non TCP connection") are triggered and start attack detected, even though there is no actual attack or stress (CPU usage is low). The detection threshold is set to 0, causing false positives.
Conditions:
-- Upgrade from 15.1.8 to 17.1.2 (with EHF/instrumented TMM).
-- Device becomes Active after upgrade/failover.
-- AFM Device DoS vectors in Fully Auto mode.
Impact:
Logs show attack detection with thresholds at 0, despite no actual stress or attack. This leads to immediate and incorrect attack detection, causing false alarm even when there is no actual attack or system stress.
Workaround:
None
1953273-1 : Big3d high CPU with thousands of https monitors with SNI
Links to More Info: BT1953273
Component: Global Traffic Manager (DNS)
Symptoms:
Big3d high CPU utilization occurs
Conditions:
Large volume of https monitors and monitored resources with SNI configured.
Impact:
Big3d high CPU utilization
Workaround:
None
1952821-2 : WAF guided configuration shows a warning message instead list of available configurations★
Links to More Info: BT1952821
Component: Application Security Manager
Symptoms:
A warning message "Your BIG-IP version does not support the selected category of configuration templates. Please upgrade your BIG-IP system to configure them." Instead, the configurations list (categories) is available.
Conditions:
There is a mismatch versions between the Guided Configuration installed and the BIG-IP.
Impact:
You cannot choose any of the guided configuration categories that otherwise would be available.
Workaround:
Uninstall all iApps packages and return to Guided Configuration, allowing BIG-IP to reinstall the default packages as part of the GC release package. Alternatively, the "Upgrade Guided Configuration" option can be used to upload and install a newer version of GC. Since iApps packages are bundled within a GC release, these methods ensure compatibility and eliminate version mismatch problems.
1943669 : "Automatic Update Check & Automatic Phone Home features" settings is changed upon running 'load sys config current-partition' in other partition
Links to More Info: BT1943669
Component: TMOS
Symptoms:
'auto-check' and 'auto-phonehome' configurations are not updated on non-Common partitions.
Conditions:
1. Disable "auto-check" and "auto-phonehome"
2. Save the config
3. Check "auto-check" and "auto-phonehome" status.
4. Switch to non-Common partition.
5. Load the current config
6. Check the "auto-check" and "auto-phonehome"
7. Switch back to common partition and check the status.
Impact:
These features could be enabled if you load the configuration on the non-Common partitions.
Workaround:
Disable 'auto-check' and 'auto-phonehome' again after switching back to the Common partition.
1943593-2 : Inconsistent DoS Attack Status between tmctl/event logs and GUI
Links to More Info: BT1943593
Component: Advanced Firewall Manager
Symptoms:
GUI shows "Not Detected / Forwarded" for PPS even though tmctl reports detection.
Conditions:
PPS rate fluctuates around the threshold, often staying below it.
Impact:
Detection is triggered internally (tmctl), but not reflected in the GUI; this may mislead operators monitoring attacks via the GUI.
Workaround:
None
1943257-1 : HTTP monitor "last error" string sends incorrect response
Links to More Info: BT1943257
Component: Local Traffic Manager
Symptoms:
When a recv string is used with an HTTP/HTTP2 monitor, the HTTP status code is collected and in the event of failure, the most recent value (from before the failure) is retrieved and used as part of the log output. This can result in a message that is misleading.
Conditions:
- The BIG-IP system configured to monitor an HTTP/HTTP2 server.
Impact:
Generates a misleading log messages, difficulty in identifying the actual cause of the monitor failure.
notice mcpd[8371]: 01070638:5: Pool /Common/http-pool member /Common/172.16.1.87:80 monitor status down. [ /Common/my-http-monitor: down; last error: /Common/my-http-monitor: Response Code: 200 (OK) @2025/05/12 07:30:25. ] [ was up for 0hr:0min:46sec ]
Workaround:
None
1938345 : F5 on AWS : Unable to Launch F5 BIG-IP instance with latest firmware 17.5.0 in AWS★
Links to More Info: BT1938345
Component: TMOS
Symptoms:
BIG-IP AWS instance using AMI image for 17.5.0 intermittently fails to complete onboarding, specifically for one particular flavour of image - F5 BIGIP-17.5.0-0.0.15 PAYG-Best Plus 1Gbps.
Conditions:
When rapid BIG-IP instance ami is deployed on AWS. Specially F5 BIGIP-17.5.0-0.0.15 PAYG-Best Plus 1Gbps AMI.
Impact:
Intermittently the instance completes deployment but without network configuration such as vlans, self IPs and routes
Workaround:
The issue is resolved on the next DHCP lease update
1938101-1 : Performance issue on specific parameters extractions
Links to More Info: BT1938101
Component: Application Security Manager
Symptoms:
Performance degradation on specific pages
Conditions:
When there are dynamic parameters extractions using HTML
Impact:
Slowdown of the extraction page load time
Workaround:
None
1938085-1 : Performance issue on specific parameters extractions
Component: Application Security Manager
Symptoms:
Performance degradation on specific pages
Conditions:
When there are dynamic parameters extractions using HTML
Impact:
Slowdown of the extraction page load time
Workaround:
None
1937717-1 : AVR increases the Content-Length header but fails to inject the CSPM script into the payload
Links to More Info: BT1937717
Component: Application Visibility and Reporting
Symptoms:
Under certain conditions, AVR will change the Content-Length header (to account for CSPM script injection) but then will not inject the actual CSPM script onto the HTTP payload
Conditions:
- Option "collect-page-load-time" is enabled in the AVR profile
- Sys db key "avr.cspm.inject.location" is set to a value of "after_head"
Impact:
Client can stall waiting for the remaining payload which never arrives
Workaround:
Do at least one of the following things:
- On the HTTP profile, set option "response-chunking" to "rechunk"
- Set sys db key "avr.cspm.inject.location" to "at_the_end"
- On the AVR profile, disable option "collect-page-load-time"
1937589-1 : LTM v17.x f5-irule.crt is valid only until Jul 2027
Links to More Info: BT1937589
Component: Local Traffic Manager
Symptoms:
The nodejs services using default f5-irule.crt certificate request template gets validity upto jul 2027 and may fail to work after July 2027.
Haven't provided any access to use these certificates in other Node.js services, although they could logically be used.
Conditions:
BIG-IP software version 17.x using nodeJS/iRules beyond July 2027 without modifying f5-irule.crt validity period.
Impact:
NodeJS/iRules services using unmodified f5-irule.crt fails to work after July 2027.
Workaround:
None
1937545-1 : Disabling ipsec.if.checkpolicy lead to premature connection termination for a tunneled traffic
Links to More Info: BT1937545
Component: TMOS
Symptoms:
Connections arriving at the BIG-IP over an IPsec tunnel may be unexpectedly closed when ipsec.if.checkpolicy is disabled and the Virtual Server uses SNAT.
Conditions:
- BIG-IP with more than 1 TMM.
- IPsec tunnel in Interface mode.
- FastL4 Virtual Server with SNAT.
- sys db ipsec.if.checkpolicy is disabled.
- Traffic is initiated from behind the remote peer and uses auto lasthop to return traffic, ie there is no routing for the protected traffic back towards the client.
Impact:
Connections arriving via IPsec are unexpectedly and prematurely closed.
Workaround:
The sys db ipsec.if.checkpolicy is enabled by default.
Do not disable ipsec.if.checkpolicy when SNAT is on the Virtual Server that handles traffic for an IPsec tunnel.
1936469-1 : Multiple Ctrl-Alt-Delete signals in virtual console reboots BIG-IP Virtual Edition
Links to More Info: BT1936469
Component: TMOS
Symptoms:
A device reboot occurs when pressing Ctrl-Alt-Del multiple times in rapid succession.
Conditions:
This occurs when pressing Ctrl-Alt-Del or sending the command to a BIG-IP Virtual Edition (VE) virtual console more than 7 times within 2 seconds.
Impact:
Accidental or unauthorized reboots of the BIG-IP instance are possible.
Workaround:
None
1935713-2 : TMM crash when handling traffic over vlangroup with autolasthop disabled
Links to More Info: BT1935713
Component: Local Traffic Manager
Symptoms:
In certain circumstances, TMM may crash when handling traffic over a vlangroup with autolasthop disabled.
Conditions:
- Vlangroup.
- No self-IP addresses configured.
- Autolasthop is disabled.
Impact:
Traffic is disrupted while restarting TMM.
Workaround:
Enable autolasthop.
1934941-3 : Assertion failure in aspath_intern for BGPD.
Links to More Info: BT1934941
Component: TMOS
Symptoms:
Assertion failure in BGPD
Conditions:
BGP routing configured, enabled
Impact:
Assertion failure
Workaround:
None
1934845-1 : Transparent proxy loses APM session variables in SSL Orchestrator service
Links to More Info: BT1934845
Component: SSL Orchestrator
Symptoms:
Cannot access session variables
Conditions:
SSL Orchestrator Transparent Proxy configuration
Impact:
Unable to access session variables with Transparent Proxy
Workaround:
Attach a dummy swg_transparent
1934457-4 : Cursor in BIG-IP Configuration Utility iRule editor appears in the incorrect position
Links to More Info: BT1934457
Component: TMOS
Symptoms:
The cusrsor is at the incorrect position when using BIG-IP Configuration Utility iRule editor for long lines with unwrapped text.
Conditions:
1. Edge or Chrome on Windows
2. Zoom is set at 100%
3. "Wrap Text", "Show Print Margin", and "Ignore Signature/Checksum" are unchecked
4. For a long line in the editor, the cursor would appear in the wrong position.
Impact:
Editing the iRule becomes inconvenient and prone to errors.
Workaround:
Set the zoom in the browsers at 125%
1934373-2 : DoS attack is blocking while transparent
Links to More Info: BT1934373
Component: Application Security Manager
Symptoms:
A DoS attack is blocking while configured as transparent.
The blocking is only by resets
Conditions:
A transparent volumetric dosl7 and web acceleration profile are configured on the same virtual
Impact:
Blocking even though the configuration is transparent.
Workaround:
tmsh modify sys db dosl7d.static_uri_protection value disable
1934157-2 : Http2 monitor fails if a pool is used for routing to pool members
Links to More Info: BT1934157
Component: Local Traffic Manager
Symptoms:
Http2 monitoring reports all pool members as down
Conditions:
The TCP connection to the pool members are sent to the gateway instead of the pool members
Impact:
Http2 monitoring not possible
Workaround:
Use tcp monitoring or https if possible and acceptable.
1933965-2 : Unable to associate multiple cert/keys of different types to Certificate Key Chain via TMSH
Links to More Info: BT1933965
Component: Local Traffic Manager
Symptoms:
Below error is thrown when assigning RSA cert/key followed by ECDSA cert/key with below command
tmsh create ltm profile client-ssl /path/_ssl_server cert-key-chain replace-all-with {
_cert_rsa_0 {
cert /path/_cert_rsa.crt
key /path/_cert_rsa.key
chain none
usage SERVER
}
_cert_ecdsa_0 {
cert /path/_cert_ecdsa.crt
key /path/_cert_ecdsa.key
chain none
usage SERVER
}
}
Error:
010717e1:3: Client SSL profile (/path/_ssl_server): cannot contain more than one set of same certificate/key type.
Conditions:
Assigning RSA cert/key followed by ECDSA cert/key
Impact:
Unable to create the client SSL profile
Workaround:
Workaround 1: change the certificate chain order so the ECDSA cert/key occurs before the RSA cert/key.
tmsh create ltm profile client-ssl /path/_ssl_server cert-key-chain replace-all-with \{ _cert_ecdsa_0 \{ cert /path/_cert_ecdsa.crt key /path/_cert_ecdsa.key chain none usage SERVER \} _cert_rsa_0 \{ cert /path/_cert_rsa.crt key /path/_cert_rsa.key chain none usage SERVER \} \}
tmsh list ltm profile client-ssl /path/_ssl_server
ltm profile client-ssl /path/_ssl_server {
app-service none
cert-key-chain {
_cert_ecdsa_0 {
cert /path/_cert_ecdsa.crt
key /path/_cert_ecdsa.key
}
_cert_rsa_0 {
cert /path/_cert_rsa.crt
key /path/_cert_rsa.key
}
}
inherit-ca-certkeychain true
inherit-certkeychain false
}
Workaround #2: Create a Client SSL and associate only 1 RSA cert/key. Thereafter, associate the next set of ECDSA cert/key to the same Client SSL profile.
1) Create SSL profile and associate only the RSA cert/key to Certificate Key Chain.
# tmsh create ltm profile client-ssl /path/_ssl_server cert-key-chain replace-all-with \{ _cert_rsa_0 \{ cert /path/_cert_rsa.crt key /path/_cert_rsa.key chain none usage SERVER \} \}
2) Associate existing ECDSA cert/key to Certificate Key Chain of the above SSL Profile
#tmsh modify ltm profile client-ssl /path/_ssl_server cert-key-chain add {_cert_ecdsa_0 { cert /path/_cert_ecdsa.crt key /path/_cert_ecdsa.key chain none usage SERVER }}
tmsh list ltm profile client-ssl /path/_ssl_server
ltm profile client-ssl /path/_ssl_server {
app-service none
cert-key-chain {
_cert_ecdsa_0 {
cert /path/_cert_ecdsa.crt
key /path/_cert_ecdsa.key
}
_cert_rsa_0 {
cert /path/_cert_rsa.crt
key /path/_cert_rsa.key
}
}
inherit-ca-certkeychain true
inherit-certkeychain false
}
1933373-3 : Newly added Threat Campaigns are missing REST ID
Links to More Info: BT1933373
Component: Application Security Manager
Symptoms:
Newly created UTF-8 policies have an empty value for the REST ID (rest_uuid) in some or all Policy Threat Campaigns.
Conditions:
- Create a new UTF-8 policy using BIG-IP with no Threat Campaign license.
- License the Threat Campaign functionality.
- Create a second UTF-8 policy with the Threat Campaign enabled.
Impact:
Newly added Threat Campaigns are missing the REST ID.
Workaround:
- After license Threat Campaigns, the cached binary policy templates must be cleared to ensure newly created policies use updated templates reflecting the licensed Threat Campaign functionality.
Remove cached binary policy templates by running:
rm /var/ts/install/policy_templates/*.bin
- Threat Campaigns in new UTF-8 policy should have REST IDs.
1933105-3 : TMM does not fragment the output before encapsulating the payload
Links to More Info: BT1933105
Component: TMOS
Symptoms:
Tmm does not fragment the traffic before it goes to encapsulation
Conditions:
- IPSec
-- Tmm receives fragmented payload
Impact:
Large packets are not fragmented on egress.
Workaround:
None
1933061-1 : Changing "bot category" of an user-defined bot-signature should be validated and denied when the change is not appropriate
Links to More Info: BT1933061
Component: Application Security Manager
Symptoms:
Disallowed configuration gets accepted. Subsequent full configuration load fail and unit remains offline.
Conditions:
A user-defined bot is configured under bot-signature
AND the bot is configured for mitigation exception
Then, bot category of the bot gets updated and new category is one of the categories that is under Unknown/Browser/Mobile Application class
After above operation are performed, subsequent config full load fails.
Impact:
Configuration load fail and unit remains offline.
Workaround:
- Do not perform the operation described in Conditions section
- If it has been performed but your unit is still online, use GUI or TMSH to revert the change of bot category
- If it has been performed and config load has failed and unit is offline state, manually revert the change of bot category as below
e.g:
MyBot was configured in mitigation exception. Bot category of MyBot was updated to be "Mobile App without SDK" that should not be accepted, but accepted due to this bug.
Manually modify /config/bigip.conf
// Before manual modification
security bot-defense signature /Common/MyBot {
category "/Common/Mobile App without SDK"
risk na
user-agent {
search-string MyBot
}
}
// After manual modification
security bot-defense signature /Common/MyBot {
category "/Common/Search Bot"
risk na
user-agent {
search-string MyBot
}
}
Save the change then
# bigstart restart
If this does not reflect the manual modification, perform force mcpd reload.
# rm -f /var/db/mcpdb.* ; touch /service/mcpd/forceload
# bigstart restart
1932965-1 : AVRD may crash at startup due to non-thread-safe version of BOOST json Spirit parser
Links to More Info: BT1932965
Component: Application Visibility and Reporting
Symptoms:
Avrd crashes while processing JSON
Conditions:
AVRD utilizes the BOOST Spirit-based JSON parser to parse JSON documents
Impact:
AVRD might crash impacting application performance and traffic analytics may stop being collected or processed while avrd restarts.
Workaround:
None
1932161-3 : PEM iRule usage memory leak
Links to More Info: BT1932161
Component: Policy Enforcement Manager
Symptoms:
When using PEM iRules there is a chance of a memory leak
Conditions:
Using PEM iRules
Impact:
TMM memory leak
Workaround:
None
1930897-1 : Tmm core due to overflow of ifc ref counts with flow forwarding
Links to More Info: BT1930897
Component: Local Traffic Manager
Symptoms:
Tmm crashes when passing high amounts of traffic.
Conditions:
Flow forwarding rejected when accepting flows due to high volume of packets that exhausts connection limit and overflows the ifc ref count.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
1930841-1 : Tmsh show sys conn virtual-server may report an incomplete set of flows after a virtual server modification
Links to More Info: BT1930841
Component: Local Traffic Manager
Symptoms:
After modifying a virtual server, 'tmsh show sys connection virtual <virtual-server-name>' may not report connections already existing when the change occurred.
Conditions:
Use the command "tmsh show sys connection virtual <virtual-server-name>".
Impact:
The complete set of connections for the virtual server may not be reported.
Workaround:
Use 'tmsh show sys connection cs-server-addr' (or other selection criteria) instead.
1929045-3 : TMM may core after HTTP::respond used for first request on iSession connection
Links to More Info: BT1929045
Component: Local Traffic Manager
Symptoms:
TMM crashes while establishing an iSession tunnel.
Conditions:
- APM configured
- Tunnel being established
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
1928437-5 : False traffic spikes in Throughput graphs
Links to More Info: BT1928437
Component: Local Traffic Manager
Symptoms:
Traffic spikes are observed in the TMM Client-side Throughput Client In and the Throughput Service graphs, but there is no actual traffic that accounts for them.
There is also record of this in the Sys::Global Traffic ClientSide Traffic Bits In and Packets In.
Conditions:
The BIG-IP frequently receives bursts of traffic for a new flow. Some examples:
- Several packets arrive for a new UDP flow.
- Several packets arrive for a non-existent TCP flow
Over time, the traffic counts build up and might all be accounted for at once resulting in a spike in the graphs.
Impact:
The issue is cosmetic, but might cause concern when reviewing the performance graphs.
Workaround:
None
1928169-1 : HTTP2 RST_STREAM NO_ERROR received by BIG-IP not interpreted correctly
Links to More Info: BT1928169
Component: Local Traffic Manager
Symptoms:
Communication disrupted to the client when server sends a RST_STREAM NO ERROR
Conditions:
if the server has already sent a response (e.g., headers and body) and does not need additional data from the client (e.g., request body for POST or PUT requests), it might send a RST_STREAM with NO_ERROR to stop the stream and signal that no further data is required.
Impact:
Communication disrupted.
Workaround:
None
1928157-1 : [APM][SAML] constant SIGSEGV "in saml_sp_finish_message_signing" after upgrade to 17.1.x★
Links to More Info: BT1928157
Component: Access Policy Manager
Symptoms:
After upgrade, tmm crashes while passing SAML traffic.
Conditions:
-- SAML profile configured.
-- The profile doesn't have a signed certificate configured for the SP profile
-- The IDP profile does have a signed certificate
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Add the signed certificate to the same profile
1927829-1 : SSL Orchestrator resets connection with connection abort waiting for data from an inline service
Links to More Info: BT1927829
Component: SSL Orchestrator
Symptoms:
Traffic flowing through topologies gets reset (RST) instead of waiting for data to flow from inline services.
Conditions:
A topology is configured to make use of at least one inline service.
Impact:
Connections get reset (RST) and the client does not get data.
Workaround:
None
1927521-1 : DPDK has dependency on SSSE3
Links to More Info: BT1927521
Component: TMOS
Symptoms:
TMM goes into restart loop with following error in /var/log/tmm regarding SSSE3 not being available
notice ERROR: This system does not support "SSSE3".
notice Please check that RTE_MACHINE is set correctly.
notice EAL: FATAL: unsupported cpu type.
notice EAL: unsupported cpu type.
notice dpdk: Error: rte_eal_init() failed, err=-1
notice xnet_lib [pci:0000:02:00.0]: Error: Failed to initialize driver
notice xnet[02:00.0]: Error: Unable to attach to xnet dev
notice xnet(1.1)[02:00.0]: Error: Unable to initialize device
notice xnet(1.1)[02:00.0]: Waiting for tmm1 to reach state 4...
notice ndal Error: Restarting TMM
notice Initiating TMM shutdown.
notice tap(tap)[00:00.0]: Waiting for tmm1 to reach state 4...
notice ---------------------------------------------
Conditions:
1) xnet-DPDK is being used
2) BIG-IP running in an environment where SSSE3 is not available either because CPU is so old that it does not support SSSE3 or SSSE3 has been disabled in VM's config.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Switch to 'sock' driver by adding the following line into /config/tmm_init.tcl, replacing <VENDOR_ID:DEVICE_ID> with the corresponding interfaces' Vendor and Device IDs shown via 'lspci -nn'.
For environments in HyperV or Azure, f5f5:f550 should be used for Vendor and Device.
[root@BIGIP:Active:Standalone] log # cat /config/tmm_init.tcl
device driver vendor_dev <VENDOR_ID:DEVICE_ID> sock
[root@BIGIP:Active:Standalone] log #
1926733-1 : Tmm memory leak with L7 response policy
Links to More Info: BT1926733
Component: Local Traffic Manager
Symptoms:
TMM slowly leaks memory.
During diagnosis, with the following diagnostic command:
tmctl -w192 -id blade memory_usage_stat | egrep "http_data|cur_"
http_data indicates the highest memory usage
Conditions:
-- Virtual Server with fastL4 + HTTP
-- L7 response policy attached (for example redirect-http-https)
Impact:
Http_data usage goes up over time and does not return to prior levels when traffic ceases.
Workaround:
None
1922661-3 : JSON profile settings not displayed in REST API after attaching schema files
Links to More Info: BT1922661
Component: Application Security Manager
Symptoms:
When a JSON content profile has validation files attached, the following settings are not visible through the REST API:
"sensitiveData"
"attackSignaturesCheck"
"metacharElementCheck"
Conditions:
JSON content profile has schema validation files attached.
Impact:
JSON profile settings not visible in REST API.
Workaround:
None
1922617-3 : BGP Multipath selection might be unpredictable.
Links to More Info: BT1922617
Component: TMOS
Symptoms:
BGP Multipath selection might be unpredictable.
Conditions:
Four EBGP neighbors in two different AS, each sending the same route (NRLI) towards BIG-IP. Route might sometimes not be considered candidate for multipath.
Impact:
Route might not be considered candidate for multipath.
Workaround:
Set 'bgp bestpath as-path multipath-relax' to install all available paths.
1921217-1 : Incremental build breaks due to library mismatch
Links to More Info: BT1921217
Component: TMOS
Symptoms:
Incremental builds may fail due to a library mismatch during build processes. This issue is limited to F5’s internal build infrastructure and does not impact product functionality, product performance, or usability
Conditions:
None
Impact:
None
Workaround:
None
1921085-1 : Core file generated when using FTP::ftps_mode require without SSL profile in TCP filter
Links to More Info: BT1921085
Component: Local Traffic Manager
Symptoms:
Tmm crashes while passing ftp traffic.
Conditions:
1. create a FTP virtual without SSL profile.
2. create a iRule to force FTP::ftps_mode require in FTP profile like
when CLIENT_ACCEPTED {
FTP::ftps_mode require
}
3. Attempt FTP transfer via FTP virtual created.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Attach appropriate SSL profile to the FTP virtual.
1921069-2 : The error ERR_ARG occurs when using iRule HTTP::collect command without the parameter value in HTTP_REQUEST_DATA
Links to More Info: BT1921069
Component: Local Traffic Manager
Symptoms:
The iRule HTTP::collect command without the parameter value in HTTP_REQUEST_DATA returns an error.
Conditions:
The error occurs when the HTTP::collect does not have any value.
Impact:
The iRule fails with ERR_ARG error.
Workaround:
Always enter value to HTTP::collect. Refer HTTP::collect iRule command page, https://clouddocs.f5.com/api/irules/HTTP__collect.html.
This workaround will depend on the specific iRule being used.
1921049-1 : When L7 policy is updated, existing HTTP/2 connection using it gets a RST_STREAM
Links to More Info: BT1921049
Component: Local Traffic Manager
Symptoms:
HTTP/2 connections sometimes get a RST_STREAM
Conditions:
L7 policy that is being used by HTTP/2 connections is updated or changed.
Impact:
Lost of connectivity on a HTTP/2 stream.
Workaround:
Avoid updating L7 Policy while Http/2 connections are active.
1921025-1 : Need more information when http2 RST STREAM
Links to More Info: BT1921025
Component: Local Traffic Manager
Symptoms:
Sometimes, finding the root cause of an http2 RST STREAM is more difficult
Conditions:
Troubleshooting issues with HTTP2
Impact:
Difficulty in debugging.
Workaround:
None
1920637-1 : Duplicate user-defined Signature Set based on Attack Type is created upon policy import during upgrade★
Links to More Info: BT1920637
Component: Application Security Manager
Symptoms:
After an upgrade or a re-import, duplicate signature sets denoted by a "_1" are created containing NULL values instead of empty strings.
Conditions:
A user-defined signature set has an empty string for the tagged signature filter.
Impact:
Additional "duplicate" sets are created every time a policy is re-imported. This does not affect any functionality, but does increase the total configuration size, and makes the configuration more difficult to manage.
Workaround:
You can repair the policy by navigating to “Security ›› Application Security : Policy Building : Learning and Blocking Settings”, clicking on “change”, and choosing the original created sets instead of the duplicated sets. Save, and then apply the policy. The duplicated sets can be deleted after that.
1917677-4 : "show security ip-intelligence info address" may fail to query legacy IP Reputation database
Links to More Info: BT1917677
Component: Advanced Firewall Manager
Symptoms:
When using the command "show security ip-intelligence info address", Query Legacy IP Reputation Database may not get queried.
Explicit documentation outlining how to configure a policy to enable IP reputation database queries in association with this command is missing.
Conditions:
- System provisioned with either ASM or AFM.
- IP Intelligence license activated.
- An IP Intelligence policy configured in the system.
Impact:
The command does not work with the database as intended.
Although the output of the command shows legacy in the IP Intelligence Sources, it does not return the lookup results of the IP reputation database.
Workaround:
None
1900621-2 : Missing client ip
Links to More Info: BT1900621
Component: Application Security Manager
Symptoms:
Client ip address not available for some dosl7 attack ids
Conditions:
Remote logging configured
Impact:
Source ip missing for some attack ids on remote server/dos dashboard
Workaround:
Check attack info in lcoal log_db which contains client ip in on another event
1893989-1 : NTP truncates symmetric keys to 30 bytes
Links to More Info: BT1893989
Component: TMOS
Symptoms:
The Network Time Protocol (NTP) server, where symmetric keys were used for cryptographic operations, was truncated to 30 bytes. This limitation restricted the effective length of symmetric keys even when longer keys were provided. As a result, it reduced the expected level of security for configurations utilizing keys longer than 30 bytes. (For example, using SHA256 symmetric keys will fail)
Conditions:
When NTP uses a symmetric key size of 30 bytes or more.
Impact:
- Truncating symmetric keys to 30 bytes in NTP significantly reduces security by limiting entropy, diminishing compliance with cryptographic standards, and opening systems to a range of attack vectors.
- The truncation silently weakens configurations, affecting user trust and operational reliability.
Workaround:
None
1890997-1 : TCP connection stall in TMM conn table with ASM policy and no websocket profile
Links to More Info: BT1890997
Component: Application Security Manager
Symptoms:
Virtual server configured with and ASM policy but no websocket profile. After a 101 response and the TCP 4-way teardown, the connection isn't removed from TMM connection table.
Conditions:
Virtual server with ASM policy, no websocket profile
Impact:
Connection is not removed from the TMM connection table
Workaround:
Add a websocket profile to the virtual server configuration.
1890749-2 : In a multi-user scenario, the system is allowing users to create more authentication tokens than the maximum limit allowed per user.
Links to More Info: BT1890749
Component: TMOS
Symptoms:
In a multi-user scenario, users are able to create more tokens than the max allowed setting allows.
Conditions:
-- User1 creates 100 tokens
-- User2 creates 100 tokens
-- restart restjavad process
-- User1 try to create new token
-- User1 can create new token without an error
Impact:
No limitation for using tokens.
Workaround:
None
1889861-3 : Passive monitoring with ASM might not log the server response.
Links to More Info: BT1889861
Component: Local Traffic Manager
Symptoms:
Passive monitoring with ASM might not log the server response.
Conditions:
Passive monitoring with ASM deployed. Similar to https://techdocs.f5.com/en-us/bigip-14-1-0/big-ip-asm-implementations-14-1-0/working-with-passive-monitoring.html
Impact:
Server response is not getting logged.
Workaround:
None
1889741-2 : Need for the SYS DB variable to toggle ssl_crypto::queue_max
Component: Local Traffic Manager
Symptoms:
While ssl_crypto::queue_max can be configured using TCL commands, a corresponding TMSH equivalent is required.
Conditions:
When the system handles a large number of concurrent SSL handshakes or cryptographic operations
Impact:
-- SSL handshake failures
-- Inability to configure the ssl_crypto::queue_max via tmsh
Workaround:
None
1881569-4 : Programs invoked by tmsh when session is interrupted may remain running
Links to More Info: BT1881569
Component: TMOS
Symptoms:
If an interactive user session is interrupted while a tmsh process is executing another command (e.g. bash), under particular circumstances the child process may continue executing.
This occurs if the bash process is itself executing a long-running command (e.g. 'watch' or 'tcpdump' or similar), and then the SSH connection is interrupted.
Conditions:
-- An interactive tmsh process runs another program (e.g. bash)
-- That bash process is executing another command that will not generally exit on its own without user intervention (e.g. 'watch' or 'tcpdump')
-- The user session is interrupted
Impact:
Processes remain executing even after they should have been terminated because the user session disconnected.
If the long-running command the bash process is executing tries to invoke tmsh, the LTM log file may contain repeated logs similar to the following:
Mar 25 12:10:00 hostname notice tmsh[22420]: 01420003:5: Cannot load user credentials for user "username"
Mar 25 12:10:00 hostname notice tmsh[22420]: 01420003:5: The current session has been terminated.
Workaround:
Avoid unclean shutdown/interruption of user sessions if possible. Otherwise, identify the long-running processes that are still running, and then kill them.
1881537-1 : Platform Agent does not log diff of Feature Info Attributes
Links to More Info: BT1881537
Component: F5OS Messaging Agent
Symptoms:
Whenever a change is made in F5OS, platform agent dumps the complete list of feature info attributes. Update the platform agent log to show the attribute changes to highlight relevant changes to ease debugging.
Conditions:
- F5OS change on hypervisor such as trunk change.
- Platform agent outputs feature info attributes list.
Impact:
Log messages could be more clear to ease debugging.
Workaround:
None
1881509-1 : Platform Agent not logging Trunk changes from F5OS
Links to More Info: BT1881509
Component: F5OS Messaging Agent
Symptoms:
When trunk changes are made in F5OS, they are not explicitly logged on the tenant.
Conditions:
F5OS tenant making a trunk change.
Impact:
Hard to debug trunk changes made live on F5OS.
Workaround:
None
1880441-2 : Security log profile IPI options are visible for configuration in UI but not allowed
Links to More Info: BT1880441
Component: Advanced Firewall Manager
Symptoms:
In the AFM UI (Security ›› Event Logs : Logging Profiles ›› Edit Logging Profile), the user can edit IPI section and enable the following checkboxes:
Log Shun Events Enabled
Log Geo Events Enabled
Log RTBH Events Enabled
Log Scrubber Events Enabled
However, enabling any of them may result in an error: « The <OPTION NAME> option can only be enabled on the global-network log profile.»
Conditions:
Using the AFM UI to enable the logging profile for IPI options
Impact:
The IPI logging options are not configurable in the UI
Workaround:
None
1856513-2 : Tomcat fails to write log messages to /usr/share/tomcat/logs/liveupdate.log
Links to More Info: BT1856513
Component: Application Security Manager
Symptoms:
You only see this message in /var/log/tomcat/liveupdate.log file. No other log messages are written, which impedes troubleshooting Live Update.
liveupdate.script file is corrupted, live update repository initialized with default schema
Conditions:
You are running on a version which has a fix for ID 907025.
For more information see https://cdn.f5.com/product/bugtracker/ID907025.html
Impact:
Difficult to troubleshoot issues that occur with Live Update
Tomcat memory growth can cause tomcat to run out of memory, be slow, and use higher than usual CPU due to increased garbage collection activity.
Workaround:
Run the following commands:
chown tomcat:tomcat /var/log/tomcat/liveupdate.log
/usr/share/tomcat/logs/liveupdate.log
bigstart restart tomcat
1856425-1 : Old EPSEC images keeps coming back on standby device after reboot
Links to More Info: BT1856425
Component: Access Policy Manager
Symptoms:
Previous EPSEC packages still reside on the system /shared/apm/images/ even if they are deleted.
Conditions:
Even both standby and active are sync old epsec images are not being deleted from /shared/apm/images/
-- VIPRION system
-- High availability (HA) environment
-- vCMP with multiple blades
-- The system is rebooted
Impact:
Unnecessary retention of outdated EPSEC images.
Workaround:
1) Look for all epsec files on all blades:
clsh find / -path /proc -prune -o -name *epsec-1* -print
2) Delete older non-used epsec images (using UI or tmsh)
3) Verify no references to older epsec exist in bigip.conf. If they do, they need to be removed.
grep epsec /config/bigip.conf
4) Delete any orphan non-used epsec images from /config/filestore/files_d/Common_d/epsec_package_d/ (only keep the one listed in bigip.conf):
Ex:
clsh rm -f /config/filestore/files_d/Common_d/epsec_package_d/\:Common\:EPSEC\:Upload\:epsec-1.0.0-1622.0.iso_126649_1
clsh rm -f /config/filestore/files_d/Common_d/epsec_package_d/\:Common\:EPSEC\:Upload\:epsec-1.0.0-1505.0.iso_126643_1
5) Look again for all epsec files on all blades:
clsh find / -path /proc -prune -o -name *epsec-1* -print
6) If some older epsec files are still visible in /shared/apm/images/
6.1) Stop csyncd (this will prevent rsync from restoring epsec images while you try to delete them):
clsh bigstart stop csyncd
6.2) Delete leftover epsec (those not visible in UI):
Ex:
clsh rm -f /shared/apm/images/epsec-1.0.0-1622.0.iso
clsh rm -f /shared/apm/images/epsec-1.0.0-1505.0.iso
...
6.3) Start csyncd:
clsh bigstart start csyncd
6) Sync to standby (if manual sync)
Once completed, move on to standby.
#############
# On standby:
#############
1) Look for all epsec files on all blades:
clsh find / -path /proc -prune -o -name *epsec-1* -print
2) Stop csyncd (that will prevent rsync from restoring epsec images while you try to delete them):
clsh bigstart stop csyncd
3) Delete leftover epsec (those not visible in UI):
Ex:
clsh rm -f /shared/apm/images/epsec-1.0.0-1622.0.iso
clsh rm -f /shared/apm/images/epsec-1.0.0-1505.0.iso
...
4) Verify no references to older epsec exist in bigip.conf. If any, we need to do a full sync from active to standby again.
grep epsec /config/bigip.conf
=> you should see the same thing as the active
5) Delete any orphan non-used epsec images from /config/filestore/files_d/Common_d/epsec_package_d/ (only keep the one listed in bigip.conf):
Ex:
clsh rm -f /config/filestore/files_d/Common_d/epsec_package_d/\:Common\:EPSEC\:Upload\:epsec-1.0.0-1622.0.iso_126649_1
clsh rm -f /config/filestore/files_d/Common_d/epsec_package_d/\:Common\:EPSEC\:Upload\:epsec-1.0.0-1505.0.iso_126643_1
...
6) Start csyncd:
clsh bigstart start csyncd
7) Look again for all epsec files on all blades:
clsh find / -path /proc -prune -o -name *epsec-1* -print
8) If you need to confirm that older epsec images are not coming back, reboot the standby guest chassis
1854461-2 : Unable to delete file from "Available to Deploy" when removed from "Available to Install"
Links to More Info: BT1854461
Component: Protocol Inspection
Symptoms:
When deleting an IPS policy, the GUI reports an error "Unable to delete file", but the file is deleted.
Conditions:
After deleting the IM package from the "Available to install", followed by saving the save sys config and reboot the BIG-IP device. Unable to delete the IM package from the "available to deploy" and which leads to the GUI error
Impact:
No functionality impact, only the GUI error, which is cosmetic.
Workaround:
None
1854353-3 : Users with Resource admin role are not able to save the UCS.
Links to More Info: BT1854353
Component: TMOS
Symptoms:
When creating a UCS file, an error occurs:
Data Input Error: Invalid partition ID request, partition does not exist ([All])
Error during config save.
Unexpected Error: UCS saving process failed.
Conditions:
-- Creating a UCS file
-- The user role that initiated the UCS save is Resource Admin
Impact:
Users in a Resource Admin role are unable to save a UCS file.
Workaround:
Other admin type roles are able to save the UCS file.
1854137-1 : Verified accept and pool reselect-tries may cause TCP proxy to core
Links to More Info: BT1854137
Component: Local Traffic Manager
Symptoms:
Tmm crashes and restarts
Conditions:
-- TCP Virtual server with verified-accept enabled
-- Some form of asynchronous persistance
-- Flaky pool members at precisely the right time in the verified accept sequence.
-- Delayed ACK on serverside, thus allowing the pool member to be taken down and the sweeper to expire the server-side flow.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
1849829-2 : Deprecation of dnssec-lookaside and dnssec-enable Directives in latest BIND release
Links to More Info: BT1849829
Component: SSL Orchestrator
Symptoms:
The directives dnssec-lookaside and dnssec-enable previously used in the named.conf configuration file are now deprecated and no longer supported by latest BIND versions.
If these directives are present in the named.conf file:
Error messages appear in DNS server logs when starting the named service.
The DNS server fails to start or exhibit unexpected behaviour due to the presence of unsupported directives.
Conditions:
1. SSL Orchestrator L3 explicit topology
2. Check bind version with below command
# named -v
BIND 9.18.28 (Extended Support Version) <id:f77fadb>
This version of BIND is not supporting mentioned dns tokens.
Impact:
DNS queries will fail if the BIND configuration (named.conf) contains unsupported directives (e.g., dnssec-lookaside, dnssec-enable).
As a result:
The DNS resolver will fail to process queries.
This will cause traffic relying on name resolution to fail, leading to potential disruptions in services that depend on DNS.
Workaround:
1. Remove the deprecated directives dnssec-lookaside and dnssec-enable from the BIND configuration file located at: /var/named/config/named.conf
2. After making the changes, restart the named service to apply the updated configuration: bigstart restart named
1849029 : Debug TMM crashes in FIPS/CC mode
Links to More Info: BT1849029
Component: Local Traffic Manager
Symptoms:
A TMM in debug mode crash occurs in FIPS/CC mode when using ClientSSL or ServerSSL profile.
Conditions:
-- Debug tmm is running
-- FIPS/CC mode enabled
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Switch to non debug tmm.
1848577-2 : VCMP guest stats are not visible on vCMP host GUI nor CLI
Links to More Info: BT1848577
Component: Application Visibility and Reporting
Symptoms:
- Issuing the command 'tmsh show analytics vcmp report view-by guest measures { average-guest-cpu-usage }' returns 'No data available'
- Graphs on 'Statistics ›› Analytics : vCMP : CPU Usage' says "There is no data to display either due to the lack of relevant traffic or due to the settings of the filter." even after the vCMP guest has been running for more than 10 minutes.
Conditions:
- vCMP host running v17.1.x
- The following tables are missing when issuing the command tmctl -f /var/tmstat/blade/vcmp_union_tables' from the vCMP host:
vcmp_tmm_stat_union
vcmp_pva_stat_union
vcmp_proc_pid_stat_union
vcmp_host_info_stat_union
Impact:
No stats (eg. CPU, Network, Disk Usage) can be seen for the vCMP guests when looking from the vCMP host.
Workaround:
Run this Bash one-liner from the vCMP host:
bigstart restart merged ; sleep 600 ; bigstart restart avrd ; sleep 600 ; bigstart restart avrd merged ; sleep 600 ;
Thereafter, check the tables and analytics with these commands:
tmctl -w$COLUMNS -f /var/tmstat/blade/vcmp_union_tables
tmsh show analytics vcmp report view-by guest measures { average-guest-cpu-usage }
1848565-2 : Error during updating device details: Internal error (Json parser error)
Links to More Info: BT1848565
Component: Access Policy Manager
Symptoms:
Mdmsyncmanager reports errors for every query from the MDM DB:
Error in /var/log/apm:
notice mdmsyncmgr[24645]: 019dffff:5: (null)::00000000: {} /Common/mdm: Start querying devices from https://mysite.com/TrafficGateway/TrafficRoutingService/ResourceAccess/ComplianceRetrievalService
err mdmsyncmgr[24645]: 019dffff:3: (null)::00000000: {} /Common/mdm: Error during updating device details: Internal error (Json parser error)
Conditions:
MDM is configured.
Impact:
Errors are logged by mdmsyncmanager due to JSON errors. Other causes or impacts are unknown, this does not seem to impact traffic.
Workaround:
None
1848541-2 : Invalid regular expression causing bd restart loop
Links to More Info: BT1848541
Component: Application Security Manager
Symptoms:
ASM (BD) restart loop
/var/log/ts/bd.log contains events reporting PCRE compilation failure:
ECARD|ERR |Jan 23 10:16:59.036|14826|regexp_table_management.cpp:0057|key crc f77c3b66 PCRE compilation failed at offset 3: PCRE does not support \L, \l, \N{name}, \U, or \u
Conditions:
An invalid regular expression exists in a policy prior to upgrade.
Impact:
Bd restart loop. ASM traffic disrupted while bd restarts.
Workaround:
Clear out incorrect regular expressions from DCC.GLOBAL_PARAM_REG_EXPS
Restart ASM or allow the device to restart.
# tmsh restart sys service asm
1828005-1 : Syslog message does not carry log level when destination is remote
Links to More Info: BT1828005
Component: TMOS
Symptoms:
When a syslog include filter includes a local log source, the log level filter is ignored for the remote syslog server.
Conditions:
Add an include filter with source,filter,destination and configure source as local:
include "
filter f_remote_loghost {
facility(local0) and level(info..emerg);
};
destination d_remote_loghost {
udp(\"<ip>\" port(514));
};
log {
source(local);
filter(f_remote_loghost);
destination(d_remote_loghost);
};
"
Impact:
Log level is not displayed. This makes it difficult to understand the priority of the logs on the remote system.
Workaround:
Include s_syslog_pipe as source in the include filter
Steps to apply:
1. Login to tmsh and execute the command to edit the config : tmsh edit /sys syslog all-properties
2.Add the below include config:
include "
filter f_remote_loghost {
facility(local0) and level(info..emerg);
};
destination d_remote_loghost {
udp(\"<ip>\" port(514) );
};
log {
source(s_syslog_pipe);
filter(f_remote_loghost );
destination(d_remote_loghost);
};
"
3.Save the file and restart syslog with the command: bigstart restart syslog-ng
4. This will reflect the logs with priority in the remote server
1827821-2 : isBase64 params and headers not blocking Attack Signatures
Links to More Info: BT1827821
Component: Application Security Manager
Symptoms:
The parameter value in GET requests are considered as base64 even when the calculated score is below 'base64_max_score'
Params and headers configured as "Base64Decode=required" do not detect base64 encoded attack signatures.
Conditions:
-- Create a parameter named "param" configured as "Base64Decode=required".
-- Send Request to URL /?param=PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg==
Impact:
No Violations Detected, while the parameter included an attack signature (PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg== is the base64 encoded value of <script>alert(1)</script>)
Workaround:
None
1826273-2 : Mysql client uses TLS1.1 when connecting to mysql server running 5.7
Links to More Info: BT1826273
Component: TMOS
Symptoms:
Connection is always negotiated with TLS1.1
Conditions:
The mqsql client in BIG-IP's version is 5.1.47, which hardcode's the TLS version used to connect with mysql server versions which supports TLS1.1. TLS1.1 is not a supported version in mysql server 8.0.0.4 onwards and client successfully connects to those servers with TLS 1.2.
Impact:
Client should negotiate with TLS1.2
Workaround:
None
1825249-1 : read_until: end of file
Links to More Info: BT1825249
Component: Access Policy Manager
Symptoms:
The Configuration Utility displays an error: "read_until: end of file."
Conditions:
-- Viewing a virtual server in the GUI
-- The Virtual Server does not have an HTTP profile attached
Impact:
The GUI prints a "read_until: end of file" error
Workaround:
None
1825057-2 : 'vs_name' field truncated at 64 characters with ASM's remote logging
Links to More Info: BT1825057
Component: Application Security Manager
Symptoms:
The virtual server name field (vs_name) is truncated at 64 bytes with ASM's remote logging handled by BD process.
The 'vs_name' field comprises of the partition name as well as virtual server name and the 64 character limit is inclusive of both these names.
Conditions:
ASM/Advanced WAF device running one of the versions listed under Known Affected Versions.
Impact:
Virtual server name gets truncated in remote logging events
Workaround:
None.
1824965-1 : Implement iRule support to fetch SNI from SSL, HTTP and QUIC traffic
Component: Traffic Classification Engine
Symptoms:
You can not use an iRule to look up the SNI/hostname from SSL, HTTP, and QUIC traffic.
Conditions:
You need to look up the SNI/hostname in an iRule
Impact:
You are unable to look up the SNI or hostname.
Workaround:
None
1824521-2 : GUI: VLAN names are not populated while creating the vlan-group under Network Quick configuration
Links to More Info: BT1824521
Component: Local Traffic Manager
Symptoms:
VLAN names are not present as a dropdown option in the Quick configuration GUI.
Conditions:
On a tenant device, navigate to Network -> Quick Configuration -> Create -> VLAN Group Properties -> Tag
Impact:
We may be unable to configure the vlangroup from the Quick configuration GUI on the tenant
Workaround:
VLAN groups can be configured through the following path:
Network > VLANs > VLAN Groups > Create
This interface provides a list of available VLANs from which you can select members to add to the VLAN group.
You can also configure VLAN Groups via the CLI.
1824113-3 : GTM iRule : [active_members <poolname>] command ignores any status effects applied by a parent.
Links to More Info: BT1824113
Component: Global Traffic Manager (DNS)
Symptoms:
Disabling a pool or virtual server that is referenced by a pool member affects how pool <poolname> selects a response, but [active_members <poolname>] still returns a value that ignores these status effects.
Conditions:
-- GTM pool
-- An iRule that checks the available_members of the pool is greater than zero before selecting the pool
-- Disable the pool
The pool is still selected for client queries to the wideIP
Logs show that the available_members is equal to the number of pool members, even though the pool is disabled.
Impact:
Unable to manage availability by disabling the pool.
Workaround:
None
1824009-3 : When DNS64 is enabled, resolver cache passes SERVFAIL responses to the client
Links to More Info: BT1824009
Component: Global Traffic Manager (DNS)
Symptoms:
When a DNS profile is configured with both Secondary DNS64 (with a prefix) and a resolver cache, any response from an authoritative server to a AAAA query with RCODEs such as SERVFAIL or SERVFAIL(Timeout due to no response from external resolver), FORMERR, NOTIMP, REFUSED, YXRRSET, NXRRSET, YXDOMAIN , NOTAUTH, or NOTZONE will be cached as SERVFAIL and sent directly to the client.
Conditions:
- DNS64 enabled in the DNS profile
- DNS resolver cache configured
Impact:
SERVFAIL response is directly send back to the client
Workaround:
None
1821353-2 : Error on long wildcard configuration
Links to More Info: BT1821353
Component: Application Security Manager
Symptoms:
When a wildcard url is configured with a size above 1023, the system can't start up.
Conditions:
The wildcard URL length exceed 1023 bytes.
Impact:
Bd goes into restart loop.
Workaround:
Reduce the length of the wildcard URL.
1820833-1 : General Database Error when creating a new profile
Links to More Info: BT1820833
Component: Bot Defense
Symptoms:
When creating a custom bot defense profile, after clicking Finished an error occurs: "General Database Error"
Conditions:
-- Creating a custom mobile bot defense profile
-- The profile enables mobile endpoints
-- The parent profile has been modified
Impact:
The profile is not created and a General Database Error is reported.
Workaround:
None
1820573-2 : PEM Traffic Classification signatures are classifying the youtube videos with quic enabled as udp.quic instead of udp.quic.youtube.youtube_video.youtube_video_abr on windows using the latest chrome web browser
Links to More Info: BT1820573
Component: Traffic Classification Engine
Symptoms:
Classification is not happening properly
Conditions:
YouTube video playing on the latest version of Chrome web browser
Impact:
Classification is incorrect
Workaround:
None
1819857-1 : [APM][PRP] Session variables are not able to access within Oauth Client agent intermittently
Links to More Info: BT1819857
Component: Access Policy Manager
Symptoms:
The request object which contains custom session variables which are filled through iRule and variable assign agent are empty in oauth redirect urls
At the time of oauth Request object creation i.e from mcp to tmm oauth_request_item_table is not getting populated in all tmm instances and every time issue identified in a single tmm instance.
Conditions:
-- BIG-IP APM as OAuth Client, inside Per-Request-Policy.
-- Some custom session variables are filled thru variable assign agent and irules.
custom session variables are used in oauth request in auth redirect and token redirect params.
Impact:
Not able to perform oauth
Workaround:
None
1818949-2 : [APM] BIG-IP as OAuth AS sending invalid grant error when refresh token expired.
Links to More Info: BT1818949
Component: Access Policy Manager
Symptoms:
As per RFC states that, the provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client then should send a 400 Bad Request status code and a error json response
{"error": "invalid_grant", ...}
currently BIG-IP sending as {"error": "access_denied", ...}
with 400 status code.
Conditions:
OAuth configured.
using the refresh token to get the access token, when refresh token is expired. (ex: using postman)
Impact:
Returns Invalid error
Workaround:
None
1818861-2 : Timestamp cookies are not compatible with fastl4 mirroring.
Links to More Info: BT1818861
Component: Advanced Firewall Manager
Symptoms:
DOS tcp-ack-ts vector with tscookies option enabled is not compatible with fastl4 (L4) mirroring.
Conditions:
- DOS tcp-ack-ts vector with tscookies option enabled
- Mirroring configured on fastL4 TCP virtual.
- FastL4 profile with timestamp 'preserve' option configured.
Impact:
Existing connections hang due to tsval not being transformed properly on a newly active device.
Workaround:
Set fastl4 timestamp option to strip/rewrite.
1818137-2 : Tmm IPv4 fragmentation handling distribution
Links to More Info: BT1818137
Component: Local Traffic Manager
Symptoms:
BIG-IP VE handles fragmented IPv4 traffic on the first tmm thread/tmm0. With this change the ability to spread the fragmented IPv4 traffic is introduced.
Conditions:
Handling of fragmented IPv4 traffic.
Impact:
Handling of fragmented IPv4 traffics distribution.
Workaround:
None
1814413-3 : Dynamic parameters are not extracted and cookies are not generated
Links to More Info: BT1814413
Component: Application Security Manager
Symptoms:
Dynamic parameters are not extracted and cookies are missed.
Conditions:
Create a parameter in extraction and in the Extracted Items configuration.
Impact:
Unable to extract dynamic parameters due to which false positives are generated.
Workaround:
Include the file type in the Extracted Items configuration.
1813717-4 : Some blocked requests are not logged when filtered by response status codes
Links to More Info: BT1813717
Component: Application Security Manager
Symptoms:
Blocked requests with status code N/A are not logged when filtered by response code
Conditions:
-- Using a custom logging profile with request type set to all requests or blocked requests, logic operation AND and Response status code set to ONLY
Impact:
Missing logs of some blocked requests
Workaround:
None
1812349-5 : IPsec phase 2 (IKEv1 Quick Mode) will not start after upgrade★
Links to More Info: BT1812349
Component: TMOS
Symptoms:
IPsec IKEv1 tunnels fail half way through tunnel negotiation. As a result the tunnel never comes up.
Conditions:
-- BIG-IP with IKEv1 IPsec tunnel
-- ISAKMP traffic to the remote peer is not in route-domain 0 (RD0)
-- Upgrade to version 16.x or 17.x
Impact:
IPsec tunnels are not able to connect remote peer networks.
Workaround:
There are two options:
-- Use IKEv2, this will require that the remote peer is also reconfigured to IKEv2.
-- Alternatively, move the IPsec peer's configuration to RD0.
1788193-3 : [MCP] Request logging should only be allowed with supported protocol profiles
Links to More Info: BT1788193
Component: TMOS
Symptoms:
Request Logging can only log HTTP requests. Other protocol profiles are not supported. Configuring request logging on a MQTT virtual server will cause tmm to crash.
Conditions:
Request logging profile is configured on MQTT virtual server
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
1788105-2 : TLS1.3 connections between BIG-IP and server hangs with an APM policy that is invoked after the server's SSL handshake finishes★
Links to More Info: BT1788105
Component: Local Traffic Manager
Symptoms:
A TLS1.3 connection between the BIG-IP system and the server hangs.
Other reported symptoms:
-- SSL decryption fails
-- SSL handshake failure
-- SSL Orchestrator explicit proxy stops responding
This can be encountered after an upgrade to an affected version.
Conditions:
A virtual server that uses
1. TLS1.3 in the serverSSL profile
2. An APM policy that uses events that trigger after the SSL handshake on the server has completed
In an SSL Orchestrator setting, inline HTTP and ICAP services make use of APM policies that use L7 protocol lookup. Server Certificate and L7 protocol lookup conditions also make use of events that trigger the APM policy after the SSL handshake has completed.
Impact:
The connection hangs and the client is unable to connect to the server.
Workaround:
Apply either of these workarounds
1. Disable TLS1.3 on the serverSSL profile
2. Avoid using events that trigger the policy after the SSL handshake on the server has completed (for example avoid Event Wait and L7 protocol Lookup)
1788065-1 : The rule cannot be deleted because it is in use by a rule
Links to More Info: BT1788065
Component: Local Traffic Manager
Symptoms:
When trying to delete two iRules in same transaction with one is calling the proc defined in another the deletion fails with below error.
mcpd[6467]: 01070265:3: The rule (/Common/Shared/library_irule) cannot be deleted because it is in use by a rule (/Common/Shared/example_irule).
The rules are
- "library_irule" containing procedure do_nothing
- "example_irule" that calls proc do_nothing
- Virtual "my_vs1" that attaches "example_irule"
Conditions:
-- Two iRules exist.
-- One iRule calls a procedure defined in the other iRule.
-- You attempt to delete both iRules at the same time.
Impact:
Unable to delete the iRule.
Workaround:
Try to delete the iRules in different transactions.
1787909-2 : Sys db variable security.configpassword value is changed to not null when ng_export is interrupted
Links to More Info: BT1787909
Component: Access Policy Manager
Symptoms:
AAA authentication starts failing after exporting/importing an access policy.
Conditions:
When 'ng_export <access policy name> <new access policy name>' is interrupted, for example by pressing CTRL-C.
Impact:
A change to the AAA password does not take effect and AAA authentication fails.
Workaround:
You are affected by this issue if you expect security.configpassword to be null but the output of 'tmsh list sys db security.configpassword' is non-null.
You can run the following command to set it back to null.
tmsh modify /sys db security.configpassword value "<null>"
1787701-2 : [APM]Customization in German contains French language
Links to More Info: BT1787701
Component: Access Policy Manager
Symptoms:
Observe "Change password" contains a French word "Modifier le mot de passe" in Logon Page agent.
Conditions:
Access policy with German language.
Impact:
It is confusing to see a different language in customization.
Workaround:
None
1786805-4 : TMM might crash immediately after going active for the first time after a reboot
Links to More Info: BT1786805
Component: Advanced Firewall Manager
Symptoms:
In some rare scenarios, TMM might crash immediately after going active for the first time after a system reboot.
Conditions:
-- A virtual server has a DoS profile attached.
-- The BIG-IP goes active for the first time after a reboot.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
1784137-1 : Net stp-globals object config-name back to default value upon reboot
Links to More Info: BT1784137
Component: TMOS
Symptoms:
Net stp-globals config-name is reset to default "base mac" in running config, while bigip_base.conf has custom config-name.
This behavior is seen after upgrade to v17.1.1.3 and also when reboot the device when its in v17.
Conditions:
1. Upgrade to v17.1.1.3
2. Reboot the device after changing the config-name in stp-globals.
Impact:
Any changes to net stp-globals will revert to default after reboot.
Workaround:
Configure via startup script after MCPD is found running when the BIG-IP system starts up.
1782137-2 : Management of Wide IPs using the GUI may fail when multiple monitors exist
Links to More Info: BT1782137
Component: Global Traffic Manager (DNS)
Symptoms:
When multiple monitor instances exist, the GUI may become unresponsive when managing Wide IPs.
Conditions:
- GTM configuration contains a sufficiently high number of monitors (> 4000).
- Using the GUI to manage Wide IPs.
Impact:
Configuration changes through the GUI may not be effective. Unable to use the GUI for configuration management.
Workaround:
Use TMSH
1782057-2 : BD crash related to dns lookup
Links to More Info: BT1782057
Component: Application Security Manager
Symptoms:
A bd daemon crash
Conditions:
Related to DNS lookup scenarios
Impact:
ASM traffic disrupted while bd restarts.
Workaround:
None
1778901-2 : PPTP-GRE proxy need tmstat table for connection error analysis
Links to More Info: BT1778901
Component: TMOS
Symptoms:
BIG-IP is unable to create a GRE flow, the connection fails to complete.
Conditions:
This can happen for various reasons, for example:
- CMP communication with another TMM failed.
- Remote end (server) to which one client is already connected, responded with a call-reply containing a call-id which was already used by that server in a previous, existing(still alive) call setup.
- BIG-IP uses translated call-id in the outgoing call request which was already sent to the server and the GRE connection for that setup is still UP, and validation fails when the server accepts a connection.
Impact:
BIG-IP uses a duplicate translated call-id when communicating with the server, but there are no stats in the tmstat table to perform additional troubleshooting of the cause.
Workaround:
None
1778793-5 : Database health monitors may use the wrong connection when attempting to connect to database
Links to More Info: BT1778793
Component: Local Traffic Manager
Symptoms:
Database monitors fail periodically and mark a pool member down.
Periodically, the DB monitor will create user sessions on the DB server without closing them.
Conditions:
- Multiple database health monitor instances exist to probe a given node.
- The monitor instances share the same values for the following parameters:
- destination IP address
- destination port
- database name.
Impact:
Healthy pool members are not selected to receive traffic.
Workaround:
You can work around this issue by using a BIG-IP EAV external monitor to probe the health of your database. An example for MySQL is available on DevCentral at https://community.f5.com/kb/codeshare/mysql-monitor/273565.
Alternatively, you may also work around this issue by adding a unique connection property as a suffix to the database name. This ensures a unique JDBC connection string is constructed for each monitor in order to avoid this issue.
For example you can use the connection properties "ApplicationName=<monitor_name>" or "applicationName=<monitor_name>" in PostgreSQL or Microsoft SQL Server respectively to provide the name of the calling monitor to the database.
In Oracle a connection string similar to the following can be used:
database (DESCRIPTION=(ADDRESS=(PROTOCOL=tcp)(HOST=%node_ip%)(PORT=%node_port%))(CONNECT_DATA=(SERVICE_NAME=ORACLE1))(SERVER=dedicated)(customKey=1))
or
database "%node_ip%:%node_port%:ORCLDB1?customkey=1"
Note that the PostgreSQL monitor requires a "?" character as a separator between the database name and the connection property, while MS SQL Server requires a ";" as separator.
Example tmsh commands to disambiguate monitorA and monitorB which both probe database "samedb" on the same node:
- PostgreSQL monitors:
- tmsh modify ltm monitor postgresql monitorA database samedb?ApplicationName=monitorA
- tmsh modify ltm monitor postgresql monitorB database samedb?ApplicationName=monitorB
- MS SQL Server:
- tmsh modify ltm monitor mssql monitorA database '"samedb;applicationName=monitorA"'
- tmsh modify ltm monitor mssql monitorB database '"samedb;applicationName=monitorB"'
- Oracle Server:
- tmsh modify ltm monitor oracle myoracle database '%node_ip%:%node_port%:PTDB3CC1?customkey=1'
Note that the extra quoting in the example command for MS SQL Server is required to preserve the ";" separator in the database name.
1772353-4 : Defaults for Associated Violations are re-added to a policy
Links to More Info: BT1772353
Component: Application Security Manager
Symptoms:
When Associated Violations is empty ("Selected" list is empty), and the policy is exported to XML or JSON format, and reimported, the default elements are re-added to the list.
Conditions:
Associated Violations is empty ("Selected" list is empty), and the policy is exported to XML or JSON format, and reimported
Impact:
The default Session Awareness Violations are set back to delay blocking unexpectedly.
Workaround:
Use binary format export and import.
1772317-3 : [APM][SAML SP] sp fails authentication with error "SAML assertion is invalid, error: NameID is missing"
Links to More Info: BT1772317
Component: Access Policy Manager
Symptoms:
SAML authentication fails and following log is seen on BIG-IP as sp: "SAML Agent: /Common/web_auth_act_saml_auth_subsession_ag SAML assertion is invalid, error: NameID is missing, but idp-connector's identity location is set to subject"
Conditions:
-- SAML auth is configured as SP on BIG-IP as part of per-request policy
-- assertion has an encrypted subject "<saml2:Subject><saml2:EncryptedID><xenc:EncryptedData xmlns:xenc="http://www.w3.org/2001/04/xmlenc#"...."
Impact:
Authentication fails
Workaround:
Disable "encrypt-subject " in idp config
1759261-4 : OSPF might fail to install external routes after topology change.
Links to More Info: BT1759261
Component: TMOS
Symptoms:
OSPF might fail to install external routes after topology change. Only a subset of routes might be affected.
Conditions:
The problem is more likely to occur with a large number of external type-5 routes being pushed to the BIG-IP system. The problem is time and packet-sequence dependent.
Impact:
Routes are present in OSPF DB but are not in the routing table (RIB).
Workaround:
None
1757585-4 : Unable to install a license on an AWS BIG-IP VE
Links to More Info: BT1757585
Component: TMOS
Symptoms:
- Dossier creation fails with the following errors in the BIG-IP VE LTM log file:
err chmand[4610]: 012a0003:3: DossierReq exception: VirtDossier Service: Instance identity retrieval from the metadata failed. Check network connectivity to the instance metadata before retrying
warning get_dossier[10914]: 012a0004:4: hal_request_dossier: request failed
err get_dossier[10914]: 01170003:3: halGetDossier returned error (1): Dossier generation failed.
- Installing a license from a BIG-IQ returns with an error similar to the following:
Licensing failed Assignment of regkey pool license {license_pool_name} (License for XXXXX-XXXXX-XXXXX-XXXXX-XXXXXXX) to N.N.N.N ended with INSTALLATION_FAILED status and message: Failed to install license to device N.N.N.N (Not a valid F5 License)
Conditions:
Any of these license removal scenarios trigger the issue on a Single NIC (1nic) AWS BIG-IP VE :
- Previous license has expired
- License was revoked using iControl REST command "DELETE /tm/shared/licensing/registration"
- License was revoked using BIG-IQ
Impact:
- BIG-IP fails to generate a dossier and load a license
- BIG-IQ is unable to re-license the VE
Workaround:
Fix by deleting and resetting IP routing.
1) tmsh delete net route default
2) bigstart restart dhclient
Alternatively manually modify and fix ip route
1) ip route change default via <gateway> dev internal
Where <gateway> is IP address seen in 'ip route' output for 'default'.
Ex: for following, <gateway> is 172.31.0.1
# ip route
default via 172.31.0.1 dev mgmt
default via 172.31.0.1 dev mgmt proto none metric 4096
...
1757537-4 : RCA tmm core with ** SIGSEGV ** inside pick_qos
Links to More Info: BT1757537
Component: Global Traffic Manager (DNS)
Symptoms:
Tmm core inside pick_qos
Conditions:
Race condition of rapid deletion and creation of the same virtual server.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
1756389-2 : CA certs could get deleted from server.crt after running bigip_add
Component: Global Traffic Manager (DNS)
Symptoms:
In certain cases, the /config/gtm/server.crt could be deleted after running the bigip_add script.
Conditions:
Running the bigip_add script
Impact:
The iQuery connnection(s) will be impacted until the CA certs are restored.
Workaround:
None
1755113-4 : BD crash with specific JSON schema
Links to More Info: BT1755113
Component: Application Security Manager
Symptoms:
BD crash
Conditions:
Using specific JSON schema in the JSON content profile applied on the ASM policy
Impact:
ASM traffic disrupted while bd restarts.
Workaround:
None
1753489-2 : BFD Commands Missing in ZebOS Config After Reboot or Restart for large configurations
Links to More Info: BT1753489
Component: TMOS
Symptoms:
BFD session commands are missing from the ZebOS configuration after a BIG-IP reboot or bigstart restart.
Conditions:
Occurs consistently with 40+ route domains, intermittently with 20+ route domains, and varies based on configuration size or the number of BFD commands.
Impact:
BFD session configurations are not retained after reboot/restart, causing instability in routing protocols relying on BFD.
Workaround:
None
1715153 : Log message "The connected network is vulnerable to tunnel crack as LocalIP falls under the public IP"
Links to More Info: BT1715153
Component: Access Policy Manager
Symptoms:
You may observe below log in f5report
"The connected network is vulnerable of tunnel crack as LocalIP falls under the public IP"
Conditions:
-- VPN is configured
-- A client connects from a publicly routable address.
Impact:
VPN is established despite the message "The connected network is vulnerable of tunnel crack as LocalIP falls under the public IPs"
Workaround:
None
1711813-4 : Incorrect SOA serial number shown in zxfrd logs during zone transfer
Links to More Info: BT1711813
Component: Global Traffic Manager (DNS)
Symptoms:
SOA serial is incorrect in the zxfrd logging.
zxfrd[4526]: 0153102c:5: IXFR Transfer of zone xyz.net with SOA Serial -1884747279 from 1.1.1.1 succeeded.
Conditions:
After performing the zone transfer, observe the zxfrd logging, where an incorrect serial number is seen once the number exceeds the signed integer limit.
Impact:
Difficult to troubleshoot zone transfer issues via the logs.
Workaround:
None
1708957-2 : Excessive debug logs can cause key management daemon failure
Links to More Info: BT1708957
Component: TMOS
Symptoms:
During the upgrade, when there are a large number of folders and the configuration is loading, due to logging for each folder creation, the key management daemon (KeyMgmtDaemon) fails and can result into upgrade failure.
Conditions:
- A large number of folders present in the device before upgrade.
- Logging level is set to "Debug"
- Initiate the upgrade.
Impact:
Device upgrade fails.
Workaround:
Change the log level to a value higher than "Debug" before initiating the upgrade.
1690005-2 : Masquerade Mac is not removed when F5OS is rebooted
Links to More Info: BT1690005
Component: F5OS Messaging Agent
Symptoms:
Masquerade Mac is not removed when F5OS is rebooted.
It can be observed using the 'show fdb' command in confd
Conditions:
- A HA pair of tenants is used
- A traffic group uses a masquerade mac
- The Active tenant is rebooted
Impact:
Active and Standby act as if they are the owners of Floating MAC and IP.
Workaround:
The masquerade mac's fdb can be manually deleted using the F5OS CLI.
From the standby F5OS system CLI:
config
no fdb mac-table entries entry <mac masquerade address>
commit
1688545-2 : PVA-processed traffic is not included in the route-domain stats via SNMP
Links to More Info: BT1688545
Component: TMOS
Symptoms:
PVA traffic sent to the VIP is not reflected in the route-domain statistics within SNMP.
Conditions:
Viewing ltmRouteDomainStat* route domain statistics in F5-BIGIP-LOCAL-MIB
Impact:
Discrepancy between the throughput statistics and traffic statistics on per-VLAN basis
Workaround:
None
1682101-2 : Restjavad CPU goes close to 100% during telemetry pollers collect stats
Links to More Info: BT1682101
Component: TMOS
Symptoms:
Restjavad CPU utilization approaches 100% when telemetry endpoints are accessed, such as
/mgmt/shared/telemetry/pullconsumer/metrics
Conditions:
Telemetry operations endpoints are used.
Issue observed on releases with an existing fix, ID 1040573 at https://cdn.f5.com/product/bugtracker/ID1040573.html, where some changes happened on icrd operations.
Impact:
During telemetry operations ,100% restjavad usage occurs.
Workaround:
None
1678105-3 : F5OS tenant, TMM crashing after loading a UCS
Links to More Info: BT1678105
Component: TMOS
Symptoms:
If a UCS is loaded on a F5OS tenant and the name of the tenant from where the UCS was saved does not match the tenant name where it is restored.
Conditions:
- UCS restored on tenant with a different tenant name than were the UCS was created.
Impact:
The tenant will not become operational because TMM fails to start.
Workaround:
Refer to following steps for workaround:
1. Remove the file "tmm_velocity_init.tcl" in /config/.
2. Perform bigstart restart platform_agent.
3. Ensure a new "tmm_velocity_init.tcl" is created and TMM stops failing.
1677409-2 : Show auth login-failures does not show failures when remote auth falls back to local auth
Links to More Info: BT1677409
Component: TMOS
Symptoms:
If the remote auth server fails and is configured to fallback to local auth, failures of local auth accounts are not tracked when we look at show auth login-failures
Conditions:
Issue occurs when remote auth server fails and is configured to fallback to local auth.
Impact:
Show auth login-failures is not showing the failure users which makes it more difficult to track login failures.
Workaround:
None
1671149-4 : Timestamp cookies may cause issue for PVA-accelerated connections
Links to More Info: BT1671149
Component: Advanced Firewall Manager
Symptoms:
Timestamp cookies may cause performance issues for PVA-accelerated connections on some older platforms and/or platforms without a performance license.
Conditions:
- PVA offload configured (any stage).
- DOS ACK (TS) vector has timestamp cookies option enabled.
- Platform supporting ePVA feature (Ref. https://my.f5.com/manage/s/article/K12837)
- Platform does not belong to the following subset:
B2250 (A112)
B4450N (A114)
B4460N (A121)
i10800 (C116)
i7800 (C118)
i5800 (C119)
i11800 (C123)
i11800-DS (C124)
i5820-DF (C125)
i7820-DF (C126)
i15800 (D116)
i15820-DF (D120)
VELOS BX110, BX520
r5800/5900, r10800/10900, r12800/12900 r-series platforms
Additionally, for platforms specified in the list above a license with support of turboflex 'Basic DoS vectors' capability is required. Note, this requires a 'Performance' license on some of platforms.
For more information about Turboflex please check article https://techdocs.f5.com/en-us/hw-platforms/f5-platform-turboflex-profiles/title-turboflex-overview.html
Impact:
Tmm resets the connection or causes slow performance.
Workaround:
Disable timestamp-cookie feature.
1670625-3 : Incorrect set of TCAM rules
Links to More Info: BT1670625
Component: TMOS
Symptoms:
Incorrect set of TCAM rules.
Conditions:
Multiple hardware acceleration features are activated simultaneously.
Impact:
Hardware offload does not function properly, only software protection is available.
Workaround:
None
1670041-1 : [SWG] VCMP all secondary slots restart when URL categories are modified/deleted
Component: Access Policy Manager
Symptoms:
VCMP Blades restart after modifying a SWG category.
After the deletion occurs, log entries can be seen in /var/log/ltm:
err mcpd[6095]: 01070734:3: Configuration error: Configuration from primary failed validation: 010717ac:4: Configuration Warning: The is-recategory flag in url-category (/Common/categoryname) is reset to false, because the last url has been removed.... failed validation with error 17242028.
notice clusterd[7358]: 013a0006:5: Failed to send cluster packet; disconnecting
info sod[4418]: 010c0009:6: Lost connection to mcpd - reestablishing.
notice mcpd[4424]: 0107092a:5: Secondary slot 3 disconnected
Conditions:
-- VCMP secondary blades
-- URL categories are modified or deleted
Impact:
Unexpected failover when modifying SWG Categories
Workaround:
None
1644497-4 : TMM retains old Certificate Revocation List (CRL) data in memory until the existing connections are closed
Links to More Info: BT1644497
Component: TMOS
Symptoms:
In TMM memory, the old CRL data is available until the existing connections are closed. This may exhaust TMM memory.
Conditions:
- Connections last for a long time.
- Frequent updates on the CRL.
Impact:
TMM memory exhausts.
Workaround:
- Dynamic CRL or CRLDP on the Client-SSL profile can be configured to dynamically verify the SSL certificate revocation status.
or
- Online Certificate Status Protocol (OCSP) can be enabled on the Client-SSL profile to validate SSL certificate revocation status.
1642301-4 : Loading single large Pulse GeoIP RPM can cause TMM core
Links to More Info: BT1642301
Component: Global Traffic Manager (DNS)
Symptoms:
Creates a TMM core.
Conditions:
Loading large Pulse GeoIP RPM resources.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Use GEOIP Edge database.
1635013-6 : The "show sys service" command works only for users with Administrator role
Links to More Info: BT1635013
Component: TMOS
Symptoms:
A guest or non-root user must be able to use the TMSH “show sys service” command, as there is no rule associated with a schema.
Conditions:
The issue occurs when the user is a non-root user.
Impact:
A non-root user will not be able to run the command even though they have permissions.
Workaround:
None
1632385-1 : Non-ASCII UTF-8 characters are mangled in JSON policy export
Links to More Info: BT1632385
Component: Application Security Manager
Symptoms:
Non-ASCII UTF-8 characters in a JSON policy are mangled when exported in JSON policy.
Conditions:
Values contains Non-ASCII UTF-8 characters and the policy is exported and imported back
Impact:
After re-importing the exported policy, the values change
Workaround:
None
1624557-3 : HTTP/2 with RAM cache enabled could cause BIG-IP to return HTTP 304 with content
Links to More Info: BT1624557
Component: Local Traffic Manager
Symptoms:
When the server replies to BIG-IP with HTTP 304 (not modified) and the BIG-IP system returns the contents of the RAM cache, it will not change the HTTP code 304 returned by the server when sending the cached content back to the client. The client will reject the HTTP 304 with content since it is expecting 200 OK with content.
Conditions:
-- Content in RAM cache has expired
-- The BIG-IP system requests an update from the origin server
-- The origin server returns 304 Not Modified.
Impact:
The BIG-IP system sends the response to the client as a 304 along with the content, causing the client to reject the content.
Workaround:
Disable RAM cache or alternatively have the server never return HTTP 304 but rather the content with 200 OK, even if unchanged.
1623669-2 : False “Illegal dynamic parameter value” violations when extracting parameters from links (HREF)
Links to More Info: BT1623669
Component: Application Security Manager
Symptoms:
Requests may be blocked with the violation “Illegal dynamic parameter value” even though the parameter values were correctly extracted from application responses using “Search in Links” and should be treated as valid.
Conditions:
- A parameter is configured with Dynamic content value
- “Check – Search in Links” is enabled for the parameter
- The parameter value is extracted from response links (HREF)
- The extracted value is later used in a client request while the policy is enforced
Impact:
Legitimate application traffic may be blocked because values extracted from links are not recognized as valid dynamic parameter values.
Workaround:
None
1621977-2 : Rewrite memoryleak with "REWRITE::disable" irule
Links to More Info: BT1621977
Component: Access Policy Manager
Symptoms:
Rewrite memory leak.
Conditions:
"REWRITE::disable" irule attached to virtual server.
Impact:
Rewrite memory usage is high.
Workaround:
Avoid using 'REWRITE::disable'
If only URL rewriting required (and not content rewriting), the below custom iRule which is designed exclusively for URL rewriting can be utilized,
===========
when HTTP_REQUEST {
if {[HTTP::host] equals "<JS file name>"}
{
HTTP::uri [string map {F5CH=J F5CH=I} [HTTP::uri]]
HTTP::uri [string map {F5CH=H F5CH=I} [HTTP::uri]]
}
}
===========
1615081-4 : Remove SHA and AES Constraint Checks in SNMPv3
Links to More Info: BT1615081
Component: TMOS
Symptoms:
SNMPv3 user cannot be created with a combination of SHA-2 and AES.
The following errors are observed:
> 'SHA-256 + AES' returns "The AES privacy protocol keys cannot be shorter than 192 with SHA-2 auth protocol."
> 'SHA-512 + AES' returns "The AES privacy protocol keys cannot be shorter than 192 with SHA-2 auth protocol."
> 'SHA + AES-256' returns "SHA-2 auth protocol is required with longer AES keys."
> 'SHA + AES-192' returns "SHA-2 auth protocol is required with longer AES keys."
Conditions:
- Creating SNMPv3 user with combination of SHA-2 and AES.
Impact:
Unable to create SNMPv3 user with lower keys.
Workaround:
None
1612201-3 : Malformed certificates found in local /config/httpd/conf/ssl.crt/server.crt
Links to More Info: BT1612201
Component: Global Traffic Manager (DNS)
Symptoms:
The gtm_add command fails with:
"ERROR: found "END CERT..." without BEGIN at line: 0.
ERROR: Malformed certificates found in local /config/httpd/conf/ssl.crt/server.crt."
Conditions:
A device certificate in PEM format contains a newline as CRLF:
-- Create device certificate where "-----BEGIN CERTIFICATE-----" is terminated with CRLF ('\r\n' 0x0D 0x0A) instead of LF ('\n' 0x0A)
-- Perform the gtm_add.
Impact:
The gtm_add command fails with a malformed certificate error.
Workaround:
To mitigate use openssl x509 to convert CRLF to LF:
# cp /config/httpd/conf/ssl.crt/server.crt /config/httpd/conf/ssl.crt/server.crt-back
# openssl x509 -in /config/httpd/conf/ssl.crt/server.crt-back > /config/httpd/conf/ssl.crt/server.crt
1603541-2 : Platform_agent crashes
Links to More Info: BT1603541
Component: F5OS Messaging Agent
Symptoms:
Platform_agent is crashing continuously, and core files are found.
Conditions:
The Platform_agent crashes while running stability on the hardware.
Impact:
BIG-IP tenant communicates with the F5OS host for l2 configuration and receives packet states via platform_agent.
If services restart continuously, it may not configure l2, and states may be incorrect.
Workaround:
None
1602629-4 : Tmm_mcpmsg_print can trigger SOD
Links to More Info: BT1602629
Component: TMOS
Symptoms:
TMM is killed by SOD.
Conditions:
Conditions are unknown, it was encountered when ID 1047789 was encountered, see https://cdn.f5.com/product/bugtracker/ID1047789.html
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
1602345 : Resource records are not always created when wideips are created in a bundle
Links to More Info: BT1602345
Component: Global Traffic Manager (DNS)
Symptoms:
Resource records are not created for some of the created WideIPs.
Conditions:
WideIPs are created in a bundle.
Impact:
Resource records are missing.
Workaround:
Wait for more than a minute before creating another wideip;
Or
When resource records are found missing, delete the related wideips and also delete related db zone file for that wideip, then recreate the wideip.
1602209-4 : The bigipTrafficMgmt.conf file is not copied from UCS to /config/snmp★
Links to More Info: BT1602209
Component: TMOS
Symptoms:
After restoring a UCS file, or after an upgrade, the file /config/snmp/bigipTrafficMgmt.conf is not updated.
Conditions:
The /config/snmp/bigipTrafficMgmt.conf has been modified.
Impact:
If the file was modified, the modifications are lost on upgrade or UCS install. The file will need to be modified again and snmpd restarted, and restarted on all blades/slots.
Workaround:
Edit the bigipTrafficMgmt.conf by hand after the upgrade.
After the above config file has been modified and saved, the "snmpd" daemon must be restarted, using one of two command variants:
(on a BIG-IP appliance or VE system)
# bigstart restart snmpd
(on a a multi-slot VIPRION or vCMP guest)
# clsh bigstart restart snmpd
1601517-1 : BD daemon crash on specific scenario
Links to More Info: BT1601517
Component: Application Security Manager
Symptoms:
With the ASM module licensed, provisioned and configured, the bd daemon may crash while processing incoming traffic.
Conditions:
Although a specific trigger has not been identified, this issue may occur when processing very large (several megabytes) JSON payloads.
Impact:
Traffic disrupted while bd restarts.
Workaround:
None
1600229-2 : Sometimes, admin is unable to apply policies until failover
Links to More Info: BT1600229
Component: Access Policy Manager
Symptoms:
Applying an access policy appears to not work and appears as "yellow" even after clicking it multiple times.
Conditions:
OAuth client agent has "using-dynamic-server enabled" and configured to some session variable that can be populated from an iRule.
Impact:
-- apmd memory increases
-- apmd will be busy applying the huge configuration.
-- The access policy is not applied and always appears yellow in spite of clicking multiple times.
Workaround:
None
1599841-1 : Partition access is not synced to Standby device after adding a remote user locally.
Links to More Info: BT1599841
Component: TMOS
Symptoms:
The local user created for the remote user does not have the same partition access for Standby device as it does for the Active device in the HA pair.
Conditions:
1) Log into the Active device as a remote user
2) Create a local user for this remote user (same name for the user)
3) Sync to the BIG-IP HA peer.
Impact:
The local user created has access only to the Active device and cannot login to the Standby one.
Workaround:
None
1598405-5 : Intermittent TCP RST error 'HTTP internal error (bad state transition)' occurs for larger files when the Explicit Proxy virtual server uses HTTP_REQUEST_SEND iRule event
Links to More Info: BT1598405
Component: Local Traffic Manager
Symptoms:
BIG-IP sends a TCP RST with the error message ‘bad state transition’ when the HTTP_REQUEST_SEND iRule event is triggered after the completion of the TLS handshake and acknowledgement by BIG-IP from the server.
Conditions:
- BIG-IP1 is a proxy for clients
- BIG-IP2 is provisioned with LTM and APM, connects to the server
- BIG-IP2 has ACCESS::session iRule command in HTTP_REQUEST_SEND event
Impact:
Client-side traffic may get disrupted.
Workaround:
None
1598381-1 : Unable to set the key-usage setting while renewing the CSR
Links to More Info: BT1598381
Component: Local Traffic Manager
Symptoms:
While renewing the CSR, key-usage value is set to empty.
Conditions:
While renewing the CSR with key-usage.
Impact:
Unable to configure the key-usage when renewing the CSR.
Workaround:
As a workaround, delete the complete certificate from GUI and create it using the below commands on CLI
> tmsh create sys crypto key test100.com key-size 2048 key-type rsa-private
> tmsh create sys crypto csr test100.com common-name \"test100.com\" key test100.com key-usage digitalSignature
Note: Here 'test100.com' is the certificate name.
1596637-2 : TLS1.3 with c3d and ocsp handshake failure
Links to More Info: BT1596637
Component: Local Traffic Manager
Symptoms:
SSL handshakes fail, and TLS clients send 'Bad Record MAC' errors.
Conditions:
-- TLS1.3 connection configured with c3d and ocsp.
Impact:
-- A handshake failure occurs.
Workaround:
Disable ocsp or use TLS1.2.
1596409-2 : Low thresholds for tcp-ack-ts vector caused outage after upgrade to v17.1★
Links to More Info: BT1596409
Component: TMOS
Symptoms:
After an upgrade from v15 or v16 to v17.1, you may encounter service outages caused by low thresholds for the TCP ACK (TS) DoS vector.
Conditions:
The upgrade process retains old threshold values (Detection EPS Threshold: 200, Mitigation EPS Threshold: 100), which are too low compared to the new defaults.
Impact:
These low thresholds trigger frequent DoS attack detections, leading to disruptions in service.
Workaround:
Change the threshold to the new defaults or or any reasonable values accordingly.
For example:
#tmsh modify security dos device-config dos-device-config dos-device-vector { tcp-ack-ts {default-internal-rate-limit 300000 detection-threshold-pps 200000}}
1596313-2 : Deleting and re-adding a LAG on F5OS causes a validation failure in mcpd, therefore the trunk on the tenant has no interfaces
Links to More Info: BT1596313
Component: TMOS
Symptoms:
When creating an HA group with a trunk in an LTM tenant, after the first reboot an error is thrown.
“Invalid attempt to register an n-stage validator, the stage must be greater than the current stage, and within the range 1 to 101 inclusive, current stage : 7 registered: 5 Unexpected”
Conditions:
-- BIG-IP tenant running on F5OS
-- High availability system
-- HA group with a trunk
-- The tenant is rebooted for the first time
Impact:
No impact on tmm VLAN traffic
Workaround:
Run the 'tmsh create sys ha-group' command again.
1590517-1 : High CPU utilization when enabling IPS + HTTP/2 Profile
Links to More Info: BT1590517
Component: Protocol Inspection
Symptoms:
When running HTTP/2 requests with all IPS signatures and compliance checks enabled, 100% TMM CPU utilization peaks occur.
Conditions:
-- Virtual server with an IPS and HTTP2 profile
-- HTTP2 traffic
Impact:
HTTP/2 traffic slowdown occurs, which impacts performance.
Workaround:
To help optimize CPU utilization, enable only the necessary IPS signatures and compliance checks based on specific requirements, rather than activating all available options. While this targeted approach reduces the system’s processing load and maintains essential protections, it may not completely eliminate CPU usage spikes under high traffic or intensive processing demands.
1589629-4 : An ICMPv6 Neighbor Solicitation sent to the last address on an IPv6 subnet uses the wrong Destination MAC address
Links to More Info: BT1589629
Component: Local Traffic Manager
Symptoms:
The destination MAC address of the ICMPv6 Neighbor Solicitation message is incorrect.
Conditions:
An IPv6 SelfIP address is used, and tmm attempts to resolve the address of (for example) an IPv6 pool memeber which is using the last IPv6 address in the available subnet range.
Impact:
Nodes on the network do not respond to ICMPv6 Neighbor Solicitation messages.
In large environments with many affected addresses, this could potentially contribute to a broadcast storm or degrade overall network performance.
Workaround:
None (other than avoiding the use of the last address in the IPv6 subnet range)
1589421-1 : LTM Monitor not shown in Pool Member "Health Monitors" if Transparent attribute changes
Links to More Info: BT1589421
Component: TMOS
Symptoms:
If an LTM monitor is created with an alias address configured and assigned to a pool or pool member(s), then the monitor's "transparent" attribute is changed (either from enabled to disabled, or from disabled to enabled), the monitor no longer appears in the Local Traffic GUI in the "Health Monitors" list for an affected pool member.
Conditions:
This occurs when all of the following conditions are true:
-- An LTM health monitor is configured with an Alias Address and/or Port (Destination field in TMSH)
-- The monitor is assigned to an LTM pool and/or pool member(s)
-- The monitor's Alias Address and/or Port are different from the address of the assigned pool member
-- After the monitor is assigned to the LTM pool and/or pool member(s), its "transparent" attribute is changed (either from enabled to disabled, or from disabled to enabled)
-- The list of Health Monitors assigned to a given pool member is viewed in the BIG-IP LTM GUI
(Local Traffic --> Pools : Pool List --> select pool --> Members --> select member)
Impact:
The assignment of the monitor to the pool member is not immediately visible in the BIG-IP LTM GUI in the "Health Monitors" list for the affected pool member(s).
When viewing the properties of the pool member in the Local Traffic GUI, if the "Advanced" Configuration view is selected, the Health Monitors assigned to the pool member can be viewed. If the "Inherit from Pool" option is configured, the Health Monitors assigned to the pool can be viewed under the Properties tab for the pool.
Workaround:
When viewing the properties of the pool member in the BIG-IP LTM GUI, if the "Advanced" Configuration view is selected, the Health Monitors assigned to the pool member can be viewed. If the "Inherit from Pool" option is configured, the Health Monitors assigned to the pool can be viewed under the Properties tab for the pool.
1586745-2 : LACP trunk status became DOWN due to bcm56xxd failure
Links to More Info: BT1586745
Component: TMOS
Symptoms:
Lacp, lldp reports trunk(s) down and you may observe the below logs.
err lldpd[7489]: 01570004:3: HAL send PDU failed
err lldpd[7489]: 01290003:3: HalmsgTerminalImpl_::sendMessage() Unable to send to any BCM56XXD address
err lldpd[7489]: 01570004:3: HAL send PDU request failed
info bcm56xxd[10383]: 012c0016:6: TableDmaTimeOut: ING_SERVICE_COUNTER_TABLE_X.ipipe0 interrupt timeout
err lacpd[10571]: 01290003:3: HalmsgTerminalImpl_::sendMessage() Unable to send to any BCM56XXD address
err lacpd[10571]: 01160005:3: HalMsgHandler.cpp:125 - HAL send PDU request failed
info bcm56xxd[10383]: 012c0016:6: TableDmaTimeOut:_soc_xgs3_mem_dma, Abort Failed
info bcm56xxd[10383]: 012c0016:6: TableDmaTimeOut: FP_COUNTER_TABLE_X.ipipe0 interrupt timeout
info bcm56xxd[10383]: 012c0016:6: TableDmaTimeOut:_soc_xgs3_mem_dma, Abort Failed
info bcm56xxd[10383]: 012c0016:6: TableDmaTimeOut: EFP_COUNTER_TABLE_X.epipe0 interrupt timeout
info bcm56xxd[10383]: 012c0016:6: TableDmaTimeOut:_soc_xgs3_mem_dma, Abort Failed
Conditions:
Not known at this time.
Impact:
An outage was observed
Workaround:
Restart bcm56xxd, lldpd, lacpd process.
1586405-3 : "/f5-h-$$/" repeatedly appened to URL's path every refresh of the page
Links to More Info: BT1586405
Component: Access Policy Manager
Symptoms:
Observe multiple "/f5-h-$$/" in URLs when accessing via Protected Access.
Conditions:
"<base href="xxxxx">" tag in the home page.
Impact:
URLs become lengthy upon every refresh and may lead to webapp misfunction.
Workaround:
Customized iRule
======================
when REWRITE_REQUEST_DONE {
if { [HTTP::path] ends_with "path_to_file1" } {
REWRITE::post_process 1
set rewrite_new 1
}
if { [HTTP::path] ends_with "path_to_file2" } {
REWRITE::post_process 1
set rewrite_new1 1
}
}
when REWRITE_RESPONSE_DONE {
if {[info exists rewrite_new]} {
unset rewrite_new
set rewrite_str {<base href=""f5-h-$$path_in_file1"">}
set rewrite_str_len [string length $rewrite_str]
set strt [string first $rewrite_str [REWRITE::payload]]
if {$strt > 0} {
REWRITE::payload replace $strt $rewrite_str_len {<base href="/f5-w-6578616d706c652e636f6d//path_in_file1">}
}
}
if {[info exists rewrite_new1]} {
unset rewrite_new1
set rewrite_str {<base href="f5-h-$$/path_in_file2">}
set rewrite_str_len [string length $rewrite_str]
set strt [string first $rewrite_str [REWRITE::payload]]
if {$strt > 0} {
REWRITE::payload replace $strt $rewrite_str_len {<base href="/f5-w-6578616d706c652e636f6d//path_in_file2">}
}
}
}
======================
1585153-1 : SSL handshake failures with error message Profile <name> cannot load key/cert/chain
Links to More Info: BT1585153
Component: Local Traffic Manager
Symptoms:
If the BIG-IP configuration has CA bundle manager with auto-sync enabled, it can lead to error
Profile /Common/CAbundle - /config/filestore/files_d/Common_d/certificate_d/:Common:cert2_46889_1 reading: Unknown error.
Conditions:
-- The CA bundle is being modified/updated.
-- An automatic config sync occurs
Impact:
SSL connection are failing for the given virtual server associated with the ssl profile.
Workaround:
If possible, disable auto-sync to avoid the issue.
Otherwise, when the problem happens:
-- Detach the client/server ssl profile from the virtual server, which has association with this file
-- Attach the client/server ssl profile to virtual server again after the file is available
Another workaround is:
Try to open the virtual server in the GUI and update it again with/without any minor change after file is available
1583381-2 : "Insert Secure Attribute" must be enabled and "Insert SameSite Attribute" must be set to "Lax" for pure wildcard cookie in all templates by default
Links to More Info: BT1583381
Component: Application Security Manager
Symptoms:
The pure wildcard cookie configuration "Insert Secure Attribute" is disabled and "Insert SameSite Attribute" is not set to "Lax".
Conditions:
Creating the policy using the policy templates.
Impact:
The configuration is incorrect.
Workaround:
Configure it manually: Enable "Insert Secure Attribute" and set "Insert SameSite Attribute" to "Lax".
1581685-4 : iRule 'members' command counts FQDN pool members.
Links to More Info: BT1581685
Component: Local Traffic Manager
Symptoms:
iRule 'members' command counts and lists FQDN pool members.
Conditions:
- create a pool with at least one FQDN member.
- use the members function in an iRule.
Impact:
iRule with members command will not give the desired result.
Workaround:
When FQDN pool members are present, using the 'members' command in the iRule will not yield the desired result.
1572045-2 : Login page config parameters are still case-sensitive with a case insensitive policy
Links to More Info: BT1572045
Component: Application Security Manager
Symptoms:
A login attempt is not detected.
Conditions:
- The policy is configured case-insensitive
- Upper case characters are used in the login page config parameters.
Impact:
Login attempt not detected.
Workaround:
Use only lower case for login page parameters configuration.
1571817-4 : FQDN ephemeral pool member user-down state is not synced to the peer device
Links to More Info: BT1571817
Component: TMOS
Symptoms:
One or more FQDN ephemeral pool members on a device group member is showing an incorrect state for the pool member.
Conditions:
1. Create the FQDN pool with an FQDN template pool member and ensure that the state of any ephemeral pool member associated with the FQDN template pool member is 'up'.
2. On one member of the device group, modify the state of the FQDN template pool member to 'user-down'.
3. Synchronize the configuration to the device group.
4. Check the status of the pool on the same member of the HA pair and verify that the state of any ephemeral pool member associated with the FQDN template pool member is 'user-down'.
5. On the other member of the device group, the state of any ephemeral pool member associated with the FQDN template pool member is 'up'.
Impact:
The state of the ephemeral pool members on one member of the device group is incorrect.
Workaround:
None
1560449-2 : Rest_logintegrity does not suppress output to stderr
Links to More Info: BT1560449
Component: TMOS
Symptoms:
The find command in rest_logintegrity script fails and returns "No such file or directory" when no matching file is found if there are no newly rotated restnoded, restjavad log files whenever the rest_logintegrity script runs as part of the cron job.
Conditions:
When there are no files which matches the below patterns in the script:
"/var/log/restjavad.[1-9]*.log", "/var/log/restnoded/restnoded[1-9]*.log".
Impact:
Overload of emails with message similar to:
find: '/var/log/restnoded/restnoded[1-9]*.log': No such file or directory
Workaround:
Creating the files as below mitigates the error
touch /var/log/restnoded/restnoded1.log
touch /var/log/restjavad.1.log
1552913-2 : For advanced/premium deployment of BD profile, incomplete single js download may lead to blocking Protected URIs.
Links to More Info: BT1552913
Component: Bot Defense
Symptoms:
For Advanced/Premium deployment of a BD profile, if a request to protected URI occurs before the page is fully loaded, incomplete single js download may lead to blocking the Protected URIs.
Conditions:
1. Advanced/Premium deployment of BD profile
2. Protected URI is configured with block / redirect mitigation action.
3. The backend server sends a protected URI request through some script before the entry page is fully loaded.
Impact:
BD may block legitimate requests towards protected URIs.
Workaround:
None
1552517-2 : When F5OS tenants are part of a GTM sync group, rebooting one device may cause monitor flapping on the other
Links to More Info: BT1552517
Component: TMOS
Symptoms:
When an F5OS tenant is part of a GTM sync group and it is rebooted, other members of the sync group may experience flapping monitors.
Conditions:
-- F5OS Tenants
-- GTM provisioned
-- Prober pools configured
Impact:
Flapping GTM monitors when one device is rebooted.
Workaround:
Configure gtmd and big3d to wait until tmm is ready before starting
cp /etc/bigstart/scripts/big3d /etc/bigstart/scripts/big3d.1552517
cp /etc/bigstart/scripts/gtmd /etc/bigstart/scripts/gtmd.1552517
sed -i 's/tmm running/tmm ready/' /etc/bigstart/scripts/gtmd /etc/bigstart/scripts/big3d
1549397-4 : Pool member from statically-configured node deleted along with ephemeral pool member using same IP address
Links to More Info: BT1549397
Component: Local Traffic Manager
Symptoms:
If an LTM pool is created containing both FQDN and statically-configured pool members using different port numbers, and the FQDN name resolves to the same IP address as the statically-configured node, if the FQDN name no longer resolves to that IP address, the statically-configured pool member may be deleted along with the ephemeral pool member with the same IP address.
In this configuration, the pool in question may be found to contain:
-- a statically-configured (not ephemeral) pool member referencing the statically-configured node
-- an ephemeral pool member with the same node name and IP address as the statically-configured node
Both pool members have the same node name and IP address, since only one node can exist for a given IP address. This prevents a separate ephemeral node from being created with the same IP address as the statically-configured node, forcing both pool members to reference the same statically-configured node with the given IP address.
Conditions:
-- The LTM pool contains both FQDN pool members and pool members referencing statically-configured nodes.
-- The FQDN and statically-configured pool members use different port numbers.
-- The FQDN name resolves to one or more IP addresses that match the statically-configured node.
-- The DNS server subsequently no longer resolves the FQDN name to that IP address.
Impact:
Pool members may be deleted unexpectedly when DNS records/name resolution changes.
Workaround:
To work around this issue:
-- Use the same port number for both statically-configured pool members and FQDN pool members.
-- Add the statically-configured pool member(s) to the pool before adding any FQDN pool members which resolve to the same IP address(es).
1549341-2 : BD: block response body is truncated at 1024Bytes
Links to More Info: BT1549341
Component: Bot Defense
Symptoms:
- Client receives truncated block response body
Conditions:
- Bot Defense profile configured with protected endpoints having mitigation action as "Block". The size of the configured Block response body is greater than 1024Bytes.
- BD profile is attached to a virtual server
- Client request is classified as Malicious and block mitigation action is taken.
Impact:
The client will receive a truncated block response body
1497633-4 : TMC incorrectly set /32 mask for virtual-address 0.0.0.0/0 when attached to a VS
Links to More Info: BT1497633
Component: Local Traffic Manager
Symptoms:
When a 0.0.0.0/0 virtual-address created by a wildcard virtual server and a Traffic-Matching-Criteria (TMC) is attached to it, the mask for the 0.0.0.0 virtual address will be incorrectly modified.
Conditions:
Create a wildcard Virtual server with virtual address 0.0.0.0/0.
Attach a Traffic-Matching-Criteria with destination and source addresses as 0.0.0.0/0.
Impact:
The virtual server's address is advertised with an incorrect mask of /32, making the redistributed route via ZebOS ineffective.
1497061-4 : Added support for VLANs above 512 with xnet-IAVF driver
Links to More Info: BT1497061
Component: TMOS
Symptoms:
TMM crashes when there are more than 512 VLANs
Conditions:
-- BIG-IP uses xnet-IAVF driver
-- Create more than 512 VLANs
Impact:
Traffic disrupted while tmm restarts.
You cannot create an environment to handle >512 VLANs
Workaround:
Reduce the number of VLANs to 512 or below 512.
1489941-2 : PKCE 'code_challenge_methods_supported" to be included in openid-configuration well-know-uri
Component: Access Policy Manager
Symptoms:
OAuth AS does not include PKCE "code_challenge_methods_supported" in openid-configuration well-know-uri
Conditions:
OAuth AS to support PKCE
Impact:
OAuth Client is unaware of the support for OAuth AS and PKCE parsing from the openid-configuration well-know-uri
Workaround:
None
1489817-4 : Fix crash due to number of VLANs
Links to More Info: BT1489817
Component: TMOS
Symptoms:
TMM crashes.
Conditions:
- xnet-iavf driver
- Number of VLANs for a given interface >=128
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Reduce the number of VLANs to <128
1485557-2 : OAuth token not found for OAuth server with Bearer SSO
Links to More Info: BT1485557
Component: Access Policy Manager
Symptoms:
When the BIG-IP Administrator configures BIG-IP as OAuth RS with OAuth Bearer Single Sign On, WebSSO fails as an empty access token is included as a session variable.
Conditions:
OAuth Scope sets different access_token variables except for the one that is acceptable by WebSSO.
Impact:
BIG-IP Administrator fails to implement a successful OAuth Bearer SSO on OAuth RS.
1463089-1 : TMM crash because of corrupted MQTT queue
Links to More Info: BT1463089
Component: Local Traffic Manager
Symptoms:
Tmm crashes while terminating an MQTT flow. Core file analysis indicates MQTT queue corruption.
Conditions:
LTM configured with TCP and MQTT.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
1462337-5 : Intermittent false PSU status (not present) through SNMP
Links to More Info: BT1462337
Component: TMOS
Symptoms:
PSU status displays as (2) Not Present through SNMP.
or
sysChassisFanStatus status displays as (2) Not Present through SNMP.
Conditions:
Conditions are unknown. It occurs intermittently.
Impact:
Intermittent false alarm in SNMP monitoring.
Workaround:
None
1455805-2 : MCPD unstable/inoperative after copying SNMP configuration from another BIG-IP
Links to More Info: BT1455805
Component: TMOS
Symptoms:
If SNMP configuration that contains Secure Vault-protected attributes ("$M$...") is copied from a BIG-IP system to another and the devices do not have the same Secure Vault master key, the target device will appear to accept the configuration, but will be unable to decrypt the attributes.
If the system is subsequently rebooted, MCPD will remain inoperative or restart repeatedly during startup.
The LTM log files will contain error messages similar to the following:
bigip01 notice mcpd[30645]: 01071027:5: Master key OpenSSL error: 4008867572:error:06065064:digital envelope routines:EVP_DecryptFinal_ex:bad decrypt:evp_enc.c:664:
bigip01 notice mcpd[30645]: 01b00001:5: Processed value is empty: class name (usmuser) field name ()
bigip01 err mcpd[30645]: 01071684:3: Unable to encrypt application variable (/Common/ifoobar_1_1 auth_password usmuser /Common/snmpd).
Or
bigip01 notice mcpd[7011]: 01b00001:5: Processed value is empty: class name (trapsess) field name ()
bigip01 err mcpd[7011]: 01071684:3: Unable to encrypt application variable (/Common/i192_0_2_1 auth_password trapsess /Common/snmpd).
The LTM log file may contain this log message, indicating that MCPD exited and restarted while attempting to load the configuration:
bigip01 emerg load_config_files[25201]: "/usr/bin/tmsh -n -g -a load sys config partitions all " - failed. -- Error: failed to reset strict operations; disconnecting from mcpd. Will reconnect on next command.
Conditions:
- SNMP configuration that contains Secure Vault-encrypted attributes ("$M$..."), present as SNMPv3 auth-password and/or privacy-password attributes
- SNMP configuration is copied from a BIG-IP system to another BIG-IP system, and the two devices do not share the same Secure Vault master key.
Impact:
- SNMP configuration does not function.
- If the device is rebooted or MCPD is restarted, the system will remain INOPERATIVE or MCPD will be in a restart loop.
Workaround:
Do not copy SNMP configuration with encrypted attributes between disparate devices.
If a device is currently in an inoperative state and affected by this issue:
- Create a backup copy of /config/bigip_base.conf
- Manually edit bigip_base.conf and remove the SNMPv3 users and traps
- If the system does not recover automatically, restart MCPD or reboot the device once.
1429813-5 : ASM introduce huge delay from time to time
Links to More Info: BT1429813
Component: Application Security Manager
Symptoms:
During high traffic, the response to some requests will be delayed for more than 1 second.
Conditions:
ASM Policy attached to the Virtual Server and during high traffic conditions.
Impact:
Some critical URLs like payment links, will timeout for the user.
Workaround:
None
1411365-1 : CMP forwarded flows can be removed by other CMP forwarded flows incorrectly
Links to More Info: BT1411365
Component: Local Traffic Manager
Symptoms:
BIG-IP may fail to forward server-side traffic if flow forwarding occurs due to an overload scenario, specifically due to flow collisions on the server-side connection when using the source-port preserve-strict option with UDP virtual configuration.
Conditions:
BIG-IP configured with UDP virtual configuration with source-port preserve-strict.
- CMP forwarding occurs when traffic on ingress is managed by a different TMM on egress.
- Overload condition occurs on TMM that leads to forwarding the flow by keeping server-side connection.
- Forwarded flow causes existing connection flow to be removed and interrupts current traffic flow.
Impact:
Forwarding flow removes the existing flow and causes traffic to be dropped.
Workaround:
Clear the existing connection from the connection table. For more information, refer to the article K53851362: Displaying and deleting BIG-IP connection table entries from the command line.
1410441-3 : Large file transfer over SFTP/SSH proxy failure
Links to More Info: BT1410441
Component: Advanced Firewall Manager
Symptoms:
- Large file transfer (>110MB) fails using the SFTP PUT command through a virtual server configured with AFM SSH Proxy.
- Depending on the boundary byte that gets sent from BIG-IP towards the backend server, the server sends back a SSH2_MSG_UNIMPLEMENTED for a packet type corresponding to the incorrect byte being interpreted as the message type.
Conditions:
- SSH Proxy profile attached to BIG_IP Virtual Server.
- Large file (>110MB) is uploaded using PUT command through the virtual server.
Impact:
File transfer fails.
Workaround:
Workaround options are:
- Limit the file transfer rate through the SFTP client.
Ex:
sftp -l 1000 <VS-IP>
put <filename>
- Use a smaller buffer size (eg. 1400).
Ex:
sftp -B 1400 <VS-IP>
put <filename>
1397001-2 : Memory leak in websense when RTU is updated
Links to More Info: BT1397001
Component: Access Policy Manager
Symptoms:
URLDB stops responding and you may observe below logs
crit tmm5[27171]: 01790602:2: [C] <IP:port> -> <IP:port>: (ERR_EXPIRED) URL category lookup failed
Conditions:
Websense database update.
Impact:
SSL Orchestrator traffic cannot be forwarded.
Workaround:
Restart urldb:
bigstart restart urldb
Impact of workaround: restarting urldb causes traffic to be disrupted while urldb is restarting.
1395349-1 : The httpd service shows inactive/dead after "bigstart restart httpd"
Links to More Info: BT1395349
Component: TMOS
Symptoms:
The systemd service unit for httpd shows a status of inactive (dead) after you restart httpd using bigstart restart httpd. For example:
# systemctl status httpd
* httpd.service - LSB: start and stop Apache HTTP Server
Loaded: loaded (/etc/rc.d/init.d/httpd; enabled; vendor preset: enabled)
Active: inactive (dead) since Mon 2023-11-13 09:55:06 GMT; 5s ago
In versions v15.1.10.5 and above in v15.1.x, v16.1.5 and above in v16.1.x, and v17.1.1.4 and above, if a system is affected by this and then a user or process restarts httpd via systemd, the GUI will stop responding and return 403 Forbidden errors. This happens when attempting to renew or update the device certificate via the GUI.
Conditions:
Executing the command bigstart restart httpd. This will also happen behind-the-scenes when making HTTP configuration changes via tmsh/the GUI/iControl.
Impact:
httpd is running normally, but systemd is not aware of it.
Workaround:
To confirm httpd is running, you can use the following commands:
bigstart status httpd
OR
ps ax | grep '[h]ttpd'
If you would like to clear the stale state, restart httpd via its systemd service unit twice:
systemctl restart httpd && systemctl restart httpd
If the GUI is returning 403 Forbidden errors for everything, restart httpd ("systemctl restart httpd && systemctl restart httpd").
1379649-5 : GTM iRule not verifying WideIP type while getting pool from TCL command
Links to More Info: BT1379649
Component: Global Traffic Manager (DNS)
Symptoms:
When the pool name is same for different pool types, the GTM iRule cannot segregate the pool types thus giving a wrong DNS response.
Conditions:
-- Both A/AAAA same name WideIP and pools.
-- GTM iRule with pool command pointing to common pool name in different WideIP types.
Impact:
Traffic impact as a non-existent pool member address in DNS response.
Workaround:
None
1366269-5 : NAT connections might not work properly when subscriber-id is confiured.
Links to More Info: BT1366269
Component: Advanced Firewall Manager
Symptoms:
When subscriber-aware NAT is configured or subscriber-id logging is enabled under NAT log profile some NAT connections might not work properly.
Conditions:
- Subscriber-aware NAT or NAT logging with subscriber-id enabled.
Impact:
Some NAT connections fail to complete.
Workaround:
Disable 'subscriber-id' under NAT logging profile.
1365769-2 : When multiple vlans are in the zone, only some vlans match the ACL-Policy
Links to More Info: BT1365769
Component: Advanced Firewall Manager
Symptoms:
Packets could circumvent the firewall rule if the rule uses a zone which includes multiple VLANs.
Conditions:
Firewall policies created with a Zone including two or more VLANs in the created Zone.
Impact:
The packets could circumvent the firewall rule.
Workaround:
None
1361021-4 : The management interface media on a BIG-IP Tenant on F5OS systems does not match the chassis
Links to More Info: BT1361021
Component: TMOS
Symptoms:
The management interface media on a BIG-IP tenant running on F5OS systems does not match the media/speed of the management interface on the system controllers.
Running 'tmsh show net interface' reports the media of the management interfaces (i.e. 'mgmt' or '1/mgmt') as "100TX-FD".
Conditions:
BIG-IP tenant running on F5OS systems (rSeries or VELOS).
Impact:
The media is reported as "100TX-FD".
Workaround:
Ignore the speed reported for the tenant's management interface(s), and instead, look at the speed of the management interfaces as reported in F5OS.
While running confd, run the following command to see the correct media settings:
VELOS: show interfaces interface 1/mgmt0
rSeries: show interfaces interface mgmt
1352213-4 : Handshake fails with FFDHE key share extension
Links to More Info: BT1352213
Component: Local Traffic Manager
Symptoms:
SSL handshake fails to complete and various errors show in the LTM logs
01010025:2: Device error: crypto codec Couldn't create an OpenSSL EC group object OpenSSL error:00000000:lib(0):func(0):reason(0)
01010282:3: Crypto codec error: sw_crypto-1 Couldn't initialize the elliptic curve parameters.
01010025:2: Device error: crypto codec No codec available to initialize request context.
Conditions:
An SSL profile uses TLS1.3, and a TLS Client Hello attempts to use FFDHE as part of the key share extension.
Impact:
SSL handshake fails and results in connection failure.
Workaround:
Set the SSL profile to disallow using FFDHE groups.
1350485-2 : When the parameter value contains '@', domain name is not properly extracted
Links to More Info: BT1350485
Component: Application Security Manager
Symptoms:
Request is blocked with Illegal Parameter type violation
Conditions:
-- Parameter value type set to 'Auto Detect'
-- Illegal data type violation is enabled
Impact:
Request blocked if the parameter Url values having '@' followed by other special characters
Workaround:
Change the type to alpha-numeric
1350417-3 : "Per IP in-progress sessions limit (xxx) exceeded" message occurs before number of "In-Progress session" reaches the limit
Links to More Info: BT1350417
Component: Access Policy Manager
Symptoms:
You may observe the below in /var/log/apm.
warning tmm2[20687]: 01490547:4: Access Profile <AP Name>: Per IP in-progress sessions limit (2048) exceeded for <IP Address>
Conditions:
-- No specific conditions, it happens when Access Profiles are attached to a virtual server.
Impact:
New sessions may be rejected when this message was logged.
Workaround:
Keep large value for " Per IP In-Progress session" limit.
1341093-5 : MCPD returns configuration error when attaching a client SSL profile containing TLS 1.3 to a virtual server with HTTP/2 profile
Links to More Info: BT1341093
Component: Local Traffic Manager
Symptoms:
A configuration error is seen on BIG-IP as below:
01070734:3: Configuration error: In Virtual Server (/Common/vsname) an http2 profile with enforce-tls-requirements enabled is incompatible with client ssl profile '/Common/PORTAL-3119-cssl-tls13'; cipher ECDHE-RSA-AES128-GCM-SHA256 must be available
Conditions:
- Virtual Server with cipher rule that uses tlsv1_3 ciphers only
- Cipher group
- Client-SSL profile and HTTP/2 profile with enforce-tls-requirements enabled
Impact:
HTTP/2 and Client-SSL Profiles with TLS 1.3 is not supported.
Workaround:
None
1331037-5 : The message MCP message handling failed logs in TMM with FQDN nodes/pool members
Links to More Info: BT1331037
Component: TMOS
Symptoms:
When an FQDN node or pool member is created, one or more messages of the following form may appear in the TMM logs (/var/log/tmm*):
notice MCP message handling failed in 0x<hex value>
Conditions:
This may occur when creating an FQDN node or pool member on affected versions of BIG-IP.
Impact:
There is no known impact of this issue, besides the appearance of "notice" level messages in the TMM logs.
Workaround:
None
1330213-6 : SIGABRT is sent when single quotes are not closed/balanced in TMSH commands
Links to More Info: BT1330213
Component: TMOS
Symptoms:
When a TMSH command is entered with only one single quote (unbalanced quotes), the TMSH aborts.
For example:
[root@test-mem-bigip:Active:Standalone] config # tmsh -c "list /net | grep 'foo"
terminate called after throwing an instance of 'CLI::SyntaxError'
what(): single quotes are not balanced
Aborted (core dumped)
Conditions:
When only one single quote is used in a TMSH command, the SIGABRT occurs.
For example:
# tmsh -c "list /net | grep 'foo"
or
# tmsh -c "list /net '"
Impact:
TMSH crashes and a core file is generated.
Workaround:
None
1329509-4 : TCL error 'ERR_VAL (line 1) invoked from within "HTTP::path"'.
Links to More Info: BT1329509
Component: Local Traffic Manager
Symptoms:
Under specific conditions, when the client accesses an HTTP(S) virtual server, an iRule execution error occurs. Client-side HTTP(S) connection is terminated by RST when an iRule execution error occurs.
err tmm[xxxxx]: 01220001:3: TCL error: /Common/test-rule <HTTP_REQUEST> - ERR_VAL (line 1) invoked from within "HTTP::path"
Conditions:
This issue occurs under the following conditions:
-- HTTP::path command is used on an iRule.
-- The iRule is attached to an HTTP(S) virtual server.
-- Client's HTTP(S) request URI includes square bracket character, "[" (0x5b) or "]" (0x5d).
-- Client's HTTP(S) request URI includes only opening square bracket "[" or only closing square bracket "]", for example, "GET [ HTTP/1.0\r\n\r\n".
NOTE: When an explicit proxy is configured in the HTTP profile, a client request containing only an opening square bracket "[" will result in the BIG-IP responding with a 400 Bad Request error. In this case, the TCL error may not be visible.
Impact:
The iRule execution fails with a TCL error, as shown in the example below, and the client will receive a TCP RST from the virtual server when the iRule fails to execute.
err tmm[xxxxx]: 01220001:3: TCL error: /Common/test-rule <HTTP_REQUEST> - ERR_VAL (line 1) invoked from within "HTTP::path"
Workaround:
Add "-normalized" command option to HTTP::path command.
ltm rule /Common/test-rule-normalized {
when HTTP_REQUEST {
if { [HTTP::path -normalized] contains "test" } {
HTTP::respond 200 -content "OK !!!\n"
} else {
HTTP::respond 200 -content "Hit \"else\" statement !!!\n"
}
}
}
Note: Adding the "-normalized" command option can change the URI, therefore it is highly recommended to thoroughly test and verify its behaviour before implementing the workaround in a production environment.
1327649-4 : Invalid certificate order within cert-chain associated to JWK configuration
Links to More Info: BT1327649
Component: TMOS
Symptoms:
An error occurs while validating the certificate and certificate chain in JSON web key configuration:
General error: 01071ca4:3: Invalid certificate order within cert-chain (/Common/mycert.crt) associated to JWK config (/Common/myjwk). in statement [SET TRANSACTION END]
Conditions:
Issue occurs when the certificate chain contains three or more certificates.
The proper order in issuing:
endpointchild
|
endpoint
|
intermediate
|
ca
Impact:
You are unable to create a policy with key configuration for OAuth when the certificate chain contains more than two certificates.
Workaround:
Note that there is no impact when the certificate chain order is valid and contains only two certificates in the chain.
1322413-5 : After config sync, FQDN node status changes to Unknown/Unchecked on peer device
Links to More Info: BT1322413
Component: TMOS
Symptoms:
If changes are made to the FQDN node configuration, which has a node monitor configured, and the configuration is synced to a device group, ephemeral nodes generated from the FQDN node may show Availability as “unknown” and Monitor Status as “unchecked”.
Conditions:
This may occur on versions of BIG-IP with fixes for ID724824 and ID1006157, under the following conditions:
- BIG-IP systems are configured in a device group
- The device group is configured for Manual Sync (Full or Incremental)
- One or more FQDN nodes are configured with a node monitor (which could be the Default Node Monitor)
- A change is made to the configuration of the FQDN node
- A Full configuration sync is performed (by a Manual sync with the device group configured for a Full sync, as an automatic fallback/recovery action from a failed Incremental sync, or by using the “force-full-load-push” keyword):
tmsh run cm config-sync to-group example-group force-full-load-push
Impact:
The affected nodes will be displayed with an Availability as “unknown” and Monitor Status as “unchecked”.
Workaround:
To resolve this condition, remove and add the node monitor:
- Remove the node monitor from the FQDN node configuration (or from default-node-monitor):
tmsh mod ltm node example monitor none
(tmsh mod ltm default-node-monitor rule none)
- Sync this change to the device group (Incremental sync)
- Add the node monitor again to the FQDN node configuration (or to default-node-monitor):
tmsh mod ltm node example monitor my_node_monitor
(tmsh mod ltm default-node-monitor rule my_node_monitor)
- Sync this change to the device group (Incremental sync)
1321697-1 : Moving VLANs or interfaces between LAGs on F5OS 1.8.0 (R2600) results in loss of connectivity on tenant Self-IP
Links to More Info: BT1321697
Component: TMOS
Symptoms:
After moving interfaces/VLANs from one LAG to another (or from interface to LAG) at the host level, there is no connectivity to the Self-IP on the tenant—even though changes appear correctly reflected on both host and tenant sides. No errors are observed in logs, nor are missing MAC addresses detected.
Conditions:
-- A LAG exists with assigned interfaces and VLANs.
-- Interfaces/VLANs are removed from this LAG.
-- A new LAG is created.
-- The old LAG is removed from the tenant.
-- VLANs are added to a new LAG at host level and verified present on tenant.
Impact:
Tenant Self-IP becomes unreachable after these changes. Network connectivity fails for affected VLANs/interfaces.
Workaround:
Restart MCPD within the tenant using:
bigstart restart mcpd
tmsh save sys config
1316821-3 : SSL::enable not allowed after HTTP::respond
Links to More Info: BT1316821
Component: Local Traffic Manager
Symptoms:
Rule not processed and ltm logs shows this:
TCL error: /Common/connect-irule <HTTP_REQUEST> - Illegal value. HTTP::disable not supported when responding or retrying (line 1) invoked from within "HTTP::disable"
Conditions:
When an iRule has an HTTP::respond followed by an HTTP::disable, the disable is not allowed.
Impact:
iRule not processed.
Workaround:
None
1316481-4 : Large CRL file update fails with memory allocation failure
Links to More Info: BT1316481
Component: TMOS
Symptoms:
When updating a large CRL file in BIG-IP using tmsh, the file may be partially read due to internal memory allocation failure.
Please note that the size of the CRL file causing this issue varies across hardware types, network bandwidth and usage, and system resources.
Conditions:
1. Using tmsh, large CRL file is updated to an existing CRL.
2. This large CRL file is attached to multiple profiles.
3. The tmsh modify command is used multiple time in a short span of time that leads to the memory crunch.
Impact:
When large CRL file is attached to the profile which was partially read due to memory allocation failure, the profile gets successfully updated. Connections to VIP with this profile may have unexpected results. For e.g. client connecting to VIP with a revoked client certificate will succeed as the CRL was only partially read.
Workaround:
1. Dynamic CRL / CRLDP on client-ssl profile can be configured to dynamically verify SSL certificate revocation status.
2. OCSP can be enabled on client-ssl profile to validate SSL certificate revocation status.
1312225-6 : System Integrity Status: Invalid with some Engineering Hotfixes
Links to More Info: BT1312225
Component: TMOS
Symptoms:
After installing an Engineering Hotfix,
when to attempt to verify the TPM system integrity with either the "tpm-status" or "tmsh run sys integrity status-check" command, the following error massage may appear:
System Integrity Status: Invalid
Running the "tpm-status" command with a Verbosity of 1 (or greater) reveals the following detail:
Verifying system integrity...
...
The signature in 17 is valid
Output wrong commandline parameters
cmdline is *ro ima_hash=sha256 mce=ignore_ce *
The pcr value in 17 is invalid.
...
System Integrity Status: Invalid
Conditions:
This may occur if the Engineering Hotfix contains changes which cause the following packages to be included in the Engineering Hotfix ISO:
-- sirr-tmos
-- tboot
But the Engineering Hotfix ISO does not contain the following package:
-- nash-initrd
The contents of the Engineering Hotfix ISO can be checked using the 'isoinfo' utility:
isoinfo -Rf -i <path/to/Hotfix-*.iso> | grep -e sirr -e tboot -e nash
Impact:
The TPM System Integrity Status is shown as Invalid.
This may incorrectly suggest that system integrity has been compromised.
1311053-4 : Invalid response may be sent to a client when a http compression profile and http analytics profile attached to a virtual server
Links to More Info: BT1311053
Component: Local Traffic Manager
Symptoms:
The number 617 and a script is included in the beginning of an HTTP response that is sent to a client.
Conditions:
-- Both the http compression profile and http analytics profile are attached to a virtual server
-- The server replies with a chunked response
Impact:
An invalid HTTP response is sent to the client.
Workaround:
None
1304849-3 : iSeries LCD displays "Host inaccessible or in diagnostic mode"
Links to More Info: K000140512, BT1304849
Component: TMOS
Symptoms:
On rare occasions, while booting up an iSeries BIG-IP system, the LCD may continuously display "Host inaccessible or in diagnostic mode" message for an extended period of time.
Conditions:
This can occur when booting up an iSeries BIG-IP system.
Impact:
LCD is unusable until the system is rebooted.
Workaround:
Wait for 5 minutes. If the LCD is still displaying the "Host inaccessible or in diagnostic mode" message after the specified time period, reboot the BIG-IP system.
1302101-4 : Sflow receiver flows are not established at TMM startup on sDAG platforms due to sDAG delay
Links to More Info: BT1302101
Component: TMOS
Symptoms:
No sflow data is sent.
Conditions:
Either configure a valid sflow receiver and restart the tmm or, configure a valid sflow receiver reachable via dynamic route on non sDAG platforms and restart the tmm.
Impact:
Sflow data is dropped.
Workaround:
Modify the receiver configuration (any field, including description). This allows triggering an update which will get sflow working.
1301897-6 : DAG transition does not complete when TMM starts in FORCED_OFFLINE mode
Links to More Info: BT1301897
Component: TMOS
Symptoms:
When TMM restarts with force-offline enabled, it comes up waiting for a dag_transition. It never completes because CDP proxy never comes up due to no active traffic group in FORCE_OFFLINE mode.
Conditions:
Restarting TMM with force-offline enabled.
Impact:
Tenants show high CPU and idle enforcer constantly starting or exiting.
Workaround:
Do not perform upgrade/restart in force-offline mode.
1301317-4 : Update Check request using a proxy will fail if the proxy inserts a custom header
Links to More Info: BT1301317
Component: TMOS
Symptoms:
Update check fails.
Conditions:
-- Update check is checking for updates
-- A proxy is configured
-- The proxy inserts a header in its response
Impact:
Update check will fail.
Workaround:
Do not add any header in the proxy response.
1298225-1 : Avrd generates core when dcd becomes unavailable due to some reason
Links to More Info: BT1298225
Component: Application Visibility and Reporting
Symptoms:
Avrd core file generates.
Conditions:
When avrd is writing to the external device and that device is unavailable temporarily.
Impact:
Potential system impact.
Workaround:
None
1295217-1 : When provision.1nic is set to forced_enable the mgmt interface does not respond to ICMP
Links to More Info: BT1295217
Component: TMOS
Symptoms:
When provision.1nic is set to forced_enable the mgmt interface does not respond to ping requests or other ICMP messages.
Conditions:
Provision.1nic is set to forced_enable
Impact:
Not able to ping the mgmt interface.
Workaround:
/sbin/iptables -t raw -I vadc_rawsock_in -p icmp -j ACCEPT
1294141-6 : ASM Resources Reporting graph displays over 1000% CPU usage
Links to More Info: BT1294141
Component: Application Visibility and Reporting
Symptoms:
The ASM resources graph which is present under Security > Reporting > ASM Resources > CPU Utilization displays over 100% CPU usage when ASM is under load. The unit is percentage so it shouldn't exceed 100.
Conditions:
ASM should be under load and utilizing most of CPU cycles.
Impact:
Reporting graph displays incorrect percent value.
Workaround:
1. Backup /etc/avr/monpd/monp_asm_cpu_info_measures.cfg file.
2. Run the following:
$ sed -i 's|distinct time_stamp))|distinct time_stamp)*100)|g' /etc/avr/monpd/monp_asm_cpu_info_measures.cfg
3. To make those changes take affect, run the following command:
$ bigstart restart monpd
1291121-3 : BIG-IP tenants on F5OS r5000, r10000, and r12000 platforms don't pass traffic properly while in forced offline state
Links to More Info: BT1291121
Component: TMOS
Symptoms:
Monitors may flap. Connections generated from the tenant will succeed and others will fail.
The ConfigSync status for a tenant that is forced offline will report disconnected.
Conditions:
BIG-IP tenant running on r5000, r10000, and r12000-series appliances.
Note: F5OS tenants on VELOS chassis will not pass traffic while the tenant is forced offline, but that behavior is not tracked by this ID. For more information, see K15122: Overview of the Force Offline option for devices and traffic groups (https://my.f5.com/manage/s/article/K15122)
Impact:
Traffic to/from the tenant does not work properly when the tenant is forced offline, although the behavior can be intermittent.
Workaround:
None
1290937-2 : 'contentWindow' of a dynamically genereated iframe becomes null
Component: Access Policy Manager
Symptoms:
A web application using iframes may not work/render as expected using Portal Access.
Conditions:
A web application attempts to configure 'contentWindow' for an iframe while the Portal Access feature is in use.
Impact:
Web Application through Portal Access may fails to work/render as expected
Workaround:
Workaround: Using a customized irule/ifile to return un-patched 'contentWindow' from cache-fm*.js file. ifile has modern cache-fm file.
when CLIENT_ACCEPTED {
ACCESS::restrict_irule_events disable
}
when HTTP_REQUEST {
if {
[HTTP::path] ends_with "/cache-fm-Modern.js"
} {
HTTP::respond 200 content [ifile get cachefmUploadIssueWorkaround]
}
}
1284589-4 : HTTP CONNECT request from client is not successful with the iRule 'HTTP::disable discard' command
Links to More Info: BT1284589
Component: Local Traffic Manager
Symptoms:
When you use the 'HTTP::disable discard' command in an irule to switch to HTTP transparent passthrough mode, the proxy connect / connection to server is not established.
This only occurs when the 'HTTP::disable' command is used with the additional 'discard' option (which discards the existing HTTP headers before switching to passthrough mode)
Refer https://clouddocs.f5.com/api/irules/HTTP__disable.html
Conditions:
-> Basic HTTP VS
-> iRule
when HTTP_REQUEST {
HTTP::disable discard
node <ip port>
}
Impact:
Client requests containing the HTTP CONNECT method hang (data is not proxied to the serverside flow)
Workaround:
Use 'HTTP::disable' command (without the 'discard' option)
1284413-4 : After upgrade to 16.1.3.2 from 16.0.1.1, BIG-IP can send CONNECT requests when no proxy select agent is used★
Links to More Info: BT1284413
Component: Local Traffic Manager
Symptoms:
BIG-IP uses a CONNECT to forward requests regardless of the PRP branch in use.
Conditions:
-- Configure BIG-IP as Explicit Forward proxy with SSL Orchestrator or SWG.
-- Configure an access policy and a prp and apply to the forwarding Virtual Server.
-- In the PRP, use multiple branches where one branch contains a proxy select agent, and another branch does not.
Impact:
Requests fail intermittently
Workaround:
None
1283721-4 : Vmtoolsd memory leak
Links to More Info: BT1283721
Component: TMOS
Symptoms:
The Vmtoolsd service leaks memory on VMware BIG-IP VE guests when the Disk Type is IDE or any disk type other than SCSI.
Conditions:
VMware BIG-IP VE guest
Disk type of IDE or another type that is not SCSI.
Impact:
The VE will eventually run out of memory.
Workaround:
1. Create the file /etc/vmware-tools/tools.conf and add the following to the file:
[guestinfo]
# disable scan for disk device info
diskinfo-report-device=false
2. Restart the vmtoolsd service:
systemctl restart --ignore-dependencies vmtoolsd.service
NB "guestinfo" must be in lower case. The workaround will not work if any letter is not lower case including the following "guestInfo" which was the reported workaround in https://github.com/vmware/open-vm-tools/issues/452
1282421-4 : IS-IS protocol may discard Multi-Topology Reachable IPv6 Prefixes
Links to More Info: BT1282421
Component: TMOS
Symptoms:
IS-IS protocol on the BIG-IP might discard some Multi-Topology Reachable IPv6 Prefixes.
Conditions:
This happens when the IS-IS device in the BIG-IP system is peering with RFC 7794 support for sub-TLVs.
Impact:
Some prefixes are incorrectly installed in a routing table.
Workaround:
None
1282029-1 : Logging suspicious vector feature is not supported for tcp-flags-uncommon vector on upgrade to BIG-IP 17.1.0★
Links to More Info: BT1282029
Component: Advanced Firewall Manager
Symptoms:
The following log is observed in the console or /var/log/ltm logs:
Logging 01071d5e:3: DOS attack data (tcp-flags-uncommon): Suspicious vector feature is not supported for tcp-flags-uncommon vector.
If this is after an upgrade it's likely the configuration will fail to load, which in turn will cause memory provisioning not to complete leaving the system provisioned for LTM only. This may leave insufficient 4KB page memory for the actual provisioning, for example if ASM is provisioned. The unit may show low memory symptoms such as oom killer activity, unresponsive management, cores due to daemon heartbeat timeout.
Conditions:
1. The Only Count Suspicious Events option is enabled or the attribute suspicious is true on TCP Push Flood vector.
2. Upgrade to BIG-IP 17.1.0.
Impact:
The following log is observed in the console or /var/log/ltm logs:
Logging 01071d5e:3: DOS attack data (tcp-flags-uncommon): Suspicious vector feature is not supported for tcp-flags-uncommon vector. in the console or /var/log/ltm
Failure to load configuration may be shown a few lines later:
emerg load_config_files[13166]: "/usr/bin/tmsh -n -g -a load sys config partitions all " - failed.
Workaround:
1. Confirm config:
grep "suspicious true" /config/bigip.conf
2. Backup bigip.conf:
cp /config/bigip.conf /config/bigip.conf.bak_ID1282029
3. Change affected configuration values:
sed -i 's/suspicious true/suspicious false/g' /config/bigip.conf
4. Reload MCPD per K13030. AFM comes back up with config loaded fine.
1281929-4 : The BIG-IP system's time zone database does not reflect recent changes implemented by Mexico in regard to DST
Links to More Info: BT1281929
Component: TMOS
Symptoms:
In fall of 2023, Mexico is cancelling DST (Daylight Saving Time) and is now on standard time indefinitely. The BIG-IP time zone database need an updated to reflect this change.
Conditions:
- BIG-IPs operated in Mexico.
Impact:
BIG-IP systems configured to use "America/Mexico" (or other applicable Mexican localities) will still apply DST. Hence, time will spring forward and backward on previously designated dates.
This will have no impact to application traffic handled by the BIG-IP system. However, logs, alerts, reports, cron jobs, and other will use incorrect time.
Workaround:
As a workaround, you can set the BIG-IP time zone to that of a different country with the same UTC offset and already not observing DST.
1280813-4 : 'Illegal URL' violation may trigger after upgrade
Links to More Info: BT1280813
Component: Application Security Manager
Symptoms:
Illegal URL violation is triggered for Allowed URL(s).
Conditions:
The conditions that trigger this issue post-upgrade are unknown at this time and the occurrence is rare.
Impact:
Requests get blocked with an 'Illegal URL' violation despite the it being defined as an Allowed URL because the URL object's Content-Profile reference does not get inserted and is missing in the MySQL database post-upgrade.
Workaround:
- Delete the problematic URL within the 'Security ›› Application Security : URLs : Allowed URLs : Allowed HTTP URLs' section in Configuration Utility.
- Re-create the URL again.
- Save the changes with the 'Apply Policy' task.
1280141-4 : Platform agent to log license info when received from platform
Links to More Info: BT1280141
Component: F5OS Messaging Agent
Symptoms:
Platform agent to add log to print license info on activated/reinstalled for debuggability.
Conditions:
License activated or reinstalled on platform.
Impact:
No impact
Workaround:
None
1277389-1 : HSB transmitter lockup
Links to More Info: BT1277389
Component: TMOS
Symptoms:
Packets aren't received on the software rx side leading to traffic loss
Conditions:
Unknown
Impact:
HSB lockup with SIGFPE TMM core. Traffic disrupted while tmm restarts.
Workaround:
None
1271941-4 : Tomcat CPU utilization increased after upgrading to 15.1.6 and higher versions.★
Links to More Info: BT1271941
Component: TMOS
Symptoms:
Tomcat CPU utilization is high after upgrading to BIG-IP 15.1.6, java garbage collector is running high. Tomcat needs more memory after upgrading OpenJDK.
Conditions:
- Upgrade from BIG-IP 15.1.5 and earlier versions to BIG-IP 15.1.6 and higher versions.
Impact:
Tomcat server runs in an unstable state as CPU utilization is abnormal.
Workaround:
Increase the value of the system DB variable provision.tomcat.extramb and restart tomcat. This value is an amount in MB to add to the default tomcat heap size. The default heap size varies depending on provisioning from about 130 MB for LTM only to about 270 MB for ASM systems.
provision.tomcat.extramb is 0 by default.
One approach would be to increment by 50MB a time so as not to waste memory, while monitoring CPU use of tomcat to see if it drops. Less tan 2% would be a typical CPU use assuming the web interface isn't being used. Usually the CPU drops a lot with 50 or 100, sometimes 200 or slightly more might be required.
# tmsh modify sys db provision.tomcat.extramb value 50
# bigstart restart tomcat
tomcat is a Java process with user tomcat. You can find out the pid by running this in bash, with an example output shown beneath :
# top -bn 1 | grep tomcat
18923 tomcat 20 0 731444 404080 ...
The first column is the PID, and can be used in a top command so only tomcat is monitored. Using the example above the PID was 18923, so this top command will allow monitoring that process:
# top -p 18923
(use q to quit).
Of course after each tomcat restart the pid will change.
There are other possible issues that are sometimes mitigated by very high values of provision.restjavad.extramb, for example 500 or more, even without large config size. One example is ID1856513, but it is better to workaround that directly as shown in:
https://cdn.f5.com/product/bugtracker/ID1856513.html
1256757-1 : Suspect keymgmtd memory leak while using dynamic CRL.
Links to More Info: BT1256757
Component: TMOS
Symptoms:
keymagmtd's memory size steadily increases. Specifically, in the emdeviced memory size.
Conditions:
CRL validation is enabled
Impact:
keymgmtd might crash due to out of memory conditions.
Workaround:
Need to reboot the machine to reset the memory usage.
1231889-5 : Mismatched VLAN names (or VLANs in non-Common partitions) do not work properly BIG-IP tenants running on r2000 / r4000-series appliances
Links to More Info: BT1231889
Component: Local Traffic Manager
Symptoms:
When a VLAN configured in the tenant does not have the same name as the VLAN on in F5OS or the VLAN in the tenant is created in a partition other than "Common", VLANs may not pass traffic properly without manual configuration.
If any such VLANs exist, newly-configured VLANs may also exhibit this issue, even if the VLAN is in Common and has a name that matches the name in F5OS.
The system will have log messages similar to the following; these errors will still occur even once the workaround has been applied.
Feb 15 15:39:49 r4000-1.example.com err mcpd[19522]: 01070094:3: Referenced vlan (/Common/external) is hidden, does not exist, or is already on another instance.
Feb 15 15:39:49 r4000-1.example.com err chmand[19520]: 012a0003:3: hal_mcp_process_error: result_code=0x1070094 for result_operation=eom result_type=eom
Tenants running on an r2000 or r4000-series appliance need to know the VLAN<>interface associations, but the system is not able to populate this information when the VLAN is not in the Common partition. VLANs may not have any 'interfaces' referenced, or will have 'interfaces' that are not in-sync with the configuration on the F5OS host. For example:
R2000# show running-config interfaces interface LAG; show running-config vlans vlan 47
interfaces interface LAG
config type ieee8023adLag
config description ""
aggregation config lag-type LACP
aggregation config distribution-hash src-dst-ipport
aggregation switched-vlan config trunk-vlans [ 42 47 ]
!
vlans vlan 47
config vlan-id 47
config name vlan_47
!
R2000#
[root@tenant:Active:Standalone] config # tmsh list net vlan /ottersPart/vlan_47
net vlan /ottersPart/vlan_47 {
dag-adjustment none
if-index 240 # <-- interfaces is not listed
partition ottersPart
[...]
tag 47
}
[root@tenant:Active:Standalone] config #
[root@tenant:Active:Standalone] config # tmsh list net vlan /ottersPart/vlan_47
net vlan /ottersPart/vlan_47 {
dag-adjustment none
if-index 240
partition ottersPart
interfaces { # <-- configuration with a workaround in place
LAG {
tagged
}
}
[...]
tag 47
}
Conditions:
- BIG-IP tenant running on r2000 and r4000-series platforms
- VLANs moved to partitions other than "Common", or renamed so that the name does not match between hypervisor and tenant.
Impact:
Partitions other than the Common partition cannot have VLANs. VLANs created in other partitions will not be operational in the data path.
If such VLANs exist in the tenant, newly added VLANs will also exhibit this issue.
Workaround:
In the BIG-IP tenant, modify all VLAN objects to have 'interfaces' that align with the configuration on the host.
For example, for the VLAN 47 described above, the VLAN should be listed as being 'tagged' on the 'LAG' trunk:
tmsh modify net vlan /ottersPart/vlan_47 interfaces replace-all-with { LAG { tagged } }
tmsh save sys config
1230109-1 : Mcpd memory and CPU increase while getting route stats
Links to More Info: BT1230109
Component: TMOS
Symptoms:
Mcpd CPU usage is high after several hours of repeated requests to /mgmt/tm/net/route/stats. Mcpd can crash and restart.
Conditions:
There are two known paths to the issue:
(1) Repeated making authenticated calls to the /mgmt/tm/net/route/stats endpoint.
(2) Opening a long term tmsh shell and repeatedly checking the route table (show net route).
Impact:
Mcpd memory and CPU increases; if unchecked, mcpd can crash and restart.
Workaround:
(1) Avoid checking the /mgmt/tm/net/route/stat endpoint excessively.
(2) Close tmsh session periodically.
1196505-2 : BIG-IP might RST HTTP2 connection with [F5RST:mrhttp_proxy bad transition] when ASM is in use.
Links to More Info: BT1196505
Component: Local Traffic Manager
Symptoms:
BIG-IP might RST HTTP2 connection with [F5RST:mrhttp_proxy bad transition] when ASM is in use.
Conditions:
- HTTP2
- ASM provisioned and passing traffic
Impact:
Unexpected connection reset.
Workaround:
None
1189909-1 : Active SSL Connections Curve is always kept at Zero on Performance Graph
Links to More Info: BT1189909
Component: Local Traffic Manager
Symptoms:
In the BIG-IP GUI, if a user navigates to Statistics :: Performance Reports : Performance Reports, then clicks "View Detailed Graph", next to "Active Connections" is a graph named Active SSL Connections.
Even though many client SSL connections were received by SSL virtual servers, the SSL Client curve in the graph always shows 0.
The same behavior is seen via CLI with the 'tmsh show sys performance all-stats historical detail' output where the output displays all zeroes within Active SSL Connections for SSL Client.
Conditions:
SSL connections exist from a client over a period of time.
Impact:
You are unable to determine how many active SSL/TLS connections are present.
Workaround:
Use the alternate method mentioned in article K76898322 to see the Active client-side SSL connections.
1183901-9 : VLAN name greater than 31 characters results in invalid F5OS tenant configuration
Links to More Info: BT1183901
Component: TMOS
Symptoms:
VLAN names 32 characters or longer results in invalid BIG-IP tenant configuration, and mcpd errors.
01070712:3: Internal error, object is not in a folder: type: vlan id: /Common/this_is_a_very_long_vlan_name_32
On F5OS tenants, mcpd, devmgmtd and lind restart in a loop.
Conditions:
VLAN with a name that is 32 characters or longer is assigned to a BIG-IP tenant.
Impact:
-- Invalid configuration
-- mcpd errors
-- Blank VLAN name in webUI of tenant
Workaround:
Use shorter VLAN names, with a maximum of 31 characters.
1183529-3 : OCSP request burst when cert-ldap authentication is enabled
Links to More Info: BT1183529
Component: TMOS
Symptoms:
Issue observed : When Remote client cert-ldap authentication is enabled in Big-IP and ocsp-responder is configured.
Cause: webUI update default value is 5 seconds - updates every 5 seconds triggering SSL handshake which results in OCSP request bursts on the OCSP responder which may be lead to responder becoming irresponsive . Each request triggers two OCSP responder messages, leading to unnecessary traffic and causing performance issues in customer environments.
Conditions:
When Remote client cert-ldap authentication is enabled in Big-IP and ocsp-responder is configured.
WebUI makes an OCSP check for every HTTP request. This generates a lot of OCSP requests and If the OCSP server doesn't respond consistently, then the system is immediately redirected to the login page to re-authenticate.
Impact:
The OCSP (Online Certificate Status Protocol) Responder may experience service degradation or complete failure when subjected to excessive request volumes within compressed time intervals, particularly in environments where multiple systems share a single OCSP endpoint.
Workaround:
1. In /etc/httpd/conf.d/ssl.conf ,replace the below lines
SSLVerifyClient none
<LocationMatch "^[/][^/]+[/]">
SSLVerifyClient require
</LocationMatch>
with
SSLVerifyClient require
2. restart the httpd service - bigstart restart httpd
Note:The workaround does not survive a device reboot, an upgrade, or modification of any of the authentication and/or HTTPD configurations.
1168245-1 : Browser is intermittently unable to contact the BIG-IP device
Links to More Info: BT1168245
Component: TMOS
Symptoms:
When the coloradvisory probes generated by Javascript loaded on the browser do not get responded by the BIG-IP device within 30 seconds, the browser JS generates a pop-up message "Unable to contact BIG-IP device".
Conditions:
- MCPD is busy serving requests.
- Multiple browser connections to the BIG-IP.
- HTTP GET request from browser JS for /xui/update/configuration/alert/statusmenu/coloradvisory does not get responded within 30 seconds (default timeout).
Impact:
Browser frequently sees the BIG-IP as unavailable, causing interruptions to management of the device via the GUI.
Workaround:
1. Increase memory allocated to tomcat and restjavad.
tmsh modify sys db provision.tomcat.extramb value 512
tmsh modify sys db provision.restjavad.extramb value 2227
NB these are very large values, not suitable for most systems. It is probably best to increase tomcat heap size by 50MB a time, and restjavad by 200MB a time (value 600, 800, etc).
To have provision.restjavad.extramb values will be capped in effect to 384 + value of provision.extramb.
Both tomcat and restjavad need to be restarted to have changes take effect. restjavad will log startup info in ltm log.
2. Adjust the browser-based Javascript status update interval and timeout.
2.1. Remount /usr partition as read-write using the command:
mount -o remount,rw /usr
2.2. Edit the file /usr/local/www/xui/framework/scripts/variables.js, and modify the variables: time_updateXui to 8, and timeout_status to 60.
Default values are:
var time_updateXui = 5; // Seconds
var timeout_status = 30; //Timeout value for XUI status update
Change these values to:
var time_updateXui = 8; // Seconds
var timeout_status = 60; //Timeout value for XUI status update
2.3. Remount /usr partition back to read-only.
mount -o remount,ro /usr
3. Restart associated daemons:
bigstart restart httpd
bigstart restart tomcat
bigstart restart restjavad
1166929-2 : [AdminUI][Rewrite Profile][PA] Add "*://*" to to rewrite list if an RCL has been entered
Links to More Info: BT1166929
Component: Access Policy Manager
Symptoms:
"Rewrite-List" field is empty Rewrite profile configuration
Conditions:
Portal Access configuaration
Impact:
Rewrite may not work as expected
Workaround:
Add "*://*" manually for Rewrite-List
1137521-2 : TLSv1.3 connections dropped when SSL Persistence is enabled
Links to More Info: BT1137521
Component: Local Traffic Manager
Symptoms:
A virtual server with an SSL persistence profile processing TLSv1.3 traffic may see dropped connections.
Conditions:
-- TLSv1.3 is enabled on ClientSSL profile on a virtual server.
-- SSL Persistence Mode is enabled on the virtual server.
Impact:
Traffic may be impacted as the optimizations due to SSL Persistence may not work for TLSv1.3
Workaround:
Do not enable SSL Persistence with TLSv1.3 on the affected versions.
1136905-2 : Request for Portal Access Hosted Content are RST with "No available SNAT addr"
Links to More Info: BT1136905
Component: Access Policy Manager
Symptoms:
A RST occurs with the following message in /var/log/apm:
- No available SNAT addr
Conditions:
- Portal Access with Hosted-Content.
Impact:
Unable to access hosted-content resources.
Workaround:
Use the following command:
- tmsh modify sys db ipv6.enabled value false
1128429-8 : Rebooting one or more blades at different times may cause traffic imbalance results High CPU
Links to More Info: BT1128429
Component: Carrier-Grade NAT
Symptoms:
One or more TMMs are consuming more CPU cycles than the other TMMs. The increased CPU usage is caused by a significant number of internal TMM traffic redirections.
Conditions:
- LSN pools enabled.
- The sp-dag configured on the client-side and server-side VLANs (cmp-hash src-ip and cmp-hash dst-ip respectively).
Impact:
Increased TMM CPU usage on one or more TMMs.
Workaround:
- Set up an High Availability (HA) pair of VIPRIONs and make an active VIPRION cluster standby before doing any operation that involves the rebooting, insertion, or removal of one or more blades.
Or if the VIPRION is a stand-alone cluster:
- Stop all external traffic to the VIPRION before rebooting, inserting, or removing one or more blades.
- Restart or reboot all the blades at the same time from the primary, using the following "clsh" command:
"clsh reboot volume <NEW_VOLUME>" or "clsh bigstart restart".
1128033-4 : Neuron client constantly logs errors when TCAM database is full
Links to More Info: BT1128033
Component: Local Traffic Manager
Symptoms:
A database held in hardware (TCAM), shared between tenants, has a limit that is exceeded by software in tenants that adds and manages entries in the database.
Symptomatic logs on tenant:
in /var/log/ltm, repeating logs are recorded, following is an example:
err tmm[635]: 01010331:3: Neuron client neuron_client_pva_hwl failed with rule request submit(client connection is busy (has outstanding requests))
in /var/log/tmm, cycles of following group of logs are recorded:
notice neuron_client_negotiate: Neuron client connection established
notice [DDOS Neuron]Neuron daemon started
notice hudproxy_neuron_client_closed_cb: Neuron client connection terminated
notice [DDOS Neuron]Neuron daemon stopped
For F5OS host, in partition /var/F5/partitionX/log/velos.log repeating logs are recorded, following is an example:
tcam-manager[41]: priority="Err" version=1.0 msgid=0x6b01000000000007 msg="ERROR" MSG="TCAM processing Error(-5) executing:TCAM_INSERT for ruleno:0x20000000937"
In the log message, the msgid and ruleno can vary, but the Error(-5) is an indication of this issue.
Conditions:
The BIG-IP system with a rSeries r5xxx, r10xxx, r12xxx or has VELOS blades such as BX110.
The rSeries 2xxx, 4xxx and iSeries platforms are not affected.
Large configurations, on the order of high hundreds of virtual servers, are more likely to encounter issue.
Impact:
The neuron client software will restart and log repeatedly.
Inefficient use of TCAM database.
Workaround:
None
1126505-1 : HSB and switch pause frames impact data traffic
Links to More Info: BT1126505
Component: TMOS
Symptoms:
There are cases where the HSB and switch report pause frames on the HSB <-> switch interfaces. This can be seen in the switch interface stats:
name counters.rx_pause
---- -----------------
9.1 11522051
10.1 11392101
Conditions:
The iSeries platforms with an HSB and switch.
Impact:
There can be an impact on networking traffic.
Workaround:
There is no workaround for this issue. When this condition happens, the unit needs to be rebooted to clear the issue.
1125381-5 : Extraneous warnings recorded in when using only intermediate certificates
Links to More Info: BT1125381
Component: Local Traffic Manager
Symptoms:
When client authentication is enabled on the client SSL profile but the trusted-ca file includes only an intermediate certificate and no CA root cert to build the whole cert chain, although the TLS connection is made, as expected, there is an error message reported following.
Jun 21 20:43:01 bigip warning tmm6[18125]: 01260006:4: Peer cert verify error: unable to get issuer certificate (depth 1; cert /CN=subca)
Jun 21 20:43:01 bigip warning tmm6[18125]: 01260005:4: Unable to get certificate for peer cert issuer /CN=rootca
Conditions:
Trusted-ca includes only inter-cert and no root CA-cert
is configured.
Impact:
Although the TLS handshake succeeds without any issue and the connection is processed, as expected, a confusing warning is reported.
Workaround:
Because the connection is made, you can safely ignore this message.
Note: This issue does not occur if the root CA cert is also configured in the CA-cert bundle.
1121169-6 : Unable to resize the /appdata: /dev/mapper/vg--db--sda-dat.appdata when in use
Links to More Info: BT1121169
Component: TMOS
Symptoms:
On systems where ID1004833 has been fixed, the resizing instructions for /appdata from K74200262 no longer work.
Conditions:
When the jitterentropy-rngd is started by systemd which is the default state of the BIG-IP.
Impact:
A filesystem resize operation may fail with the following error:
# lvreduce --resizefs --size -40G /dev/mapper/vg--db--sda-dat.appdata
Do you want to unmount "/appdata"? [Y|n] y
fsck from util-linux 2.23.2
/dev/mapper/vg--db--sda-dat.appdata is in use.
e2fsck: Cannot continue, aborting.
resize2fs 1.42.9 (28-Dec-2013)
resize2fs: Device or resource busy while trying to open /dev/mapper/vg--db--sda-dat.appdata
Couldn't find valid filesystem superblock.
fsadm: Resize ext3 failed
fsadm failed: 1
Filesystem resize failed.
Workaround:
Unmount /appdata and restart the jitterentropy-rngd, using the following commands:
umount /appdata
systemctl restart jitterentropy-rngd
Then retry the resize operation.
1110485-7 : SSL handshake failures with invalid profile error
Links to More Info: BT1110485
Component: Local Traffic Manager
Symptoms:
1. TMM reports SSL handshake failures with reason "hud_ssl_handler:1208: alert(40) invalid profile unknown on VIP"
2. There will be Certificate read errors in the ltm log "reading: Unknown error."
Conditions:
-- The certificates associated with the SSL profile are corrupted by modifying/adding/deleting them manually/Venafi
-- There are frequent unintentional Certificate updates
Impact:
-- The BIG-IP system will not be able process the traffic
-- All traffic to particular virtual servers fails
Workaround:
1. Correct the certificates which are corrupted and make them valid.
2. Deattach/Remove the corresponding SSL profile from all virtual servers to which it is applied.
3. In the GUI open the virtual server and click on update and make sure there are no errors shown on the screen.
4. Now re-apply the SSL profile to the virtual server
1106489-5 : GRO/LRO is disabled in environments using the TMM raw socket "sock" driver.
Links to More Info: BT1106489
Component: TMOS
Symptoms:
GRO/LRO packets are not received: "tmctl -d blade tmm/ndal_rx_stats" shows "0" in "lro". The linux host has GRO disabled: "ethtool -k eth1 | grep generic-receive-offload" shows "off".
Conditions:
-- BIG-IP is deployed in a Hyper-V environment.
-- Any environment such that "tmctl -d blade tmm/device_probed" displays "sock" in "driver_in_use".
Impact:
Performance is degraded.
Workaround:
Manually enable GRO on the device: ethtool -K eth1 gro on
Check that it's enabled with: ethtool -k eth1 | grep generic-receive-offload
1100249-6 : SNAT with FLOW_INIT firewall rule may core TMM due to wrong type of underlying flow structure
Links to More Info: BT1100249
Component: Local Traffic Manager
Symptoms:
Tmm crashes with SIGSEGV while passing firewall traffic.
Conditions:
-- SNAT + firewall rule
-- FLOW_INIT used in an iRule
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
1093717-6 : BGP4 SNMP traps are not working.
Links to More Info: BT1093717
Component: TMOS
Symptoms:
BGP4 SNMP traps are not working.
Conditions:
--Perform any BGP related event and check for snmp traps.
Impact:
No BGP SNMP traps.
Workaround:
None
1091785-7 : DBDaemon restarts unexpectedly and/or fails to restart under heavy load
Links to More Info: BT1091785
Component: Local Traffic Manager
Symptoms:
While under heavy load, the Database monitor daemon (DBDaemon) may:
- Restart for no apparent reason
- Restart repeatedly in rapid succession
- Log the following error while attempting to restart:
java.net.BindException: Address already in use (Bind failed)
- Fail to start (remain down) after several attempts, leaving database monitors disabled and marking monitored resources Down.
Conditions:
- One or more active GTM and/or LTM database monitors are configured with short probe-timeout, interval and timeout values (for example, 2, 5, or 16 respectively).
- A large number (for example, 2,000) of GTM and/or LTM database monitor instances (combinations of above monitor and pool member) are configured.
- Active GTM and/or LTM database monitors are configured with debug yes and/or count 0.
Impact:
The DBDaemon restarts for no apparent reason.
The DBDaemon fails to start (remain down) after several attempts, leaving database monitors disabled and marking monitored resources Down.
Workaround:
The conditions that are suspected to cause these symptoms include effects of ID1025089. This issue has not been confirmed to occur on BIG-IP versions which include a fix for ID1025089. On other versions, measures to prevent or reduce occurrences of ID1025089 (by reducing database monitor workload) are expected to also prevent or reduce occurrences of these symptoms.
If the DBDaemon fails to restart, the following steps may allow DBDaemon to restart successfully upon the next database monitor probe:
-- Check for a running instance of DBDaemon with the following command:
ps ax | grep -v grep | grep DBDaemon
-- If DBDaemon is running, this command will return a set of parameters including the numerical process ID (PID) at the beginning of the line and a command line that begins with "/usr/lib/jvm/jre/bin/java" and includes the parameter "com.f5.eav.DBDaemon", such as:
24943 ? Ssl 46:49 /usr/lib/jvm/jre/bin/java -cp /usr/lib/jvm/jre/lib/rt.jar:/usr/lib/jvm/jre/lib/charsets.jar:/usr/share/monitors/postgresql-jdbc.jar:/usr/share/monitors/DB_monitor.jar:/usr/share/monitors/log4j.jar:/usr/share/monitors/mssql-jdbc.jar:/usr/share/monitors/mysql-connector-java.jar:/usr/share/monitors/ojdbc6.jar -Xmx512m -Xms64m -XX:-UseLargePages -DLogFilePath=/var/log/DBDaemon-0.log com.f5.eav.DBDaemon 1521 24943 0
-- If a running DBDaemon process is identified, use the "kill" command to terminate the running DBDaemon process:
kill #
(where # is the DBDaemon PID from the above "ps" command)
-- Repeat the above "ps" command to confirm that the DBDaemon process has been terminated. If a new DBDaemon process has not been started (with a different PID), proceed to the next steps.
-- Check the /var/run directory for the presence of any files with names beginning with "DBDaemon", such as:
/var/run/DBDaemon-0.lock
/var/run/DBDaemon-0.pid
/var/run/DBDaemon-0.start.lock
Note: The numeric value in the above example filenames corresponds to the Route Domain of pool members monitored by database monitors. If the database monitors are only applied to pool members in the default route domain (RD 0), that value will be "0" as seen above. If database monitors are applied to pool members in a non-default route domain (RD 7, for example), the numeric value will correspond to that route domain, such as:
/var/run/DBDaemon-7.lock
/var/run/DBDaemon-7.pid
/var/run/DBDaemon-7.start.lock
-- If no DBDaemon process is running, delete any /var/run/DBDaemon* files. It is especially important to delete:
/var/run/DBDaemon-#.start.lock (indicates DBDaemon restart is in progress and that no further restart actions should be attempted)
/var/run/DBDaemon-#.pid (indicates current DBDaemon PID)
-- If the above actions do not result in DBDaemon restarting upon the next database monitor ping, then a complete BIG-IP restart will likely be required to recover from unknown conditions within the Java subsystem that may prevent successful DBDaemon operation:
bigstart restart
or:
reboot
1091021-7 : The BIG-IP system may not take a fail-safe action when the bigd daemon becomes unresponsive.
Links to More Info: BT1091021
Component: Local Traffic Manager
Symptoms:
You may observe LTM monitors malfunctioning on your system. For instance, you may notice some probes are not sent out on the network, and some monitored objects are showing the wrong status.
Conditions:
-- The bigd daemon consists of multiple processes (which you can determine by running "ps aux | grep bigd").
-- One or more of the processes (but not all of them) become disrupted for some reason and stop serving heartbeats to the sod daemon.
Under these conditions, sod will not take any fail-safe action and the affected bigd processes will continue running impaired, potentially indefinitely.
Impact:
LTM monitoring is impacted.
Workaround:
If you suspect this issue is occurring in your system, you can resolve it by killing all bigd processes using the following command:
pgrep -f 'bigd\.[0-9]+' | xargs kill -9
However, this does not prevent the issue from manifesting again in the future if the cause for bigd's disruption occurs again.
Monitoring may become further disrupted as bigd restarts, and a failover may occur depending on your specific configuration.
Another work around is to set only one bigd if that is possible.
modify sys db bigd.numprocs value 1
If only a single bigd is available, sod will detect when it is down.
1090313-6 : Virtual server may remain in hardware SYN cookie mode longer than expected
Links to More Info: BT1090313
Component: TMOS
Symptoms:
A virtual server may remain in hardware SYN cookie mode longer than expected after the SYN flood attack has stopped. The TMSH 'show ltm virtual' command shows that the virtual has already exited SYN Cookie mode, but the SYN packets are still responded from hardware for a few minutes longer.
Conditions:
The problem is a result of a race condition in TMM, so the issue might show up intermittently.
Impact:
Discrepancy between the actual SYN Cookie mode and the reported SYN Cookie mode for a short period of time after a SYN flood attack.
Workaround:
Disable hardware SYN Cookie mode.
1089625-3 : Java core dump with SIGABRT while high cpu load in BIG-IP
Links to More Info: BT1089625
Component: TMOS
Symptoms:
Observe the logs in /var/log/daemon.log
Nov 8 01:13:27 localhost.localdomain emerg logger[6270]: Re-starting restjavad
Java core generated in folder /var/core.
Conditions:
1. Provision ASM
2. Huge number of requests to restjavad
3. cpu is hitting 100%
Impact:
Restjavad will be restarted.
Workaround:
More heap memory can reduce cpu consuming operations, fewer GC cycles, less frequent minor GCs, overall less overhead for memory management can add for less cpu usage.
Please increase the value of provision.extramb and provision.restjavad.extramb by 200MB at a time ( 400, 600, 800 ...) till the issue resolves. Since changing the value of provision.extramb is service affecting you may want to start with a higher value so there is more room to experiment to find a good value for restjavad heap size. Note 500MB is equivalent to large management provisioning and 200MB is the same as medium management provisioning.
Note: provision.extramb value does not sync between peers (by design) and must be changed on each peer, one at a time, and is service affecting when changed on active. On ASM provisioned system it can take approximately 15 minutes for system to reprovision.
tmsh modify sys db provision.extramb value 200 ( 400, 600, 800 ...)
tmsh modify sys db provision.restjavad.extramb value 600 (800, 1000, 1200 ...
bigstart restart restjavad
Increase timeout
# tmsh modify sys db icrd.timeout value 300
# tmsh modify sys db restjavad.timeout value 300
# tmsh modify sys db restnoded.timeout value 300
bigstart restart restjavad restnoded
1087569-7 : Changing max header table size according HTTP2 profile value may cause stream/connection to terminate
Links to More Info: BT1087569
Component: Local Traffic Manager
Symptoms:
BIG-IP initializes HEADER_TABLE_SIZE to the profile value and thus when it exceeds 4K (RFC default), the receiver's header table size is still at the default value. Therefore, upon receiving header indexes which has been removed from its table, receiver sends GOAWAY (COMPRESSION_ERROR)
Conditions:
-- HTTP2 profile used in a virtual server
-- In the HTTP2 profile, 'Header Table Size' is set to a value greater than 4096
Impact:
Stream/connection is terminated with GOAWAY (COMPRESSION_ERROR)
Workaround:
Issue can be avoided by restoring the header-table-size value to the default of 4096
1086473-7 : BIG-IP resumes a TLS session on the client-side but then proceeds to do a full handshake
Links to More Info: BT1086473
Component: Local Traffic Manager
Symptoms:
When a client attempts to resume the TLS session using the Session-ID in its Client Hello from a previous session, the BIG-IP agrees by using the same Session-ID in its Server Hello, but then proceeds to perform a full handshake (Server Hello, Certificate, Server Key Exchange, Certificate Request, Server Hello Done) instead of an abbreviated handshake (Server Hello, Change Cipher Spec, Server Hello Done).
This is a violation of the TLS RFC.
Conditions:
- High availability (HA) pair of two BIG-IP units.
- LTM virtual server with a client-ssl profile.
- Mirroring enabled on the virtual server
Impact:
Client-side TLS session resumption not working.
Workaround:
Disable mirroring on the virtual server
1082197-3 : RNAME and MNAME field order reversed for Synthetic SOAs sent for negative response
Links to More Info: BT1082197
Component: Global Traffic Manager (DNS)
Symptoms:
Synthetic SOA returned by BIG-IP has the MNAME and RNAME fields reversed, resulting in the wrong values being noted as the primary name server and mailbox of administrator, respectively.
Conditions:
-- Set the failure-rcode-response enabled and failure-rcode-ttl on a down WIP.
-- Perform a DNS query.
-- Observe the SOA.
Impact:
Per RFC (rfc1035) the order of the fields is significant and MNAME must come before RNAME. When reversed, consumers of the synthetic SOA will associate the wrong values with the wrong fields.
1082169-1 : Bogus synthetic SOA records are returned for wideip with RCODE enabled
Links to More Info: BT1082169
Component: Global Traffic Manager (DNS)
Symptoms:
Synthetic SOA record is returned for wideip configured with RCODE enabled.
Conditions:
Wideip with failure-rcode-response enabled
Impact:
DNS queries fail
Workaround:
None
1077789-7 : System might become unresponsive after upgrading.★
Links to More Info: BT1077789
Component: TMOS
Symptoms:
After upgrading, the system encounters numerous issues:
-- Memory exhaustion (very low MemAvailable) with no particular process consuming excessive memory.
-- High CPU usage usually due to high kswapd or iowait activity
-- System is unresponsive, difficult to log in, slow to accept commands.
-- Provisioning is incomplete; there is a small amount of memory amount assigned to 'host' category.
Conditions:
The device is provisioned for more than LTM, typically with ASM or APM as well or instead, and needs more host memory than a pure LTM system.
-- The configuration loads in the previous release, but does not load successfully on the first boot into the release you are upgrading to.
-- Device is upgraded and the configuration is rolled forward.
-- There may be other conditions preventing the configuration from loading successfully after an upgrade.
Exact conditions that trigger this issue could be varied.
Failure to reactivate license, if needed, before upgrade could cause it, or an actual config issue. The config load error will be shown in the ltm log - search on 'emerg load'; the actual failure should be shown a few lines before the general warning about config load failure.
Impact:
-- System down, too little host (4KB page) memory to be stable.
-- Difficulty logging in over SSH might require serial console access.
Workaround:
Reboot to an unaffected, pre-upgrade volume.
-- If the system is responsive enough, use 'tmsh reboot volume <N>' or switchboot to select an unaffected volume.
-- If the system is completely unresponsive, physically powercycle a physical appliance or reboot a BIG-IP Virtual Edition (VE) from an applicable management panel, and then select an unaffected volume from the GRUB menu manually.
Note: This requires that you have console access, or even physical access to the BIG-IP device if you are unable to SSH in to the unit. On a physical device, a non-responsive system might require that you flip the power switch.
For more information, see:
-- K9296: Changing the default boot image location on VIPRION platforms :: https://support.f5.com/csp/article/K9296
-- K5658: Overview of the switchboot utility :: https://support.f5.com/csp/article/K5658
-- K10452: Overview of the GRUB 0.97 configuration file :: https://support.f5.com/csp/article/K10452.
1075045-6 : Proxy initialization failed, Defaulting to DENY, after applying additional profile to a virtual server
Links to More Info: BT1075045
Component: Local Traffic Manager
Symptoms:
Connections are reset when accessing a virtual server, with an F5 reset cause of "Port denied".
Messages in /var/log/ltm:
err tmm[<PID>]: 01010008:3: Proxy initialization failed for <virtual server>. Defaulting to DENY.
err tmm[<PID>]: 01010008:3: Listener config update failed for <virtual server>: ERR:ERR_MEM
Conditions:
-- A virtual server is configured with 23 hudchain elements, and an attempt is made to add one or more further elements, caused by a large number of attached profiles
-- The number of 'hudchain' elements does not directly correspond to the number of profiles, as some profiles add more than one hud chain element - particularly with APM, and some elements are enabled through other settings, such as compression with the http profile
-- To find the number of elements on a virtual server, set the db variable "tmm.verbose" to 'enable', add or remove a profile to/from the affected virtual server, then check the tmm log file for a line similar ot the following
-- A log line similar to the one below will be produced, which describes the hud chain elements ont the clientside flow, the proxy in the middle, and the elements on the serverside flow. The limitation of 24 includes all the elements in either the clientside or serverside flows, as well as the proxy in the middle (the proxy is counted on both the clientside and serverside flows)
<13> Oct 1 08:33:09 bigip1.local notice (L:/Common/test) hn :TCP -> SSL -> HTTP -> INFLATE -> DEFLATE -> SATELLITE -> <TCP> <- SATELLITE <- DEFLATE <- INFLATE <- HTTP <- SSL <- TCP:
In this case, the clientside flow has 6 elemnents plus the proxy, totalling 7, and the serverside flow also has 7. Either of those numbers can not exceed a fixed upper limit of 23.
Impact:
All connections to the virtual server are immediately reset.
Workaround:
Reduce the number of profiles applied to the virtual server.
1073897-5 : TMM core due to memory corruption
Links to More Info: BT1073897
Component: Local Traffic Manager
Symptoms:
Tmm restarts
Conditions:
Unknown
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
1071021-4 : Some URLs such as *cdn.onenote.net configured in the Office 365 dynamic address space are not processed by APM
Links to More Info: BT1071021
Component: Access Policy Manager
Symptoms:
Dynamic address space parser not accepting few patterns(*cdn.example.net) which are added at the DNS address space field.
Conditions:
When the user configures Office 365 Dynamic Address Space with URLs formats like:
*-admin.sharepoint.com
*cdn.onenote.net
*-files.sharepoint.com
*-myfiles.sharepoint.com
Impact:
Due to the above pattern DNS relay proxy is not compatible with them.
Workaround:
None
1069977-1 : Repeated TMM SIGABRT during ips_flow_process_data
Links to More Info: BT1069977
Component: Protocol Inspection
Symptoms:
IPS consumes excessive CPU time processing GTP related context entries and this causes the tmm clock not to be updated, because of which SOD tries to restart the TMM.
Conditions:
-- Heavy GTP traffic, and request creation messages are sent without sending the response messages.
Impact:
Traffic disrupted while tmm restarts.
1062901-6 : The 'trap-source' and 'network' SNMP properties are ineffective, and SNMP traps may be sent from an unintended interface.
Links to More Info: BT1062901
Component: TMOS
Symptoms:
The BIG-IP system sends SNMP traps from an unintended interface (likely a TMM VLAN instead of the management port).
Conditions:
This issue occurs when the configuration:
- Includes a 'trap-source' property which matches the BIG-IP system's management IP address.
- Includes a SNMP trap destination which specifies 'mgmt' as the 'network' property.
- Includes routes to the aforementioned SNMP trap destination via both tmm and the management port (and the routes are such that the tmm one wins).
Impact:
Outgoing snmp traps fail to bind to the management IP address and to leave from the management port. Instead, they will bind to a self-ip matching TMM's route to the destination and leave from a TMM VLAN.
This can cause issues (or not work at all) depending on the configuration of the host system meant to receive the traps and/or of the surrounding network devices.
Workaround:
N/A
1060541-5 : Increase in bigd CPU utilization from 13.x when SSL/TLS session resumption is not utilized by HTTPS pool members due to Open SSL upgrade
Links to More Info: BT1060541
Component: Local Traffic Manager
Symptoms:
The bigd process uses more CPU than it did in previous versions when HTTPS monitors are used for pool members and the pool members do not resume the SSL/TLS session. This is due to upstream changes in the OpenSSL library.
Conditions:
-- HTTPS monitors.
-- Pool members that do not allow or are not using TLS/SSL session resumption.
Impact:
High CPU utilization.
Workaround:
Ensure the pool members have SSL/TLS session resumption enabled.
1053561-2 : TLS 1.3 Handshake fails when 0RTT enabled on the client-side SSL and iRule is specified
Links to More Info: BT1053561
Component: Local Traffic Manager
Symptoms:
On small virtual machines (e.g. 2 cores, 4GB RAM) when OpenSSL-1.1.1 client connects to a BIG-IP device running TLS 1.3, and containing an iRule, the handshake fails.
Conditions:
1. Small virtual machine (e.g. one with 2 cores and 4GB RAM).
2. TLS 1.3 is enabled on the BIG-IP device.
3. An iRule is specified for client-side SSL.
Impact:
The handshake is terminated.
Workaround:
Disable TLS 1.3 on the BIG-IP device only if an alternative protocol is available.
1052057-2 : FCS errors on switch/HSB interface impacts networking traffic
Links to More Info: BT1052057
Component: TMOS
Symptoms:
There are cases where the HSB and switch report FCS errors on the HSB <-> switch interfaces. This can be seen in the snmp_dot3_stat table:
name fcs_errors
---------- ----------
12.1 83233172
This can cause intermittent packet loss, leading to networking errors. This can be observed on the BIG-IP as pool monitor flapping, intermittent networking connectivity, etc.
Conditions:
An iSeries platform with an HSB and switch.
Impact:
There is impact on networking traffic.
Workaround:
There is no workaround for this issue. When this condition occurs, the unit needs to be rebooted to clear the issue.
ID1239905 can be used to detect and mitigate this issue.
1043985-6 : After editing an iRule, the execution order might change.
Links to More Info: BT1043985
Component: Local Traffic Manager
Symptoms:
After modification, the iRule execution order may change for events with the same priority.
Conditions:
Virtual server has an iRule that contains multiple events with the same priority.
Impact:
Unexpected behavior can cause virtual server malfunction.
Workaround:
Add desired priorities for iRules that contain the same event.
For example: when <event_name> priority nnn
1040277-8 : Syslog-ng issue may cause logging to stop and possible reboot of a system
Links to More Info: BT1040277
Component: TMOS
Symptoms:
A syslog-ng issue with remote logging to an invalid remote syslog server may lead to logging via syslog-ng to stop, even locally. CPU use of syslog-ng may increase.
For software version 13.1 only it may lead to BIG-IP unexpectedly rebooting due to host watchdog timeout, typically within hours to a day or two after syslog-ng gets hung up.
The cessation of logging happens at the time of the last 'Syslog connection broken' in /var/log/messages before reboot.
That message will appear without a preceding 'Syslog connection established' just before it with same timestamp.
At this time syslog-ng typically spins, using near 100% CPU.
Conditions:
Invalid syslog-ng server configuration or broken connection from BIG-IP toward configured syslog-ng remote server.
A server is configured as a remote syslog destination on the BIG-IP, but it or an intervening system responds to stream of log messages by breaking connection eg by sending ICMP port unreachable to BIG-IP.
Syslog-ng will note the connection attempt and that it has broken usually in the same second, and do so every 60s when it retries.
There may be many of these log pairs, repeating every minute in /var/log/messages, such as:
Nov 25 03:14:01 localhost.localdomain notice syslog-ng[12452]: Syslog connection established; fd='14', server='AF_INET(192.168.1.1:514)', local='AF_INET(0.0.0.0:0)'
Nov 25 03:14:01 localhost.localdomain notice syslog-ng[12452]: Syslog connection broken; fd='14', server='AF_INET(192.168.1.1:514)', time_reopen='60'
The final log reports 'connection broken', usually one minute after the last established/broken pair in the very rare event that syslog-ng hangs.
Nov 25 03:15:01 localhost.localdomain notice syslog-ng[12452]: Syslog connection broken; fd='14', server='AF_INET(192.168.1.1:514)', time_reopen='60'
Impact:
Very rarely syslog-ng hangs in a non-functional state. Sometimes, this may lead to an unexpected reboot of BIG-IP. Loss of logs before restart and traffic disrupted while BIG-IP restarts.
Even if it does not reboot the loss of logging functionality can cause some daemons to block while logging and thus interrupt service.
Workaround:
Ensure syslog-ng server configuration is valid, and that the server is reachable. If a remote server is not reachable remove it from the BIG-IP syslog configuration.
If the system has encountered this issue it's important that syslog-ng is restarted if that (or equivalent such as reboot) hasn't already occurred, to resume its normal service and reduce risk of further issues.
bigstart restart syslog-ng
1039633-2 : A signature match is not highlighted correctly under certain conditions
Links to More Info: BT1039633
Component: Application Security Manager
Symptoms:
A signature match is not highlighted correctly under certain conditions in the request log
Conditions:
A long signature match
Impact:
Some confusion and misunderstanding.
Workaround:
N/A
1036289-1 : Signature ID not displayed in Attack Signature details
Links to More Info: BT1036289
Component: Application Security Manager
Symptoms:
Only signature name is displayed in the "Attack signature detected" violation details. The ID is not displayed in the details nor in the event log.
Conditions:
Reviewing attack signature details
Impact:
The attack signature ID is not displayed, which makes it more difficult to correlate which attack signature was encountered.
Workaround:
Click on Attack Signature Documentation to know the signature ID.
1036217-4 : Secondary blade restarts as a result of csyncd failing to sync files for a device group
Links to More Info: BT1036217
Component: TMOS
Symptoms:
Config sync fails on the secondary blade and mcpd restarts.
In /var/log/ltm:
remote transaction for device group /Common/<group> to commit id 45018 6946340995971480381 /Common/<dest> 0 failed with error 01070712:3: Caught configuration exception (0), Failed to sync files...
Configuration error: Configuration from primary failed validation: 01070712:3: Caught configuration exception (0), Failed to sync files..... failed validation with error 17237778.
Conditions:
-- A BIG-IP system with multiple blades configured for high availability
-- A device group with AFM objects in it
-- A config sync occurs
Other conditions necessary to trigger this issue are unknown.
Impact:
Config sync to the secondary blade fails and mcpd restarts on the secondary. The cluster primary blade has the correct configuration. This will impact incremental syncing to other peers in the device group.
Workaround:
None
1033937-6 : HTTP message router stats do not increment for virtual servers and pools
Links to More Info: BT1033937
Component: Local Traffic Manager
Symptoms:
The HTTP MR stats for virtual servers and pools do not increment
Conditions:
- BIG-IP system with HTTP using httprouter and passing traffic.
- View the MRF stats
Impact:
Virtual server and pool stats do not increment.
1031945-6 : DNS cache configured and TMM is unresponsive in 'not ready' state indefinitely after TMM restart or reboot★
Links to More Info: BT1031945
Component: Global Traffic Manager (DNS)
Symptoms:
Clusterd reports "TMM not ready" right after "Active"
Following is an example:
Jun 23 18:21:14 slot2 notice sod[12345]: Active
Jun 23 18:21:14 slot2 notice clusterd[12345]:
Blade 2 turned Yellow: TMM not ready
All blades are showing 'unavailable'.
Conditions:
- Multiple DNS cache-resolver and/or net DNS resolver objects configured with names that are similar with only difference in letter case, for example, /Common/example-dns-cache and /Common/Example-DNS-cache
- Issue observed after rebooting or upgrading.
Impact:
The system remains inoperative.
Workaround:
- Remove one of the conflicting DNS cache-resolver and/or net DNS resolver objects.
or
- Rename one of the DNS cache-resolver and/or net DNS resolver objects to a name that does not result in a case-insensitive match to another DNS cache-resolver and/or net DNS resolver object name.
1027961-4 : Changes to an admin user's account properties may result in MCPD crash and failover
Links to More Info: BT1027961
Component: TMOS
Symptoms:
-- The mcpd process fails with a segmentation fault and restarts, leaving a core-dump file.
-- Active sessions in the Configuration Utility report "unable to contact BIG-IP device".
-- Various processes may record entries into the "ltm" log saying "Lost connection to mcpd."
Conditions:
-- Changes to properties of administrative user-login accounts are occurring.
-- A user account being changed has a current, active session in the Configuration Utility GUI.
Impact:
The failure and restart of mcpd will trigger a restart of many other processes, including the TMM daemons, thus interrupting network traffic handling. In high availability (HA) configurations, a failover will occur.
Workaround:
Before making changes to the account properties of an administrative user, where the changes affect the role, make certain that all GUI Configuration Utility sessions opened by that user are logged out.
1026781-6 : Standard HTTP monitor send strings have double CRLF appended
Links to More Info: BT1026781
Component: Local Traffic Manager
Symptoms:
Standard (bigd-based, not In-TMM) HTTP monitors have a double CRLF appended (\r\n\r\n) to the send string. This does not comply with RFC1945 section 5.1 which states requests must terminate with a single CRLF (\r\n). This non-compliant behavior can lead to unexpected results when probing servers.
Conditions:
Standard bigd (not In-TMM) HTTP monitors
Impact:
Servers probed by these non-RFC-compliant HTTP monitors may respond in an unexpected manner, resulting in false negative or false positive monitor results.
Workaround:
There are several workarounds:
1. If running 13.1.0 or later, switch monitoring from bigd-based to In-TMM. In-TMM monitors properly follow RFC1945 and will send only a single CRLF (\r\n)
2. Remain with bigd-based monitoring and configure probed servers to respond to double CRLF (\r\n\r\n) in a desired fashion
Depending on server configuration, a customized send string, even with the double CRLF, may still yield expected responses.
1022997-6 : TCP segments with an incorrect checksum are transmitted when the sock driver is used in AWS deployments (e.g., 1NIC)
Links to More Info: BT1022997
Component: TMOS
Symptoms:
Deployments on AWS that use the sock driver (1NIC, for example) transmit packets with bad checksums when TSO/GSO is required. This causes significant delays as TMM re-segments the packets with correct checksums for retransmission, and may cause some operations to time out (such as configsyncs of large configurations).
Conditions:
-- BIG-IP Virtual Edition (VE) using the sock driver on AWS (all 1NIC deployments use this)
-- TSO/GSO required due to MTU limitations on one or more VLANs
Impact:
-- Delayed packets.
-- Possible timeouts for some operations (configsyncs, for example).
Workaround:
Modify (or create, if not present) the file /config/tmm_init.tcl on the affected BIG-IP systems, and add the following line to it:
ndal force_sw_tcs off 1d0f:ec20
Then restart TMM:
bigstart restart tmm
Note: Restarting TMM will cause a failover (or an outage if there is no high availability (HA) peer available).
1022361-2 : Edge Client shows HTML encoding for non-English endpoint inspection message
Links to More Info: BT1022361
Component: Access Policy Manager
Symptoms:
HTML encoding characters are displayed in place of non-English characters, for example:
ó is displayed as ó
á is displayed as á
Conditions:
-- Modern access profile customization with Endpoint Inspection Message.
-- Using BIG-IP Edge Client on Microsoft Windows.
Impact:
HTML encoding displays instead of non-English characters in messages on Edge Client.
Workaround:
None
1021201-2 : JSON parser is not fully UTF-8 compliant
Links to More Info: BT1021201
Component: Application Security Manager
Symptoms:
JSON parser's character set does not include support for UTF-8 characters and that can result in 'Malformed JSON data' violation when processing requests containing those characters in JSON data.
Conditions:
Requests contain unsupported UTF-8 characters, such as emoji characters, in JSON payload.
Impact:
Requests are blocked.
Workaround:
The System Variable 'relax_unicode_in_json' can be utilized to ignore what JSON identifies as malformed characters when it encounters such unsupported characters.
(1) Enable 'relax_unicode_in_json' through CLI:
# /usr/share/ts/bin/add_del_internal add relax_unicode_in_json 1
(2) Restart ASM to ensure changes take effect:
# bigstart restart asm
1020881-3 : TMM crashes while passing APM traffic.
Links to More Info: BT1020881
Component: Access Policy Manager
Symptoms:
TMM crashes while passing APM traffic.
Conditions:
-- LTM + APM deployment.
-- Allow list in use.
-- iRules in use.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
#--- logout_irule starts
when HTTP_REQUEST {
if { ([string tolower [HTTP::uri]] contains "closeconnection.aspx"
|| [string tolower [HTTP::uri]] contains "signout.aspx")
&& [ACCESS::session exists -state_allow -sid [HTTP::cookie MRHSession]] } {
HTTP::respond 200 content {<html><body><h1>You are now logged out.</h1></body></html>}\
"Set-Cookie" "F5_ST=deleted;expires=Thu, 01-Jan-1970 00:00:01 GMT;path=/"\
"Set-Cookie" "MRHSHint=deleted;expires=Thu, 01-Jan-1970 00:00:01 GMT;path=/"\
"Set-Cookie" "F5_HT_shrinked=deleted;expires=Thu, 01-Jan-1970 00:00:01 GMT;path=/"\
"Set-Cookie" "F5_fullWT=deleted;expires=Thu, 01-Jan-1970 00:00:01 GMT;path=/"\
"Set-Cookie" "LastMRH_Session=deleted;expires=Thu, 01-Jan-1970 00:00:01 GMT;path=/"\
"Set-Cookie" "MRHSession=deleted;expires=Thu, 01-Jan-1970 00:00:01 GMT;path=/"
ACCESS::session remove
log local0. "iRule logout triggered: Removing access session for [ACCESS::session sid]"
# disable HTTP_REQUEST events for all other iRules
event disable
}
}
#--- logout_irule ends
1019641-6 : SCTP INIT_ACK not forwarded
Links to More Info: BT1019641
Component: Local Traffic Manager
Symptoms:
After SCTP link down/up (not physical IF link down up), SCTP session can't be established.
Conditions:
-- CMP forwarding enabled (source-port preserve-strict)
-- The BIG-IP system is encountering heavy traffic load
-- A connection is deleted from the connection table
Impact:
Flow state can become out of sync between TMMs
Workaround:
Once the problem occurs, execute "tmsh delete sys connection", and the SCTP session will be re-established.
1019261-6 : In-TMM HTTPS monitor with SSL Profile set to None does not use serverssl profile.
Links to More Info: BT1019261
Component: In-tmm monitors
Symptoms:
HTTPS monitors with SSL profile set to None (default) will not use the default ServerSSL profile of "serverssl" when In-TMM monitoring is enabled. Instead, another internal ServerSSL profile is used which has different values from "serverssl".
Conditions:
-- In-TMM monitoring is enabled
-- HTTPS monitor(s) with SSL profile field is set to the default of "None"
Impact:
The TLS settings for the HTTPS monitor monitor probes will not match those of the ServerSSL "serverssl" profile and may cause unexpected behavior such as utilizing TLS 1.3 (disabled by default in the "serverssl" profile) or random session IDs.
Workaround:
Specify a ServerSSL profile in every HTTPS monitor when using In-TMM monitoring.
Attaching the profile "serverssl" will result in the same behavior that SSL Profile "none" should provide, given that the "serverssl" profile should be the default.
1016273-2 : Standby TMM can core or cause incorrect mirroring during upgrade when session mirroring is enabled★
Links to More Info: BT1016273
Component: TMOS
Symptoms:
TMM crash occurs on the standby device which is on a lower version
Conditions:
1) Active and Standby are on different versions during upgrade
2) Session mirroring enabled
Impact:
Continuous TMM crash on standby.
Workaround:
Disable session mirroring during the upgrade process. This can be done by disabling sys db statemirror.mirrorsessions.
1015093-6 : The "iq" column is missing from the ndal_tx_stats table
Links to More Info: BT1015093
Component: TMOS
Symptoms:
When viewing the ndal_tx_stats statistics table, the "iq" column is not present.
Conditions:
-- BIG-IP Virtual Edition.
-- Viewing statistics tables.
Impact:
Missing statistic; less information available.
1014761-6 : [DNS][GUI] Not able to enable/disable pool member from pool member property page
Links to More Info: BT1014761
Component: Global Traffic Manager (DNS)
Symptoms:
You are unable to enable/disable DNS pool members from the pool member property page.
Conditions:
Making changes via the DNS pool member property page.
Impact:
You can submit the changes but the changes do not persist.
Workaround:
1. tmsh
or
2. enable/disable pool member from list of pool members instead of 'general properties' page
1014633-6 : Transparent / gateway monitors may fail if there is no route to a node
Links to More Info: BT1014633
Component: Local Traffic Manager
Symptoms:
Transparent or gateway UDP monitors may fail.
Conditions:
-- Transparent or gateway monitor configured.
-- Route does not exist to destination.
Impact:
The UDP monitor fails and the node / pool member is marked unavailable.
Workaround:
Add a route to the destination.
1013793-2 : Pool members may flap on BIG-IP VE with provision.1nic set to forced_enable
Links to More Info: BT1013793
Component: TMOS
Symptoms:
-- Pool members flap up and down
-- Network trace shows BIG-IP sending TCP SYN followed immediately by RST to pool members for traffic.
Conditions:
-- BIG-IP Virtual Edition (VE)
-- System using the 'sock' network driver, as can be determined by reviewing the output of the following command:
tmctl -d blade tmm/device_probed
-- The 'provision.1nic' DB key is set to 'forced_enable'. This is common in BIG-IP VE configurations running on Azure.
Impact:
-- Monitor statuses unreliable.
Workaround:
Use the following commands to work around this on a running system (the word 'command' is a required part of what should be typed in)
command iptables -t raw -I PREROUTING 1 -i eth+ -j DROP
command ip6tables -t raw -I PREROUTING 1 -i eth+ -j DROP
In addition to that, to ensure the workaround persists after TMM restarts or system reboots, add the following to /config/user_alert.conf:
alert tmm_id1013793_workaround "HA reports tmm ready" {
exec command="iptables -t raw -D PREROUTING -i eth+ -j DROP";
exec command="ip6tables -t raw -D PREROUTING -i eth+ -j DROP";
exec command="iptables -t raw -I PREROUTING 1 -i eth+ -j DROP";
exec command="ip6tables -t raw -I PREROUTING 1 -i eth+ -j DROP";
}
And then restart alertd by running:
tmsh restart sys service alertd
1013209-7 : BIG-IP components relying on ca-bundle.crt may stop working after upgrade★
Links to More Info: BT1013209
Component: TMOS
Symptoms:
After upgrading, the BIG-IP system components may stop working due to missing CA certificates in ca-bundle.crt.
Conditions:
CA cert which is expired/will expire in 6 months (or 182 days) after upgrade is removed from ca-bundle.crt.
Impact:
The BIG-IP components such as TMM, APM etc. may stop working due to missing CA certificates in ca-bundle.crt.
Workaround:
Download the blended-bundle.crt from the F5 download site. It is located at
https://downloads.f5.com/esd/product.jsp?sw=Certificate-Authority-Bundle&pro=Certificate-Authority-Bundle
1012009-5 : MQTT Message Routing virtual may result in TMM crash
Links to More Info: BT1012009
Component: Local Traffic Manager
Symptoms:
The BIG-IP system provides an option to use Message Routing virtual servers for MQTT traffic. It uses a different approach to associate a client side and a server side than a standard virtual server. In some instances, a server side is incorrectly handled.
Conditions:
-- A Message Routing virtual with MQTT protocol.
-- A client attempts to reconnect.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
1010717-5 : Default DoS profile creation from tmsh is incorrectly interpreted by DoS profile GUI
Links to More Info: BT1010717
Component: Anomaly Detection Services
Symptoms:
Creating a DoS profile from tmsh makes the Bados feature appear to be enabled in the GUI, which is incorrect.
Conditions:
Create DoS profile from tmsh, and not from GUI.
Impact:
Inconsistency between the DoS profile and what you see in the GUI.
Workaround:
Disable BADOS in the GUI after creating a DoS profile from tmsh.
1010301-2 : Long-Running iCall script commands can result in iCall script failures or ceasing to run
Links to More Info: BT1010301
Component: TMOS
Symptoms:
When an iCall script runs for at least 5 minutes (or the value of "tmsh list sys scriptd max-script-run-time", default 300), the Scriptd service attempts to terminate the script.
However, iCall commands that result in external commands such as "tmsh::save sys ucs" (as used in the f5.automated_backup template) can block the termination signal until the command exits, and then block the parent Scriptd service. If this condition remains for 65 more seconds (for a total single iCall script time of at least 365 seconds), the BIG-IP system restarts the Scriptd service.
If the already-running iCall script is running after Scriptd finishes restarting, there is an additional risk that the Scriptd service may be un-marked for high availability monitoring in the BIG-IP system. See the results of "tmsh list sys daemon-ha scriptd heartbeat" to understand the case. As a result, the next time a long-running iCall command blocks the Scriptd service may cause Scriptd to hang again, potentially preventing all further iCall script runs without manual intervention.
Conditions:
- An iCall script that takes at least 6 minutes 5 seconds to run, with individual command(s) that take at least 65 seconds to run.
- For example, the f5.automated_backup template, when a UCS backups takes at least 6 minutes 5 seconds to finish on your BIG-IP system.
Impact:
The iCall scripts repeatedly fail to finish or cease to run altogether.
Workaround:
Re-enable Scriptd HA daemon heartbeat check with the following command:
tmsh modify sys daemon-ha scriptd heartbeat enabled
If you believe your iCall scripts need more time to run normally, you can increase the maximum run time (with an example of 10 minutes) with the following command:
tmsh modify sys scriptd max-script-run-time 600
1009337-7 : LACP trunk down due to bcm56xxd send failure
Links to More Info: BT1009337
Component: TMOS
Symptoms:
Lacp reports trunk(s) down. lacpd reports having trouble writing to bcm56xxd over the unix domain socket /var/run/uds_bcm56xxd.
Conditions:
Not known at this time.
Impact:
An outage was observed.
Workaround:
Restart bcm56xxd, lacpd, and lldpd daemons.
1006449-5 : High CPU utilization and slow SNMP response after upgrade★
Links to More Info: BT1006449
Component: TMOS
Symptoms:
After upgrading BIG-IP to version 14.0.0 or later, CPU utilization increases and SNMP queries take an unusually long time to respond.
Conditions:
-- SNMP client repeatedly polls BIG-IP for OIDs in multiple tables over a short period of time.
-- Following an upgrade
Impact:
SNMP queries take an unusually long time to return data, and BIG-IP CPU utilization is higher.
Workaround:
To the file /config/snmp/bigipTrafficMgmt.conf, add one line with the following content:
cacheObj 16
This could be accomplished by executing the following command line from bash:
# echo "cacheObj 16" >> /config/snmp/bigipTrafficMgmt.conf
After the above config file has been modified and saved, the "snmpd" daemon must be restarted, using one of two command variants:
(on a BIG-IP appliance or VE system)
# bigstart restart snmpd
(on a a multi-slot VIPRION or vCMP guest)
# clsh bigstart restart snmpd
(However, this adjustment will be lost when the BIG-IP software is next upgraded.)
1003225-5 : 'snmpget F5-BIGIP-LOCAL-MIB::ltmWebAccelerationProfileStat* returns zeroes
Links to More Info: BT1003225
Component: TMOS
Symptoms:
The values returned during an SNMP get are incorrect for the ltmWebAccelerationProfileStat.
The values should match what is displayed by running the tmsh command.
Conditions:
Performing an SNMP get:
snmpget -v 2c -c public localhost F5-BIGIP-LOCAL-MIB::ltmWebAccelerationProfileStatCacheSize.\"/Common/test\"
Impact:
The system reports inaccurate information for ltmWebAccelerationProfileStat stats.
Workaround:
None
1002969-7 : Csyncd can consume excessive CPU time★
Links to More Info: BT1002969
Component: Local Traffic Manager
Symptoms:
Following a configuration change or software upgrade, the "csyncd" process becomes always busy, consuming excessive CPU.
Conditions:
-- occurs on a multi-blade VIPRION chassis or VELOS tenant
-- may occur with or without vCMP
-- may occur after configuring F5 Telemetry Streaming, but may also occur in other circumstances
-- large numbers of files are contained in one or more of the directories being sync'ed between blades
Impact:
The overuse of CPU resources by "csyncd" may starve other control-plane processes. Handling of payload network traffic by the data plane is not directly affected.
Workaround:
To mitigate the processing load, identify which directory or directories contain excessive numbers of files being replicated between blades by "csyncd". If this replication is not absolutely needed (see below), such a directory can be removed from the set of directories being sync'ed.
For example: if there are too many files being generated in the "/run/pamcache" directory (same as "/var/run/pamcache"), remove this directory from the set being acted upon by "csyncd" by running the following commands to comment-out the associated lines in the configuration file.
[Note it is better to follow the more complete workaround from ID 1103369, https://cdn.f5.com/product/bugtracker/ID1103369.html ]
# clsh "cp /etc/csyncd.conf /etc/csyncd.conf.$(date +%Y%m%d_%H%M%S)"
# clsh "sed -i '/run\/pamcache/,+2s/^/#/' /etc/csyncd.conf"
# clsh "bigstart restart csyncd"
If the problem was observed soon after the installation of F5 Telemetry Streaming, the configuration can be adjusted to make csyncd ignore the related files in a subdirectory of "/var/config/rest/iapps". Run the following commands:
# clsh "cp /etc/csyncd.conf /etc/csyncd.conf.$(date +%Y%m%d_%H%M%S)"
# clsh "sed -i '/\/var\/config\/rest\/iapps/a \ \ \ \ \ \ \ \ ignore f5-telemetry' /etc/csyncd.conf"
# clsh "bigstart restart csyncd"
----
The impact of disabling replication for the pamcache folder is that in the event of a primary blade failover, the new primary blade would not be aware of the existing valid auth tokens, so the user (eg, a GUI user, or a REST script already in progress at the time of the failover) would need to authenticate again.
The impact of disabling replication for a folder under the /var/config/rest/iapps is that in the event of a primary blade failover, the new primary blade would not be aware of the iApps LX package, so the user would need to install the iApps LX package on the new primary blade.
★ This issue may cause the configuration to fail to load or may significantly impact system performance after upgrade
For additional support resources and technical documentation, see:
- The F5 Technical Support website: http://www.f5.com/support/
- The MyF5 website: https://my.f5.com/manage/s/
- The F5 DevCentral website: http://community.f5.com/