Applies To:
Show Versions
BIG-IP APM
- 21.0.0
F5 SSL Orchestrator
- 21.0.0
BIG-IP Analytics
- 21.0.0
BIG-IP Link Controller
- 21.0.0
BIG-IP LTM
- 21.0.0
BIG-IP PEM
- 21.0.0
BIG-IP AFM
- 21.0.0
BIG-IP FPS
- 21.0.0
BIG-IP DNS
- 21.0.0
BIG-IP ASM
- 21.0.0
BIG-IP Release Information
Version: 21.0.0
Build: 10.0
Note: This content is current as of the software release date
Updates to bug information occur periodically. For the most up-to-date bug data, see Bug Tracker.
| The blue background highlights fixes |
Known Issues in BIG-IP v21.0.x
Vulnerability Fixes
| ID Number | CVE | Links to More Info | Description | Fixed Versions |
| 937433 | CVE-2020-15778 | K04305530, BT937433 | SCP vulnerability CVE-2020-15778 | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 884801 | CVE-2025-53474 | K44517780, BT884801 | TMM may crash while processing ILX::call commands | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 2099609 | CVE-2025-61990 | K000156912, BT2099609 | TMM might core with SIGSEGV with certain network traffic | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 2078793-6 | CVE-2022-31129, CVE-2020-11022, CVE-2020-11023, CVE-2020-7676, CVE-2017-18214, CVE-2021-41184, CVE-2010-5312, CVE-2016-7103, CVE-2022-31160, CVE-2021-41182, CVE-2022-24785, CVE-2015-9251, CVE-2019-11358, CVE-2021-41183 | K000134507, BT2078793 | Security weakness in 3rd party library used in AGC | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 2053705-1 | CVE-2025-61974 | K000156733, BT2053705 | TMM memory is not cleared after handshake failure | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 2046885 | CVE-2025-59481 | K000156642, BT2046885 | iHealth configuration improvement | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 2016105 | CVE-2025-61960 | K000156597, BT2016105 | TMM might crash under certain conditions | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1 |
| 1983229 | CVE-2025-61958 | K000154647, BT1983229 | Post-rotate Command Improvements for iHealth | 21.0.0, 17.5.1.2, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1980721 | CVE-2025-54854 | K000156602, BT1980721 | APMD Core while parsing the invalid JWT Header | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1977933 | CVE-2025-53521 | K000156741, BT1977933 | TMM might crash under certain conditions | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1977917 | CVE-2025-53521 | K000156741, BT1977917 | TMM might crash under certain conditions | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1958513 | CVE-2025-58096 | K000156691, BT1958513 | TMM might core with certain network traffic | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1934493 | CVE-2025-53868 | K000151902, BT1934493 | BIG-IP SFTP hardening | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1927145 | CVE-2025-54858 | K000156621, BT1927145 | A bd process crash on a specific scenario | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1922525 | CVE-2025-53868 | K000151902, BT1922525 | BIG-IP SCP hardening | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1920057 | CVE-2025-61935 | K000154664, BT1920057 | Bd crashes | 21.0.0, 17.5.1, 17.1.3, 15.1.10.8 |
| 1889349 | CVE-2025-53856 | K000156707, BT1889349 | Crash during handling ePVA metadata | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1881373 | CVE-2024-3661 | K000139553, BT1881373 | CVE-2024-3661 Tunnelvision Vulnerability | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1874825 | CVE-2025-58071 | K000156746, BT1874825 | Specific IPsec traffic might trigger a tmm crash | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1826393 | CVE-2025-54479 | K000151475, BT1826393 | TMM may restart under certain conditions | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1758153 | CVE-2025-61938 | K000156624, BT1758153 | Configuring a Data Guard URL longer than 1024 characters triggers a restart loop | 21.0.0, 17.5.1, 17.1.3 |
| 1591821-4 | CVE-2025-59781 | K000150637, BT1591821 | The TMM memory leak occurs due to race condition of early terminated connections. | 21.0.0, 17.5.0, 17.1.2.2, 16.1.6, 15.1.10.8 |
| 1582781 | CVE-2021-23177 | K000140961, BT1582781 | CVE-2021-23177 libarchive: extracting a symlink with ACLs modifies ACLs of target | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1382313 | CVE-2025-59478 | K000152341, BT1382313 | TMM might crash under certain conditions | 21.0.0, 17.5.1, 17.1.3, 15.1.10.8 |
| 1353609 | CVE-2023-45886 | K000137315, BT1353609 | ZebOS BGP vulnerability CVE-2023-45886 | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1282837-3 | CVE-2025-61951 | K000151309, BT1282837 | DTLS1.2 Handshakes are causing tmm crash with mTLS connection | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1 |
| 1068653 | CVE-2021-20271 | K10396196, BT1068653 | CVE-2021-20271 rpm: Signature checks bypass via corrupted rpm package | 21.0.0, 17.5.1.2, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 987813 | CVE-2020-25643 | K65234135, BT987813 | CVE-2020-25643 kernel:improper input validation in the ppp_cp_parse_cr function | 21.0.0, 17.5.1, 17.1.3 |
| 981885-7 | CVE-2020-8285 | K61186963 | CVE-2020-8285 curl: malicious FTP server can trigger stack overflow when CURLOPT_CHUNK_BGN_FUNCTION is used | 21.0.0, 17.5.1.2, 17.1.3 |
| 975605 | CVE-2018-1122 | K00409335, BT975605 | CVE-2018-1122 procps-ng, procps: Local privilege escalation in top | 21.0.0, 17.5.1, 17.1.3 |
| 949509 | CVE-2025-59269 | K000151308, BT949509 | Eviction Policy UI Hardening | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 945421 | CVE-2020-1968 | K92451315, BT945421 | CVE-2020-1968: Raccoon vulnerability | 21.0.0, 17.5.1.2, 17.1.3, 16.1.6 |
| 936713 | CVE-2025-59268 | K90301300, BT936713 | REST UI interface enhancements | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 872109 | CVE-2019-17563 | K24551552, BT872109 | CVE-2019-17563: Tomcat Vulnerability | 21.0.0, 17.5.1.2, 17.1.3 |
| 798889 | CVE-2018-20836 | K11225249, BT798889 | CVE-2018-20836 kernel: race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c leads to use-after-free | 21.0.0, 17.5.1.2, 17.1.3 |
| 795993 | CVE-2019-12735 | K93144355, BT795993 | vim vulnerability: CVE-2019-12735 | 21.0.0, 17.5.1.3, 17.1.3 |
| 785209 | CVE-2019-9074 | K09092524, BT785209 | CVE-2019-9074 binutils: out-of-bound read in function bfd_getl32 | 21.0.0, 17.5.1, 17.1.3 |
| 765053 | CVE-2019-1559 | K18549143, BT765053 | OpenSSL vulnerability CVE-2019-1559 | 21.0.0, 17.5.1.2, 17.1.3 |
| 760895 | CVE-2009-5155 | K64119434, BT760895 | CVE-2009-5155 glibc: parse_reg_exp in posix/regcomp.c misparses alternatives leading to denial of service or trigger incorrect result | 21.0.0, 17.5.1, 17.1.3 |
| 753498 | CVE-2018-16869 | K45616155, BT753498 | CVE-2018-16869: Nettle vulnerability | 21.0.0, 17.5.1.3, 17.1.3 |
| 2077209-4 | CVE-2025-54755 | K000156801, BT2077209 | File Import Handler Enhancement | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 2077201-4 | CVE-2025-59483 | K000156800, BT2077201 | TMUI File Import Handler Enhancement | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1990897 | CVE-2025-61933 | K000156596, BT1990897 | APM hardening | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1983321 | CVE-2025-48976 | K000152614, BT1983321 | CVE-2025-48976 apache-commons-fileupload: Apache Commons FileUpload DoS via part headers | 21.0.0, 17.5.1.2 |
| 1966849-1 | CVE-2023-5869 | K000152931 | CVE-2023-5869 postgresql: Buffer overrun from integer overflow in array modification | 21.0.0, 17.1.3 |
| 1937817 | CVE-2025-54500 | K000152001, BT1937817 | CVE-2025-54500: A Particular HTTP/2 sequence may cause High CPU utilization [MadeYouReset] | 21.0.0, 17.5.1.2, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1892025-2 | CVE-2019-11236 | K000135001 | CVE-2019-11236 python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service | 21.0.0, 17.1.3 |
| 1891673-3 | CVE-2018-14404 | K76678525 | CVE-2018-14404 libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c | 21.0.0, 17.5.1.3 |
| 1825901 | CVE-2015-6748 | K000150762, BT1825901 | CVE-2015-6748 jsoup: XSS vulnerability related to incomplete tags at EOF | 21.0.0, 17.5.1.3, 17.1.3 |
| 1787153 | CVE-2019-9740 | K000153040, BT1787153 | CVE-2019-9740 python: CRLF injection via the query part of the url passed to urlopen() | 21.0.0, 17.5.1, 17.1.3 |
| 1787149 | CVE-2019-18348 | K000153042, BT1787149 | CVE-2019-18348 python: CRLF injection via the host part of the url passed to urlopen() | 21.0.0, 17.5.1.2, 17.1.3 |
| 1772377-1 | CVE-2024-7006 | K000152542 | Libtiff CVE-2024-7006: NULL pointer dereference in tif_dirinfo.c | 21.0.0, 17.5.1, 17.1.3 |
| 1678793 | CVE-2019-14863 | K000141459, BT1678793 | CVE-2019-14863 angular: Cross-site Scripting (XSS) due to no proper sanitization of xlink:href attributes | 21.0.0, 17.5.1.2, 17.1.3 |
| 1678789 | CVE-2019-10768 | K000141463, BT1678789 | CVE-2019-10768 AngularJS: Prototype pollution in merge function could result in code injection | 21.0.0, 17.5.1.2, 17.1.3 |
| 1678777 | CVE-2022-25869 | K000141459, BT1678777 | CVE-2022-25869 angular.js : insecure page caching in the browser, which allows interpolation of <textarea> elements. | 21.0.0, 17.5.1.2, 17.1.3 |
| 1678769 | CVE-2023-26116 | K000141463, BT1678769 | CVE-2023-26116 angularjs: Regular Expression Denial of Service via angular.copy() | 21.0.0, 17.5.1.2, 17.1.3 |
| 1672313 | CVE-2016-9841 | K000149915, BT1672313 | CVE-2016-9841 zlib: Out-of-bounds pointer arithmetic in inffast.c | 21.0.0, 17.5.1, 17.1.3 |
| 1672249 | CVE-2016-9840 | K000149905, BT1672249 | CVE-2016-9840 zlib: Out-of-bounds pointer arithmetic in inftrees.c | 21.0.0, 17.5.1, 17.1.3 |
| 1600561 | CVE-2024-2961 | K000140901, BT1600561 | CVE-2024-2961 glibc Vulnerability | 21.0.0, 17.5.1.2, 17.1.3 |
| 1596097 | CVE-2023-37369 | K000148809, BT1596097 | CVE-2023-37369 qtbase: buffer overflow in QXmlStreamReader | 21.0.0, 17.5.1.2, 17.1.3 |
| 1596073 | CVE-2023-38197 | K000148809, BT1596073 | CVE-2023-38197 qtbase: infinite loops in QXmlStreamReader | 21.0.0, 17.5.1.2, 17.1.3 |
| 1590625 | CVE-2023-1667 | K000148495 | CVE-2023-1667 libssh: NULL pointer dereference vulnerability | 21.0.0 |
| 1589661 | CVE-2019-3860 | K000149288, BT1589661 | CVE-2019-3860 libssh2: Out-of-bounds reads with specially crafted SFTP packets | 21.0.0, 17.5.1, 17.1.3 |
| 1589645 | CVE-2019-3859 | K000149288, BT1589645 | CVE-2019-3859 libssh2: Unchecked use of _libssh2_packet_require and _libssh2_packet_requirev resulting in out-of-bounds read | 21.0.0, 17.5.1.2, 17.1.3 |
| 1585277 | CVE-2024-28757 | K000139637, BT1585277 | Libexpat through 2.6.1 allows an XML Entity Expansion attack: CVE-2024-28757 | 21.0.0, 17.5.1, 17.1.2.2 |
| 1576897 | CVE-2016-9063 | K000139691, BT1576897 | CVECVE-2016-9063 firefox: Possible integer overflow to fix inside XML_Parse in Expat | 21.0.0, 17.5.1, 17.1.3 |
| 1576125 | CVE-2024-27983 | K000139532, BT1576125 | Node.js vulnerability CVE-2024-27983 | 21.0.0, 17.5.1, 17.1.2.2 |
| 1572145 | CVE-2023-29469 | K000139592, BT1572145 | CVE-2023-29469 libxml2: Hashing of empty dict strings isn't deterministic | 21.0.0, 17.5.1, 17.1.3 |
| 1572053 | CVE-2019-8457, CVE-2017-10989, CVE-2020-35527, CVE-2019-13734, CVE-2020-35525, CVE-2019-19880, CVE-2019-20218 | K000141088, BT1572053 | sqlite - CVE-2019-8457 , CVE-2017-10989,CVE-2020-35527, CVE-2019-13734,CVE-2020-35525,CVE-2019-19880,CVE-2019-20218 | 21.0.0, 17.5.1.3, 17.1.3 |
| 1517561 | CVE-2023-28484 | K000139641, BT1517561 | CVE-2023-28484 libxml2: NULL dereference in xmlSchemaFixupComplexType | 21.0.0, 17.5.1, 17.1.3 |
| 1494229 | CVE-2023-2953 | K000138814, BT1494229 | CVE-2023-2953 openldap: null pointer dereference in ber_memalloc_x function | 21.0.0, 17.5.1, 17.1.3 |
| 1470177 | CVE-2023-46218 | K000138650, BT1470177 | CVE-2023-46218 curl: information disclosure by exploiting a mixed case flaw | 21.0.0, 17.5.1.2, 17.1.3 |
| 1469629 | CVE-2023-5981, CVE-2024-0553 | K000138649, BT1469629 | CVE-2023-5981 & CVE-2024-0553: gnutls vulnerability on response times of ciphertexts | 21.0.0, 17.5.1.3, 17.1.3 |
| 1441577 | CVE-2023-42795 | K000138178, BT1441577 | CVE-2023-42795 tomcat: improper cleaning of recycled objects could lead to information leak | 21.0.0, 17.5.1, 17.1.3 |
| 1393733 | CVE-2022-43750 | K000139700, BT1393733 | CVE-2022-43750 kernel: memory corruption in usbmon driver | 21.0.0, 17.5.1, 17.1.3 |
| 1390457 | CVE-2022-25147 | K000137702, BT1390457 | CVE-2022-25147 apr-util: out-of-bounds writes in the apr_base64 | 21.0.0, 17.5.1.2, 17.1.3 |
| 1327169 | CVE-2023-24329 | K000135921, BT1327169 | CVE-2023-24329 python: urllib.parse url blocklisting bypass | 21.0.0, 17.5.1, 17.1.3 |
| 1306309 | CVE-2023-28709 | K000135262, BT1306309 | CVE-2023-28709 Apache tomcat: Fix for CVE-2023-24998 was incomplete | 21.0.0, 17.5.1, 17.1.3 |
| 1306305 | CVE-2023-24998 | K000133052, BT1306305 | CVE-2023-24998 [Apache Tomcat]: FileUpload DoS with excessive parts | 21.0.0, 17.5.1.2, 17.1.3 |
| 1301545 | CVE-2023-0568 | K000134747, BT1301545 | CVE-2023-0568 php: 1-byte array overrun in common path resolve code | 21.0.0, 17.5.1, 17.1.3 |
| 1270257 | CVE-2023-0662 | K000133753, BT1270257 | CVE-2023-0662 php: DoS vulnerability when parsing multipart request body | 21.0.0, 17.5.1, 17.1.3 |
| 1266853 | CVE-2023-24998 | K000133052, BT1266853 | CVE-2023-24998 Apache Commons FileUpload: FileUpload DoS with excessive parts | 21.0.0, 17.5.1.2, 17.1.3 |
| 1144673 | CVE-2025-47148 | K000148816, BT1144673 | Persistent Connection Issue in SSO v2 Plugin | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1136113 | CVE-2022-25647 | K00994461 | CVE-2022-25647: GSON Vulnerability | 21.0.0 |
| 1099369 | CVE-2018-25032 | K21548854, BT1099369 | CVE-2018-25032 [NodeJS]zlib: A flaw found in zlib, when compressing (not decompressing!) certain inputs. | 21.0.0, 17.5.1.2, 17.1.3 |
| 1093685 | CVE-2021-4083 | K52379673, BT1093685 | CVE-2021-4083 kernel: fget: check that the fd still exists after getting a ref to it | 21.0.0, 17.5.1, 17.1.3 |
| 1073461 | CVE-2018-15518 | K42941419, BT1073461 | CVE-2018-15518: Double free in QXmlStreamReader | 21.0.0, 17.5.1.3 |
| 1057141 | CVE-2018-14647 | K000151007, BT1057141 | CVE-2018-14647 python: Missing salt initialization in _elementtree.c module | 21.0.0, 17.5.1, 17.1.3 |
| 1043977 | CVE-2021-3672 CVE-2021-22931 |
K53225395, BT1043977 | CVE-2021-3672 CVE-2021-22931 NodeJS Vulnerabilities in iAppLX | 21.0.0, 17.5.1.2, 17.1.3 |
| 1041141 | CVE-2021-35942 | K98121587, BT1041141 | CVE-2021-35942 glibc: Arbitrary read in wordexp() | 21.0.0, 17.5.1, 17.1.3 |
| 1035781 | CVE-2021-33909 | K75133288, BT1035781 | CVE-2021-33909: Linux Kernel Vulnerability | 21.0.0, 17.5.1.2, 17.1.3 |
| 1028701 | CVE-2019-9947 | K000151516, BT1028701 | CVE-2019-9947 python: CRLF injection via the path part of the url passed to urlopen() | 21.0.0, 17.5.1, 17.1.3 |
| 1001369 | CVE-2020-12049 | K16729408, BT1001369 | D-Bus vulnerability CVE-2020-12049 | 21.0.0, 17.5.1, 17.1.3, 15.1.4.1 |
| 993681 | CVE-2019-18282 | K32380005 | CVE-2019-18282 Kernel: Device Tracking Vulnerability | 21.0.0 |
| 988589 | CVE-2019-25013 | K68251873, BT988589 | CVE-2019-25013 glibc vulnerability: buffer over-read in iconv | 21.0.0, 17.5.1, 17.1.3, 15.1.4.1 |
| 965545 | CVE-2020-27617 | K41142448, BT965545 | CVE-2020-27617 : QEMU Vulnerability | 21.0.0, 17.5.1.2, 17.1.3 |
| 921525 | CVE-2020-1752 | K49921213, BT921525 | CVE-2020-1752: glibc vulnerability using glob | 21.0.0, 17.5.1, 17.1.3 |
| 874521 | CVE-2019-1551 | K43798238, BT874521 | OpenSSL vulnerability: CVE-2019-1551 | 21.0.0, 17.5.1.2 |
| 1893361-2 | CVE-2021-3177 | K000133761 | CVE-2021-3177 python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c | 21.0.0, 17.5.1.3, 17.1.3 |
| 1893141-2 | CVE-2020-26137 | K000133547 | CVE-2020-26137 in Library:python, Installed:2.7.5-58.el7.0.0.14.i686, FixVersion:2.7.5-92.el7_9 and others, on HostOS: CentOS Security Update for python | 21.0.0, 17.5.1.3, 17.1.3 |
| 1891817-3 | CVE-2018-18521 | K21426934 | CVE-2018-18521 elfutils: Divide-by-zero in arlib_add_symbols function in arlib.c | 21.0.0, 17.5.1.3, 17.1.3 |
| 1891813-3 | CVE-2018-18520 | K21426934 | CVE-2018-18520 elfutils: eu-size cannot handle recursive ar files | 21.0.0, 17.5.1.3, 17.1.3 |
| 1891805-3 | CVE-2018-18310 | K21426934 | CVE-2018-18310 elfutils: invalid memory address dereference was discovered in dwfl_segment_report_module.c in libdwfl | 21.0.0, 17.5.1.3, 17.1.3 |
| 1891361-3 | CVE-2015-8035 | K76678525 | CVE-2015-8035 libxml2: DoS caused by incorrect error detection during XZ decompression | 21.0.0, 17.5.1.3, 17.1.3 |
| 1814405-1 | CVE-2024-11187 | K000150814 | CVE-2024-11187- Bind Vulnerability | 21.0.0 |
| 1787141 | CVE-2018-20852 | K000151520, BT1787141 | CVE-2018-20852 python: Cookie domain check returns incorrect results | 21.0.0, 17.5.1.3, 17.1.3 |
| 1697273 | CVE-2020-8037 | K000149929, BT1697273 | CVE-2020-8037 tcpdump: ppp decapsulator can be convinced to allocate a large amount of memory | 21.0.0, 17.5.1.2, 17.1.3 |
| 1692917 | CVE-2024-6232 | K000148252, BT1692917 | CVE-2024-6232 CPython Tarfile vulnerability | 21.0.0, 17.5.1, 17.1.3 |
| 1623197 | CVE-2024-37891 | K000140711, BT1623197 | CVE-2024-37891 urllib3: proxy-authorization request header is not stripped during cross-origin redirects | 21.0.0, 17.5.1, 17.1.3 |
| 1591481 | CVE-2017-1000381 | K000149130, BT1591481 | CVE-2017-1000381: C-ares Vulnerability iRulesLX | 21.0.0, 17.5.1.2, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1591469 | CVE-2017-1000381 | K000149130, BT1591469 | CVE-2017-1000381 c-ares: NAPTR parser out of bounds access | 21.0.0, 17.1.3 |
| 1591249 | CVE-2018-6913 | K000141301, BT1591249 | CVE-2018-6913 perl: heap buffer overflow in pp_pack.c | 21.0.0, 17.5.1, 17.1.3 |
| 1586537 | CVE-2024-0985 | K000140188, BT1586537 | CVE-2024-0985 postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL | 21.0.0, 17.5.1.2, 17.1.3 |
| 1566997 | CVE-2016-10349 | K000148259, BT1566997 | CVE-2016-10349 libarchive: Heap-based buffer over-read in the archive_le32dec function | 21.0.0, 17.5.1.2, 17.1.3 |
| 1566533 | CVE-2017-18342 | K000139901, BT1566533 | CVE-2017-18342 PyYAML: yaml.load() API could execute arbitrary code | 21.0.0, 17.5.1, 17.1.3 |
| 1561689 | CVE-2016-10350 | K000148259, BT1561689 | CVE-2016-10350 libarchive: Heap-based buffer over-read in the archive_read_format_cab_read_header function | 21.0.0, 17.1.3 |
| 1394517 | CVE-2018-12122 | K000137090, BT1394517 | CVE-2018-12122: Slowloris HTTP Denial of Service (NodeJS v6) | 21.0.0, 17.1.2.2 |
| 1336185 | CVE-2018-12123 | K000137090, BT1336185 | NodeJS Vulnerability - CVE-2018-12123 | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1330801 | CVE-2018-12123, CVE-2018-12121, CVE-2018-12122 | K000137090, BT1330801 | NodeJS Vulnerability CVE-2018-12123, CVE-2018-12121, CVE-2018-12122 | 21.0.0, 17.5.1, 17.1.3 |
| 1326665 | CVE-2023-32067 | K000135831, BT1326665 | CVE-2023-32067 c-ares: 0-byte UDP payload Denial of Service | 21.0.0, 17.5.1.2 |
| 1304081 | CVE-2023-2650 | K000135178, BT1304081 | CVE-2023-2650 openssl: Possible DoS translating ASN.1 object identifiers | 21.0.0, 17.5.1, 17.1.3 |
| 1240373 | CVE-2022-37436 | K000132665, BT1240373 | CVE-2022-37436: Flaw in mod_proxy module of httpd | 21.0.0, 17.5.1.2, 17.1.3 |
| 1209209-8 | CVE-2022-28733 | K000132893 | CVE-2022-28733 grub2: Integer underflow in grub_net_recv_ip4_packets | 21.0.0 |
| 1029013 | CVE-2016-10228 | K52494142, BT1029013 | CVE-2016-10228 glibc: iconv program can hang when invoked with the -c option | 21.0.0, 17.5.1.2, 17.1.3 |
| 1005097 | CVE-2020-17507 | K11542555 | CVE-2020-17507: Vulnerability in Phantomjs | 21.0.0 |
| 2050321 | CVE-2014-9426 | K16339, BT2050321 | PHP Vulnerabilities: CVE-2014-9425 | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1678809 | CVE-2023-26117 | K000150967, BT1678809 | CVE-2023-26117: Angular JS vulnerability | 21.0.0, 17.5.1.2, 17.1.3 |
| 1678805 | CVE-2023-26118 | K000150967, BT1678805 | CVE-2023-26118 angularjs: Regular Expression Denial of Service via the <input type="url"> element | 21.0.0, 17.5.1.2, 17.1.3 |
| 1673161 | CVE-2023-45853 | K000149884, BT1673161 | CVE-2023-45853 zlib: integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_6 | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1590509 | CVE-2023-32573 | K000148690, BT1590509 | CVE-2023-32573 qt: Uninitialized variable usage in m_unitsPerEm | 21.0.0, 17.1.3 |
Functional Change Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2083217 | 1-Blocking | BT2083217 | Updates to BIG-IP Image Signing and Verification Process - October 2025★ | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1710233 | 3-Major | BT1710233 | No option to disable violation for double-escaped NULL in query string | 21.0.0, 17.5.1.3, 17.1.3 |
TMOS Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2137653-2 | 1-Blocking | BT2137653 | Unable to upload files that contain a colon in the filename | 21.0.0 |
| 1976113-1 | 1-Blocking | BT1976113 | Deployment of BIG-IP Best Plus images on Azure fails with OSProvisioningClientError | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1 |
| 740258 | 2-Critical | BT740258 | Support IPv6 connections to TACACS+ remote auth servers | 21.0.0, 17.5.1 |
| 2132125 | 2-Critical | Unable to upload QKView to iHealth | 21.0.0 | |
| 2078797 | 2-Critical | K000156885, BT2078797 | LTM Policy actions fail to render in configuration utility (web UI)★ | 21.0.0 |
| 2077601 | 2-Critical | The guest or manager role users getting error on reading virtual server config | 21.0.0 | |
| 2077297 | 2-Critical | BT2077297 | HA Group List page in webUI shows a blank page | 21.0.0 |
| 2064413-1 | 2-Critical | BT2064413 | UCS File Download Failure via REST API Due to Byte-Range Handling Bug in BIG-IP | 21.0.0 |
| 2053613 | 2-Critical | Core dump found during stability testing | 21.0.0 | |
| 2047593-1 | 2-Critical | BT2047593 | Blade upgrade fails with the "HAL unexpected init failure (continuing) : Unknown slot for ChassisBase" error message★ | 21.0.0 |
| 2044417 | 2-Critical | BT2044417 | Connectivity problems and eal-intr-thread cores on Azure using >= 6 interfaces | 21.0.0 |
| 2037409 | 2-Critical | BT2037409 | Tmctl tables are corrupted for large cluster size and tmm memory shows 0 | 21.0.0, 17.5.1.3 |
| 2007705 | 2-Critical | BT2007705 | HSL can incorrectly handle pending TCP connections leading to a TMM crash | 21.0.0 |
| 1967025 | 2-Critical | Improved Permission Handling in REST SNMP Endpoint and TMSH | 21.0.0 | |
| 1934401 | 2-Critical | BT1934401 | iSeries HSB v5.26.8.0 firmware | 21.0.0, 17.5.1 |
| 1934393 | 2-Critical | BT1934393 | iSeries HSB v5.9.14.0 firmware | 21.0.0, 17.5.1 |
| 1934385 | 2-Critical | BT1934385 | iSeries HSB v4.3.5.0 firmware | 21.0.0, 17.5.1 |
| 1927513 | 2-Critical | BT1927513 | SIGSEGV TMM core ikev2_encrypt_packet_construct at iked/ikev2_packet.c:334 | 21.0.0, 17.5.1.2 |
| 1787621-3 | 2-Critical | BT1787621 | TMM may unexpectedly restart during IPsec tunnel negotiation | 21.0.0, 17.5.1.2 |
| 1757585 | 2-Critical | BT1757585 | Unable to install a license on an AWS BIG-IP VE | 21.0.0 |
| 1492337 | 2-Critical | BT1492337 | TMM fails to start up using Xnet-DPDK-virtio due to out of bounds MTU | 21.0.0, 17.5.1, 17.1.3 |
| 1330213-1 | 2-Critical | BT1330213 | SIGABRT is sent when single quotes are not closed/balanced in TMSH commands | 21.0.0 |
| 1305117 | 2-Critical | BT1305117 | SSL profile "no-dtlsv1.2" option is left disabled while upgrading from v14.x or v15.x to 17.1.0★ | 21.0.0, 17.5.1.3 |
| 1014361-4 | 2-Critical | BT1014361 | Config sync fails after provisioning APM or changing BIG-IP license | 21.0.0, 17.5.1.3 |
| 944817 | 3-Major | Improper IP based access access restrictions via HTTPD | 21.0.0 | |
| 936829 | 3-Major | TMUI Dashboard Hardening | 21.0.0 | |
| 867253 | 3-Major | BT867253 | Systemd not deleting user journals | 21.0.0, 17.5.1 |
| 685626-13 | 3-Major | iControl REST improper sanitisation of data | 21.0.0 | |
| 213618 | 3-Major | Resetting DB variable to default does not always work | 21.0.0 | |
| 2130601 | 3-Major | TMUI Request Processing Improvement | 21.0.0 | |
| 2119173 | 3-Major | BT2119173 | The Active or Standby buttons in the webUI are not working | 21.0.0 |
| 2098861 | 3-Major | BT2098861 | Single-NIC not supported on Azure Standard_Ds_v5 Series. | 21.0.0 |
| 2058989 | 3-Major | TMUI hardening | 21.0.0 | |
| 2058977 | 3-Major | TMUI hardening | 21.0.0 | |
| 2047293 | 3-Major | BT2047293 | TMM NULL dereference in Dyn-TCAM after multiple failures | 21.0.0, 17.5.1.3, 17.1.3 |
| 1968033 | 3-Major | Remove the unused ImageMagick package from BIG-IP | 21.0.0, 17.5.1.3 | |
| 1965053 | 3-Major | BT1965053 | Keymgmtd: Incorrect and misleading debug log statements | 21.0.0, 17.5.1.2 |
| 1952729 | 3-Major | BT1952729 | Certificates with explicitly defined EC parameters are treated as invalid in Common Criteria mode and TLS communication will be rejected. | 21.0.0, 17.5.1.2 |
| 1936233 | 3-Major | BT1936233 | TMM mismanagement of IPsec connections can slowly leak memory and cause tunnel negotiation to fail | 21.0.0, 17.5.1.2 |
| 1935833 | 3-Major | BT1935833 | Tmm cores with "ERR: Attempting to send MPI message to ourself" | 21.0.0, 17.5.1.2 |
| 1928749 | 3-Major | BT1928749 | TMM cores in rare circumstances | 21.0.0, 17.5.1.2, 17.1.3 |
| 1925837-2 | 3-Major | CVE-2018-18508 nss: NULL pointer dereference in several CMS functions resulting in a denial of service | 21.0.0, 17.5.1.3, 17.1.3 | |
| 1924801-2 | 3-Major | grub2: Heap out-of-bounds write in short form option parser | 21.0.0, 17.5.1.3, 17.1.3 | |
| 1922501 | 3-Major | BT1922501 | TMM crash loop due to missing kernel driver★ | 21.0.0, 17.5.1 |
| 1920341 | 3-Major | BT1920341 | SSH Public Key authentication allows RSA and not ECDSA in ccmode | 21.0.0, 17.5.1 |
| 1880365 | 3-Major | BT1880365 | Cannot log into Fs_v2 Azure BIG-IP with >= 32 vCPUs and >= 5 interfaces | 21.0.0, 17.5.1 |
| 1856449 | 3-Major | BT1856449 | [keymgmtd]OpenSSL: DRBG Continuous RNG test failed: DRBG stuck. | 21.0.0, 17.5.1.2 |
| 1853721 | 3-Major | BT1853721 | User has reached maximum active login tokens | 21.0.0, 17.5.1.2, 17.1.3 |
| 1798961 | 3-Major | BT1798961 | With CC/FIPS license installed, OpenSSL should raise fatal alert when client does not advertise EMS support | 21.0.0, 17.5.1, 17.1.3 |
| 1789477 | 3-Major | BT1789477 | Orphaned tmsh processes might eventually lead to an out-of-memory condition | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1755413 | 3-Major | BT1755413 | Fast scp file transfer may not display progress bar | 21.0.0 |
| 1753533 | 3-Major | CVE-2018-16492 nodejs-extend: Prototype pollution can allow attackers to modify object properties | 21.0.0, 17.5.1.3, 16.1.6.1 | |
| 1708957 | 3-Major | BT1708957 | Excessive debug logs can cause key management daemon failure | 21.0.0 |
| 1708189 | 3-Major | BT1708189 | ICMP errors with HSL can rarely cause tmm cores | 21.0.0, 17.5.1.2, 17.1.3 |
| 1622789 | 3-Major | BT1622789 | Traffic levels for NAT64/46 traffic might be different after an upgrade | 21.0.0, 17.5.1, 17.1.2 |
| 1621269 | 3-Major | BT1621269 | TMM restart loop when attaching large number of interfaces. | 21.0.0, 17.5.1 |
| 1612345 | 3-Major | Improved Handling of BFD Session Traffic | 21.0.0, 17.5.1, 17.1.3 | |
| 1602209-3 | 3-Major | BT1602209 | The bigipTrafficMgmt.conf file is not copied from UCS to /config/snmp★ | 21.0.0 |
| 1505301 | 3-Major | CVE-2022-29154 rsync: remote arbitrary files write inside the directories of connecting peers | 21.0.0, 17.5.1.2, 17.1.3 | |
| 1450181 | 3-Major | Improved Permission Handling in REST SNMP Endpoint and TMSH | 21.0.0, 17.1.3 | |
| 1217533-5 | 3-Major | BIG-IP SFTP hardening | 21.0.0 | |
| 1144057 | 3-Major | K05403841 | BIG-IP and BIG-IQ improvements disclosed by Rapid7 | 21.0.0 |
| 1121517 | 3-Major | BT1121517 | Interrupts on Hyper-V are pinned on CPU 0 | 21.0.0, 17.5.1, 17.1.3, 16.1.4, 15.1.10 |
| 1069341 | 3-Major | CVE-2016-4738 libxslt: Heap overread due to an empty decimal-separator | 21.0.0, 17.5.1.2, 17.1.3 | |
| 1052433-2 | 3-Major | CVE-2019-19530: use-after-free caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver | 21.0.0, 17.1.3 | |
| 1032001 | 3-Major | BT1032001 | Statemirror address can be configured on management network or clusterd restarting | 21.0.0, 17.5.1.3, 17.1.3, 15.1.3.1 |
| 1029173 | 3-Major | BT1029173 | MCPD fails to reply and does not log a valid message if there are problems replicating a transaction to PostgreSQL | 21.0.0 |
| 1027237 | 3-Major | BT1027237 | Cannot edit virtual server in GUI after loading config with traffic-matching-criteria | 21.0.0, 17.5.1.2, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 857045 | 4-Minor | BT857045 | LDAP system authentication may stop working | 21.0.0, 17.5.1, 16.1.5 |
| 2047069-2 | 4-Minor | BT2047069 | Issue observed in Checkmarx scan | 21.0.0, 17.1.3 |
| 2012301 | 4-Minor | Upgrade the certificate to be compatible with the new upgraded gson package | 21.0.0 | |
| 1959725 | 4-Minor | CVE-2024-42322 kernel: ipvs: properly dereference pe in ip_vs_add_service | 21.0.0, 17.5.1.3, 17.1.3 | |
| 1959513 | 4-Minor | CVE-2023-52803 kernel: SUNRPC: Fix RPC client cleaned up the freed pipefs dentries | 21.0.0, 17.1.3 | |
| 1926141-2 | 4-Minor | kernel: possible out of bounds write in kbd_keycode of keyboard.c | 21.0.0, 17.5.1.3, 17.1.3 | |
| 1925349-2 | 4-Minor | kernel: fs/quota/quota_tree.c does not validate the block number in the quota tree | 21.0.0, 17.5.1.3, 17.1.3 | |
| 1925037-2 | 4-Minor | Kernel: denial of service in atm_tc_enqueue in net/sched/sch_atm.c due to type confusion | 21.0.0, 17.5.1.3, 17.1.3 | |
| 1925033-2 | 4-Minor | kernel: slab-out-of-bounds read vulnerabilities in cbq_classify | 21.0.0, 17.5.1.3, 17.1.3 | |
| 1924981-2 | 4-Minor | kernel: Out-of-bounds access in write_extent_buffer() when mounting and operating a crafted btrfs image | 21.0.0, 17.5.1.3, 17.1.3 | |
| 1924977-2 | 4-Minor | kernel: Invalid pointer dereference in fs/btrfs/relocation.c:__del_reloc_root() when mounting crafted btrfs image | 21.0.0, 17.5.1.3, 17.1.3 | |
| 1923693-2 | 4-Minor | kernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race | 21.0.0, 17.5.1.3, 17.1.3 | |
| 1923665-2 | 4-Minor | kernel: Integer overflow in function rndis_query_oid of rndis_wlan.c | 21.0.0, 17.5.1.3, 17.1.3 | |
| 1923605-2 | 4-Minor | kernel: Salsa20 encryption algorithm does not correctly handle zero-length inputs allowing local attackers to cause denial-of-service | 21.0.0, 17.5.1.3, 17.1.3 | |
| 1891745-3 | 4-Minor | CVE-2018-16403 elfutils: Heap-based buffer over-read in libdw/dwarf_getabbrev.c and libwd/dwarf_hasattr.c causes crash | 21.0.0, 17.5.1.3, 17.1.3 | |
| 1753933 | 4-Minor | CVE-2020-14393 perl-dbi: Buffer overflow on an overlong DBD class name | 21.0.0, 17.5.1, 17.1.3 | |
| 1753617 | 4-Minor | CVE-2023-24621 Untrusted Polymorphic Deserialization to Java Classes | 21.0.0, 17.5.1.2, 17.1.3 | |
| 1623597-2 | 4-Minor | BT1623597 | Nat46/64 hardware connection re-offload is not optimal. | 21.0.0, 17.5.1 |
| 1401961-2 | 4-Minor | BT1401961 | A blade with a non-functional backplane may override the dag context for the whole system | 21.0.0, 17.5.1 |
| 1314333 | 4-Minor | Patch gnutls library for CVEs CVE-2018-10844, CVE-2018-10845, CVE-2018-10846 | 21.0.0, 17.5.1.2, 17.1.3 | |
| 1144421 | 4-Minor | CVE-2019-14866 cpio: improper input validation when writing tar header fields leads to unexpected tar generation | 21.0.0, 17.5.1, 17.1.3 | |
| 1128685 | 4-Minor | BT1128685 | REST API requests using deleted expired tokens returns xml response when authentication fails | 21.0.0 |
| 1069949 | 4-Minor | CVE-2018-1000007 curl: HTTP authentication leak in redirects | 21.0.0, 17.5.1, 17.1.3 | |
| 1061485 | 4-Minor | CVE-2019-19527: Linux kernel vulnerability | 21.0.0, 17.5.1.2, 17.1.3 | |
| 1059229 | 4-Minor | CVE-2019-16994 kernel: Memory leak in sit_init_net() in net/ipv6/sit.c | 21.0.0, 17.5.1.2, 17.1.3 | |
| 1058197 | 4-Minor | CVE-2019-14973: LibTIFF Vulnerability | 21.0.0, 17.5.1.2, 17.1.3 | |
| 1052445-2 | 4-Minor | CVE-2019-19537 kernel: race condition caused by a malicious USB device in the USB character device driver layer | 21.0.0, 17.5.1.3, 17.1.3 | |
| 1052437-2 | 4-Minor | CVE-2019-19532 kernel: malicious USB devices can lead to multiple out-of-bounds write | 21.0.0, 17.1.3 | |
| 1052333 | 4-Minor | CVE-2018-16885: Linux kernel vulnerability | 21.0.0, 17.5.1.2, 17.1.3 | |
| 1052253 | 4-Minor | CVE-2018-13095 kernel: NULL pointer dereference in fs/xfs/libxfs/xfs_inode_buf.c | 21.0.0, 17.1.3 | |
| 1052249 | 4-Minor | CVE-2018-13094 kernel: NULL pointer dereference in xfs_da_shrink_inode function | 21.0.0, 17.5.1, 17.1.3 | |
| 1052245 | 4-Minor | CVE-2018-13093 kernel: NULL pointer dereference in lookup_slow function | 21.0.0, 17.5.1.2, 17.1.3 | |
| 1052217 | 4-Minor | CVE-2018-19985 kernel: oob memory read in hso_probe in drivers/net/usb/hso.c | 21.0.0, 17.5.1, 17.1.3 | |
| 1052181 | 4-Minor | CVE-2018-7191 kernel: denial of service via ioctl call in network tun handling | 21.0.0, 17.5.1.2, 17.1.3 | |
| 1051869 | 4-Minor | CVE-2018-20169: Linux kernel vulnerability | 21.0.0, 17.5.1.2, 17.1.3 | |
| 1051769 | 4-Minor | CVE-2019-10140 kernel: overlayfs: NULL pointer dereference in ovl_posix_acl_create function in fs/overlayfs/dir.c | 21.0.0, 17.5.1.2, 17.1.3 | |
| 1051697 | 4-Minor | CVE-2019-11833 kernel: fs/ext4/extents.c leads to information disclosure | 21.0.0, 17.5.1.2, 17.1.3 | |
| 1028541 | 4-Minor | CVE-2018-18384: Unzip Vulnerability | 21.0.0, 17.5.1.3, 17.1.3 | |
| 1580357 | 5-Cosmetic | CVE-2016-2037 CVE-2015-1197 cpio: out of bounds write | 21.0.0, 17.5.1, 17.1.3 |
Local Traffic Manager Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2047569 | 1-Blocking | BT2047569 | TMM may crash during the startup with SR-IOV Intel E810 NIC on VMWare environments | 21.0.0 |
| 1825513-2 | 1-Blocking | BT1825513 | ClientSSL profile with PQC group may cause TMM to crash | 21.0.0, 17.5.1 |
| 2137581 | 2-Critical | TMM core may occur under certain conditions | 21.0.0 | |
| 2132165 | 2-Critical | BT2132165 | TCP connection fail when tm.tcpstopblindinjection is enabled | 21.0.0 |
| 1965329 | 2-Critical | BT1965329 | TMM may crash when re-declaring an LTM policy with a data-group | 21.0.0 |
| 1935053 | 2-Critical | BT1935053 | Impact of crypto queue limits on SSL handshake reliability | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1 |
| 1926989 | 2-Critical | BT1926989 | BIG-IP Virtual Edition: kswapd running constantly and consuming most of the CPU cycles of a core★ | 21.0.0, 17.5.1 |
| 1921049 | 2-Critical | BT1921049 | When L7 policy is updated, existing HTTP/2 connection using it gets a RST_STREAM | 21.0.0 |
| 1756525-1 | 2-Critical | BT1756525 | ixlv driver could have failed hardware offload with TSO off | 21.0.0, 17.5.1, 17.1.3 |
| 1598405 | 2-Critical | BT1598405 | Intermittent TCP RST error 'HTTP internal error (bad state transition)' occurs for larger files when the Explicit Proxy virtual server uses HTTP_REQUEST_SEND iRule event | 21.0.0 |
| 1579533 | 2-Critical | BT1579533 | Jitterentropy read is restricted to FIPS mode or TMM usage only, for performance reasons★ | 21.0.0, 17.5.1, 17.1.3 |
| 1519001 | 2-Critical | BT1519001 | After a crash, tmm may experience memory corruption | 21.0.0, 17.5.1.2 |
| 1267221 | 2-Critical | BT1267221 | When TMM starts, Hyper-V shows no RX packets on the ethX interface★ | 21.0.0, 17.5.1 |
| 1134257 | 2-Critical | BT1134257 | TMM cores when pingaccess profile is modified multiple times and configuration is loaded | 21.0.0, 17.5.1.3, 17.1.3 |
| 1124865-3 | 2-Critical | BT1124865 | Removal of LAG member from an active LACP trunk on r2k and r4k systems requires tmm restart | 21.0.0, 17.5.1.3, 17.1.3, 15.1.9 |
| 1009161-4 | 2-Critical | BT1009161 | SSL mirroring protect for null sessions | 21.0.0, 15.1.5.1, 14.1.4.5 |
| 966785 | 3-Major | BT966785 | Rate Shaping stops TCP retransmission | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1 |
| 932461 | 3-Major | BT932461 | Certificate update on the SSL profile server for the HTTPS monitor: BIG-IP does not use the updated certificate. | 21.0.0, 17.5.1.2, 17.1.3 |
| 881065 | 3-Major | BT881065 | Adding port-list to Virtual Server changes the route domain to 0 | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 673060 | 3-Major | BT673060 | SSL handshake failure with Session Ticket enabled on the backend server | 21.0.0 |
| 2130729 | 3-Major | BT2130729 | HTTP::respond not working properly with HTTP3/quic - content not sent | 21.0.0 |
| 2064505 | 3-Major | TLS 1.2 handshake failure with cipher rule configured using hybrid KEM algorithms first | 21.0.0 | |
| 2044565 | 3-Major | Add support for tcp & clientssl default profiles to enhance S3 workload performance | 21.0.0 | |
| 2035129-5 | 3-Major | BT2035129 | The CMP stream communication between tmms on different blades might stall after a tmm memory exhaustion event | 21.0.0 |
| 2008633 | 3-Major | BT2008633 | Active mode FTP using port 0 for data-channel connections | 21.0.0, 17.5.1.3, 17.1.3 |
| 1974801 | 3-Major | Deprecated PKCSv1.5 in Marvell affects r5000-DF and r10000-DF Platforms | 21.0.0 | |
| 1952657 | 3-Major | BT1952657 | In FIPS-CC mode ECC Certificates with explicitly defined EC parameters are accepted | 21.0.0, 17.5.1.2 |
| 1952557 | 3-Major | BT1952557 | DB monitor incorrectly marks pool member UP if recv string configured but no results from DB server | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1 |
| 1937777 | 3-Major | BT1937777 | The client can resume a TLS session using psk_ke mode in the psk_key_exchange_modes extension. | 21.0.0, 17.5.1.2 |
| 1934781 | 3-Major | BT1934781 | In FIPS-CC mode ECC Certificates with explicitly defined EC parameters are accepted | 21.0.0, 17.5.1.2 |
| 1934397 | 3-Major | BT1934397 | SSL Orchestrator l2 inline monitor failure on r2000 or r4000 tenants | 21.0.0, 17.1.3 |
| 1934157 | 3-Major | BT1934157 | Http2 monitor fails if a pool is used for routing to pool members | 21.0.0 |
| 1928537 | 3-Major | BT1928537 | Missing initial PKCS11d login state causes login failures on certain AWS CloudHSMs | 21.0.0, 17.5.1, 17.1.3 |
| 1921069 | 3-Major | BT1921069 | The error ERR_ARG occurs when using iRule HTTP::collect command without the parameter value in HTTP_REQUEST_DATA | 21.0.0 |
| 1826185 | 3-Major | BT1826185 | Tenants on r2000 and r4000 series may drop packets larger than 9194 bytes | 21.0.0, 17.5.1.2 |
| 1825241-3 | 3-Major | BT1825241 | MCPD validation fails when non-existent cipher group is referenced by SSL profile | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1821033 | 3-Major | BT1821033 | Assertion "packet must already have an ethernet header" when using tcpdump | 21.0.0, 17.5.1 |
| 1820581 | 3-Major | The handshake failure reasons are not printed in the logs for ServerSSL profile | 21.0.0 | |
| 1814821 | 3-Major | BT1814821 | DHE groups present in profile's cipherlist with TLS1.3 enabled and tmm.ssl.useffdhe set to false simultaneously | 21.0.0, 17.5.1 |
| 1758961 | 3-Major | BT1758961 | TMM may core if proxy_common_init errors out due to inappropriate NAT configuration | 21.0.0 |
| 1755181 | 3-Major | BT1755181 | Not enough information when a TCP reset occurs due to compression error | 21.0.0 |
| 1753569 | 3-Major | CVE-2022-39353: node-xmldom vulnerability | 21.0.0 | |
| 1697041 | 3-Major | BT1697041 | TMM may fail to start, device is inoperative★ | 21.0.0, 17.5.1.2, 17.1.3 |
| 1636077 | 3-Major | BT1636077 | Adding an operationally DOWN interface to existing LAG causes traffic disruption on r2k/r4k | 21.0.0, 17.5.1 |
| 1624557 | 3-Major | BT1624557 | HTTP/2 with RAM cache enabled could cause BIG-IP to return HTTP 304 with content | 21.0.0 |
| 1602641 | 3-Major | BT1602641 | Configuring verified-accept and SSL mirroring on the same virtual results in stalled connections. | 21.0.0 |
| 1577161-3 | 3-Major | BT1577161 | BIG-IP tries to resume SSL sessions when session ID only matches partially | 21.0.0, 16.1.6.1, 15.1.10.8 |
| 1555525 | 3-Major | BT1555525 | WCCP traffic may have its source port changed | 21.0.0, 17.5.1, 17.1.2, 16.1.6 |
| 1553169 | 3-Major | BT1553169 | Parsing tcp payload using iRules can be inaccurate because of binary to string conversion | 21.0.0, 17.5.1.2 |
| 1550869 | 3-Major | BT1550869 | Tmm leak on request-logging or response logging on FTP virtual server | 21.0.0, 17.5.1, 17.1.3 |
| 1549397 | 3-Major | BT1549397 | Pool member from statically-configured node deleted along with ephemeral pool member using same IP address | 21.0.0 |
| 1505649-2 | 3-Major | BT1505649 | SSL Handshake fall back to full handshake during session resumption, if SNI string is more than 32 characters in length | 21.0.0, 17.5.1, 17.1.2 |
| 1470265-1 | 3-Major | DTLS over TCP results in unsupported behavior | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8 | |
| 1382181-1 | 3-Major | BT1382181 | BIG-IP resets only server-side on idle timeout when used FastL4 profile with loose-* settings enabled★ | 21.0.0, 17.5.1, 17.1.3 |
| 1316821 | 3-Major | BT1316821 | HTTP::disable not allowed after HTTP::respond | 21.0.0 |
| 1309637 | 3-Major | BT1309637 | Mac masquerade not working after VLAN movement on host interfaces | 21.0.0, 17.5.1 |
| 1273161 | 3-Major | BT1273161 | Secondary blades are unavailable, clusterd is reporting shutdown, and waiting for other blades | 21.0.0, 17.5.1.2 |
| 1190753 | 3-Major | BT1190753 | HTTP/2 Virtual Server ignores customized HTTP known-methods list | 21.0.0 |
| 1173825 | 3-Major | Improper sanitisation in Qkview data | 21.0.0 | |
| 1166481 | 3-Major | BT1166481 | The vip-targeting-vip fastL4 may core | 21.0.0 |
| 1071385 | 3-Major | BT1071385 | SSL session resumption is incorrectly logging handshake failure messages | 21.0.0, 17.5.1.3 |
| 1036645 | 3-Major | BT1036645 | Running keyswap.sh on a VIPRION or VCMP platform may not complete successfully | 21.0.0, 17.5.1.3, 17.1.3 |
| 1033937 | 3-Major | BT1033937 | HTTP message router stats do not increment for virtual servers and pools | 21.0.0 |
| 1012009 | 3-Major | BT1012009 | MQTT Message Routing virtual may result in TMM crash | 21.0.0, 15.1.4.1 |
| 990173 | 4-Minor | BT990173 | Dynconfd repeatedly sends the same mcp message to mcpd | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 2038309 | 4-Minor | BT2038309 | After the full config sync, FQDN template node status changes to ‘fqdn-checking’ (Unknown) untill the DNS query is triggered | 21.0.0 |
| 2016041 | 4-Minor | Remove the unused DynaCache Package | 21.0.0 | |
| 1928437 | 4-Minor | BT1928437 | False traffic spikes in Throughput graphs | 21.0.0, 17.1.3 |
| 1756697 | 4-Minor | BT1756697 | Sec-WebSocket-Extensions header is not stripped when Compression is disabled | 21.0.0 |
| 1670225 | 4-Minor | BT1670225 | 'Last Error' field remains empty after initial monitor Down status post-reboot | 21.0.0 |
| 1622425-1 | 4-Minor | BT1622425 | Float the management ip to the next available ip when the connectivity of primary blade is lost | 21.0.0, 17.5.1.2 |
| 1620785 | 4-Minor | BT1620785 | F5 cache mechanism relies only on Last-Modified/If-Modified-Since headers and ignores the etag/If-None-Match headers | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1352649 | 4-Minor | BT1352649 | The trailing semicolon at the end of [HTTP::path] in the iRule is being omitted. | 21.0.0, 17.5.1, 17.1.3 |
Performance Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1814477 | 2-Critical | BT1814477 | AWS Performance Drop from BIG-IP v17.1.2.1 to v17.5.0 | 21.0.0, 17.5.1 |
Global Traffic Manager (DNS) Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2044381 | 2-Critical | BT2044381 | Gtmd SIGSEGV core due to monitor status change | 21.0.0 |
| 1821089 | 2-Critical | BT1821089 | DNS64 and resolver cache may not function together as expected | 21.0.0 |
| 1010129 | 2-Critical | BT1010129 | A segmentation fault occurs | 21.0.0 |
| 936417 | 3-Major | DNS/GTM daemon big3d does not accept ECDHE or DHE ciphers | 21.0.0, 17.1.3, 16.1.6.1 | |
| 2064569 | 3-Major | BT2064569 | BIND upgrade to version 9.18.37 | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 2034789 | 3-Major | BT2034789 | Unbound has been upgraded from version 1.20.0 to 1.23.1 | 21.0.0, 17.5.1.3, 17.1.3 |
| 1962785 | 3-Major | BT1962785 | Monitors of type snmp_link can fail | 21.0.0, 17.5.1.2, 17.1.3, 16.1.6.1 |
| 1856289 | 3-Major | BT1856289 | Virtual server, which is managed by remote LTM device, is shown as "offline/enabled" with "Monitor /Common/bigip : no reply from big3d: timed out" message (red diamond icon). | 21.0.0, 17.5.1, 17.1.3 |
| 1854297 | 3-Major | With DNS64 enabled, AAAA NXDomain responses are passed directly to the client. | 21.0.0 | |
| 1824009 | 3-Major | BT1824009 | When DNS64 is enabled, resolver cache passes SERVFAIL responses to the client | 21.0.0 |
| 1782137 | 3-Major | BT1782137 | Management of Wide IPs using the GUI may fail when multiple monitors exist | 21.0.0 |
| 1757537 | 3-Major | BT1757537 | RCA tmm core with ** SIGSEGV ** inside pick_qos | 21.0.0 |
| 1756397 | 3-Major | BT1756397 | BIG-IP is not forwarding the Extended DNS Error (EDE) Codes to Clients | 21.0.0, 17.5.1 |
| 1612201 | 3-Major | BT1612201 | Malformed certificates found in local /config/httpd/conf/ssl.crt/server.crt | 21.0.0 |
| 1592209 | 3-Major | BT1592209 | Monitored objects stays "Offline (Enabled)" even after manually enabling the server object after reboot | 21.0.0, 17.5.1.2, 17.1.3 |
| 1082197 | 3-Major | BT1082197 | RNAME and MNAME field order reversed for Synthetic SOAs sent for negative response | 21.0.0 |
| 1041889 | 3-Major | BT1041889 | RRSIG missing for CNAME with RDATA in different zone | 21.0.0, 17.5.1.2 |
| 1711813 | 4-Minor | BT1711813 | Incorrect SOA serial number shown in zxfrd logs during zone transfer | 21.0.0 |
Application Security Manager Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1933825 | 2-Critical | BT1933825 | High cpu usage by BD | 21.0.0, 17.5.1.3, 17.1.3 |
| 1857413 | 2-Critical | BT1857413 | Malformed XML data or Malformed JSON data violation raised despite URL containing content-profile | 21.0.0, 17.5.1, 17.1.3 |
| 1798601 | 2-Critical | BT1798601 | BD restart loop after upgrade on error in CONFIG_TYPE_ACCOUNT_CHARSET_TEMPLATES★ | 21.0.0, 17.5.1.2, 17.1.3 |
| 1709557 | 2-Critical | BT1709557 | Header value length greater than 1023 in alternate response file headers causing ASM restart loop | 21.0.0, 17.5.1, 17.1.3 |
| 1621185 | 2-Critical | BT1621185 | A BD crash on a specific scenario, even after ID1553989 | 21.0.0, 17.5.1, 17.1.3 |
| 1365629 | 2-Critical | BT1365629 | FPS signature and engine update fail to access sys db key proxy.password | 21.0.0, 17.5.1.2, 17.1.2, 15.1.10.8 |
| 2137773 | 3-Major | BT2137773 | Table content in FPS/DataSafe webUI page not shown correctly★ | 21.0.0 |
| 2033809 | 3-Major | ASM Connection Handling Improvement | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8 | |
| 2017105 | 3-Major | BT2017105 | Disk partition /var full after quick config changes★ | 21.0.0 |
| 2008573 | 3-Major | BT2008573 | Login/Logout expected/unexpected string has no length validation | 21.0.0 |
| 1989133 | 3-Major | BT1989133 | Unexpected blocking of valid login attempts after upgrade to version 17.5.0 | 21.0.0 |
| 1976513 | 3-Major | BT1976513 | Some ASM entity names are not shown in the REST error response message | 21.0.0, 17.5.1.3, 17.1.3 |
| 1975941 | 3-Major | BT1975941 | Alternate_response_content length greater than 51200 in ACCOUNT_ALTERNATE_RESPONSE_FILE causing ASM restart loop | 21.0.0, 17.5.1.3, 17.1.3 |
| 1972369 | 3-Major | BT1972369 | BD performance improvement | 21.0.0, 17.5.1.3 |
| 1971217 | 3-Major | BT1971217 | False negative with illegal redirect attempt | 21.0.0, 17.5.1.3, 17.1.3 |
| 1959709-1 | 3-Major | BT1959709 | "Europe" IPs are allowed despite blocking all European countries | 21.0.0, 16.1.6.1 |
| 1934513 | 3-Major | BT1934513 | Redefinition of xlink namespace leads to 'malformed document' violation | 21.0.0, 17.5.1.2, 17.1.3 |
| 1927225 | 3-Major | BT1927225 | Vertical tab (u000b) is removed from the request by the JSON parser | 21.0.0, 17.5.1.2, 17.1.3 |
| 1849585 | 3-Major | BT1849585 | A correctly encoded long Authorization param triggers 'illegal base64 value' vaiolation | 21.0.0, 17.5.1.3, 17.1.3 |
| 1789529 | 3-Major | BT1789529 | A crash of the bd daemon | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1 |
| 1772329 | 3-Major | BT1772329 | Apply Policy failure after upgrading to v16.1.x and later, from earlier version★ | 21.0.0, 17.5.1.3, 17.1.3 |
| 1673157 | 3-Major | Extended Latin characters are not blocked as expected from JSON schema patterns | 21.0.0 | |
| 1629701 | 3-Major | BT1629701 | Attack signature is not shown in local event log for staged entity when not in learn/staging | 21.0.0, 17.5.1, 17.1.3 |
| 1350485 | 3-Major | BT1350485 | When the parameter value contains '@', domain name is not properly extracted | 21.0.0 |
| 1980649 | 4-Minor | BT1980649 | High CPU usage by bd | 21.0.0, 17.5.1.3, 17.1.3 |
| 1966313 | 4-Minor | BT1966313 | Websocket event logs show "N/A" for virtual server name except during upgrade request | 21.0.0 |
| 1962073 | 4-Minor | BT1962073 | Creation of file type entries with trailing and/or leading spaces is allowed via REST in ASM policy | 21.0.0, 17.5.1.3, 17.1.3 |
| 1812201 | 4-Minor | BT1812201 | A specific unicode character issue a malformed json violation | 21.0.0, 17.5.1, 17.1.3 |
| 1783217 | 4-Minor | BT1783217 | Rare bd crash | 21.0.0, 17.5.1.2, 17.1.3 |
| 1782365 | 4-Minor | BT1782365 | Importing a policy creates default 'password' sensitive parameter when it is not present in the exported policy in full JSON format | 21.0.0, 17.5.1, 17.1.3 |
| 1591197 | 4-Minor | Specific JSON enforcement is not working | 21.0.0 | |
| 1469393 | 4-Minor | BT1469393 | Browser extension can cause Bot-Defense profile screen to misfunction | 21.0.0, 17.5.1, 17.1.3 |
Application Visibility and Reporting Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2058853 | 3-Major | SMTP validation improvements | 21.0.0 |
Access Policy Manager Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1930945-1 | 1-Blocking | BT1930945 | [APM][KERBEROS][NTLM FALLBACK] Kerberos Authentication fails post-upgrade to v17.5.0/v17.5.1 — “Profile '/Common/kerberos_auth_config_default' was not found” and ECA Crashes★ | 21.0.0, 17.5.1 |
| 930625 | 2-Critical | BT930625 | TMM crash is seen due to double free in SAML flow | 21.0.0, 17.5.1, 17.1.3 |
| 2047445-1 | 2-Critical | BT2047445 | A VPN connection may fail when an Access policy or a Virtual Server is configured in a route domain | 21.0.0 |
| 1975885-1 | 2-Critical | BT1975885 | Massive M_ACCESS string leak in TMM | 21.0.0 |
| 1966729 | 2-Critical | BT1966729 | Endpoint inspection not working with chrome browser | 21.0.0, 17.5.1.2 |
| 1957157 | 2-Critical | BT1957157 | [nlad]OpenSSL: DRBG Continuous RNG test failed: DRBG stuck. | 21.0.0, 17.5.1.3 |
| 1825949-5 | 2-Critical | BT1825949 | [APM][Radius] Message-Authenticator value is incorrect for OTP request | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1821373 | 2-Critical | BT1821373 | SAML Assertion Handling issue in APM SSO | 21.0.0, 17.5.1, 17.1.3 |
| 1819813-1 | 2-Critical | BT1819813 | [APM][NTLM]TMM core on null _ntlm_msg on 17.1.x on top of ID1495381 | 21.0.0, 17.5.1.2, 17.1.3 |
| 1783081-1 | 2-Critical | BT1783081 | Removing conditional freeing for m_oauth instances in tmm | 21.0.0, 17.5.1, 17.1.3 |
| 1773161-1 | 2-Critical | BT1773161 | BIG-IP APM 17.1.2 VPN tunnels failed to establish at "GET /isession" stage | 21.0.0, 17.5.1, 17.1.3 |
| 1552705-4 | 2-Critical | BT1552705 | New subsession reads access_token from per-session policy instead of per-request policy. | 21.0.0, 17.5.1, 17.1.3, 16.1.6 |
| 648946-2 | 3-Major | BT648946 | Oauth server is not registered in the map for HA addresses | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1 |
| 641662 | 3-Major | BT641662 | Always connected exclusion list does not support more than 10 entries. | 21.0.0, 17.5.1 |
| 634576-5 | 3-Major | K48181045, BT634576 | TMM core in per-request policy | 21.0.0, 17.5.1, 16.1.5, 13.1.0 |
| 608745 | 3-Major | BT608745 | Send HOST header in OCSP responder request | 21.0.0, 17.5.1.2, 17.1.3, 16.1.6.1 |
| 2035005 | 3-Major | BT2035005 | VMware Horizon applications launched via BIG-IP as VDI proxy ignore args parameter in vmware-view URI | 21.0.0, 17.5.1.3, 17.1.3 |
| 2034985-1 | 3-Major | Unable to forward NTLM SSO back-end cookies to front-end | 21.0.0 | |
| 1991289-1 | 3-Major | BT1991289 | ECA always invokes the default access profile 'kerberos_auth_default' | 21.0.0, 17.5.1.3, 17.1.3 |
| 1991261-1 | 3-Major | BT1991261 | AAA LDAP: priority group activation resets when updating configuration in APM | 21.0.0, 17.5.1.3, 17.1.3 |
| 1991241 | 3-Major | BT1991241 | ECA plugin unresponsive | 21.0.0, 17.5.1.3, 17.1.3 |
| 1991237 | 3-Major | BT1991237 | Unable to configure number of apmd threads using tmsh command | 21.0.0, 17.5.1.3, 17.1.3 |
| 1987361 | 3-Major | BT1987361 | APMD file descriptor exhaustion when LDAP operational timeout is set to 180 seconds | 21.0.0, 17.5.1.3, 17.1.3 |
| 1982937 | 3-Major | BT1982937 | InTune MDM endpoint compliance intermittently fails despite being compliant | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1 |
| 1980645-1 | 3-Major | BT1980645 | Bypass APM for Horizon Blast/PcoIP connection for internal users | 21.0.0, 17.5.1.3, 17.1.3 |
| 1969861 | 3-Major | BT1969861 | [APM][NTLM]ECA core SIGSEGV | 21.0.0, 17.5.1.3, 17.1.3 |
| 1965849-2 | 3-Major | BT1965849 | [APM] TMM core is observed in validating the saml assertion signature | 21.0.0, 17.5.1.2, 17.1.3 |
| 1926885-1 | 3-Major | BT1926885 | [APM] URL DB mismatch error for Religion categories in the upgrade★ | 21.0.0, 17.5.1 |
| 1917741 | 3-Major | BT1917741 | [APM][TMM] memory growth in SAML SP while decoding assertion attributes | 21.0.0, 17.5.1 |
| 1856285 | 3-Major | BT1856285 | [APM]mdmsyncmgr core is observed very intermittently | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1 |
| 1826013-2 | 3-Major | K000150397, BT1826013 | BIG-IP as Oauth C/RS "Invalid json error" after upgrade to 17.1.2.1 when json response has non ASCII characters★ | 21.0.0, 17.5.1.2, 17.1.3 |
| 1813841 | 3-Major | BT1813841 | Password Caching setting is not applied | 21.0.0, 17.5.1 |
| 1813209 | 3-Major | BT1813209 | Password Cache Expiration field is hidden in Connectivity profile | 21.0.0, 17.5.1 |
| 1796609-1 | 3-Major | BT1796609 | [APM][VDI]TCL error when upgrading to 17.x: can't read "tmm_apm_feed_login": no such variable★ | 21.0.0, 17.5.1, 17.1.3, 16.1.6 |
| 1789501 | 3-Major | BT1789501 | [APM][Standard Customisation]Webtop is blank after upgrading APM version 17.1.2 with Edge Browser in Compatibility mode.★ | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1 |
| 1782113-2 | 3-Major | BT1782113 | Parameter 'redirectwebauthn:i:0' is crashing the RDP file with 'The RDP File is corrupted' error message | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1 |
| 1771985 | 3-Major | BT1771985 | [APM] OAuth AS max claims data support upto 8kb dynamically | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1771945 | 3-Major | BT1771945 | Memory leak when using event-wait with SSL SANs | 21.0.0, 17.5.1.2, 17.1.3 |
| 1758181-1 | 3-Major | BT1758181 | Optimal gateway routing issue with HTML5 client | 21.0.0, 17.5.1, 17.1.3 |
| 1758029-3 | 3-Major | K000150565, BT1758029 | [APM][NA]VPN tunnels fail to establish when a virtual server is on a non-default route domain★ | 21.0.0, 17.5.1, 17.1.3 |
| 1672997-1 | 3-Major | BT1672997 | Apmd memory grows over time in AD/LDAP auth scenarios | 21.0.0, 17.5.1, 17.1.3, 16.1.6, 15.1.10.8 |
| 1628001 | 3-Major | BT1628001 | TMM core when ACL operation is performed on a deleted session | 21.0.0, 17.5.1, 17.1.3 |
| 1623941-1 | 3-Major | BT1623941 | [AD] BIG-IP APM AD Auth agent sometimes prompts for new password (every login) after upgrade★ | 21.0.0, 17.5.1, 17.1.3, 16.1.6 |
| 1617037 | 3-Major | BT1617037 | [PA]"navigator.userAgent" detects Chrome browser as Safari | 21.0.0, 17.5.1.2 |
| 1587453-1 | 3-Major | BT1587453 | “default-all” profile is selected by default in “Dynamic LAN address spaces” | 21.0.0, 17.5.1.2, 17.1.3 |
| 1587421-1 | 3-Major | BT1587421 | GUI issue when creating a new Network Access connection | 21.0.0, 17.5.1.2, 17.1.3 |
| 1583745-1 | 3-Major | BT1583745 | "Out of bounds" TCL error in VDI iRule | 21.0.0, 17.5.1.2, 17.1.3, 16.1.6.1 |
| 1583261-1 | 3-Major | BT1583261 | Saml traffic can rarely cause tmm cores | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1567761-2 | 3-Major | BT1567761 | [APM] AccessProfile name is missing in log User '<username>' belongs to domain '<domain_name>' | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1 |
| 1495381-1 | 3-Major | BT1495381 | TMM core with SWG explicit forward proxy or PRP configuration | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1 |
| 1400533-1 | 3-Major | BT1400533 | TMM core dump include SIGABRT multiple times, on the Standby device. | 21.0.0, 17.5.1, 17.1.3 |
| 1292605-2 | 3-Major | BT1292605 | Uncaught ReferenceError: ReferenceError: REquest is not defined | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1269709 | 3-Major | BT1269709 | GUI should throw the error when the VS is configured with both vdi and HTTP/2 profiles | 21.0.0, 17.5.1, 17.1.2, 16.1.5 |
| 1136905-3 | 3-Major | BT1136905 | Request for Portal Access Hosted Content are RST with "No available SNAT addr" | 21.0.0 |
| 1100081 | 3-Major | K21440462, BT1100081 | Error message "http_process_state_prepend - Invalid action:0x10a091" for version 15 and "http_process_state_prepend - Invalid action:0x107061" for versions 16 and 17 appears in the LTM log★ | 21.0.0, 17.5.1.3, 17.1.3 |
| 1081245-2 | 3-Major | BT1081245 | [APM] SSO OAuth Bearer passthrough inserts an old access token instead of the latest one. | 21.0.0, 17.5.1, 17.1.3 |
| 1078713 | 3-Major | BT1078713 | Windows 11 not included in client OS check and Windows Info agent. | 21.0.0, 17.5.1 |
| 1047789 | 3-Major | BT1047789 | [APM] MCP err msg seen when editing/applying resource assign in VPE | 21.0.0, 17.5.1 |
| 1008885-2 | 3-Major | BT1008885 | Sessiondump CPU is showing unknown for Mac OS and BIG-IP platform | 21.0.0, 17.5.1.2, 17.1.3, 16.1.6.1 |
| 926917 | 4-Minor | BT926917 | Portal Access: unwanted decoding html entities in attribute values of HTML tags | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 811829-1 | 4-Minor | BT811829 | BIG-IP as Authorization server: OAuth Report GUI display expired token as active | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 485387 | 4-Minor | BT485387 | EncryptedAssertion may not be processed by BIG-IP as SP when EncryptedKey element is specified by RetrievalMethod Element by external IdP. | 21.0.0, 17.5.1, 17.1.3 |
| 1881145-2 | 4-Minor | BT1881145 | Change log level of PPP TunnelStats log messages to debug level | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1 |
| 1825449-1 | 4-Minor | BT1825449 | Citrix Optimal Gateway Routing is not showing login username of session | 21.0.0, 17.5.1, 17.1.3 |
| 1825253-2 | 4-Minor | BT1825253 | Enhance the log message for better readability User session was terminated due to IP address change during session | 21.0.0, 17.5.1.3, 17.1.3 |
| 1818461 | 4-Minor | BT1818461 | [APM][VPN][WIN] Tunnel can't be established if endpoint inspection is Skipped. Machine Hash is not maching★ | 21.0.0, 17.5.1, 17.1.3 |
| 1737465-2 | 4-Minor | BT1737465 | Port number being used for verifying server certificate CN field | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1 |
| 1701209-3 | 4-Minor | BT1701209 | APM ignores the update-interval setting | 21.0.0, 17.5.1.2, 17.1.3, 16.1.6.1 |
| 1612885 | 4-Minor | BT1612885 | [PORTAL] Handle error in get_frameElement() | 21.0.0, 17.5.1, 17.1.2, 16.1.6.1 |
| 1591813-3 | 4-Minor | BT1591813 | [APM][SAML] SP automation fails with error message 'cannot update (cert_type)' | 21.0.0, 17.5.1, 17.1.3, 16.1.6.1 |
| 1585981-3 | 4-Minor | BT1585981 | High instances of OAuth in TMM memory leak | 21.0.0, 17.5.1.3, 17.1.3 |
Service Provider Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1952881 | 3-Major | BT1952881 | Tmm memory leak in SCTP metadata | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1 |
Advanced Firewall Manager Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1132449 | 1-Blocking | BT1132449 | Incomplete or missing IPv6 IP Intelligence database results to connection reset and/or high TMM CPU usage | 21.0.0, 17.5.1, 17.1.3, 16.1.6 |
| 1786325 | 2-Critical | BT1786325 | Nxdomain stop blocking & nxdomain added into the allow list on rSeries | 21.0.0, 17.5.1.2 |
| 1410441 | 2-Critical | BT1410441 | Large file transfer over SFTP/SSH proxy failure | 21.0.0 |
| 997169-3 | 3-Major | BT997169 | AFM rule not triggered | 21.0.0, 17.5.1, 17.1.2, 16.1.6, 15.1.4.1 |
| 935769-7 | 3-Major | BT935769 | Upgrading / Rebooting BIG-IP with huge address-list configuration takes a long time★ | 21.0.0, 17.5.1.2 |
| 2099689 | 3-Major | AFM Security Policy checkboxes for Auto Generate UUID and Logging for rules listed doesn't work via GUI | 21.0.0 | |
| 1976925-2 | 3-Major | BT1976925 | Device dos whitelist not working properly for DNS dos protection when BA enabled | 21.0.0 |
| 1968237 | 3-Major | BT1968237 | Configuration fails to load post upgrade due to invalid DoS signature predicate 'ip flags'★ | 21.0.0, 17.5.1.3 |
| 1936421 | 3-Major | BT1936421 | Core generated for autodosd daemon when synchronization process is terminated | 21.0.0, 17.5.1, 17.1.3 |
| 1934865 | 3-Major | BT1934865 | Remove multiple redundant entries for port-list objects in configuration file | 21.0.0, 17.5.1 |
| 1920097 | 3-Major | BT1920097 | Allow bad actor threshold below 0.1% | 21.0.0, 17.5.1.3, 17.1.3 |
| 1786805 | 3-Major | BT1786805 | TMM might crash immediately after going active for the first time after a reboot | 21.0.0, 17.1.3 |
| 1635209 | 3-Major | BT1635209 | Firewall NAT policy with SNAT automap does not work with ALG protocols in active mode | 21.0.0, 17.5.1.2, 17.1.3 |
| 1635189 | 3-Major | BT1635189 | TMM crashes when firewall NAT policy uses automap with Active FTP connection | 21.0.0, 17.5.1.2, 17.1.3 |
| 1510477-1 | 3-Major | BT1510477 | RD rule containing zones does not match expected traffic on the Network firewall policy | 21.0.0, 17.5.1.3, 17.1.3 |
Carrier-Grade NAT Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1819721-2 | 3-Major | BT1819721 | LSN failed events details are ambiguous | 21.0.0 |
Traffic Classification Engine Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1581057 | 3-Major | BT1581057 | Wr_urldbd IPC memory leak | 21.0.0, 17.1.3, 16.1.6 |
Device Management Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1626337-2 | 3-Major | K81310610, BT1626337 | RPMS not being included in the generated UCS with fix of ID985329 incorporated★ | 21.0.0, 17.5.1, 17.1.3 |
iApp Technology Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1493765 | 3-Major | CVE-2021-22884 nodejs: DNS rebinding in --inspect | 21.0.0, 17.5.1.3, 17.1.3 |
Protocol Inspection Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1771793 | 2-Critical | New blob compilations causing missed inspections from protocol inspection profiles | 21.0.0, 17.1.3 | |
| 1756825 | 2-Critical | K000150010, BT1756825 | IPS Signatures not inspected being sometime after reboot | 21.0.0, 17.5.1.2, 17.1.3 |
| 1824037-1 | 3-Major | BT1824037 | IPS profile using engine after free | 21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1 |
| 1787981 | 3-Major | BT1787981 | Memory leak in ips_pcb_cache | 21.0.0, 17.5.1.3, 17.1.3 |
| 1715685 | 3-Major | BT1715685 | Protocol inspection takes up to 5 hours before starting to work after a reboot | 21.0.0, 17.1.3 |
In-tmm monitors Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1819777-2 | 2-Critical | BT1819777 | In-tmm TCP monitor with no RCV and RCVdisable string might lead to a crash | 21.0.0, 17.5.1, 17.1.3 |
Bot Defense Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1820833-2 | 3-Major | BT1820833 | General Database Error when creating a new profile | 21.0.0 |
F5OS Messaging Agent Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1438801 | 3-Major | BT1438801 | VLAN name greater than or equal to 32 characters causes VLAN to lose member information | 21.0.0 |
| 1359817 | 3-Major | BT1359817 | The setting of DB variable tm.macmasqaddr_per_vlan does not function correctly | 21.0.0 |
Cumulative fix details for BIG-IP v21.0.0 that are included in this release
997169-3 : AFM rule not triggered
Links to More Info: BT997169
Component: Advanced Firewall Manager
Symptoms:
An AFM rule is not triggered when it should be.
Conditions:
-- Source and destination zone configured
-- A gateway pool is used in the route
Impact:
A firewall rule is not triggered and the default deny rule is used.
Workaround:
Alter the route to use an IP address and not a pool.
Fix:
Firewall rules are now triggered when gateway pools are used.
Fixed Versions:
21.0.0, 17.5.1, 17.1.2, 16.1.6, 15.1.4.1
993681 : CVE-2019-18282 Kernel: Device Tracking Vulnerability
Links to More Info: K32380005
990173 : Dynconfd repeatedly sends the same mcp message to mcpd
Links to More Info: BT990173
Component: Local Traffic Manager
Symptoms:
If dynconfd sends a single message to mcpd containing two or more operations, and one of the operations fails mcpd validation, dynconfd repeatedly sends same message to mcpd.
An example of two operations in one mcp message would be an ephemeral node creation and an ephemeral pool member creation in a single mcp message.
Once one such message fails, dynconfd repeatedly attempts to resend the same message. In addition, at the next DNS query interval, dynconfd may create one or more new instances of such messages, which may each be retried if they fail. The result can cause an increasing accumulation of MCP messages sent by dynconfd which must be processed by mcpd.
Conditions:
This can occur when:
-- Using FQDN nodes and FQDN pool members.
-- There is an additional issue where the message from dynconfd fails validation within mcpd (e.g., a misconfiguration in which the monitor assigned to the pool is configured with a wildcard destination and the pool member is added to the pool with a port of '0' or 'any'.
Impact:
MCP messages from dynconfd which fail due to an error might cause the population of ephemeral nodes and pool members to fail and become out of sync with what the DNS server is resolving.
By repeatedly resending the same messages, which fail repeatedly, dynconfd causes increased mcpd CPU utilization.
Eventually, the load caused by processing an increasing accumulation of MCP messages may cause increasing and excessive memory usage by mcpd and a possible mcpd core, or may cause mcpd to become busy and unresponsive and be killed/restarted by SOD.
Workaround:
Examine the LTM logs for mcpd error messages indicating failed attempts to create ephemeral nodes or ephemeral pool members, and resolve the cause of the failed node or pool-member creation.
Fix:
Dynconfd no longer repeatedly resends MCP messages that have failed due to an error.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8
981885-7 : CVE-2020-8285 curl: malicious FTP server can trigger stack overflow when CURLOPT_CHUNK_BGN_FUNCTION is used
Links to More Info: K61186963
966785 : Rate Shaping stops TCP retransmission
Links to More Info: BT966785
Component: Local Traffic Manager
Symptoms:
When rate shaping is applied to a virtual server, the BIG-IP system does not retransmit unacknowledged data segments, even when the BIG-IP system receives a duplicate ACK.
Conditions:
This issue occurs when both of the following conditions are met:
-- Virtual server configured with a rate shaping.
-- Standard type of virtual server.
Impact:
The BIG-IP system does not retransmit unacknowledged data segments.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1
949509 : Eviction Policy UI Hardening
Links to More Info: K000151308, BT949509
944817 : Improper IP based access access restrictions via HTTPD
Component: TMOS
Symptoms:
Under certain conditions HTTPD IP based access restriction may work improperly.
Conditions:
When using HTTPD IP based access restriction.
Impact:
Improper restriction based on IP address
Fix:
IP Access restrictions for HTTPD now works properly
Fixed Versions:
21.0.0
936829 : TMUI Dashboard Hardening
Component: TMOS
Symptoms:
In certain scenarios, TMUI does not follow best security practices.
Conditions:
NA
Impact:
NA
Workaround:
NA
Fix:
Best security practices are now applied.
Fixed Versions:
21.0.0
936417 : DNS/GTM daemon big3d does not accept ECDHE or DHE ciphers
Component: Global Traffic Manager (DNS)
Symptoms:
The DNS/GTM big3d daemon does not accept ECDHE or DHE ciphers.
Conditions:
Connections to big3d with ECDHE or DHE ciphers.
Impact:
ECDHE/DHE ciphers do not work with big3d.
Workaround:
Configure ciphers with RSA key exchange.
Fixed Versions:
21.0.0, 17.1.3, 16.1.6.1
935769-7 : Upgrading / Rebooting BIG-IP with huge address-list configuration takes a long time★
Links to More Info: BT935769
Component: Advanced Firewall Manager
Symptoms:
Version upgrade takes more time than usual when the config contains address-lists with a lot of IP addresses. The same delay will be observed with 'tmsh load sys config' as well.
Conditions:
-- Configure address-list with 10K to 20K IP addresses or address ranges or subnets.
-- Configuration loading (e.g. Post upgrade, running tmsh load sys config, modification of the configuration and subsequent full load as in full config sync)
Impact:
Version upgrade / 'tmsh load sys config' process takes a long time than usual.
Workaround:
1) Convert continuous individual addresses in the address-lists to IP address ranges and subnets if possible.
2) Remove the huge address-lists from config before the upgrade and add back after the upgrade process is finished.
3) Upgrading to a release or EHF that contains the fix for 1209409. 1209409 does not eliminate the issue but it does reduce the time it takes to validate certain address lists.
Fixed Versions:
21.0.0, 17.5.1.2
932461 : Certificate update on the SSL profile server for the HTTPS monitor: BIG-IP does not use the updated certificate.
Links to More Info: BT932461
Component: Local Traffic Manager
Symptoms:
When you overwrite the certificate that is configured on the SSL profile server and is used with the HTTPS monitor, the BIG-IP system neither uses a client certificate nor continues to use the old certificate.
After you update the certificate, the stored certificate is incremented. However, the monitor log indicates that it is using the old certificate.
Conditions:
--Create a pool with an HTTPS pool member.
--Create an HTTPS monitor with a certificate and key.
--Assign the HTTPS monitor to the HTTPS pool.
--Update the certificate through GUI or TMSH.
Impact:
The monitor tries to use the old certificate or does not present a client certificate after the update.
Workaround:
Use one of the following workarounds:
-- Restart bigd:
bigstart restart bigd
-- Modify the server SSL profile certificate key. Set it to ‘none’, and switch back to the original certificate key name.
The bigd utility successfully loads the new certificate file.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
930625 : TMM crash is seen due to double free in SAML flow
Links to More Info: BT930625
Component: Access Policy Manager
Symptoms:
When this issue occurs the TMM will crash
Conditions:
Exact reproduction steps are not known but it occurs during SAML transactions
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fix:
N/A
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
926917 : Portal Access: unwanted decoding html entities in attribute values of HTML tags
Links to More Info: BT926917
Component: Access Policy Manager
Symptoms:
HTML Entities in Attribute values in HTML tags are decoded when they shouldn't be.
Conditions:
Portal Access is enabled
Impact:
Unwanted Application errors
Workaround:
None
Fix:
HTML entities in attribute values of HTML tags are no longer decoded by Portal Access
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8
881065 : Adding port-list to Virtual Server changes the route domain to 0
Links to More Info: BT881065
Component: Local Traffic Manager
Symptoms:
When attaching the port-list to virtual server dest:port-list, the route domain of the virtual server is changed to the default value of 0, and the port-list is not correctly applied. This is encountered in the GUI but not in the CLI.
Conditions:
Using port-list along with virtual server in non default route domain using the GUI.
Impact:
You are unable to use the GUI to attach a port-list that uses a non-default route domain to a virtual server.
Workaround:
Use tmsh to attach a port-list to a virtual server if the port-list uses a non-default route domain.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8
867253 : Systemd not deleting user journals
Links to More Info: BT867253
Component: TMOS
Symptoms:
When setting 'SystemMaxUse' to any value, systemd does not honor this limit, and the specified size is exceeded.
Conditions:
Using a non-TMOS user account with external authentication permission.
Note: Systemd-journald is configured to create a user journal for every remote user that logs into the BIG-IP system.
Impact:
Journald filling up the file system. These journals are allocated with a minimum size of 4MiB and are not removed when the log entries age-out.
Workaround:
Option 1:
To immediately free up space, manually remove per-user journal logs from the following location:
/var/log/journal/*/user-*
Option 2:
To prevent the system from creating these journal files going forward:
1. Edit /etc/systemd/journald.conf and add the following at the bottom of the file:
SplitMode=none
2. Restart systemd-journal service
# systemctl restart systemd-journald
3. Delete the existing user journal files from /var/log
# rm /var/log/journal/*/user-*
Note:
-- You must apply this workaround separately to each blade of a VIPRION or vCMP guest running on a VIPRION.
-- You must reapply this workaround after performing software installations.
Fixed Versions:
21.0.0, 17.5.1
857045 : LDAP system authentication may stop working
Links to More Info: BT857045
Component: TMOS
Symptoms:
If the system daemon responsible for LDAP authentication crashes, the system will not automatically restart it, and remote LDAP authentication may stop working.
In /var/log/daemon.log, you may see the following:
warning systemd[1]: nslcd.service failed
Conditions:
Nslcd daemon crashed, and it fails to restart.
Impact:
System authentication stops working until nslcd is restarted.
Workaround:
Manually restart nslcd daemon:
systemctl start nslcd
nslcd can be reconfigured to restart automatically and create core files when it crashes, though these changes will be lost across software installs (and is not backed up as part of a UCS archive):
1. Run "systemctl edit nslcd", which will open a text editor (by default, nano).
2. In the text editor, add these contents:
[Service]
# Allow core files
LimitCORE=infinity
# Try to keep auth daemon running, even if it crashes
Restart=always
3. Exit the text editor and save the file
4. Check the output of "systemctl status nslcd" for any warnings/errors from systemd as a result of editing the file; there should not be any.
5. Restart nslcd:
systemctl restart nslcd
Fixed Versions:
21.0.0, 17.5.1, 16.1.5
811829-1 : BIG-IP as Authorization server: OAuth Report GUI display expired token as active
Links to More Info: BT811829
Component: Access Policy Manager
Symptoms:
Expired tokens status is shown as ACTIVE in the GUI whereas it is shown AS EXPIRED in the CLI via tmsh list apm oauth token-details
Conditions:
-- Access tokens/Refresh tokens should be expired
Impact:
Misleading information regarding the token status
Workaround:
Uuse 'tmsh list apm oauth token-details' but this shows only the first 100 tokens
Fix:
Made GUI changes to match the tmsh functionality
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8
798889 : CVE-2018-20836 kernel: race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c leads to use-after-free
760895 : CVE-2009-5155 glibc: parse_reg_exp in posix/regcomp.c misparses alternatives leading to denial of service or trigger incorrect result
740258 : Support IPv6 connections to TACACS+ remote auth servers
Links to More Info: BT740258
Component: TMOS
Symptoms:
Pam_tacplus package 1.2.9 does not support IPv6 connections to TACACS+ remote auth server
Conditions:
IPv6 connections to TACACS+ remote auth server in system-auth methods
Impact:
On a pure IPv6 network, or a network where their TACACS server is only reachable via IPv6, will not be able to use TACACS for system-auth
Workaround:
None
Fix:
NA
Fixed Versions:
21.0.0, 17.5.1
685626-13 : iControl REST improper sanitisation of data
Component: TMOS
Symptoms:
A few values are not properly being sanitised by iControl REST.
Conditions:
When using iControl REST APIs
Impact:
Improper sanitisation of data
Workaround:
Limit access to management and self-ips to trusted networks and users to limit the exposure.
Fix:
iControl REST is now properly sanitising data.
Fixed Versions:
21.0.0
673060 : SSL handshake failure with Session Ticket enabled on the backend server
Links to More Info: BT673060
Component: Local Traffic Manager
Symptoms:
SSL handshake failure occurs as a certificate is not issued (no certificate).
Conditions:
- Server SSL profile is enabled with the Session Ticket feature
- Backend server also supports Session Ticket
Impact:
- Service is disrupted because of a handshake failure.
- SSL handshake fails with no certificate issue.
Workaround:
Disable the Session Ticket feature on the Server SSL Profile or the backend server.
Fixed Versions:
21.0.0
648946-2 : Oauth server is not registered in the map for HA addresses
Links to More Info: BT648946
Component: Access Policy Manager
Symptoms:
The same loopback address is assigned to two listeners.
Conditions:
-- AAA Servers with pool.
-- OAuth Server.
Impact:
Traffic issues due loopback address that is assigned to OAuth Server, can be assigned to some other AAA Server that also uses pool.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6.1
641662 : Always connected exclusion list does not support more than 10 entries.
Links to More Info: BT641662
Component: Access Policy Manager
Symptoms:
In locked client mode, APM provides a way to configure destinations that can still be reached by client, even in locked client mode. Number of entries is limited to 10.
Conditions:
Locked client mode is enabled
Impact:
More than 10 exclusions cannot be added
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1
634576-5 : TMM core in per-request policy
Links to More Info: K48181045, BT634576
Component: Access Policy Manager
Symptoms:
TMM might core in cases when per-request policy encounters a reject ending and the server-side flow is not available.
Conditions:
APM or SWG per-request policy with reject ending.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None.
Fix:
TMM no longer cores when per-request policy encounters reject ending.
Fixed Versions:
21.0.0, 17.5.1, 16.1.5, 13.1.0
608745 : Send HOST header in OCSP responder request
Links to More Info: BT608745
Component: Access Policy Manager
Symptoms:
HOST header not sent in OCSP responder request. APM OCSP responder object uses HTTP/1.0 to send a request to the OCSP responder and HTTP/1.0 does not have a host header.
Conditions:
OCSP configuration
Impact:
APM receives an invalid response because the OCSP Server didn't know which site to send the request to due to no HOST header.
Workaround:
Create a layer virtual server listening on the IP of the ocsp server and having an irule insert the host header.
ltm rule ocsp_insert_http_host {
when HTTP_REQUEST {
HTTP::header insert Host <e.g. IP address>
}
}
Fix:
HOST header added in OCSP responder request for HTTP/1.1.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3, 16.1.6.1
485387 : EncryptedAssertion may not be processed by BIG-IP as SP when EncryptedKey element is specified by RetrievalMethod Element by external IdP.
Links to More Info: BT485387
Component: Access Policy Manager
Symptoms:
An encrypted assertion from an external SAML Identity Provider (IdP) can contain the RetrievalMethod element to specify a link to the EncryptedKey element. The EncryptedKey element contains the key for decrypting the CipherData associated with an EncryptedData element.
BIG-IP configured as a Service Provider (SP) does not support the RetrievalMethod element while processing an encrypted assertion. As a result, the assertion is not processed properly, and error messages are printed to the log files: "Cannot decrypt SAML Assertion" and "failed to process encrypted assertion, error: Cipher value from EncryptedKey element not found".
Conditions:
External IdP uses RetrievalMethod to specify EncryptedKey element.
BIG-IP is configured as SP. BIG-IP requires received assertions to be encrypted.
Impact:
Authentication will fail due to inability to process assertion.
Workaround:
To work around the problem, reconfigure IdP to use embedded EncryptedKey instead of using RetrievalMethod.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
2137773 : Table content in FPS/DataSafe webUI page not shown correctly★
Links to More Info: BT2137773
Component: Application Security Manager
Symptoms:
When the user navigates either to
Security ›› Fraud Protection Service : Anti-Fraud Profiles
or
Security ›› Data Protection : BIG-IP DataSafe
The table content is not shown.
Conditions:
Navigate to
Security ›› Fraud Protection Service : Anti-Fraud Profiles
or
Security ›› Data Protection : BIG-IP DataSafe
Impact:
User cannot see or access the profile contents via GUI.
Workaround:
None
Fix:
User can see the profiles table.
Fixed Versions:
21.0.0
2137653-2 : Unable to upload files that contain a colon in the filename
Links to More Info: BT2137653
Component: TMOS
Symptoms:
You are unable to upload files where the filename contains a colon.
The BIG-IP returns a 400 HTTP error with the following error message: "A valid filename must be supplied".
Conditions:
Trying to upload a file to the BIG-IP where the filename uses one or more colons.
Impact:
Files that contain colons in the filename are unable to me uploaded.
Workaround:
The only option is to use a filename that does not use a colon.
Fixed Versions:
21.0.0
2137581 : TMM core may occur under certain conditions
Component: Local Traffic Manager
Symptoms:
Under certain SSL conditions, TMM could encounter a core.
Conditions:
NA
Impact:
Traffic is disrupted while the TMM process restarts.
Workaround:
Set the 'Alert Timeout' value to a specific value, say 5 seconds, instead of the default 'indefinite' value, in ALL client-ssl AND server-ssl profiles.
Configuration Steps
-------------------
GUI Path:
Local Traffic ›› Profiles : SSL : Client ›› clientssl → Alert Timeout = 5 seconds
Local Traffic ›› Profiles : SSL : Server ›› serverssl → Alert Timeout = 5 seconds
TMSH Command:
(tmos)# modify ltm profile client-ssl clientssl alert-timeout 5
(tmos)# modify ltm profile server-ssl serverssl alert-timeout 5
Fix:
TMM able to work properly.
Fixed Versions:
21.0.0
213618 : Resetting DB variable to default does not always work
Component: TMOS
Symptoms:
When using the 'reset-to-default' option to set a DB variable to its default value, the DB variable may appear to be reconfigured for its default value, but the new value may not have any functional effect.
For example, if the DB variable 'log.mcpd.level' is configured with a value of 'debug', then the command 'tmsh mod sys db log.mcpd.level reset-to-default', the DB variable 'log.mcpd.level' will display a value of 'notice', but mcpd will continue logging at 'debug' level.
Conditions:
This may occur when:
-- A system DB variable is configured with a non-default value.
-- A command is issued to reset that DB variable to its default value using the following syntax:
-- from a tmsh prompt:
'modify /sys db <variable.name> reset-to-default'
-- from a bash prompt:
'tmsh modify sys db <variable.name> reset-to-default'
Impact:
The intended change in the system DB variable value does not have the desired effect.
For example, if system DB variable controlling logging levels is changed from 'debug' (or other verbose logging level) to its default (non-debug) value, debug logging continues, which may fill the file system unexpectedly and result in system failures.
Workaround:
To ensure that:
-- BIG-IP daemons implement the behavior expected by changing the system DB variable to its default value, and
-- The saved BIG-IP configuration reflects that the system DB variable is no longer configured with a non-default value,
Issue two commands to (1) explicitly configure the system DB variable to the desired value, and (2) make system DB variable as being configured with its default value, using the following format:
-- from a tmsh prompt:
'modify /sys db <variable.name> value <desired_value>'
'modify /sys db <variable.name> reset-to-default'
-- from a bash prompt:
'tmsh modify sys db <variable.name> value <desired_value>'
'tmsh modify sys db <variable.name> reset-to-default'
Fixed Versions:
21.0.0
2132165 : TCP connection fail when tm.tcpstopblindinjection is enabled
Links to More Info: BT2132165
Component: Local Traffic Manager
Symptoms:
Connections fail through virtual servers as the server's initial data is dropped.
Conditions:
- DB key tm.tcpstopblindinjection is enabled
- Virtual server for protocol where server speaks first (e.g. SMTP, SSH/SFTP, FTP)
Impact:
Connections fail.
Workaround:
Disable the DB key sys db tm.tcpstopblindinjection
Fix:
Improved handling of sys db tm.tcpstopblindinjection
Fixed Versions:
21.0.0
2132125 : Unable to upload QKView to iHealth
Component: TMOS
Symptoms:
Message displayed after attempting to upload a QKview:
Failed to upload the QKView file to iHealth
Conditions:
Unable to upload QKView.
Impact:
Can't upload.
Workaround:
The customer can download the qkview from the BIG-IP and then upload it through the ihealth webui.
Fix:
Can upload.
Fixed Versions:
21.0.0
2130729 : HTTP::respond not working properly with HTTP3/quic - content not sent
Links to More Info: BT2130729
Component: Local Traffic Manager
Symptoms:
irule for http/3 virtual server with
HTTP::respond that includes content will not send the content
Conditions:
The header sent to the client does indicate content with a content-length above 0
* Request completely sent off
< HTTP/3 200
< content-type: text/html
< server: BIG-IP
< content-length: 179
But no content is sent and the connection is terminated abnormally.
Impact:
Not able to use HTTP::respond with content
Workaround:
None
Fixed Versions:
21.0.0
2130601 : TMUI Request Processing Improvement
Component: TMOS
Symptoms:
TMUI may not properly process certain requests in specific scenarios.
Conditions:
NA
Impact:
Unexpected behavior
Workaround:
NA
Fix:
TMUI now processes requests as expected.
Fixed Versions:
21.0.0
2119173 : The Active or Standby buttons in the webUI are not working
Links to More Info: BT2119173
Component: TMOS
Symptoms:
The blank page is displayed when the Active or StandBy button in the top left corner of the webUI is clicked.
Conditions:
1) HA Group is configured
2) Click the Active or the Standby button in the top left corner of the webUI.
Impact:
Blank page is displayed.
Workaround:
Navigate to Device Management >> Traffic Groups and select the desired traffic group.
Fixed Versions:
21.0.0
2099689 : AFM Security Policy checkboxes for Auto Generate UUID and Logging for rules listed doesn't work via GUI
Component: Advanced Firewall Manager
Symptoms:
The "Logging" and "Auto Generate UUID" checkboxes for firewall rules do not respond in the GUI but work correctly via tmsh CLI.
Conditions:
The issue occurs when editing firewall rules in the BIG-IP AFM GUI
Impact:
Users are unable to enable or disable "Logging" and "Auto Generate UUID" for firewall rules via the BIG-IP AFM GUI
Workaround:
Use tmsh:
tmsh modify security firewall rule-list SELF-IP-WEB rules modify { new3 { log yes } }
Fixed Versions:
21.0.0
2099609 : TMM might core with SIGSEGV with certain network traffic
Links to More Info: K000156912, BT2099609
2098861 : Single-NIC not supported on Azure Standard_Ds_v5 Series.
Links to More Info: BT2098861
Component: TMOS
Symptoms:
In Azure/HyperV single NIC VMs, tmm fails to attach to the 1.0 interface.
Conditions:
- HyperV or Azure VM that has a single SR-IOV NIC attached to the VM.
- Affected instances show `getdb provision.1nic` value as "disable". For 1nic instances, this dbvar should have "enable" value to correctly configure tmm and mgmt networking.
- This problem does not happen with 1nic instances using only a synthetic netvsc nic.
Impact:
As tmm can't successfully attach to the 1nic instance, no data traffic passes.
Workaround:
Configure "provision.1nic" dbar value to "forced_enable" to override the automation behavior:
setdb provision.1nic "forced_enable"
Fix:
Both data connectivity through TMM works in Single-NIC instances deployed in Azure/HyperV.
Fixed Versions:
21.0.0
2083217 : Updates to BIG-IP Image Signing and Verification Process - October 2025★
Links to More Info: BT2083217
Component: TMOS
Symptoms:
A key update in October 2025 impacts image signature verification for certain BIG-IP and F5OS releases, potentially blocking installations or validations on older systems.
Conditions:
This change is implemented in BIG-IP versions released October 2025 or later, and all BIG-IP Engineering Hotfixes created on or after October 13, 2025.
Impact:
As a result, BIG-IP images signed with new keys may not be automatically verified by earlier BIG-IP and F5OS releases.
In addition, earlier BIG-IP releases may not be automatically verified by BIG-IP versions released October 2025 or later.
Workaround:
BIG-IP ISO Images:
Signature verification (as documented in K15225) will block installation of this release on systems running earlier BIG-IP versions.
To install this release:
1.Temporarily disable BIG-IP ISO signature verification.
2.Install this BIG-IP release.
3.Re-enable BIG-IP ISO signature verification.
Signature verification (as documented in K15225) will also block installation of older BIG-IP versions (released before October 2025) on systems running this BIG-IP release.
To install older versions:
1.Temporarily disable BIG-IP ISO signature verification.
2.Install the desired older BIG-IP version.
3.Re-enable BIG-IP ISO signature verification.
F5OS Tenant Images:
For this BIG-IP release, ".qcow2.zip.bundle" tenant images cannot be validated on F5OS host systems (VELOS chassis or rSeries appliances) running F5OS versions released prior to October 2025. This is due to differences in signing and verification methods.
To install F5OS tenant images:
Where possible, use the ".tar.bundle" image type, which is compatible with all supported F5OS releases other than F5OS-A 1.5.x. For F5OS-A 1.5.x, upgrade the host to F5OS-A 1.5.4 or later, and then use the ".qcow2.zip.bundle" tenant image.
For more information, see:
K15225: Enabling signature verification for BIG-IP ISO image files
https://my.f5.com/manage/s/article/K15225
K24341140: Verifying BIG-IP software images using SIG and PEM files
https://my.f5.com/manage/s/article/K24341140
K000157005: F5 signing certificate and key rotation, October 2025
https://my.f5.com/manage/s/article/K000157005
Fix:
This BIG-IP release has been signed with cryptographic keys updated as of October 2025.
Behavior Change:
As the result of rotation of the keys used to sign BIG-IP images, verification of images for this BIG-IP release may not behave as historically expected.
- For BIG-IP ISO images, ISO image signature verification documented in K15225 will block installation of this release on systems running earlier releases of BIG-IP.
To successfully install this BIG-IP release:
1. Disable BIG-IP ISO signature verification
2. Install this BIG-IP release
3. Re-enable BIG-IP ISO signature verification
- For BIG-IP ISO images, ISO image signature verification documented in K15225 will block installation of BIG-IP versions released prior to October 2025.
To successfully install older BIG-IP versions while running this BIG-IP release:
1. Disable BIG-IP ISO signature verification
2. Install the desired BIG-IP release
3. Re-enable BIG-IP ISO signature verification
- For F5OS tenant images for this BIG-IP release, F5OS tenant images of the ".qcow2.zip.bundle" type cannot be validated when imported into an F5OS host system (VELOS partition or rSeries appliance) for F5OS versions released prior to October 2025. This is due to different signing and verification methods for ".qcow2.zip.bundle" image types.
To successfully install an F5OS tenant image for this BIG-IP release:
- For F5OS-A 1.5.x, upgrade the system to at least F5OS-A 1.5.4 and then import an ".qcow2.zip.bundle" image.
- For all other supported F5OS versions, import an F5OS tenant image of the ".tar.bundle" type. This image type uses a different signing and verification method which is recognized as valid on both newer and older F5OS host software versions.
It is highly recommended that all F5-provided software images be manually verified using the procedures described in:
K24341140: Verifying BIG-IP software images using SIG and PEM files
https://my.f5.com/manage/s/article/K24341140
See also:
K15225: Enabling signature verification for BIG-IP ISO image files
https://my.f5.com/manage/s/article/K15225
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8
2078797 : LTM Policy actions fail to render in configuration utility (web UI)★
Links to More Info: K000156885, BT2078797
Component: TMOS
Symptoms:
Upon going to Local Traffic >> Policies : Policy List and selecting a policy that has actions defined, the following error is logged via the browser developer console.
TypeError: can't access property "action", i.action is undefined
t app.min.js:20
ActionTextController app.min.js:20
Angular 44
jQuery 5
angular.js:15717:16
Conditions:
- LTM Policies and actions are configured.
- The LTM Policies are viewed in the configuration utility (web UI)
Impact:
- This issue prevents the BIG-IP administrator from being able to view detailed information about the LTM Policies via the configuration utility.
- BIG-IP administrator is also unable to edit pools or virtual servers from the drop-down list when selecting an action to forward traffic for the LTM policy rule.
Workaround:
Use TMSH to view or edit LTM Policies.
Open a case with F5 Support (K2633) and request an engineering hotfix with the fix for ID 2078797.
Fix:
The LTM Policies correctly render in the configuration utility.
Fixed Versions:
21.0.0
2078793-6 : Security weakness in 3rd party library used in AGC
Links to More Info: K000134507, BT2078793
2077601 : The guest or manager role users getting error on reading virtual server config
Component: TMOS
Symptoms:
When the user selects any created virtual server to see the read-only details, the error
"General database error retrieving information." is displayed on the screen.
Conditions:
Create a user with guest or manager role and try to read the virtual server configs
Impact:
The guest or manager role users were restricted to read or create a new virtual server configuration
Workaround:
None
Fix:
Added the json profile to the known list during validation of non admin user
Fixed Versions:
21.0.0
2077297 : HA Group List page in webUI shows a blank page
Links to More Info: BT2077297
Component: TMOS
Symptoms:
HA Group List page shows a blank page with no information on the screen
Conditions:
The system is configured for High Availability (HA)
1) Go to System > High Availability > HA Group List
2) Click the Create button or an existing entry in the list
Impact:
No information is visible in HA Group List page in webUI
Workaround:
None
Fixed Versions:
21.0.0
2077209-4 : File Import Handler Enhancement
Links to More Info: K000156801, BT2077209
2077201-4 : TMUI File Import Handler Enhancement
Links to More Info: K000156800, BT2077201
2064569 : BIND upgrade to version 9.18.37
Links to More Info: BT2064569
Component: Global Traffic Manager (DNS)
Symptoms:
BIND version 9.18.28 was published on 23 July 2024
Conditions:
New security fixes were made available in the last 9.18.37 BIND version: CVE-2025-40775, CVE-2025-40776.
Impact:
NA
Workaround:
None
Fix:
BIND was upgraded to the last 9.18.37 version
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8
2064505 : TLS 1.2 handshake failure with cipher rule configured using hybrid KEM algorithms first
Component: Local Traffic Manager
Symptoms:
When a TLS 1.2 connection is initiated with https virtual server using a cipher rule with hybrid KEM algorithms listed first, the connection handshake fails.
Conditions:
Cipher rule is configured with hybrid KEM algorithms before their related classic DH-group algorithms. Issue does not occur if classic DH-group algorithms precede hybrid KEM algorithms in the cipher rule.
Fail:
ltm cipher rule group1 {
cipher rule1
dh-groups X25519MLKEM768:X25519
}
Works:
ltm cipher rule group1 {
cipher rule1
dh-groups X25519:X25519MLKEM768
}
Impact:
TLS 1.2 connections secure key exchange fail when hybrid KEM algorithms listed first in the cipher rule configurations.
Workaround:
Issue does not occur if classic DH-group algorithms precede hybrid KEM algorithms in the cipher rule.
ltm cipher rule group1 {
cipher rule1
dh-groups X25519:X25519MLKEM768
}
Fix:
Ensure hybrid PQC KEM and classic DH-group algorithms can coexist in any order within cipher rule configurations without handshake failures.
Fixed Versions:
21.0.0
2064413-1 : UCS File Download Failure via REST API Due to Byte-Range Handling Bug in BIG-IP
Links to More Info: BT2064413
Component: TMOS
Symptoms:
When downloading UCS files using the BIG-IP REST API with clients such as PowerShell 7, downloaded files are larger than expected and contain duplicate or corrupted data. The MD5 checksum of the downloaded file does not match the source UCS file on the BIG-IP system. This is due to the REST service returning the same portion of the file for every chunk request, resulting in failed or unusable UCS restore attempts
Conditions:
Affected when downloading UCS files over the REST API (using HTTP Range headers) from BIG-IP.
Most commonly seen with PowerShell 7 and other clients that download files in chunks.
Not observed with PowerShell 5 or when using SCP/SFTP.
Occurs on affected TMOS versions before the implementation of the fix.
Impact:
UCS file downloads via REST API are incomplete and corrupted.
MD5 checksum mismatch prevents UCS archive validation or restore.
Automated backups or migrations using REST API may fail.
Potential risk of data loss if corrupted UCS files are used for restore.
Workaround:
Use alternate file transfer methods such as SCP or SFTP to download UCS files directly from /var/local/ucs/ on the BIG-IP system.
Fixed Versions:
21.0.0
2058989 : TMUI hardening
Component: TMOS
Symptoms:
In certain scenarios, TMUI does not follow best security practices.
Conditions:
NA
Impact:
NA
Workaround:
NA
Fix:
Best security practices are now applied.
Fixed Versions:
21.0.0
2058977 : TMUI hardening
Component: TMOS
Symptoms:
In certain scenarios, TMUI does not follow best security practices.
Conditions:
NA
Impact:
NA
Workaround:
NA
Fix:
Best security practices are now applied.
Fixed Versions:
21.0.0
2058853 : SMTP validation improvements
Component: Application Visibility and Reporting
Symptoms:
SMTP validation did not follow expected behavior.
Conditions:
NA
Impact:
NA
Workaround:
NA
Fix:
SMTP validation follows expected behaviour.
Fixed Versions:
21.0.0
2053705-1 : TMM memory is not cleared after handshake failure
Links to More Info: K000156733, BT2053705
2053613 : Core dump found during stability testing
Component: TMOS
Symptoms:
Core dump found during the stability testing in the control plane
Conditions:
Configure the BIG-IP and send the continous traffic
Impact:
Core dump found in the control plane and it will impact the confifiguration of BIG-IP.
Workaround:
None
Fix:
Fixed by not sending the invalid configuration to main thread, which worker thread can not handle.
Fixed Versions:
21.0.0
2047593-1 : Blade upgrade fails with the "HAL unexpected init failure (continuing) : Unknown slot for ChassisBase" error message★
Links to More Info: BT2047593
Component: TMOS
Symptoms:
C4800 chassis blades at slot positions 5 - 8 fails to join cluster after upgrading to BIG-IP TMOS 17.5.0 with error "Unknown slot for ChassisBase".
Conditions:
C4800 chassis that supports 8 blades with blades at slots 5 to 8 and running with BIG-IP v17.5.0.
Impact:
Reduced capacity due to fewer blades joining cluster for traffic handling.
Workaround:
None
Fixed Versions:
21.0.0
2047569 : TMM may crash during the startup with SR-IOV Intel E810 NIC on VMWare environments
Links to More Info: BT2047569
Component: Local Traffic Manager
Symptoms:
During the TMM restart, the Intel E810 SR-IOV interface may remain in an invalid state. It will prevent the initialisation of the interface on the next TMM start, and TMM will generate the core file in this case.
Conditions:
BIG-IP VE is deployed on VMWare ESXi environment with E810 SR-IOV interface attached.
Impact:
TMM may crash during startup.
Workaround:
To clean invalid SR-IOV interface state, a complete reboot of the BIG-IP VM or VMware hypervisor is required.
Fix:
TMM correctly shut down Intel E810 SR-IOV interfaces during the service restart.
Fixed Versions:
21.0.0
2047445-1 : A VPN connection may fail when an Access policy or a Virtual Server is configured in a route domain
Links to More Info: BT2047445
Component: Access Policy Manager
Symptoms:
When the Access policy is configured in a route domain using the "Route Domain and SNAT Selection" agent, or when a virtual server is configured in any route domain, a VPN connection may fail with the error: "iSession: Connection error: isession_handle_syn:3740: No peer:4". This issue is applicable only to Windows-based Edge clients and Browser clients.
Conditions:
1. Windows client is used
2. Access policy is configured in route domain or Route domain is configured on VS
3. User tries to establish VPN connection
Impact:
VPN connection may fail
Workaround:
Any of the following workarounds can be applied:
-- Configure route domain with parent as default route domain. In some cases we may need to disable "strict isolation", In addition to parent as default route domain.
-- Disable ipv6 using "tmsh modify sys db ipv6.enabled value false"
-- tmsh modify sys db isession.ctrl.apm value disable
Fix:
VPN connection should be established when the APM access policy is configured with route domain.
Fixed Versions:
21.0.0
2047293 : TMM NULL dereference in Dyn-TCAM after multiple failures
Links to More Info: BT2047293
Component: TMOS
Symptoms:
TMM SIGSEGV crash.
Conditions:
Triggered by HW offload of a security feature.
Impact:
TMM restart, HA failover.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
2047069-2 : Issue observed in Checkmarx scan
Links to More Info: BT2047069
Component: TMOS
Symptoms:
Some special characters are included in the file name on the dashboard page.
Conditions:
When the user gives special characters for file names in the dashboard page.
Impact:
The user will not be able to retrieve the files if they are saved incorrectly.
Workaround:
None
Fixed Versions:
21.0.0, 17.1.3
2046885 : iHealth configuration improvement
Links to More Info: K000156642, BT2046885
2044565 : Add support for tcp & clientssl default profiles to enhance S3 workload performance
Component: Local Traffic Manager
Symptoms:
The default tcp and clientssl profiles are not optimized for handling S3 traffic
Conditions:
When LTM is configured in BIG-IP and S3 traffic is received.
Impact:
S3 workload performance could be suboptimal.
Workaround:
Manually configuring the tcp and clientssl profiles with recommended values can improve S3 traffic performance with BIG-IP acting as a proxy.
Fix:
The new s3-tcp and s3-default-clientssl profile are optimized to handle S3 traffic and improve GET, PUT, STAT and througput performance for S3 flows.
Fixed Versions:
21.0.0
2044417 : Connectivity problems and eal-intr-thread cores on Azure using >= 6 interfaces
Links to More Info: BT2044417
Component: TMOS
Symptoms:
With Hyper-V platforms, VMBus devices are present due to the virtualization architecture. These devices make use of VMBus channels in the /sys/bus directories. Hyper-V has a reported supported limit of 128 monitored VMBus channels. Patches for non-monitored (low-speed) VMBus channels have caused connectivity problems and eal-intr-thread cores.
Conditions:
-- Use Hyper-V platform
-- Use 16 vCPUs and attach >= 7 interfaces
-- Use 24 vCPUs and attach >= 6 interfaces
Impact:
Traffic interrupts and eal-intr-thread cores can occur.
Workaround:
Deploy instances with <= 3 interfaces on Hyper-V platforms.
Fix:
Regardless of combinations of vCPU and interface counts, traffic can be passed and eal-intr-thread cores are limited. VMBus channels correspond with device queues so the 128 monitored VMBus channel limit forces queue-sharing and impacts performance. To avoid losing performance, deploy instances with fewer interfaces.
Fixed Versions:
21.0.0
2044381 : Gtmd SIGSEGV core due to monitor status change
Links to More Info: BT2044381
Component: Global Traffic Manager (DNS)
Symptoms:
Gtm cored
Conditions:
-- Three GTMs in a sync group
-- A GTM pool has a monitor with "require 1 from 2 probes" configured
-- Resources are marked down due to iQuery traffic disruption between two of the GTMs, then come back up
Impact:
GSLB traffic disrupted while gtmd restarts.
Workaround:
None
Fixed Versions:
21.0.0
2038309 : After the full config sync, FQDN template node status changes to ‘fqdn-checking’ (Unknown) untill the DNS query is triggered
Links to More Info: BT2038309
Component: Local Traffic Manager
Symptoms:
The node’s availability changes to unknown, even though the DNS server is reachable and should have valid resolution data.
The FQDN resolver does not immediately send a DNS query upon receiving the sync, which delays recovery of the node status.
Node status returns to fqdn-up only after the next scheduled DNS query interval (For example, 240 seconds).
Conditions:
-- BIG-IP devices configured with FQDN template nodes.
-- Performing config sync with the force-full-load-push option.
The issue occurs on the sync receiver only. It does not reproduce without force-full-load-push.
Impact:
Temporary service visibility issue:
FQDN nodes incorrectly display 'fqdn-checking' or 'availability unknown' until the next DNS resolution cycle.
This can exist till the next FQDN interval configuration (For example, 4 minutes).
May confuse administrators monitoring node status.
Workaround:
To work around this issue, either:
-- After initiating the config sync force-full-load-push, initiate on the standby/sync receiver:
bigstart restart dynconfd
or:
-- Configure the FQDN template node with a shorter 'interval' value, so that the next DNS query occurs more quickly after the full config sync operation.
Fix:
None
Fixed Versions:
21.0.0
2037409 : Tmctl tables are corrupted for large cluster size and tmm memory shows 0
Links to More Info: BT2037409
Component: TMOS
Symptoms:
When a BIG-IP is deployed on a large cluster with 5 or more blades on VELOS chassis platforms, the following tables are shown as corrupted:
tmctl -d blade tmm/sdaglib_mirror_table
tmctl -d blade tmm/sdaglib_did_info
tmctl -d blade ipfix_destination_stats
tmctl -d blade tmm/sctp
tmctl -d blade tmm/lac
The command tmsh show sys tmm-info; shows 0 tmm memory
Memory (bytes)
tmsh show sys tmm-info
Conditions:
When using F5 VELOS Chassis platforms installed and deployed with BIG_IP with a number of blades 5 or above.
Impact:
Any data presented to user based on the impacted tables will be indicating incorrect data.
Workaround:
None
Fix:
A new DID table column is added to represent DAG PG tables in a concise format.This fits and adhere to TMSTAT size restriction and avoids table corruption for larger DAG tables using wide format(16-bit virtual server 8 bit) in DAG tables.
Fixed Versions:
21.0.0, 17.5.1.3
2035129-5 : The CMP stream communication between tmms on different blades might stall after a tmm memory exhaustion event
Links to More Info: BT2035129
Component: Local Traffic Manager
Symptoms:
Issues with ARP or NDP resolution. Intermittent issues with the tmm session table.
Conditions:
BIG-IP is running on a chassis platform
tmm has run out of memory at some point but was able to recover
Impact:
CMP communication is impacted which may affect the tmm session table, ARP and NDP resolution, intra-chassis mirroring among other things.
Workaround:
It is difficult to determine which tmm(s) on which slot(s) might have been affected by the issue. Either restart tmm on the blades that experienced a memory exhaustion event or restart tmm on each blade in the chassis.
Fixed Versions:
21.0.0
2035005 : VMware Horizon applications launched via BIG-IP as VDI proxy ignore args parameter in vmware-view URI
Links to More Info: BT2035005
Component: Access Policy Manager
Symptoms:
Applications launched through BIG-IP virtual server start correctly, but the args parameter is dropped.
Example: Command Prompt opens but does not execute ipconfig when launched with args=%2Fk%20ipconfig.
When bypassing BIG-IP (direct VCS node access), the same URI executes the command successfully.
Applications without args (e.g., Calculator) work as expected both with and without BIG-IP.
Conditions:
VMware Horizon published applications behind BIG-IP APM.
Launching applications via vmware-view:// URI with args parameter.
Protocols tested: Blast, PCoIP.
Issue occurs consistently when BIG-IP virtual server FQDN is used.
Direct access to Horizon Connection Server (bypassing BIG-IP) does not exhibit the problem.
Impact:
User cannot deep-link into specific app states or pass runtime arguments to published applications through BIG-IP.
Breaks workflows relying on args, such as opening IBM Notes documents directly or running pre-defined commands in applications.
Causes functional discrepancy between direct Horizon access and BIG-IP proxied access, leading to user frustration and support escalations.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
2034985-1 : Unable to forward NTLM SSO back-end cookies to front-end
Component: Access Policy Manager
Symptoms:
Unable to forward NTLM SSO back-end cookies to front-end.
NTLM has three HTTP round-trips and can set different sets of cookies in each trip. After successful NTLM SSO, APM does not forward some cookies from the back-end to the front-end.
Conditions:
-- NTLM SSO is configured.
-- The server side sends one or more 401 responses to the BIG-IP system during the transaction, followed by a 200 response.
Impact:
Cookies are not sent to the client side, and SSO negotiation fails.
Fix:
Send relevant cookies in response.
Fixed Versions:
21.0.0
2034789 : Unbound has been upgraded from version 1.20.0 to 1.23.1
Links to More Info: BT2034789
Component: Global Traffic Manager (DNS)
Symptoms:
Unbound has been upgraded to include the latest fixes in version 1.23.1
Conditions:
None
Impact:
Unbound has been upgraded to include the latest fixes in version 1.23.1
Workaround:
None
Fix:
Unbound has been upgraded to include the latest fixes in version 1.23.1
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
2033809 : ASM Connection Handling Improvement
Component: Application Security Manager
Symptoms:
ASM connections may not close properly under certain conditions.
Conditions:
- Processing large JSON requests
- Default ASM configuration (bypass_upon_load = 0)
- High memory usage scenarios
Impact:
Potential connection issues during high load.
Workaround:
NA
Fix:
Improved ASM connection handling.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1, 15.1.10.8
2017105 : Disk partition /var full after quick config changes★
Links to More Info: BT2017105
Component: Application Security Manager
Symptoms:
When a new configuration is applied, the previous data files are kept as long as they may be needed and also had a minimum age for deletion applied. When multiple config changes were made in quick succession this resulting in multiple generations that were under the minimum age for cleanup, and some duplicate data files that hadn't changed between generations. This can exhaust the available space in /var.
Conditions:
Many small config changes are applied in quick succession. This can occur during a version upgrade or EHF installation.
Impact:
Disk space was exhausted, leading to failure to apply configuration or configuration corruption.
Fix:
File cleanup now correctly removes files that are no longer needed, regardless of their age. "Duplicate" data files are now hardlinked to reduce wasted disk space.
Fixed Versions:
21.0.0
2016105 : TMM might crash under certain conditions
Links to More Info: K000156597, BT2016105
2016041 : Remove the unused DynaCache Package
Component: Local Traffic Manager
Symptoms:
DynaCache is shipped as part of BIG-IP and is no longer used anywhere in BIG-IP.
Conditions:
DynaCache Package is included in BIG-IP
Impact:
None
Workaround:
None
Fix:
DynaCache package has been removed from BIG-IP.
Fixed Versions:
21.0.0
2012301 : Upgrade the certificate to be compatible with the new upgraded gson package
Component: TMOS
Symptoms:
After the Gson package upgrade to 2.10.1, we need to update the certificate in cacert so that the SSL handshake exception is not present, as the new Gson package needs an updated certificate for verification.
Conditions:
Where the Gson package is used.
Impact:
Fails all the related packages in the build
Workaround:
Update the cacert with the correct certificate
Fix:
Certificate is updated to support Gson 2.10.1
Fixed Versions:
21.0.0
2008633 : Active mode FTP using port 0 for data-channel connections
Links to More Info: BT2008633
Component: Local Traffic Manager
Symptoms:
- Infrequent FTP data-channel failure.
- Control-channel is terminated with ABOR due to data-channel failure.
Conditions:
- FTP profile configured with data-port 0 (any).
- Active mode FTP.
- Server using privileged port(s) (<1024).
Impact:
Failed FTP data connection.
Workaround:
If the server uses a known privileged port (e.g., 20), set this as the data-port in the FTP profile.
Alternatively, configure the server to use non-privileged port (>= 1024).
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
2008573 : Login/Logout expected/unexpected string has no length validation
Links to More Info: BT2008573
Component: Application Security Manager
Symptoms:
You can configure an inappropriately long string for the login/logout criteria.
Conditions:
Configuring the Login/Logout expected/unexpected string.
Impact:
Upon asm restarted bd goes into restart loop. ASM traffic disrupted while bd restarts.
Workaround:
None
Fixed Versions:
21.0.0
2007705 : HSL can incorrectly handle pending TCP connections leading to a TMM crash
Links to More Info: BT2007705
Component: TMOS
Symptoms:
TMM crashes.
Conditions:
A pool member is marked down or delete while there are TCP connection issues with some pool members
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fix:
Does not core anymore, and TMM handle the situation correctly
Fixed Versions:
21.0.0
1991289-1 : ECA always invokes the default access profile 'kerberos_auth_default'
Links to More Info: BT1991289
Component: Access Policy Manager
Symptoms:
ECA always invokes the kerberos_auth_default profile, even when it’s known that the request will be denied later.
Conditions:
-- SSL Orchestrator Proxy configured with SWG-explicit NTLM ONLY Access Profile
Impact:
Increasing unnecessary load on apmd, which will cause a performance issue during peak time.
Workaround:
None
Fix:
ECA will not send a known invalid request to APMD to deny
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1991261-1 : AAA LDAP: priority group activation resets when updating configuration in APM
Links to More Info: BT1991261
Component: Access Policy Manager
Symptoms:
AAA LDAP pool-based configuration in APM resets the Priority Group Activation (PGA) setting to the default after any update to AAA LDAP configuration.
Manual changes to PGA (e.g., disabling it) are overwritten during AAA updates in the APM UI.
Conditions:
-- AAA LDAP is configured in APM with the "Use Pool" option enabled.
-- Priority Group Activation on the auto-generated pool is manually set to "Disabled" via Local Traffic > Pools.
-- Any subsequent update to the AAA LDAP configuration in APM resets the Priority Group Activation setting back to "Less than 1 Available Member(s)".
Impact:
-- Custom settings for Priority Group Activation are not persistent and are overwritten during APM updates.
-- Load balancing behavior may not work as intended if PGA is reset unexpectedly.
Workaround:
Manually update Priority Group Activation settings in the auto-generated pool via Local Traffic > Pools after each AAA LDAP configuration update in APM.
Disable Priority Group Activation immediately after updating any AAA LDAP configuration values in APM.
Fix:
No changes to the UI are required for the fix.
The TMUI backend logic has been updated to retain custom Priority Group Activation settings when reloading the LDAP AAA configuration.
When reloading the LDAP AAA configuration, the system will now preserve existing Priority Group Activation settings and prevent reinitialization of this variable.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1991241 : ECA plugin unresponsive
Links to More Info: BT1991241
Component: Access Policy Manager
Symptoms:
ECA plugin becomes unresponsive and is stuck on a read call.
Conditions:
-- SSL Orchestrator Proxy configured with SWG-explicit NTLM ONLY Access Profile
Impact:
ECA plugin became unresponsive, leading to a performance degradation.
Workaround:
None
Fix:
Added support for a read socket timeout.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1991237 : Unable to configure number of apmd threads using tmsh command
Links to More Info: BT1991237
Component: Access Policy Manager
Symptoms:
You are unable to configure the number of apmd threads via tmsh.
Conditions:
-- SSL Orchestrator Proxy is configured with SWG-explicit NTLM ONLY Access Profile
-- Any access policy configured in APM.
Impact:
Unable to control the number of apmd threads using tmsh command.
Workaround:
None
Fix:
Manage the number of apmd threads using TMSH. The default value will be used if no changes are required to the apmd threads, and the current behaviour will remain unchanged.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1990897 : APM hardening
Links to More Info: K000156596, BT1990897
1989133 : Unexpected blocking of valid login attempts after upgrade to version 17.5.0
Links to More Info: BT1989133
Component: Application Security Manager
Symptoms:
Users may experience blocking of legitimate login attempts due to incorrect classification of failed logins.
Conditions:
Occurs when brute force protection is enabled and login attempts are made to a configured login URL without authentication headers.
Impact:
Valid login attempts may be falsely flagged as brute force attacks, triggering enforcement actions such as CAPTCHA or blocking pages, potentially disrupting user access.
Workaround:
None
Fix:
Fixed issue with blocking valid login attempts
Fixed Versions:
21.0.0
1987361 : APMD file descriptor exhaustion when LDAP operational timeout is set to 180 seconds
Links to More Info: BT1987361
Component: Access Policy Manager
Symptoms:
You may observe below string in /var/log/apm*
"Too many open files"
"threads 560, running 560"
Conditions:
NTLM config with LDAP pool configuration.
Impact:
Unable to process APM traffic
Workaround:
Restart APMD process
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1983321 : CVE-2025-48976 apache-commons-fileupload: Apache Commons FileUpload DoS via part headers
Links to More Info: K000152614, BT1983321
1983229 : Post-rotate Command Improvements for iHealth
Links to More Info: K000154647, BT1983229
1982937 : InTune MDM endpoint compliance intermittently fails despite being compliant
Links to More Info: BT1982937
Component: Access Policy Manager
Symptoms:
Compliant devices are shown as non-compliant
Conditions:
MDM Intune mdm check is used
Impact:
Access policy is denied even for compliant devices
Workaround:
None
Fix:
Access policy should be allowed if device is compliant.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1
1980721 : APMD Core while parsing the invalid JWT Header
Links to More Info: K000156602, BT1980721
1980649 : High CPU usage by bd
Links to More Info: BT1980649
Component: Application Security Manager
Symptoms:
High CPU usage by bd
Conditions:
-- ASM provisioned and in use
-- A specific condition leads BD to unnecessary high CPU
Impact:
High CPU
Workaround:
None
Fix:
BD no longer causes high CPU under the specific condition.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1980645-1 : Bypass APM for Horizon Blast/PcoIP connection for internal users
Links to More Info: BT1980645
Component: Access Policy Manager
Symptoms:
Need a method to bypass APM for Horizon Blast connection for internal users using some configuration option in VPE.
Conditions:
1. VMware VDI is configured in APM
2. Internal and external users traffic is separated before reaching this Virtual Server.
Impact:
Internal user VMware horizon desktop/app traffic always goes through the Virtual Server though it can be bypassed after Authentication.
Workaround:
None
Fix:
There should be a configurable option in VPE to bypass vmware horizon desktop/app traffic for Internal users.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1977933 : TMM might crash under certain conditions
Links to More Info: K000156741, BT1977933
1977917 : TMM might crash under certain conditions
Links to More Info: K000156741, BT1977917
1976925-2 : Device dos whitelist not working properly for DNS dos protection when BA enabled
Links to More Info: BT1976925
Component: Advanced Firewall Manager
Symptoms:
-- When VLANs are configured in the network-whitelist, TCP traffic was properly bypassed, and DOS attack alarms were not triggered.
-- DNS traffic, despite being sent from whitelisted VLANs, still trigger DOS attack alarms.
Conditions:
-- VLANs assigned to the network-whitelist.
-- Virtual wire mode (vWire) configured with the configured VLAN tags.
-- Behavioral Analysis (BA) is enabled alongside DNS A Query and DNS AAAA Query attack vectors.
Impact:
Despite being whitelisted, DNS queries (e.g., high-volume traffic) trigger DOS detection and mitigation due to improper whitelist logic handling. DNS resolution is disrupted.
Workaround:
None
Fixed Versions:
21.0.0
1976513 : Some ASM entity names are not shown in the REST error response message
Links to More Info: BT1976513
Component: Application Security Manager
Symptoms:
A REST response of patching a hostname for Virus Detection Server is missing ASM entity name "hostname" in the error message
Conditions:
A REST request is made on a specific ASM entity and error response is returned
Impact:
The error message in REST response may be unclear
Workaround:
None
Fix:
ASM entity names are shown in the REST error response message successfully
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1976113-1 : Deployment of BIG-IP Best Plus images on Azure fails with OSProvisioningClientError
Links to More Info: BT1976113
Component: TMOS
Symptoms:
When deploying BIG-IP Best Plus images in Azure, the deployment process fails with the following error message status:
Status: "OSProvisioningClientError"
Despite this error, the VM may still allow SSH login, causing confusion about the actual deployment status.
Conditions:
- Occurs during provisioning of BIG-IP Best Plus images in Azure.
- The error is related to SSH key generation timing during the provisioning process.
Impact:
- Deployment status is reported as Failed even though the VM is accessible via SSH.
- Automation workflows relying on successful provisioning status may break.
- Users may assume the deployment is unusable, leading to unnecessary troubleshooting or redeployment.
Workaround:
- After receiving the error, verify if the VM is accessible via SSH.
- If accessible, you can proceed with manual configuration.
Fix:
The fix ensures that the necessary SSH keys are generated prior to the service initialization.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1
1975941 : Alternate_response_content length greater than 51200 in ACCOUNT_ALTERNATE_RESPONSE_FILE causing ASM restart loop
Links to More Info: BT1975941
Component: Application Security Manager
Symptoms:
Bd goes into a restart loop
Conditions:
Custom response body configured with tokens present and length becomes greater than 51200 after replacing tokens with their respective values.
Impact:
Bd constantly restarts. Traffic disrupted while bd restarts.
Workaround:
Reduce the size of response body less than 51200
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1975885-1 : Massive M_ACCESS string leak in TMM
Links to More Info: BT1975885
Component: Access Policy Manager
Symptoms:
Memory leak while deleting apm session.
Conditions:
-- Running a version that fixed ID 1672257 (currently version 17.5.0)
-- Access sessions are deleted
Impact:
Increase in tmm memory
Workaround:
None
Fixed Versions:
21.0.0
1974801 : Deprecated PKCSv1.5 in Marvell affects r5000-DF and r10000-DF Platforms
Component: Local Traffic Manager
Symptoms:
- SSL profile configuration fails with Marvell HSM keys
- SSL handshake fails during runtime
- Configuration rejection messages in UI/API
- Runtime errors and aborted connections
Conditions:
All 6 conditions must be present:
Platform: Marvell r5000-DF or r10000-DF
F5OS Version: ≥ 1.5.3
FIPS Firmware: ≥ 2.09
SSL profile references Marvell on-board HSM key
Cipher list includes only RSA key exchange
Attempting PKCS#1 v1.5 padding operations
Impact:
Configuration rejections and handshake failures
Workaround:
Update Cipher Suites (Primary recommendation) - Use ECDHE instead of RSA key exchange
Fixed Versions:
21.0.0
1972369 : BD performance improvement
Links to More Info: BT1972369
Component: Application Security Manager
Symptoms:
A specific performance issue that can be fixed occurs on a basic structure used throughout the BD.
Conditions:
ASM is configured and traffic is passing.
Impact:
Increased CPU utilization.
Workaround:
None
Fix:
Fixed the performance issue.
Fixed Versions:
21.0.0, 17.5.1.3
1971217 : False negative with illegal redirect attempt
Links to More Info: BT1971217
Component: Application Security Manager
Symptoms:
ASM does not block illegal redirect attempt in a certain scenario
Conditions:
Occurs with a specific configuration on ASM and a specific server redirect response .
Impact:
False negative.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1969861 : [APM][NTLM]ECA core SIGSEGV
Links to More Info: BT1969861
Component: Access Policy Manager
Symptoms:
ECA cores repeatedly
Conditions:
NTLM Configuration in APM
Impact:
Cannot process NTLM traffic.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1968237 : Configuration fails to load post upgrade due to invalid DoS signature predicate 'ip flags'★
Links to More Info: BT1968237
Component: Advanced Firewall Manager
Symptoms:
After upgrading from v16.1.4.1 to v17.1.2.2, both device slots remain in an offline state.
Configuration fails to load due to a DoS signature issue (/Common/dos_Sig).
The system throws the following error:
>01071cc8:3: Dos Signature (/Common/dos-common/Sig_69253_39_1737834503): Arg (Fragmented) for predicate 'IP Flags' is invalid for DNS/NETWORK signature.
Conditions:
-- DoS signatures are configured using persistence-based predicates such as ‘IP Flags’.
-- Configuration executed via tmsh commands as outlined in the documentation:
https://clouddocs.f5.com/cli/tmsh-reference/v15/modules/security/security_dos_dos-signature.html
-- This can be configured via the GUI as well
-- Issue occurs when upgrading from 16.1.4.1 to 17.1.2.2.
Impact:
Device will be in offline state Post Upgrade
Workaround:
None
Fix:
Fixed
Fixed Versions:
21.0.0, 17.5.1.3
1968033 : Remove the unused ImageMagick package from BIG-IP
Component: TMOS
Symptoms:
ImageMagick-6.7.8.9-15.el7_2 is no longer used anywhere in BIG-IP and is being removed.
Conditions:
None
Impact:
None
Workaround:
None
Fix:
ImageMagick has been removed from BIG-IP.
Fixed Versions:
21.0.0, 17.5.1.3
1967025 : Improved Permission Handling in REST SNMP Endpoint and TMSH
Component: TMOS
Symptoms:
Certain requests to the REST SNMP endpoint and TMSH improperly handle user permissions, which may lead to inconsistent behavior or access concerns.
Conditions:
Not specified
Impact:
Security best practices are not followed.
Workaround:
Only allow trusted administrators to access the REST interface or TMSH. Restrict management access to secure and trusted networks.
Fix:
User permissions for both REST SNMP endpoint and TMSH are now handled as expected, ensuring proper enforcement of access controls.
Fixed Versions:
21.0.0
1966849-1 : CVE-2023-5869 postgresql: Buffer overrun from integer overflow in array modification
Links to More Info: K000152931
1966729 : Endpoint inspection not working with chrome browser
Links to More Info: BT1966729
Component: Access Policy Manager
Symptoms:
Endpoint inspection may not start when virtual server is accessed from Chrome browser of MacOS. When refreshed it may work properly.
Also client-type agent in access policy incorrectly detects MacOS as win11.
Conditions:
-- User accesses virtual server via a Chrome browser on MacOS.
-- Access policy has "client os" agent in VPE.
Impact:
Server incorrectly detects client platform macOS as win11
Workaround:
When HTTP_REQUEST {
if {[HTTP::uri] equals "/my.policy"} {
if {[HTTP::header exists "Sec-CH-UA-Platform-Version"] && [HTTP::header exists "Sec-CH-UA-Platform"]} {
set platform [string tolower [HTTP::header value "Sec-CH-UA-Platform"]]
set platform [string tolower [string trim [string map {\" ""} $platform]]]
if { $platform ne "windows" } {
HTTP::header remove "Sec-CH-UA-Platform-Version"
log local0. "Removing header $platform"
}
}
}
}
when CLIENT_ACCEPTED {
ACCESS::restrict_irule_events disable
}
Fix:
Server should detect platform correctly if client is using macOS.
Fixed Versions:
21.0.0, 17.5.1.2
1966313 : Websocket event logs show "N/A" for virtual server name except during upgrade request
Links to More Info: BT1966313
Component: Application Security Manager
Symptoms:
Remote logging for WebSocket traffic may display "N/A" in the vs_name field for messages other than the initial upgrade request.
Conditions:
Occurs when using a remote logging profile in CSV format with ASM and WebSocket traffic on a configured virtual server.
Impact:
Log entries may lack clarity or traceability due to missing virtual server name information, potentially complicating monitoring and troubleshooting.
Workaround:
None
Fixed Versions:
21.0.0
1965849-2 : [APM] TMM core is observed in validating the saml assertion signature
Links to More Info: BT1965849
Component: Access Policy Manager
Symptoms:
In SAML assertion signature validation, there is an error scenario where a macro in the defined log expects multiple arguments, which have been incorrectly passed.
Conditions:
SAML SP is configured with
- Invalid certificates.
- Or incorrect permission for certificates.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
SAML is configured with proper certificates with proper permissions.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1965329 : TMM may crash when re-declaring an LTM policy with a data-group
Links to More Info: BT1965329
Component: Local Traffic Manager
Symptoms:
TMM may crash when re-declaring an LTM policy with a data-group.
Conditions:
-- AS3 declaration that has a VIP with an LTM policy that uses a data-group.
-- The policy is re-declared while there is traffic on the VIP
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Declare while no traffic is on the VIP
Use iRules instead of LTM policies to access the data-group
Fix:
Tmm no longer crashes
Fixed Versions:
21.0.0
1965053 : Keymgmtd: Incorrect and misleading debug log statements
Links to More Info: BT1965053
Component: TMOS
Symptoms:
A few debug log statements in the keymgmtd daemon are inaccurate or misleading, resulting in confusion and difficulty when troubleshooting production issues.
Conditions:
Reviewing keymgmtd logs
Impact:
Misleading debug log messages
Workaround:
None
Fix:
Fixed misleading log messages
Fixed Versions:
21.0.0, 17.5.1.2
1962785 : Monitors of type snmp_link can fail
Links to More Info: BT1962785
Component: Global Traffic Manager (DNS)
Symptoms:
Monitors of type snmp_link can fail as they may not be added to the active probe list.
Conditions:
Use of monitor type snmp_link.
Impact:
Availability status may be shown in red.
Workaround:
None
Fix:
Removed the condition check for adding Monitors to the active probe list.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3, 16.1.6.1
1962073 : Creation of file type entries with trailing and/or leading spaces is allowed via REST in ASM policy
Links to More Info: BT1962073
Component: Application Security Manager
Symptoms:
Duplicate 'File Type' entries seen in ASM policy
Conditions:
'File Type' entries in ASM policy created via REST
Impact:
'File Type' protection do not work as expected
Workaround:
Delete the existing entries and add them via GUI
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1959725 : CVE-2024-42322 kernel: ipvs: properly dereference pe in ip_vs_add_service
Component: TMOS
Symptoms:
In the Linux kernel, the following vulnerability has been resolved: ipvs: properly dereference pe in ip_vs_add_service Use pe directly to resolve sparse warning: net/netfilter/ipvs/ip_vs_ctl.c:1471:27: warning: dereference of noderef expression
Conditions:
Linux kernel 4.7 up to (but not including) 5.10.237, 5.15.181, 6.1.119, 6.6.44, 6.10.3, and 6.11 are vulnerable to this CVE.
Impact:
Exploitation of the vulnerability could cause the system to become unavailable (DoS).
Workaround:
NA
Fix:
Patched kernel to fix the vulnerability.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1959709-1 : "Europe" IPs are allowed despite blocking all European countries
Links to More Info: BT1959709
Component: Application Security Manager
Symptoms:
Blocked Europe IP being allowed to access the web service
Conditions:
In ASM policy, configure to block all European countries. Thus any IP from 'Europe' should be blocked.
Impact:
IP access to the web service is allowed, which was supposed to be blocked.
Workaround:
None
Fixed Versions:
21.0.0, 16.1.6.1
1959513 : CVE-2023-52803 kernel: SUNRPC: Fix RPC client cleaned up the freed pipefs dentries
Component: TMOS
Symptoms:
BIG-IP is impacted because the vulnerable SUNRPC code for CVE-2023-52803 is present as a loadable kernel module in the affected kernel version (3.10.0). Although the module is not loaded by default, a privileged (root) user could load and use it, exposing the system to a potential denial-of-service via kernel crash if the vulnerability is triggered. Unprivileged or remote exploitation is not possible in the current configuration, so impact is limited to privileged misuse or error.
Conditions:
NA
Impact:
BIG-IP is impacted because the vulnerable SUNRPC code for CVE-2023-52803 is present as a loadable kernel module in the affected kernel version (3.10.0). Although the module is not loaded by default, a privileged (root) user could load and use it, exposing the system to a potential denial-of-service via kernel crash if the vulnerability is triggered. Unprivileged or remote exploitation is not possible in the current configuration, so impact is limited to privileged misuse or error.
Workaround:
Restrict shell and administrative access to trusted users only, and ensure that only authorized administrators are permitted to load kernel modules.
Fix:
Patched kernel to fix the CVE-2023-52803
Fixed Versions:
21.0.0, 17.1.3
1958513 : TMM might core with certain network traffic
Links to More Info: K000156691, BT1958513
1957157 : [nlad]OpenSSL: DRBG Continuous RNG test failed: DRBG stuck.
Links to More Info: BT1957157
Component: Access Policy Manager
Symptoms:
You may observe below logs in /var/log/ltm
err nlad[31252]: OpenSSL: DRBG Continuous RNG test failed: DRBG stuck.
err fips_monitor[19162]: 01da0011:3: SelfTest/Integrity test failure detected, triggering reboot action
Conditions:
Conditions are unknown
Impact:
Unexpected reboot causing disruption to traffic and failover.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.3
1952881 : Tmm memory leak in SCTP metadata
Links to More Info: BT1952881
Component: Service Provider
Symptoms:
Tmm crashes on out of memory.
Conditions:
Virtual server configured with a sctp profile and a legacy diameter profile.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Use the recommended message routing framework (MRF) Diameter solution instead of the legacy diameter (MBLB) profile.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1
1952729 : Certificates with explicitly defined EC parameters are treated as invalid in Common Criteria mode and TLS communication will be rejected.
Links to More Info: BT1952729
Component: TMOS
Symptoms:
In Common Criteria mode, BIG-IP accepts certificates with explicit EC parameters
Conditions:
1. BIG-IP is in Common Criteria (Common Criteria) mode
2. BIG-IP has ECC certificates as a Server and/or Clients/Servers interacting with BIG-IP sending ECC certificates with Explicit EC params.
Impact:
In Common Criteria mode, BIG-IP accepts certificates with explicit EC parameters and TLS connection is successful.
Workaround:
None
Fix:
Added fix to reject certificates with explicit defined EC params by BIG-IP.
Fixed Versions:
21.0.0, 17.5.1.2
1952657 : In FIPS-CC mode ECC Certificates with explicitly defined EC parameters are accepted
Links to More Info: BT1952657
Component: Local Traffic Manager
Symptoms:
BIG-IP accepts certificates with explicit EC parameters enabled while importing and handshakes will be successful.
Conditions:
1. BIG-IP is in CC (Common Criteria) mode
2. BIG-IP has ECC certificates as a Server and/or Clients/Servers interacting with BIG-IP sending ECC certificates with Explicit EC params
Impact:
BIG-IP improperly imports certificates with explicitly-defined EC params when running in Common Criteria mode.
Workaround:
None
Fix:
Added fix to reject certificates with explicit defined ec params by BIG-IP while importing
Fixed Versions:
21.0.0, 17.5.1.2
1952557 : DB monitor incorrectly marks pool member UP if recv string configured but no results from DB server
Links to More Info: BT1952557
Component: Local Traffic Manager
Symptoms:
A database monitor (mssql, mysql, oracle, postgresql) may incorrectly mark a pool member as UP if the monitor is configured with a 'recv' string, but the query configured in the 'send' string does not return any results from the database server.
In this case, the DB (database) monitor attempts to match the 'recv' string to the result set from the database server, and fails to mark an empty result set as a mismatch.
Conditions:
-- A DB (database) monitor (mssql, mysql, oracle, postgresql) is configured and applied to an LTM or GTM pool.
-- The DB monitor has a 'send' string configured with a query that does not return any results from the database server.
-- The DB monitor has a 'recv' string configured.
Impact:
Pool members may be incorrectly marked UP.
Workaround:
In the DB monitor configuration, modify the query in the 'send' to return a result that does not match the 'recv' string.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1
1937817 : CVE-2025-54500: A Particular HTTP/2 sequence may cause High CPU utilization [MadeYouReset]
Links to More Info: K000152001, BT1937817
1937777 : The client can resume a TLS session using psk_ke mode in the psk_key_exchange_modes extension.
Links to More Info: BT1937777
Component: Local Traffic Manager
Symptoms:
In TLS, the psk_key_exchange_modes extension in the Client Hello specifies the supported key exchange modes for resuming sessions with pre-shared keys (PSK).
As per Common Criteria guidelines, if client hello contains only psk_ke mode in the "psk_key_exchange_modes" extension then TLS handshake either (1) implicitly rejects the session ticket by performing a full handshake, or (2) terminates the TLS handshake to prevent the flow of application data.
Conditions:
In ClientHello, only psk_ke mode should be present in the "psk_key_exchange_modes" extension.
ClientHello should contain "pre_shared_key" extension too.
Impact:
TLS handshake will be successful with this configuration.
Workaround:
None
Fix:
Updated the code to perform full handshake if psk_ke mode present in the "psk_key_exchange_modes" extension.
Fixed Versions:
21.0.0, 17.5.1.2
1936421 : Core generated for autodosd daemon when synchronization process is terminated
Links to More Info: BT1936421
Component: Advanced Firewall Manager
Symptoms:
Autodosd cores on SIGSEGV.
Conditions:
-- AFM DoS vectors configured
-- This can occur during normal operation but the specific conditions that trigger it are unknown
Impact:
Autodosd is restarted, but up to 15 seconds of history may be lost.
Workaround:
None
Fix:
Fixed an autodosd crash.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1936233 : TMM mismanagement of IPsec connections can slowly leak memory and cause tunnel negotiation to fail
Links to More Info: BT1936233
Component: TMOS
Symptoms:
-- The BIG-IP cannot setup a specific IPsec tunnel.
-- The BIG-IP may eventually run out of memory, or core
Conditions:
-- IPsec IKEv2
-- Tunnel config changes, or tunnel never works from initial setup
Impact:
-- TMM may run out of memory after a very long time
-- TMM may core due to the leaked connections
Workaround:
None
Fix:
The connection leak will not happen.
Fixed Versions:
21.0.0, 17.5.1.2
1935833 : Tmm cores with "ERR: Attempting to send MPI message to ourself"
Links to More Info: BT1935833
Component: TMOS
Symptoms:
A TMM crash occurs, tmm_assert is triggered if an MPI message is sent to the same TMM (self).
Conditions:
New IPsec tunnel configured or deleted and High Availability config sync is started.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None.
Fix:
The crash no longer occurs.
Fixed Versions:
21.0.0, 17.5.1.2
1935053 : Impact of crypto queue limits on SSL handshake reliability
Links to More Info: BT1935053
Component: Local Traffic Manager
Symptoms:
SSL handshake failures triggered by sudden connection spikes and crypto queue saturation
Conditions:
1. Brief surge in SSL connection volume
2. Saturation of the crypto processing queue
Impact:
Degraded service availability due to SSL handshake disruptions
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1
1934865 : Remove multiple redundant entries for port-list objects in configuration file
Links to More Info: BT1934865
Component: Advanced Firewall Manager
Symptoms:
When a port-list object is created using TMSH, REST or GUI under any context, redundant entries for the same object are generated in the configuration file under three contexts:
net port-list
security firewall port-list
security shared-objects port-list
For example, a port-list created using one CLI results in multiple entries referring to the same schema object, such as:
net port-list /Common/portListExample {
ports {
80 { }
443 { }
}
}
security shared-objects port-list /Common/portListExample {
ports {
80 { }
443 { }
}
}
security firewall port-list /Common/portListExample {
ports {
80 { }
443 { }
}
}
This behaviour causes unnecessary duplication in the configuration file.
Conditions:
Creating a port-list object in any context results in the same object being added as three separate entries in the configuration file.
Ex: Using TMSH CLI configuration.
Redundant entries occur in the configuration file when:
A port-list object is created using any one of the following TMSH CLIs:
1. tmsh create net port-list
2. tmsh create security firewall port-list
3. tmsh create security shared-objects port-list
All three CLI commands point to the same object and record three separate entries in the configuration file.
Impact:
Redundant entries in the configuration file lead to:
1. Increased configuration file size unnecessarily.
2. Risk of user confusion during manual editing or review of configuration files.
This issue does not impact runtime functionality or object behaviour, but it introduces maintenance overhead when users interact with their configurations.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1
1934781 : In FIPS-CC mode ECC Certificates with explicitly defined EC parameters are accepted
Links to More Info: BT1934781
Component: Local Traffic Manager
Symptoms:
BIG-IP accepts certificates with explicit EC parameters enabled and handshakes will be successful.
Conditions:
1. BIG-IP is in CC (Common Criteria) mode
2. BIG-IP has ECC certificates as a Server and/or Clients/Servers interacting with BIG-IP sending ECC certificates with Explicit EC params
Impact:
BIG-IP improperly accepts certificates with explicitly-defined EC params when running in Common Criteria mode.
Workaround:
None
Fix:
Added fix to reject certificates with explicit defined ec params by BIG-IP
Fixed Versions:
21.0.0, 17.5.1.2
1934513 : Redefinition of xlink namespace leads to 'malformed document' violation
Links to More Info: BT1934513
Component: Application Security Manager
Symptoms:
An unexpected 'malformed document' violation is seen
Conditions:
- XML schema with redefined xlink namespace is set
- Request contains redefined xlink namespace
Impact:
False positive
Workaround:
None
Fix:
Redefinition of xlink namespace can be enabled through setting ASM internal variable 'allowXLINKRename' to 1
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1934493 : BIG-IP SFTP hardening
Links to More Info: K000151902, BT1934493
1934401 : iSeries HSB v5.26.8.0 firmware
Links to More Info: BT1934401
Component: TMOS
Symptoms:
iSeries HSB v5.26.8.0 firmware
Conditions:
iSeries i11000 series appliance
Impact:
Not applicable.
Workaround:
Not applicable.
Fix:
Fixes HSB bit-flip issues. See ID891333 for more information.
Fixed Versions:
21.0.0, 17.5.1
1934397 : SSL Orchestrator l2 inline monitor failure on r2000 or r4000 tenants
Links to More Info: BT1934397
Component: Local Traffic Manager
Symptoms:
SSL Orchestrator l2 inline monitors may not function correctly on r2000 or r4000 tenants.
Conditions:
-- SSL Orchestrator
-- l2 inline monitor
A traffic capture will show packets being egressed out one interface and not arriving at the other.
Impact:
The l2 inline service monitored via these interfaces will be marked down.
Workaround:
The issue is due to the MAC filter that is installed for every interface's MAC address. When the filter also matches a vlan MAC address this issue occurrs.
Compare the output of
tmsh show net interface all-properties
and
tmsh show net vlan
and make sure there is no MAC overlap. If there is, create some "dummy" vlans to move the overlap.
After creating dummy vlans, re-assign the MACs with the following command
tmsh modify ltm global-settings general share-single-mac global
tmsh modify ltm global-settings general share-single-mac unique
Fix:
We now provide a workaround to disable MAC filters via xnet_init.tcl
echo -e "drvcfg iavf uc_mac_filter 0\ndrvcfg iavf mc_mac_filter 0" >> /config/xnet_init.tcl
bigstart restart tmm
Fixed Versions:
21.0.0, 17.1.3
1934393 : iSeries HSB v5.9.14.0 firmware
Links to More Info: BT1934393
Component: TMOS
Symptoms:
iSeries HSB v5.9.14.0 firmware
Conditions:
iSeries i5000, i7000, or i10000 series appliance
Impact:
Not applicable.
Workaround:
Not applicable.
Fix:
Fixes HSB bit-flip issues. See ID891333 for more information.
Fixed Versions:
21.0.0, 17.5.1
1934385 : iSeries HSB v4.3.5.0 firmware
Links to More Info: BT1934385
Component: TMOS
Symptoms:
iSeries HSB v4.3.5.0 firmware
Conditions:
iSeries i2000 or i4000 series appliance
Impact:
Not applicable.
Workaround:
Not applicable.
Fix:
Fixes HSB bit-flip issues. See ID891333 for more information.
Fixed Versions:
21.0.0, 17.5.1
1934157 : Http2 monitor fails if a pool is used for routing to pool members
Links to More Info: BT1934157
Component: Local Traffic Manager
Symptoms:
Http2 monitoring reports all pool members as down
Conditions:
The TCP connection to the pool members are sent to the gateway instead of the pool members
Impact:
Http2 monitoring not possible
Workaround:
Use tcp monitoring or https if possible and acceptable.
Fixed Versions:
21.0.0
1933825 : High cpu usage by BD
Links to More Info: BT1933825
Component: Application Security Manager
Symptoms:
High cpu usage by BD
Conditions:
A specific condition leads BD to unnecessary high CPU
Impact:
High CPU
Workaround:
None
Fix:
BD no longer causes high CPU under the specific condition.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1930945-1 : [APM][KERBEROS][NTLM FALLBACK] Kerberos Authentication fails post-upgrade to v17.5.0/v17.5.1 — “Profile '/Common/kerberos_auth_config_default' was not found” and ECA Crashes★
Links to More Info: BT1930945
Component: Access Policy Manager
Symptoms:
1.ECA process continuously restarts (SIGSEGV/crash).
2. /var/log/apm contains errors indicating missing Kerberos config and NTLM fallback.
Conditions:
1. kerberos usecase
Impact:
1. Kerberos authentication fails, leading to unsuccessful proxy access for domain-joined users.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1
1928749 : TMM cores in rare circumstances
Links to More Info: BT1928749
Component: TMOS
Symptoms:
TMM cores in rare circumstances
Conditions:
Can occur after High Availability (HA) failover.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fix:
TMM crash prevented.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1928537 : Missing initial PKCS11d login state causes login failures on certain AWS CloudHSMs
Links to More Info: BT1928537
Component: Local Traffic Manager
Symptoms:
The PKCS11d daemon did not properly initialize the login state for each partition. It was previously assumed that a user was effectively “logged in” on startup, even though no explicit state indicated CKR_USER_NOT_LOGGED_IN.
This worked with older HSMs and earlier AWS CloudHSM SDK3 primarily because those libraries did not strictly require an explicit CKR_USER_NOT_LOGGED_IN state; they would either auto-login or return CKR_USER_ALREADY_LOGGED_IN in most cases.
However, newer AWS CloudHSM libraries (SDK5) and other current HSM vendors require a proper indication that the user is not logged in to handle re-login flows correctly.
Conditions:
Use SDK version 5 with BIG-IP.
Impact:
Key creation fails.
Workaround:
None
Fix:
- This fix is applied to all HSMs, not just AWS CloudHSM. Each partition starts in a well-defined, “not logged in” state. It only transitions to CKR_OK or CKR_USER_ALREADY_LOGGED_IN when the device confirms the user is authenticated.
- The change sets the hsm_partitions.array[slot].login_status = CKR_USER_NOT_LOGGED_IN during session/partition initialization.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1928437 : False traffic spikes in Throughput graphs
Links to More Info: BT1928437
Component: Local Traffic Manager
Symptoms:
Traffic spikes are observed in the TMM Client-side Throughput Client In and the Throughput Service graphs, but there is no actual traffic that accounts for them.
There is also record of this in the Sys::Global Traffic ClientSide Traffic Bits In and Packets In.
Conditions:
The BIG-IP frequently receives bursts of traffic for a new flow. Some examples:
- Several packets arrive for a new UDP flow.
- Several packets arrive for a non-existent TCP flow
Over time, the traffic counts build up and might all be accounted for at once resulting in a spike in the graphs.
Impact:
The issue is cosmetic, but might cause concern when reviewing the performance graphs.
Workaround:
None
Fixed Versions:
21.0.0, 17.1.3
1927513 : SIGSEGV TMM core ikev2_encrypt_packet_construct at iked/ikev2_packet.c:334
Links to More Info: BT1927513
Component: TMOS
Symptoms:
Crashes after many failovers when upgraded from 15.1.x to 17.1.x version.
Conditions:
Failover
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fix:
Use sys-db variable "ipsec.removeredundantsa" to avoid the crash.
Fixed Versions:
21.0.0, 17.5.1.2
1927225 : Vertical tab (u000b) is removed from the request by the JSON parser
Links to More Info: BT1927225
Component: Application Security Manager
Symptoms:
The JSON parser removes the vertical tab (\u00b) from the request, preventing attack signatures from matching and causing the request to be bypassed.
Conditions:
Attaching the JSON profile, send a request with a vertical tab (\u000b).
Impact:
Attack signatures are not matched to the SQL injection attack vector.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1927145 : A bd process crash on a specific scenario
Links to More Info: K000156621, BT1927145
1926989 : BIG-IP Virtual Edition: kswapd running constantly and consuming most of the CPU cycles of a core★
Links to More Info: BT1926989
Component: Local Traffic Manager
Symptoms:
After a new installation or after an upgrade to of a Virtual Edition to one of the affected versions, the 'kswapd' daemon runs constantly, consuming up to 100% of the cycles of a CPU core.
Swap use may be higher after upgrade.
Conditions:
- installation of a new BIG-IP Virtual Edition
or
- upgrade of a BIG-IP Virtual Edition to one of the affected versions
Impact:
A CPU core constantly consuming most of its CPU cycles.
General slowness of the system.
Swap use may be higher after upgrade.
Workaround:
If the problem is present after a TMOS upgrade:
- check what was the value of vm.min_free_kbytes before the upgrade by booting back in the previous volume
- set the same value in the new volume with the command:
# sysctl -w vm.min_free_kbytes=<VALUE>
No reboot or tmm restart is needed.
If the Virtual Edition is a fresh install:
- set the vm.min_free_kbytes value to 24141
# sysctl -w vm.min_free_kbytes=24141
No reboot or tmm restart is needed.
You may need to follow the "Additional Information" section in https://my.f5.com/manage/s/article/K000150960 to ensure that the changes persist after a reboot.
Fix:
Vm.min_free_kbytes is given the correct value.
Fixed Versions:
21.0.0, 17.5.1
1926885-1 : [APM] URL DB mismatch error for Religion categories in the upgrade★
Links to More Info: BT1926885
Component: Access Policy Manager
Symptoms:
Error messages in /var/log/apm
"The requested URL Category (/Common/Lesser-Known_Religions) was not found."
"The requested URL Category (/Common/Widely-Known_Religions) was not found."
Conditions:
APM provisions and SWG database downloads enabled.
Impact:
Upgrades fails with below error:
There were warnings:
Category name changed from /Common/Lesser_Known_Religions to in allowed categories of url filter /Common/test_filter
Category name changed from /Common/Widely_Known_Religions to in allowed categories of url filter /Common/test_filter
Compliance '/Common/gtp_unknown_tunnel_id' is deprecated and removed from '/Common/protocol_inspection'.
Compliance '/Common/smtp_command_length_overflow' is deprecated and removed from '/Common/protocol_inspection'.
01070734:3: Configuration error: In url-filter (/Common/<filter>), allowed-category () does not exist. In url-filter (/Common/<filter>), allowed-category () does not exist.
Unexpected Error: Loading configuration process failed.
Workaround:
Edit the respective categories before upgrading to the latest version.
1. Edit bigip.conf
2. Look for the respective failure filter name and change the
Lesser_Known_Religions to Lesser-Known_Religions and
Widely_Known_Religions to Widely-Known_Religions
3. Save the file
4. Update the configuration using tmsh save/load sys config
Fix:
Corrected category names in the configuration to address upgrade failures from older versions to 17.5.x caused by mismatches. The handling is implemented in the fixup script, which is triggered when a URL Filter is configured.
Fixed Versions:
21.0.0, 17.5.1
1926141-2 : kernel: possible out of bounds write in kbd_keycode of keyboard.c
Component: TMOS
Symptoms:
In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-144161459
Conditions:
NA
Impact:
Attacker can cause denial of service and take the system down
Workaround:
Allow access to only trusted users
Fix:
Patched kernel to fix the vulnerability
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1925837-2 : CVE-2018-18508 nss: NULL pointer dereference in several CMS functions resulting in a denial of service
Component: TMOS
Symptoms:
In Network Security Services (NSS) before 3.36.7 and before 3.41.1, a malformed signature can cause a crash due to a null dereference, resulting in a Denial of Service.
Conditions:
NSS version before 3.36.7 and before 3.41.1
Impact:
Exploitation could cause the system to become unavailable (DoS).
Workaround:
NA
Fix:
Patched nss to fix the vulnerability.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1925349-2 : kernel: fs/quota/quota_tree.c does not validate the block number in the quota tree
Component: TMOS
Symptoms:
In the Linux kernel before 5.15.3, fs/quota/quota_tree.c does not validate the block number in the quota tree (on disk). This can, for example, lead to a kernel/locking/rwsem.c use-after-free if there is a corrupted quota file.
Conditions:
NA
Impact:
High impact on system availability
Workaround:
Give access to trusted users only.
Fix:
Patched kernel to fix the vulnerability
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1925037-2 : Kernel: denial of service in atm_tc_enqueue in net/sched/sch_atm.c due to type confusion
Component: TMOS
Symptoms:
atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).
Conditions:
NA
Impact:
Attacker can cause denial of service and take the system down
Workaround:
Allow access to only trusted users
Fix:
Patched kernel to fix the vulnerability
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1925033-2 : kernel: slab-out-of-bounds read vulnerabilities in cbq_classify
Component: TMOS
Symptoms:
cbq_classify in net/sched/sch_cbq.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service (slab-out-of-bounds read) because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).
Conditions:
NA
Impact:
Attacker can cause denial of service and take the system down
Workaround:
Allow access to only trusted users
Fix:
Patched kernel to fix the vulnerability
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1924981-2 : kernel: Out-of-bounds access in write_extent_buffer() when mounting and operating a crafted btrfs image
Component: TMOS
Symptoms:
An issue was discovered in the Linux kernel through 4.17.10. There is out-of-bounds access in write_extent_buffer() when mounting and operating a crafted btrfs image, because of a lack of verification that each block group has a corresponding chunk at mount time, within btrfs_read_block_groups in fs/btrfs/extent-tree.c.
Conditions:
NA
Impact:
Attacker can cause denial of service and take the system down
Workaround:
Allow access to only trusted users
Fix:
Patched kernel to fix the vulnerability
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1924977-2 : kernel: Invalid pointer dereference in fs/btrfs/relocation.c:__del_reloc_root() when mounting crafted btrfs image
Component: TMOS
Symptoms:
An issue was discovered in the Linux kernel through 4.17.10. There is an invalid pointer dereference in __del_reloc_root() in fs/btrfs/relocation.c when mounting a crafted btrfs image, related to removing reloc rb_trees when reloc control has not been initialized.
Conditions:
NA
Impact:
Attacker can cause denial of service and take the system down
Workaround:
Allow access to only trusted users
Fix:
Patched kernel to fix the vulnerability
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1924801-2 : grub2: Heap out-of-bounds write in short form option parser
Component: TMOS
Symptoms:
A flaw was found in grub2 in versions prior to 2.06. The option parser allows an attacker to write past the end of a heap-allocated buffer by calling certain commands with a large number of specific short forms of options. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Conditions:
NA
Impact:
The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Workaround:
Ensure bootloader is not exposed to shell or remote control: BIG-IP TMOS by default does not expose GRUB menu to remote users
Functional Impact: Potential DOS
Fix:
Patched grub2 to fix the vulnerability
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1923693-2 : kernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race
Component: TMOS
Symptoms:
A use-after-free flaw was found in vcs_read in drivers/tty/vt/vc_screen.c in vc_screen in the Linux Kernel. This issue may allow an attacker with local user access to cause a system crash or leak internal kernel information.
Conditions:
NA
Impact:
High impact on the confidentiality and availability of BIGIP
Workaround:
Give access to trusted users.
Fix:
Patched kernel to fix the vulnerability
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1923665-2 : kernel: Integer overflow in function rndis_query_oid of rndis_wlan.c
Component: TMOS
Symptoms:
In rndis_query_oid in drivers/net/wireless/rndis_wlan.c in the Linux kernel through 6.1.5, there is an integer overflow in an addition.
Conditions:
NA
Impact:
Attacker can cause denial of service and take the system down
Workaround:
Allow access to only trusted users
Fix:
Patched kernel to fix the vulnerability
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1923605-2 : kernel: Salsa20 encryption algorithm does not correctly handle zero-length inputs allowing local attackers to cause denial-of-service
Component: TMOS
Symptoms:
The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable.
Conditions:
NA
Impact:
Attacker can cause denial of service and take the system down
Workaround:
Allow access to only trusted users
Fix:
Patched kernel to fix the vulnerability
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1922525 : BIG-IP SCP hardening
Links to More Info: K000151902, BT1922525
1922501 : TMM crash loop due to missing kernel driver★
Links to More Info: BT1922501
Component: TMOS
Symptoms:
TMM goes into a crash loop with following logs in 'tmm' logs
notice EAL: Driver cannot attach the device (<VMBus-ID>)
notice EAL: Failed to attach device on primary process
notice dpdk[<VMBus-ID>]: Error: rte_dev_probe failed: err=-95
notice xnet_lib [vmbus:eth2]: Error: Failed to initialize driver
notice xnet[00:e2.0]: Error: Unable to attach to xnet dev
This is due to missing uio_hv_generic kernel module which gets removed on TMM shutdown but fails to be re-inserted upon TMM post-crash restart.
Conditions:
1) BIG-IP on HyperV or Azure
2) Using xnet-DPDK driver
3) TMM crashes due to any other reason and restarts; can not repro directly using 'bigstart restart tmm' unless a 'bigstart restart' also reproduces the initial crash as well
Impact:
Traffic disrupted while tmm restarts.
Workaround:
(A)
1) Add 'modprobe uio_hv_generic' to '/usr/lib/bigstart/functions'
This will likely require remounting /usr to allow writing; this can be done via
sudo mount -o remount,rw /usr
2) Within 'functions', search for 'vadc_restore_vmbus_nics()' and add 'modprobe uio_hv_generic' to bottom of function after 'done'
3) Afterwards, restart TMM with 'bigstart restart tmm'
(B)
1) Switch to 'sock' driver by adding following config
[root@BIGIP:Active:Standalone] config # cat /config/tmm_init.tcl
device driver vendor_dev f5f5:f550 sock
[root@BIGIP:Active:Standalone] config #
2) Restart TMM with 'bigstart restart tmm'
Fix:
Re-activate missing module after TMM crash
Fixed Versions:
21.0.0, 17.5.1
1921069 : The error ERR_ARG occurs when using iRule HTTP::collect command without the parameter value in HTTP_REQUEST_DATA
Links to More Info: BT1921069
Component: Local Traffic Manager
Symptoms:
The iRule HTTP::collect command without the parameter value in HTTP_REQUEST_DATA returns an error.
Conditions:
The error occurs when the HTTP::collect does not have any value.
Impact:
The iRule fails with ERR_ARG error.
Workaround:
Always enter value to HTTP::collect. Refer HTTP::collect iRule command page, https://clouddocs.f5.com/api/irules/HTTP__collect.html.
This workaround will depend on the specific iRule being used.
Fixed Versions:
21.0.0
1921049 : When L7 policy is updated, existing HTTP/2 connection using it gets a RST_STREAM
Links to More Info: BT1921049
Component: Local Traffic Manager
Symptoms:
HTTP/2 connections sometimes get a RST_STREAM
Conditions:
L7 policy that is being used by HTTP/2 connections is updated or changed.
Impact:
Lost of connectivity on a HTTP/2 stream.
Workaround:
Avoid updating L7 Policy while Http/2 connections are active.
Fix:
HTTP/2 connections are no longer affected
Fixed Versions:
21.0.0
1920341 : SSH Public Key authentication allows RSA and not ECDSA in ccmode
Links to More Info: BT1920341
Component: TMOS
Symptoms:
When a device is in common criteria mode, you cannot use ecdsa-sha2-nistp256 or ecdsa-sha2-nistp384 for SSH public key authentication. Additionally, you can use rsa key which you should not be able to according to common criteria guidelines.
Conditions:
-- Common Criteria mode is enabled
Impact:
You cannot ssh with ECDSA but can with RSA key
Workaround:
Workaround is in file /config/ssh/sshd_config, on line 34 replace:
HostKey /config/ssh/ssh_host_rsa_key
with:
HostKey /config/ssh/ssh_host_ecdsa_key
HostKey /config/ssh/ssh_host_ecdsa_p384_key
Note that this workaround must be applied after each reboot in ccmode, since the sshd_config file will revert after reboot.
Fix:
SSH public key authentication works as expected in ccmode.
Fixed Versions:
21.0.0, 17.5.1
1920097 : Allow bad actor threshold below 0.1%
Links to More Info: BT1920097
Component: Advanced Firewall Manager
Symptoms:
When configuring AFM DoS vector protections, the bad actor threshold cannot be set below 0.1% for the configured DoS vector rate threshold. This restriction may prevent users from tailoring thresholds for large-scale environments with high user volume and low per-user traffic.
Conditions:
AFM DoS Profile with per-source (bad actor) detection enabled.
Bad actor threshold configured less than 0.1% for vector rate threshold.
Impact:
Prevents deployment of granular bad actor detection in high-scale environments where per-source traffic is significantly lower than 0.1% of the total DoS vector threshold. This impacts the ability to accurately detect and mitigate abusive sources without affecting normal user behaviour.
Workaround:
None
Fix:
Reduced bad actor threshold enforcement to allow configuration below 0.1% for the vector threshold (up to 0.01%), enabling finer-grained control over source detection in large-scale deployments.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1920057 : Bd crashes
Links to More Info: K000154664, BT1920057
1917741 : [APM][TMM] memory growth in SAML SP while decoding assertion attributes
Links to More Info: BT1917741
Component: Access Policy Manager
Symptoms:
Tmm crashes due to out of memory while passing SAML traffic
Conditions:
-- SAML SP configured with assertion attributes.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1
1893361-2 : CVE-2021-3177 python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c
Links to More Info: K000133761
1893141-2 : CVE-2020-26137 in Library:python, Installed:2.7.5-58.el7.0.0.14.i686, FixVersion:2.7.5-92.el7_9 and others, on HostOS: CentOS Security Update for python
Links to More Info: K000133547
1892025-2 : CVE-2019-11236 python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service
Links to More Info: K000135001
1891817-3 : CVE-2018-18521 elfutils: Divide-by-zero in arlib_add_symbols function in arlib.c
Links to More Info: K21426934
1891813-3 : CVE-2018-18520 elfutils: eu-size cannot handle recursive ar files
Links to More Info: K21426934
1891805-3 : CVE-2018-18310 elfutils: invalid memory address dereference was discovered in dwfl_segment_report_module.c in libdwfl
Links to More Info: K21426934
1891745-3 : CVE-2018-16403 elfutils: Heap-based buffer over-read in libdw/dwarf_getabbrev.c and libwd/dwarf_hasattr.c causes crash
Component: TMOS
Symptoms:
libdw in elfutils 0.173 checks the end of the attributes list incorrectly in dwarf_getabbrev in dwarf_getabbrev.c and dwarf_hasattr in dwarf_hasattr.c, leading to a heap-based buffer over-read and an application crash.
Conditions:
elfutils version prior to 0.174
Impact:
Exploitation could cause the system to become unavailable (DoS).
Workaround:
NA
Fix:
Patched elfutils to fix the vulnerability.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1891673-3 : CVE-2018-14404 libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c
Links to More Info: K76678525
1891361-3 : CVE-2015-8035 libxml2: DoS caused by incorrect error detection during XZ decompression
Links to More Info: K76678525
1889349 : Crash during handling ePVA metadata
Links to More Info: K000156707, BT1889349
1881373 : CVE-2024-3661 Tunnelvision Vulnerability
Links to More Info: K000139553, BT1881373
1881145-2 : Change log level of PPP TunnelStats log messages to debug level
Links to More Info: BT1881145
Component: Access Policy Manager
Symptoms:
Presently PPP Tunnel Stats logs are in log level Notice.
Conditions:
Enable APM logs to Notice and establish VPN session. When disconnect VPN session user will see these logs.
Impact:
Lot of logs are seen in Notice level which are needed only for additional debugging.
Workaround:
None
Fix:
After changing log level to debug user should see less logs in APM log file.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1
1880365 : Cannot log into Fs_v2 Azure BIG-IP with >= 32 vCPUs and >= 5 interfaces
Links to More Info: BT1880365
Component: TMOS
Symptoms:
No login prompt is available to access Azure Fs_v2 instances when attaching 5 or more instances. 8 is the max number of interfaces for F32_v2 or larger.
Conditions:
-- Use Azure F32_v2 instance size or larger.
-- Attach 5 or more interfaces to BIG-IP.
Impact:
No access to F32_v2 instances or larger when attaching 5 or more interfaces.
Workaround:
None
Fix:
Login prompt is available.
Fixed Versions:
21.0.0, 17.5.1
1874825 : Specific IPsec traffic might trigger a tmm crash
Links to More Info: K000156746, BT1874825
1857413 : Malformed XML data or Malformed JSON data violation raised despite URL containing content-profile
Links to More Info: BT1857413
Component: Application Security Manager
Symptoms:
* XML/JSON traffic gets flagged or blocked with a Malformed XML data or Malformed JSON data violation despite the URL having a content-profile associated with it.
* When the violation gets raised, the violation details lists the profile as "N/A".
* The XML/JSON content profiles are visible when viewing the content profile configuration via WebUI. However, corresponding database tables lose integrity, which results false positive.
Conditions:
Any change followed by 'Apply Policy' on a policy can ruin the integrity of corresponding database that might affect other policies, and false positive would start after subsequent 'Apply Policy' or global configuration update.
Impact:
XML/JSON traffic gets flagged or, if enforced, blocked despite the content profile associated to the URL.
Workaround:
Make a spurious policy change to the affected XML or JSON profile (e.g., updating its Description), followed by applying policy changes via 'Apply Policy,'
This helps resolve the issue by populating a new entry in the database table for this policy.
Avoid making any change on any GraphQL profile to prevent it from re-occurring.
Fix:
Configuration change will not ruin the integrity of the database tables.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1856449 : [keymgmtd]OpenSSL: DRBG Continuous RNG test failed: DRBG stuck.
Links to More Info: BT1856449
Component: TMOS
Symptoms:
You may observe below logs in /var/log/ltm
err keymgmtd[31381]: OpenSSL: DRBG Continuous RNG test failed: DRBG stuck.
err fips_monitor[18007]: 01da0011:3: SelfTest/Integrity test failure detected, triggering reboot action
Conditions:
Conditions are unknown
Impact:
Unexpected reboot causing disruption to traffic and failover.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.2
1856289 : Virtual server, which is managed by remote LTM device, is shown as "offline/enabled" with "Monitor /Common/bigip : no reply from big3d: timed out" message (red diamond icon).
Links to More Info: BT1856289
Component: Global Traffic Manager (DNS)
Symptoms:
When a virtual server object, which is managed by a remote LTM device, is disabled, after gtmd is restarted (or GTM/DNS device reboot) and gtmd becomes online and iQuery communication is re-established with the remote LTM device, the bellow message is logged to /var/log/gtm and virtual server status becomes "offline/disabled" (black diamond icon).
gtmd[xxxx]: 011ae0f2:1: Monitor instance /Common/bigip 10.1.1.201:80 CHECKING --> DOWN from /Common/bigipdns (no reply from big3d: timed out)
gtmd[xxxx]: 011a6006:1: SNMP_TRAP: virtual server /Common/vs1 (ip:port=10.1.1.201:80) (Server /Common/bigipltm) state change blue --> red ( Monitor /Common/bigip : no reply from big3d: timed out: disabled directly)
Then, even after re-enabling the virtual server, which is managed by LTM, virtual server stays as "offline/enabled" (red diamond icon) with "Monitor /Common/bigip : no reply from big3d: timed out" message.
----------------------------------
| Gtm::Virtual Server: vs1
----------------------------------
| Status
| Availability : offline
| State : enabled
| Reason : Monitor /Common/bigip : no reply from big3d: timed out
| Destination : 10.1.1.201:80
| Up Time : ---
Conditions:
All of the following conditions met.
- GTM/DNS device manages remote LTM device and its virtual server.
- Remote LTM virtual server is not directly monitored by GTM/DNS device monitor object. Instead, remote LTM virtual server is monitored by remote LTM device itself (e.g., on remote LTM device, virtual server pool is monitored by pool monitor).
- On GTM/DNS device, disable and re-enable virtual server, which is managed by remote LTM device.
- After virtual server is disabled on GTM/DNS device, gtmd restart on GTM/DNS device or GTM/DNS device reboots.
- GTM/DNS is running on a software versions 17.1.1 or 16.1.5 or later versions in which the ID 1133201 is fixed.
Impact:
Virtual server stays as unavailable despite the remote LTM device reporting virtual server status as 'up'. Hence, pool or wideIP, which uses the affected server object, may be unavailable too.
Workaround:
If issue had already occurred and virtual server stayed as "offline/enabled" (red diamond icon), restarting gtmd on GTM/DNS device will rescue the affected virtual server.
If issue does not yet occur but virtual server is going to be disabled and re-enabled, you can prevent issue by changing "DNS >> Settings : GSLB : General - Monitor Disabled Objects" setting (gtm global-settings general monitor-disabled-objects) to "yes" (default "no"). This needs to be done prior to disabling virtual server (prior to gtmd restart/reboot).
# tmsh modify gtm global-settings general monitor-disabled-objects yes
# tmsh save sys config gtm-only
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1856285 : [APM]mdmsyncmgr core is observed very intermittently
Links to More Info: BT1856285
Component: Access Policy Manager
Symptoms:
Mdmsyncmgr process cores
Conditions:
MDM usecase in APM Network Access
Impact:
Unable to use MDM
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1
1854297 : With DNS64 enabled, AAAA NXDomain responses are passed directly to the client.
Component: Global Traffic Manager (DNS)
Symptoms:
According to DNS64 RFC6147, AAAA NXDomain responses should be passed directly to the client without generating an A query. Authoritative name servers should not return NXDomain for the AAAA query when an A resource record exists for the same domain name. When misconfigured authoritative name server return NXDomain for the AAAA query when an A resource record exists, proper DNS64 operation is prevented.
Conditions:
- DNS64 is configured.
- The authoritative server is misconfigured to return NXDomain to the AAAA query even though an A resource record exists.
Impact:
DNS64 does not work properly due to a misconfigured authoritative name server.
Workaround:
None
Fix:
New DB variable, DNS.DNS64NXDomainAsNoError, controls DNS64 handling of AAAA NXDomain errors. When enabled, NXDomain errors, like other errors, are treated like NoError and an A query is issued. The default, disabled, follows RFC6147 and returns the NXDomain error immediately to the client.
Fixed Versions:
21.0.0
1853721 : User has reached maximum active login tokens
Links to More Info: BT1853721
Component: TMOS
Symptoms:
You are unable to create any new tokens for a user.
Conditions:
To reproduce the issue, create 100 active tokens for non admin user and reboot device
-- 100 active tokens already exist for a non-admin user
-- The system is rebooted
Impact:
You are unable to create any new tokens for the user.
An error is reported: "User has reached maximum active login tokens"
Workaround:
Execute below command
restcurl -X DELETE /shared/authz/tokens
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1849585 : A correctly encoded long Authorization param triggers 'illegal base64 value' vaiolation
Links to More Info: BT1849585
Component: Application Security Manager
Symptoms:
A correctly encoded base64 string that is over 8192 triggers 'illegal base64 value' violation
Conditions:
Authorization param is longer than 8192 chars
Impact:
False positive with 'illegal base64 value'
Workaround:
Disable the violation
Fix:
Introduced a new BD internal max_header_length. Default is 8192 that is the same value as it was. If you want to let ASM handling auth-param longer than 8192, set larger value than the auth-param with this internal.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1826393 : TMM may restart under certain conditions
Links to More Info: K000151475, BT1826393
1826185 : Tenants on r2000 and r4000 series may drop packets larger than 9194 bytes
Links to More Info: BT1826185
Component: Local Traffic Manager
Symptoms:
F5OS tenants have a supported maximum MTU of 9198 bytes as per K6399. Tenants running on 2000 and r4000 series may drop packets larger than 9194 bytes.
The tmm/xnet/iavf/per_vf_stats.rx_discards stat increments when this occurrs.
Conditions:
R2000 or r4000 platform.
Jumbo frames
Impact:
Dropped jumbo frames
Workaround:
Lower the MTU such that packets are not exceeding 9194 bytes.
Fixed Versions:
21.0.0, 17.5.1.2
1826013-2 : BIG-IP as Oauth C/RS "Invalid json error" after upgrade to 17.1.2.1 when json response has non ASCII characters★
Links to More Info: K000150397, BT1826013
Component: Access Policy Manager
Symptoms:
OAuth authentication fails with error error: Invalid json on oauth client/RS
Conditions:
OAuth client/RS receives JWT token which contains non-ASCII characters
Impact:
OAuth authentication fails
Workaround:
None
Fix:
17.1.2.1 code has libjson:isvalid() to check if the json is valid or not. this function cannot validate non ASCII characters and returns error. removed this function and added logic to check if valid json is received or not.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1825949-5 : [APM][Radius] Message-Authenticator value is incorrect for OTP request
Links to More Info: BT1825949
Component: Access Policy Manager
Symptoms:
When a OTP challenge is requested on RSA, the Message-Authenticator value in the second request is not corrected/alarmed by the RSA server.
Eventually the packet is dropped at the Radius Server.
Conditions:
The Message-Authenticator attribute radius.messageauthenticator is set to true.
Impact:
This causes authentication failures, disrupting the user’s access control process.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8
1825901 : CVE-2015-6748 jsoup: XSS vulnerability related to incomplete tags at EOF
Links to More Info: K000150762, BT1825901
1825513-2 : ClientSSL profile with PQC group may cause TMM to crash
Links to More Info: BT1825513
Component: Local Traffic Manager
Symptoms:
TMM or system services may restart unexpectedly due to memory pressure.
In /var/log/tmm:
warning tmm[24255]: 01260013:4: SSL Handshake failed for TCP 10.20.2.115:44404 -> 10.20.40.191:443
err tmm[24255]: 01230140:3: RST sent from 10.20.40.191:443 to 10.20.2.115:44404, [0x3076761:2571] SSL handshake timeout exceeded
err tmm3[24255]: 01010282:3: Crypto codec error: sw_crypto-3 RSA private encrypt error OpenSSL error:03078069:bignum routines:BN_EXPAND_INTERNAL:expand on static bignum data
err tmm2[24255]: 01010282:3: Per-invocation log rate exceeded; throttling.
err tmm6[24255]: 01010282:3: Resuming log processing at this invocation; held 53 messages.
Conditions:
Cipher rule DH group X25519KYBER768 is enabled.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
There is no workaround, disable X25519KYBER768 to mitigate the issue.
Fix:
Fix memory issues.
Fixed Versions:
21.0.0, 17.5.1
1825449-1 : Citrix Optimal Gateway Routing is not showing login username of session
Links to More Info: BT1825449
Component: Access Policy Manager
Symptoms:
When an iRule-based solution for optimal gateway routing is used for Citrix VDI, the currently logged-in username will not be displayed on the GUI session details page.
Conditions:
- APM Citrix VDI OGR is implemented with an iRule workaround.
- When the user checks the last logged-in username in the GUI.
Impact:
Username column displays empty instead of username.
Workaround:
None
Fix:
The Username column should display the name of the user currently logged in for the session.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1825253-2 : Enhance the log message for better readability User session was terminated due to IP address change during session
Links to More Info: BT1825253
Component: Access Policy Manager
Symptoms:
Users experience an unexpected termination of their session when the IP address changes during the active session. So the log message was improved for better readability.
Conditions:
This issue is observed when there is a network change, such as:
-- Switching from WIFI to mobile data.
-- VPN IP address change.
-- IP address reassignment due to DHCP lease renewal.
Impact:
Users are abruptly logged out, resulting in lost session data or work in progress. This can cause delays and interruptions in workflows, especially in environments that require continuous access.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1825241-3 : MCPD validation fails when non-existent cipher group is referenced by SSL profile
Links to More Info: BT1825241
Component: Local Traffic Manager
Symptoms:
When using "tmsh load sys config verify" or performing an MCPD forceload/reboot, no validation error is reported for a SSL profile referencing a non-existent cipher group. This is unexpected behavior.
However, when using "tmsh load sys config", the system correctly identifies and reports the missing cipher group as a validation error. This is the expected behavior.
Conditions:
The disk config file (/config/bigip.conf) is missing the cipher group configuration, while that cipher group continues to be referenced within a SSL profile.
Impact:
When a SSL profile references a non-existent cipher group, the configuration loads without validation errors under certain conditions. This can result in connection failures with error messages such as:
Connection error: hud_ssl_handler:1315: alert(40) invalid profile unknown on VIP <VIP_NAME>
Workaround:
Ensure the disk config file (/config/bigip.conf) always has the cipher group present if it is being referenced by a Client or Server SSL profile.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8
1824037-1 : IPS profile using engine after free
Links to More Info: BT1824037
Component: Protocol Inspection
Symptoms:
crashes while passing IPS traffic.
Conditions:
-- IPS license applied to BIG-IP
-- IPS profile attached to a virtual server
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fix:
Fixed a tmm crash related to IPS.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3, 16.1.6.1
1824009 : When DNS64 is enabled, resolver cache passes SERVFAIL responses to the client
Links to More Info: BT1824009
Component: Global Traffic Manager (DNS)
Symptoms:
When a DNS profile is configured with both Secondary DNS64 (with a prefix) and a resolver cache, any response from an authoritative server to a AAAA query with RCODEs such as SERVFAIL or SERVFAIL(Timeout due to no response from external resolver), FORMERR, NOTIMP, REFUSED, YXRRSET, NXRRSET, YXDOMAIN , NOTAUTH, or NOTZONE will be cached as SERVFAIL and sent directly to the client.
Conditions:
- DNS64 enabled in the DNS profile
- DNS resolver cache configured
Impact:
SERVFAIL response is directly send back to the client
Workaround:
None
Fix:
When a DNS profile is configured with both Secondary DNS64 (and Prefix) and a resolver cache, a response from an authoritative server of SERVFAIL to a AAAA query now triggers an A query back to the authoritative server. The response is then Synthetized and cached before the AAAA response is sent back to the client.
Two counters have been added to the dns_cache_resolver_stat stat table available through tmctl. mesh.dns64error counts the number of non-zero rcode responses from the authoritative server for both the AAAA and A queries. mesh.dns64timeout counts the number of timeouts from the authoritative server for both the AAAA and A queries.
Fixed Versions:
21.0.0
1821373 : SAML Assertion Handling issue in APM SSO
Links to More Info: BT1821373
Component: Access Policy Manager
Symptoms:
When attributes with large encrypted values are present, the allocated memory may not be appropriately resized, leading to unexpected behavior, or tmm may crash.
Conditions:
This occurs specifically under configurations that utilize SAML with encrypted attributes containing large values.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fix:
SAML Assertion Handling issue in APM SSO has been addressed.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1821089 : DNS64 and resolver cache may not function together as expected
Links to More Info: BT1821089
Component: Global Traffic Manager (DNS)
Symptoms:
Wirth DNS64 enabled and also a resolver cache, the first AAAA query for a name that has only an A record and no AAAA record is correctly translated to the configured prefix. However, subsequent queries return only NOERROR to the client instead of the AAAA response.
Conditions:
-- DNS64 enabled with resolver cache
-- AAAA queries
Impact:
Subsequent queries return NOERROR and no record responses
Workaround:
None
Fixed Versions:
21.0.0
1821033 : Assertion "packet must already have an ethernet header" when using tcpdump
Links to More Info: BT1821033
Component: Local Traffic Manager
Symptoms:
Tmm crashes when running tcpdump.
Conditions:
1. A virtual server references another virtual server with an iRule
2. The destination virtual server has an iRule with reject inside FLOW_INIT
3. Use tcpdump while hitting the reject rule
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Use either remote tcpdump or avoid using reject rule in FLOW_INIT.
Fix:
Tmm no longer crashes in this scenario.
Fixed Versions:
21.0.0, 17.5.1
1820833-2 : General Database Error when creating a new profile
Links to More Info: BT1820833
Component: Bot Defense
Symptoms:
When creating a custom bot defense profile, after clicking Finished an error occurs: "General Database Error"
Conditions:
-- Creating a custom mobile bot defense profile
-- The profile enables mobile endpoints
-- The parent profile has been modified
Impact:
The profile is not created and a General Database Error is reported.
Workaround:
None
Fix:
The code has been adjusted to retrieve failure response codes from the custom profile rather than the parent profile
Fixed Versions:
21.0.0
1820581 : The handshake failure reasons are not printed in the logs for ServerSSL profile
Component: Local Traffic Manager
Symptoms:
There is no information related to the handshake failure printed in the logs.
Ex:
info tmm[16212]: 01260013:6: SSL Handshake failed for TCP 10.89.179.1:6514 -> 10.89.218.1:20787
Conditions:
This can be seen in the basic serverssl profile configuration.
Impact:
No functional impact. This is additional information that enables to identify the reason for the handshake failure.
Workaround:
None
Fix:
The reason of the handshake Failure is added in the logs for the serverssl profile.
Fixed Versions:
21.0.0
1819813-1 : [APM][NTLM]TMM core on null _ntlm_msg on 17.1.x on top of ID1495381
Links to More Info: BT1819813
Component: Access Policy Manager
Symptoms:
Tmm cores while APM looks up a session.
Conditions:
SWG explicit forward proxy or PRP with NTLM or Kerberos or LDAP credentials identification method.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1819777-2 : In-tmm TCP monitor with no RCV and RCVdisable string might lead to a crash
Links to More Info: BT1819777
Component: In-tmm monitors
Symptoms:
In-tmm TCP monitor with no RCV and RCVdisable string might lead to a crash.
Conditions:
This happens when TCP in-tmm monitor is configured without any matching disable/enable string
ltm monitor tcp TCP {
adaptive disabled
defaults-from tcp
interval 5
ip-dscp 0
recv none <<<< !
recv-disable none <<<< !
send "GET /check HTTP/1.0\r\n\r\n"
time-until-up 0
timeout 16
}
Bigd monitoring is not affected.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
- Disable in-tmm monitoring.
- OR, configure in-tmm TCP monitor with any string match.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1819721-2 : LSN failed events details are ambiguous
Links to More Info: BT1819721
Component: Carrier-Grade NAT
Symptoms:
When an LSN translation failure occurs, the logs show ""NAPT - Translation failed" which does not give enough details to narrow down potential root causes.
Conditions:
A LSN translation failure occurs
Impact:
Narrowing down potential root causes of the failure may be difficult.
Workaround:
None
Fixed Versions:
21.0.0
1818461 : [APM][VPN][WIN] Tunnel can't be established if endpoint inspection is Skipped. Machine Hash is not maching★
Links to More Info: BT1818461
Component: Access Policy Manager
Symptoms:
Because of selecting Skip Inspection button during EPI launch, it leads to in-correct machine hash and VPN connection is failed with below errors.
err tmm1[18549]: 01230140:3: RST sent from 10.103.xx.xx:443 to 10.103.xx.xx:64086, [0x2ff9084:34740] Machine Hash is not Valid
tmm1[18549]: 01230140:3: RST sent from 10.103.xx.xx:443 to 10.103.xx.xx:64123, [0x2ff9084:4239] Access encountered an error (Operation not supported)
Conditions:
-- Endpoint inspection is enabled in access policy, add Advanced resources assignment for fallback branch and end with allow
-- Launch endpoint inspection, select Skip Inspection instead of Start Inspection
If you are upgrading, this can be encountered after upgrading to version 17.1.2 and APM client (7250 or 7251).
Impact:
TCP connection reset is encountered and VPN connection fails.
Workaround:
Instead of Skip Inspection, select Start Inspection
(Or)
Don't configure any EPI check in Access policy
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1814821 : DHE groups present in profile's cipherlist with TLS1.3 enabled and tmm.ssl.useffdhe set to false simultaneously
Links to More Info: BT1814821
Component: Local Traffic Manager
Symptoms:
You might observe CRIT-level logs of configuration issues in the TMM logs but there is no impact to the traffic. Example log message:
crit tmm4[17746]: 01260000:2: Profile /Common/serverssl-secure: DHE groups present in profile's cipherlist with TLS1.3 enabled and tmm.ssl.useffdhe set to false simultaneously.
Conditions:
1. The db variable tmm.ssl.useffdhe set to false
2. Virtual server configured to use DH groups
Impact:
Crit-level logs are logged to /var/log/tmm
Workaround:
Leave the tmm.ssl.useffdhe value to default which is true
Fixed Versions:
21.0.0, 17.5.1
1814477 : AWS Performance Drop from BIG-IP v17.1.2.1 to v17.5.0
Links to More Info: BT1814477
Component: Performance
Symptoms:
A FastL4 throughput drop occurs when updating to BIG-IP version 17.5.0.
Conditions:
-- Using AWS BIG-IP v17.5.0
Impact:
Throughput is lower compared to v17.1.2.1.
Workaround:
None
Fix:
Performance is improved in v17.5.0 compared to v17.1.2.1.
Fixed Versions:
21.0.0, 17.5.1
1814405-1 : CVE-2024-11187- Bind Vulnerability
Links to More Info: K000150814
1813841 : Password Caching setting is not applied
Links to More Info: BT1813841
Component: Access Policy Manager
Symptoms:
In the Connectivity profile, "F5 Access for Mac OS" is removed and updated on "Desktop Client Settings".
The Allow password caching functionality which was used to work with "F5 Access for Mac OS" is not working after updating the UI to "Desktop Client Settings".
Conditions:
Allow Password Caching is enabled on BIG-IP UI for Mac F5 Access.
Impact:
Users will be prompted to password page even after Allow Password caching is enabled.
Workaround:
Enable the Allow password caching via TMSH:
For Memory Option to Enable on Allow Password Caching:
modify apm profile connectivity Connectivity_profile client-policy modify { Connectivity_profile_clientPolicy { macos-ec { save-password true save-password-method memory save-password-timeout 10 } } }
For Disk option to Enable on Allow Password Caching:
modify apm profile connectivity Connectivity_profile client-policy modify { Connectivity_profile_clientPolicy { macos-ec { save-password true save-password-method disk } } }
Fixed Versions:
21.0.0, 17.5.1
1813209 : Password Cache Expiration field is hidden in Connectivity profile
Links to More Info: BT1813209
Component: Access Policy Manager
Symptoms:
Password Cache Expiration field is hidden in Connectivity profile under Desktop Client Settings
Conditions:
1. Access-> Connectivity/VPN -> Profiles ->add/edit
2. Desktop Client Settings -> enable "Allow Password Caching"
3. Select "memory" as the "Save Password Method"
Impact:
For Creating new Connectivity profile:
You will not be able to set Password Cache Expiration value and default value of 240 will be used
For Existing Connectivity Profile:
You will not be able to modify the Password Cache Expiration value (Existing value).
In case of upgrades the existing value will be used
Workaround:
To modify the Password Cache Expiration value run:
tmsh modify apm profile connectivity <profile_name> client-policy modify { <profile_name>_clientPolicy { ec { save-password-timeout <desired value> } } }
Fixed Versions:
21.0.0, 17.5.1
1812201 : A specific unicode character issue a malformed json violation
Links to More Info: BT1812201
Component: Application Security Manager
Symptoms:
When JSON arrives with a specific character, a malformed json violation is issued.
Conditions:
A specific character arrives in a JSON payload
Impact:
A blocking violation occurs.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1798961 : With CC/FIPS license installed, OpenSSL should raise fatal alert when client does not advertise EMS support
Links to More Info: BT1798961
Component: TMOS
Symptoms:
When FIPS license is installed, OpenSSL enforces Extended Master Secret (EMS) to its peer clients. If a legacy TLS/SSL client does not provide EMS in its ClientHello extension, OpenSSL server merely aborts the handshake without sending a Fatal Handshake Alert message to the client. As a result, the reason for handshake abort is not clear.
Conditions:
1. FIPS license is installed on the BIG-IP Device
2. HTTPD server running on the BIG-IP device is linked with libssl.{so, a}
3. An attempt is made to contact the WebUI from a legacy browser that did not have support for EMS (or alternatively, from a service that did not advertise EMS support)
Impact:
Absence of explicit log message results in some confusion as to what the error was when the handshake terminated.
Workaround:
None
Fix:
A log message indicating a Fatal Handshake Message alert will be added. Then, whenever a legacy TLS/SSL client failed to provide the Extended Master Secret in its ClientHello message to the BIG-IP device with FIPS license installed, an error will be logged as the handshake aborts. This will inform the user the reason for the handshake termination.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1798601 : BD restart loop after upgrade on error in CONFIG_TYPE_ACCOUNT_CHARSET_TEMPLATES★
Links to More Info: BT1798601
Component: Application Security Manager
Symptoms:
After upgrade, bd goes into a restart loop. An error is logged to /var/log/bd.log:
ECARD_POLICY|NOTICE|Feb 01 21:35:01.061|21460|table_funcs.cpp:1471|handle_table_dynamic CONFIG_TYPE_INTERNAL_PARAMETERS res:[0]
ECARD_POLICY|NOTICE|Feb 01 21:35:01.061|21460|table_funcs.cpp:1471|handle_table_dynamic CONFIG_TYPE_ENFORCER_ACCOUNTS res:[0]
ECARD_POLICY|NOTICE|Feb 01 21:35:01.063|21460|table_funcs.cpp:1471|handle_table_dynamic CONFIG_TYPE_LANGUAGE_CHARSET res:[0]
ECARD_POLICY|NOTICE|Feb 01 21:35:01.067|21460|table_funcs.cpp:1471|handle_table_dynamic CONFIG_TYPE_ACCOUNT_CHARSET_TEMPLATES res:[0]
BD_MISC|ERR |Feb 01 21:35:01.070|21460|temp_func.c:2296|CONFIG_TYPE_PROTOBUF_FILENAMES message had parsing error: could not parse protobuf message
Conditions:
There is a licensing change on a device, and there is a policy that does not have any JSON profiles that have metacharElementCheck enabled.
Impact:
BD restarts in a loop. Traffic disrupted while bd restarts.
Workaround:
Run the following SQL on an affected system(s).
UPDATE DCC.ACCOUNT_CHARSET_TEMPLATES AS target JOIN (SELECT policy_name_crc, charset FROM DCC.ACCOUNT_CHARSET_TEMPLATES WHERE charset_templ_id = 2) AS source ON (target.policy_name_crc = source.policy_name_crc AND target.charset = '') SET target.charset = source.charset;
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1796609-1 : [APM][VDI]TCL error when upgrading to 17.x: can't read "tmm_apm_feed_login": no such variable★
Links to More Info: BT1796609
Component: Access Policy Manager
Symptoms:
After upgrading from BIG-IP version 15 to version 17 you may get a RST due to the below TCL error when requesting some application URLs:
TCL error: /Common/_sys_APM_VDI_Helper <HTTP_RESPONSE_RELEASE> - can't read "tmm_apm_feed_login": no such variable while executing "if { ($tmm_apm_client_type == "rdg-http" || $tmm_apm_feed_login) && $tmm_apm_is_nego_auth } { # Getting response header fo..."
Conditions:
-- VDI profile is attached
-- iRules are attached with custom priorities
Impact:
TCL errors observed in the LTM logs leading to connection reset
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6
1789529 : A crash of the bd daemon
Links to More Info: BT1789529
Component: Application Security Manager
Symptoms:
A crash happens on specific xml payloads
Conditions:
Very specific circumstances related to specific policy and traffic.
Impact:
Traffic disrupted while bd restarts.
Workaround:
None
Fix:
A crash related to the XML parser was fixed.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6.1
1789501 : [APM][Standard Customisation]Webtop is blank after upgrading APM version 17.1.2 with Edge Browser in Compatibility mode.★
Links to More Info: BT1789501
Component: Access Policy Manager
Symptoms:
The Webtop is blank, does not display any resources.
Conditions:
The issue occurs when all of the following conditions are met.
-Using Microsoft Edge browser in compatibility mode (IE mode)
-Access Profile is using standard customisation
-BIG-IP Version 17.1.2 or later, 16.1.5 or later (version with fix of ID504374)
Impact:
Unable to use legacy applications in Microsoft Edge's IE compatibility mode
Workaround:
Use modern customization for access profile.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6.1
1789477 : Orphaned tmsh processes might eventually lead to an out-of-memory condition
Links to More Info: BT1789477
Component: TMOS
Symptoms:
Occasionally, tmsh processes are orphaned when a user connects to the BIG-IP system via SSH, runs commands, and then quits the session or disconnects.
An orphaned tmsh process will have a parent pid (PPID) of 1. You can check for orphaned tmsh processes using the following shell command:
/bin/ps -o pid,ppid,comm -C tmsh
PID PPID COMMAND
8255 1 tmsh
If this issue occurs often enough, it might cause the BIG-IP system to run out of memory.
Conditions:
-- Using tmsh to connect to the BIG-IP system via SSH.
-- Running commands.
-- Quitting the session or disconnecting.
Impact:
Orphaned tmsh processes are created, which might eventually lead to an out-of-memory condition, if it occurs often enough.
Workaround:
There are several workarounds for this issue:
-- Change the default shell to bash for users that are going to use the script.
-- Use iControl.
-- Kill orphaned tmsh processes.
Fix:
Tmsh processes are no longer orphaned when a user connects to the BIG-IP system via SSH, runs commands, and then quits the session or disconnects under these conditions.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8
1787981 : Memory leak in ips_pcb_cache
Links to More Info: BT1787981
Component: Protocol Inspection
Symptoms:
The ips_pcb_cache stat keeps increasing while the system is passing traffic.
Conditions:
- IPS licensed and provisioned.
- Port missing from service or
- Port configured for service that does not match traffic.
Impact:
Increased memory usage of ips_pcb_cache and may lead to tmm crash. Traffic disrupted while tmm restarts.
Workaround:
Add TCP port (e.g., port 443) to the respective service on the IPS profile. For example, with a virtual-server that is configured with port 443, the port should be added to HTTP service if it terminates SSL (e.g., has client-ssl profile), otherwise the SSL service.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1787621-3 : TMM may unexpectedly restart during IPsec tunnel negotiation
Links to More Info: BT1787621
Component: TMOS
Symptoms:
Tmm crashes while handling IPSec traffic
Conditions:
-- IPsec IKEv2 tunnel configured and in use
-- The IPsec attempts to establish a tunnel with the remote peer
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fix:
The TMM restart will not occur.
Fixed Versions:
21.0.0, 17.5.1.2
1787153 : CVE-2019-9740 python: CRLF injection via the query part of the url passed to urlopen()
Links to More Info: K000153040, BT1787153
1787149 : CVE-2019-18348 python: CRLF injection via the host part of the url passed to urlopen()
Links to More Info: K000153042, BT1787149
1787141 : CVE-2018-20852 python: Cookie domain check returns incorrect results
Links to More Info: K000151520, BT1787141
1786805 : TMM might crash immediately after going active for the first time after a reboot
Links to More Info: BT1786805
Component: Advanced Firewall Manager
Symptoms:
In some rare scenarios, TMM might crash immediately after going active for the first time after a system reboot.
Conditions:
-- A virtual server has a DoS profile attached.
-- The BIG-IP goes active for the first time after a reboot.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fixed Versions:
21.0.0, 17.1.3
1786325 : Nxdomain stop blocking & nxdomain added into the allow list on rSeries
Links to More Info: BT1786325
Component: Advanced Firewall Manager
Symptoms:
Nxdomain domain eg:nxdomain.example.com is added into allow list. This causes tmctl nxdomain vector stats to not be accounted for, even when the client receives a response as nxdomain.
Conditions:
-- An nxdomain DoS vector is triggered
-- The nxdomain is later added to the allow list
Impact:
Tmctl stats for nxdomain vector is not accurate.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.2
1783217 : Rare bd crash
Links to More Info: BT1783217
Component: Application Security Manager
Symptoms:
A rare bd crash on some conditions related to json parsing
Conditions:
-- ASM provisioned, passing traffic
-- JSON parsing occurs
Impact:
ASM traffic disrupted while bd restarts.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1783081-1 : Removing conditional freeing for m_oauth instances in tmm
Links to More Info: BT1783081
Component: Access Policy Manager
Symptoms:
Increase in TMM memory with M_OAUTH instances
Conditions:
M_OAUTH instances are freed based on conditional checks.
Impact:
Memory leak in TMM.
Workaround:
None
Fix:
Remove conditional freeing.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1782365 : Importing a policy creates default 'password' sensitive parameter when it is not present in the exported policy in full JSON format
Links to More Info: BT1782365
Component: Application Security Manager
Symptoms:
Importing a policy creates a default 'password' sensitive parameter when it is not present in the exported policy in full JSON mode
Conditions:
-- Create a policy with API security template.
-- Delete the default "password" sensitive parameter.
-- Export the policy in full JSON format.
-- Import the policy again.
Impact:
Unexpected sensitive parameter appears in imported policy
Workaround:
None
Fix:
The policy is imported without sensitive parameters that do not appear in the full JSON policy
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1782137 : Management of Wide IPs using the GUI may fail when multiple monitors exist
Links to More Info: BT1782137
Component: Global Traffic Manager (DNS)
Symptoms:
When multiple monitor instances exist, the GUI may become unresponsive when managing Wide IPs.
Conditions:
- GTM configuration contains a sufficiently high number of monitors (> 4000).
- Using the GUI to manage Wide IPs.
Impact:
Configuration changes through the GUI may not be effective. Unable to use the GUI for configuration management.
Workaround:
Use TMSH
Fixed Versions:
21.0.0
1782113-2 : Parameter 'redirectwebauthn:i:0' is crashing the RDP file with 'The RDP File is corrupted' error message
Links to More Info: BT1782113
Component: Access Policy Manager
Symptoms:
Currently, with the below Custom Parameters
redirectclipboard:i:0
redirectprinters:i:0
redirectsmartcards:i:0
redirectwebauthn:i:0
The issue is when adding 'redirectwebauthn:i:0' to RDP Custom Parameters, the user gets RDP connection error when the user opens the downloaded RDP file. The ‘The RDP File is corrupted. The remote connection cannot be started’ message is displayed.
Conditions:
The parameter 'redirectwebauthn:i:0' is added to RDP Custom Parameters.
Impact:
Displays the below error message while opening the RDP file:
‘The RDP File is corrupted. The remote connection cannot be started’
Workaround:
Launch the RDP without the "redirectwebauthn:i:0" parameter.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6.1
1773161-1 : BIG-IP APM 17.1.2 VPN tunnels failed to establish at "GET /isession" stage
Links to More Info: BT1773161
Component: Access Policy Manager
Symptoms:
Windows Edgeclient (any other client) stuck at Initialisation.
You may observe a lot of below logs in f5tunnelserver.txt
2024-12-15,12:32:26:530, 19084,19088,, 48, , 970, CUTunnelServerX::isReady(), server response , result=0
2024-12-15,12:32:27:035, 19084,19088,, 48, , 970, CUTunnelServerX::isReady(), server response , result=0
2024-12-15,12:32:27:541, 19084,19088,, 48, , 970, CUTunnelServerX::isReady(), server response , result=0
2024-12-15,12:32:28:046, 19084,19088,, 48, , 970, CUTunnelServerX::isReady(), server response , result=0
Conditions:
-- BIG-IP version with fix of ID 903501
-- "sys db ipv6.enabled" is set to FALSE
-- Any client attempting to establish a VPN tunnel
Impact:
VPN fails to establish
Workaround:
1. "sys db ipv6.enabled" is set to TRUE
OR
2. Perform below two operations
a) Disable the DB variable isession.ctrl.apm:
tmsh modify sys db isession.ctrl.apm value disable
b) Perform 'Apply Access Policy' for the access policy attached to the virtual server.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1772377-1 : Libtiff CVE-2024-7006: NULL pointer dereference in tif_dirinfo.c
Links to More Info: K000152542
1772329 : Apply Policy failure after upgrading to v16.1.x and later, from earlier version★
Links to More Info: BT1772329
Component: Application Security Manager
Symptoms:
An error occurs when applying a policy:
crit perl[21254]: 01310027:2: ASM subsystem error (asm_start,F5::SetActive::Impl::set_active): Setting policy active failed: Failed on insert to DCC.CONTENT_PROFILE_TEMPLATES (DBD::mysql::db do failed: Column 'flg_tolerate' cannot be null)
Conditions:
You had previously imported a policy that was exported from ASM running on v16.1.x or later, to a system running a software version earlier than v16.1.x.
e.g:
You exported a policy from ASM running on v16.1.x, and import it to another ASM running on v15.1.x. Then you upgrade your v15.1.x to higher version.
Impact:
Changes on affected policies are not applied and an error occurs.
Workaround:
Delete graphql content profile with affected policies.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1771985 : [APM] OAuth AS max claims data support upto 8kb dynamically
Links to More Info: BT1771985
Component: Access Policy Manager
Symptoms:
The max claim data size is set to 8kb by default.
Conditions:
Oauth AS configured with multiple claims.
Impact:
The large claim size can lead to excessive memory consumption.
Workaround:
None
Fix:
Allocate the right amount of memory dynamically as required based on claims configuration
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8
1771945 : Memory leak when using event-wait with SSL SANs
Links to More Info: BT1771945
Component: Access Policy Manager
Symptoms:
- Memory usage continues to grow despite load.
- TMM Crash / HA Failover.
Conditions:
- Access policy with event-wait
- Rule contains [ACCESS::perflow get perflow.ssl.server_cert.subject_alt_name]
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1771793 : New blob compilations causing missed inspections from protocol inspection profiles
Component: Protocol Inspection
Symptoms:
After a sudden or normal reboot, ipsd takes more time to bring respective ips profiles to the Ready state. During this time, blob compilations are causing missed inspections from protocol inspection profiles.
Conditions:
A high number of signatures across multiple or duplicated inspection profiles leads to this issue.
Impact:
Some traffic is not inspected before ipsd has transitioned to the Ready state.
Workaround:
None
Fix:
After the fix, new blob compilations contains all inspections in protocol inspection profiles
Fixed Versions:
21.0.0, 17.1.3
1758961 : TMM may core if proxy_common_init errors out due to inappropriate NAT configuration
Links to More Info: BT1758961
Component: Local Traffic Manager
Symptoms:
TMM core is generated and tmm is restarted.
Conditions:
When proxy_common_init() fails due to incorrect configuration of a transparent HTTP proxy in non-standard HTTP and pass-through mode, it only occurs when an ACK and data are received during the connection setup.
Impact:
The core will be generated, and the TMM will be restarted accordingly. Traffic disrupted while TMM restarts.
Workaround:
None
Fixed Versions:
21.0.0
1758181-1 : Optimal gateway routing issue with HTML5 client
Links to More Info: BT1758181
Component: Access Policy Manager
Symptoms:
When you configure APM VDI Citrix OGR using article https://community.f5.com/kb/technicalarticles/solution-for-citrix-optimal-gateway-routing/278727, the system fails to start ica connection to the backend desktop using HTML5 access.
Additionally, the iRule example is incorrect.
Conditions:
1. OGR is configured using https://community.f5.com/kb/technicalarticles/solution-for-citrix-optimal-gateway-routing/278727
2. Use HTML5 client access
Impact:
Could not connect to backend desktop using HTML5.
Workaround:
None
Fix:
It should connect to backend desktop using HTML5 along with native client.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1758153 : Configuring a Data Guard URL longer than 1024 characters triggers a restart loop
Links to More Info: K000156624, BT1758153
1758029-3 : [APM][NA]VPN tunnels fail to establish when a virtual server is on a non-default route domain★
Links to More Info: K000150565, BT1758029
Component: Access Policy Manager
Symptoms:
Observe VPN fails with below error in /var/log/ltm
err tmm[20501]: 01470000:3: iSession: Connection error: isession_handle_syn:3737: No peer:4
Conditions:
-- VPN configured across multiple route domains
-- Route domains are not related
-- BIG-IP v17.1.x (this can be encountered while upgrading to v17.1.x)
Impact:
VPN fails to establish
Workaround:
Make sure the default route domain is a parent of the non-default route domain.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1757585 : Unable to install a license on an AWS BIG-IP VE
Links to More Info: BT1757585
Component: TMOS
Symptoms:
- Dossier creation fails with the following errors in the BIG-IP VE LTM log file:
err chmand[4610]: 012a0003:3: DossierReq exception: VirtDossier Service: Instance identity retrieval from the metadata failed. Check network connectivity to the instance metadata before retrying
warning get_dossier[10914]: 012a0004:4: hal_request_dossier: request failed
err get_dossier[10914]: 01170003:3: halGetDossier returned error (1): Dossier generation failed.
- Installing a license from a BIG-IQ returns with an error similar to the following:
Licensing failed Assignment of regkey pool license {license_pool_name} (License for XXXXX-XXXXX-XXXXX-XXXXX-XXXXXXX) to N.N.N.N ended with INSTALLATION_FAILED status and message: Failed to install license to device N.N.N.N (Not a valid F5 License)
Conditions:
Any of these license removal scenarios trigger the issue on a Single NIC (1nic) AWS BIG-IP VE :
- Previous license has expired
- License was revoked using iControl REST command "DELETE /tm/shared/licensing/registration"
- License was revoked using BIG-IQ
Impact:
- BIG-IP fails to generate a dossier and load a license
- BIG-IQ is unable to re-license the VE
Workaround:
Fix by deleting and resetting IP routing.
1) tmsh delete net route default
2) bigstart restart dhclient
Alternatively manually modify and fix ip route
1) ip route change default via <gateway> dev internal
Where <gateway> is IP address seen in 'ip route' output for 'default'.
Ex: for following, <gateway> is 172.31.0.1
# ip route
default via 172.31.0.1 dev mgmt
default via 172.31.0.1 dev mgmt proto none metric 4096
...
Fix:
Added a check to fix ip routing for 'default' before performing routing setup.
Fixed Versions:
21.0.0
1757537 : RCA tmm core with ** SIGSEGV ** inside pick_qos
Links to More Info: BT1757537
Component: Global Traffic Manager (DNS)
Symptoms:
Tmm core inside pick_qos
Conditions:
Race condition of rapid deletion and creation of the same virtual server.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fixed Versions:
21.0.0
1756825 : IPS Signatures not inspected being sometime after reboot
Links to More Info: K000150010, BT1756825
Component: Protocol Inspection
Symptoms:
After sudden or normal reboot, ipsd takes own time to bring respective ips profiles to Ready state. during this time traffic is not inspected for the signature traffic and passes through.
Conditions:
A high number of signatures across multiple or duplicated inspection profiles leads to significant delays in enforcement after a reboot.
Impact:
Traffic is not inspected for the signature after reboot before enforcing and actually passes through.
Fix:
After the fix, IPS Profiles will take less time to reach the ready state, even if the tmm or mcpd is restarted.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1756697 : Sec-WebSocket-Extensions header is not stripped when Compression is disabled
Links to More Info: BT1756697
Component: Local Traffic Manager
Symptoms:
When compression mode is 'Typed' and compression is 'disabled' in websocket profile, BIG-IP should strip Sec-WebSocket-Extensions header but it is not happening.
Conditions:
Compression mode is 'Typed' and compression is 'disabled' in websocket profile
Impact:
Sec-WebSocket-Extensions header is seen in server side.
Workaround:
None
Fixed Versions:
21.0.0
1756525-1 : ixlv driver could have failed hardware offload with TSO off
Links to More Info: BT1756525
Component: Local Traffic Manager
Symptoms:
IPv4 packets for TLS alerts contain empty IP checksums.
Conditions:
-- The ixlv driver is used by tmm
-- TSO is disabled
Impact:
Empty checksums will cause TLS clients to reject TLS alert messages.
Workaround:
Change driver type to use xnet in tmm_init.tcl by inputting `device driver pci vendor_dev 8086:1889 xnet` or for a specific PCI device with `device driver pci XX:XX.X xnet`
Fix:
Removed offloading IPv4 header checksum to the hardware unless TSO is on and so use what BIG-IP calculates instead.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1756397 : BIG-IP is not forwarding the Extended DNS Error (EDE) Codes to Clients
Links to More Info: BT1756397
Component: Global Traffic Manager (DNS)
Symptoms:
When BIG-IP processes responses from upstream name servers, it strips the Extended DNS Error (EDE) information, which provides additional details about the cause of DNS errors.
Conditions:
-- BIG-IP is configured with a listener that has a DNS profile to process DNS queries.
-- DNS requests from clients include the EDNS (Extension Mechanisms for DNS) flag.
Impact:
DNS clients will not receive additional information about the cause of DNS errors.
Workaround:
None
Fix:
With the fix, BIG-IP is now able to process and respond to clients with Extended DNS Errors (EDE) information that it receives from upstream name servers.
We have exposed the fix through a Db variable called dns.forwardextendeddnserrorcode. By default, the Extended DNS Errors(EDE) support is disabled. If you want to enable EDE support you can change the Db variable value to enable.
sys db dns.forwardextendeddnserrorcode {
value "enable"
}
To avoid truncation due to lengthy extra text that is part of the EDE, we have limited it to 64 bytes.
Fixed Versions:
21.0.0, 17.5.1
1755413 : Fast scp file transfer may not display progress bar
Links to More Info: BT1755413
Component: TMOS
Symptoms:
- Missing progress bar on scp file transfer.
Conditions:
- Includes fix for CVE-2019-6109.
Impact:
The progress bar indicating download progress of scp file transfer is missing in the output.
Workaround:
None
Fixed Versions:
21.0.0
1755181 : Not enough information when a TCP reset occurs due to compression error
Links to More Info: BT1755181
Component: Local Traffic Manager
Symptoms:
TCP RST with compression error does not provide additional details.
Conditions:
When inflate ratio exceeded
tmm.deflate.inflate.max.ratio
or the size of the data once decompress is larger than
tmm.deflate.memory.threshold
a TCP Reset is sent, but it does not say why.
Impact:
Difficult to diagnostic
Workaround:
None
Fix:
Log in ltm at info level is recorded
Also, the pcap will show the reason in the TCP Reset frame
Fixed Versions:
21.0.0
1753933 : CVE-2020-14393 perl-dbi: Buffer overflow on an overlong DBD class name
Component: TMOS
Symptoms:
A buffer overflow was found in perl-DBI < 1.643 in DBI.xs. A local attacker who is able to supply a string longer than 300 characters could cause an out-of-bounds write, affecting the availability of the service or integrity of data.
Conditions:
Triggered when loading a DBD module with an excessively long class name.
Impact:
This vulnerability may cause a heap-based buffer overflow, potentially leading to a crash or arbitrary code execution.
Workaround:
NA
Fix:
Patched Perl-DBI to fix the vulnerability.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1753617 : CVE-2023-24621 Untrusted Polymorphic Deserialization to Java Classes
Component: TMOS
Symptoms:
It allows untrusted deserialisation to Java classes by default, where the data and class are controlled by the author of the YAML document being processed.
Conditions:
yamlbeans versions before 1.15 are vulnerable
Impact:
It can result in remote code execution (RCE) or denial of service.
Workaround:
N/A
Fix:
yamlbeans has been patched to address this vulnerability.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1753569 : CVE-2022-39353: node-xmldom vulnerability
Component: Local Traffic Manager
Symptoms:
xmldom is a pure JavaScript W3C standard-based (XML DOM Level 2 Core) `DOMParser` and `XMLSerializer` module. xmldom parses XML that is not well-formed because it contains multiple top level elements, and adds all root nodes to the `childNodes` collection of the `Document`, without reporting any error or throwing. This breaks the assumption that there is only a single root node in the tree, which led to issuance of CVE-2022-39299 as it is a potential issue for dependents. Update to @xmldom/xmldom@~0.7.7, @xmldom/xmldom@~0.8.4 (dist-tag latest) or @xmldom/xmldom@>=0.9.0-beta.4 (dist-tag next). As a workaround, please one of the following approaches depending on your use case: instead of searching for elements in the whole DOM, only search in the `documentElement`or reject a document with a document that has more then 1 `childNode`.
Conditions:
NA
Impact:
This can lead to unexpected behaviour or at least application level Denial of Service.
Workaround:
NA
Fix:
xmldom is patched with the fix.
Fixed Versions:
21.0.0
1753533 : CVE-2018-16492 nodejs-extend: Prototype pollution can allow attackers to modify object properties
Component: TMOS
Symptoms:
A prototype pollution vulnerability was found in the extend module (<2.0.2, <3.0.2). This allows an attacker to inject arbitrary properties onto Object.prototype. Node.js components such as odata-v4-server and odata-v4-service-metadata may expose BIG-IP systems to prototype pollution attacks.
Conditions:
Node.js-based components where extend library (< v3.0.2) is in use.
Impact:
Potentially leading to unexpected behavior
Workaround:
NA
Fix:
NPM version is now updated to v6.4.1 to support extend version v3.0.2 where the fix is available
Fixed Versions:
21.0.0, 17.5.1.3, 16.1.6.1
1737465-2 : Port number being used for verifying server certificate CN field
Links to More Info: BT1737465
Component: Access Policy Manager
Symptoms:
TMM reports a SSL certificate error:
warning tmm1[18695]: 01260022:4: Peer cert verification: The common name (10.1.1.1) is invalid or does not match the authenticate name (10.1.1.1:4430). The subject alternative name also does not match the authenticate name.
Conditions:
-- The ssl server certificate is set to "require"
-- The URI includes the port number
Impact:
SSL server certificate validation fails
Workaround:
Set server certificate requirement to "ignore"
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6.1
1715685 : Protocol inspection takes up to 5 hours before starting to work after a reboot
Links to More Info: BT1715685
Component: Protocol Inspection
Symptoms:
Long hours of CPU spike of ipsd and mcpd were observed after a sudden reboot of BIG-IP Virtual Edition.
Protocol inspection stats from "tmctl protocol_inspection_stats" are not recorded for up to 5 hours after rebooting.
Conditions:
The ips profile loaded with a significant number of profiles and includes HTTP and OTHER services for all.
Impact:
Ipsd and mcp high cpu utilization after reboot. This can last for several hours. During this time, protocol inspection is not ready.
Workaround:
Reduce the duplicated IPS Profiles
Fix:
After the fix, IPS Profiles will take less time to reach the ready state, even if the tmm or mcpd is restarted.
Fixed Versions:
21.0.0, 17.1.3
1711813 : Incorrect SOA serial number shown in zxfrd logs during zone transfer
Links to More Info: BT1711813
Component: Global Traffic Manager (DNS)
Symptoms:
SOA serial is incorrect in the zxfrd logging.
zxfrd[4526]: 0153102c:5: IXFR Transfer of zone xyz.net with SOA Serial -1884747279 from 1.1.1.1 succeeded.
Conditions:
After performing the zone transfer, observe the zxfrd logging, where an incorrect serial number is seen once the number exceeds the signed integer limit.
Impact:
Difficult to troubleshoot zone transfer issues via the logs.
Workaround:
None
Fixed Versions:
21.0.0
1710233 : No option to disable violation for double-escaped NULL in query string
Links to More Info: BT1710233
Component: Application Security Manager
Symptoms:
Requests containing double-escaped NULL characters (e.g., %2500) trigger a violation, even when single-escaped NULL (%00) detection is desired.
Conditions:
Occurs when ASM is configured to detect NULL characters in query strings. There is currently no granular control to differentiate between a single encoded NULL and a double encoded NULL.
Impact:
May result in false positives for legitimate traffic using double-escaped characters, with no available configuration to suppress this specific violation.
Workaround:
None
Behavior Change:
ASM treated both a single URL-encoded NULL byte and a double-encoded NULL as the same violation, always flagging both as “Escaped NULL in query string” - with no way to suppress only the double-encoded case.
In this fix, an internal toggle "enforce_multiple_decoded_null" allows administrators to keep blocking the singly encoded NULL byte while allowing the twice-encoded sequence. This provides granular control on how the encoded NULL bytes are handled.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1709557 : Header value length greater than 1023 in alternate response file headers causing ASM restart loop
Links to More Info: BT1709557
Component: Application Security Manager
Symptoms:
Bd goes into a restart loop with the following error messages:
ECARD_POLICY|NOTICE|Oct 25 02:01:27.939|21735|table_funcs.cpp:1471|handle_table_dynamic CONFIG_TYPE_ACCOUNT_ALTERNATE_RESPONSE_FILE_HEADERS res:[0]
BD_MISC|ERR |Oct 25 02:01:27.939|21735|temp_func.c:2295|CONFIG_TYPE_PROTOBUF_FILENAMES message had parsing error: could not parse protobuf message
BD_MISC|ERR |Oct 25 02:01:27.939|21735|table_funcs.cpp:2734|CONFIG_TYPE_PROTOBUF_FILENAMES message had errors in block_index: 22. status=-1
BD_MISC|NOTICE|Oct 25 02:01:27.939|21735|table_funcs.cpp:2734|{"component":"BD","datetime":"1969-12-31T16:00:00Z","jobId":"","jobStartDatetime":"1969-12-31T16:00:00Z","jobStatus":"failed"}
BD_MISC|ERR |Oct 25 02:01:27.940|21735|temp_func.c:2288|CONFIG_TYPE_MANIFEST message had parsing error: could not parse protobuf message
Conditions:
A header in the blocking page is configured to be more than 1023 bytes.
Impact:
Endless restart loop
Workaround:
Change the blocking page header size.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1708957 : Excessive debug logs can cause key management daemon failure
Links to More Info: BT1708957
Component: TMOS
Symptoms:
During the upgrade, when there are a large number of folders and the configuration is loading, due to logging for each folder creation, the key management daemon (KeyMgmtDaemon) fails and can result into upgrade failure.
Conditions:
- A large number of folders present in the device before upgrade.
- Logging level is set to "Debug"
- Initiate the upgrade.
Impact:
Device upgrade fails.
Workaround:
Change the log level to a value higher than "Debug" before initiating the upgrade.
Fixed Versions:
21.0.0
1708189 : ICMP errors with HSL can rarely cause tmm cores
Links to More Info: BT1708189
Component: TMOS
Symptoms:
High-speed logging configured to use a remote syslog server can cause tmm to core if the server sends back ICMP errors (like ICMP unreachable).
Conditions:
-- High Speed Logging to a remote syslog server
-- Remote server sends back ICMP errors
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1701209-3 : APM ignores the update-interval setting
Links to More Info: BT1701209
Component: Access Policy Manager
Symptoms:
Irrespective of update-interval value, APM fetches the CRL from the CRLDP for each client certificate.
Conditions:
Configure update-interval.
Impact:
Multiple request keep triggering to update the CRL cache.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3, 16.1.6.1
1697273 : CVE-2020-8037 tcpdump: ppp decapsulator can be convinced to allocate a large amount of memory
Links to More Info: K000149929, BT1697273
1697041 : TMM may fail to start, device is inoperative★
Links to More Info: BT1697041
Component: Local Traffic Manager
Symptoms:
In very rare circumstances, tmm may fail to start and log a message similar to the following:
/var/log/tmm:
notice vmxnet3(1.3)[1b:00.0]: Waiting for tmm1 to reach state 1...
/var/log/tmm1:
notice Failed to connect to TMROUTED: ERR_INPROGRESS. Try again in 10 seconds.
notice MCP connection expired early in startup; retrying
While the issue is occurring, there will be incomplete ARP entries for tmm.
# arp -an | grep 127.1.1.
? (127.1.1.2) at <incomplete> on tmm
? (127.1.1.3) at <incomplete> on tmm
? (127.1.1.4) at <incomplete> on tmm
? (127.1.1.6) at <incomplete> on tmm
? (127.1.1.7) at <incomplete> on tmm
? (127.1.1.8) at <incomplete> on tmm
Conditions:
-- BIG-IP VE or Tenant OS
-- Hypervisor under high load
This has also been reported to occur after the reboot during an upgrade.
Impact:
Tmm is unable to start
Workaround:
Restart tmm manually with
bigstart restart tmm
Alternatively, set up a static arp mapping on the linux host:
arp -s 127.1.1.2 00:01:23:45:67:01
arp -s 127.1.1.3 00:01:23:45:67:02
arp -s 127.1.1.4 00:01:23:45:67:03
arp -s 127.1.1.5 00:01:23:45:67:04
arp -s 127.1.1.6 00:01:23:45:67:05
arp -s 127.1.1.7 00:01:23:45:67:06
arp -s 127.1.1.8 00:01:23:45:67:07
If there are more than 8 tmms, the following script can be used:
for y in $(seq $(/usr/bin/getdb Provision.tmmCountActual)); do arp -s 127.1.1.$(($y+1)) 00:01:23:45:67:$(printf "%02g" $y); done
Fix:
Fixed a race condition during tmm startup.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1692917 : CVE-2024-6232 CPython Tarfile vulnerability
Links to More Info: K000148252, BT1692917
1678809 : CVE-2023-26117: Angular JS vulnerability
Links to More Info: K000150967, BT1678809
1678805 : CVE-2023-26118 angularjs: Regular Expression Denial of Service via the <input type="url"> element
Links to More Info: K000150967, BT1678805
1678793 : CVE-2019-14863 angular: Cross-site Scripting (XSS) due to no proper sanitization of xlink:href attributes
Links to More Info: K000141459, BT1678793
1678789 : CVE-2019-10768 AngularJS: Prototype pollution in merge function could result in code injection
Links to More Info: K000141463, BT1678789
1678777 : CVE-2022-25869 angular.js : insecure page caching in the browser, which allows interpolation of <textarea> elements.
Links to More Info: K000141459, BT1678777
1678769 : CVE-2023-26116 angularjs: Regular Expression Denial of Service via angular.copy()
Links to More Info: K000141463, BT1678769
1673161 : CVE-2023-45853 zlib: integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_6
Links to More Info: K000149884, BT1673161
1673157 : Extended Latin characters are not blocked as expected from JSON schema patterns
Component: Application Security Manager
Symptoms:
Extended Latin or non-ASCII characters (e.g., ß, à, á, ä, ç, ü) are not blocked as instructed by a regular expression in the JSON schema in the API Security based policy.
Conditions:
This occurs when using the API Security template that includes regex-based validation rules that target Unicode ranges above U+00C0.
Impact:
Character validation does not work as intended, allowing disallowed Unicode characters to pass through.
Workaround:
None
Fix:
Expected blocking to Latin characters in JSON schema.
Fixed Versions:
21.0.0
1672997-1 : Apmd memory grows over time in AD/LDAP auth scenarios
Links to More Info: BT1672997
Component: Access Policy Manager
Symptoms:
Apmd memory grows over time. It is mainly due to memory fragmentation due to memory sharing among apmd threads.
Conditions:
The access policy in use has AD/LDAP auth as one of the agents
Impact:
Apmd memory grows over time. After it grows beyond a limit, oom killer might kill apmd thereby leading to traffic disruption.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6, 15.1.10.8
1672313 : CVE-2016-9841 zlib: Out-of-bounds pointer arithmetic in inffast.c
Links to More Info: K000149915, BT1672313
1672249 : CVE-2016-9840 zlib: Out-of-bounds pointer arithmetic in inftrees.c
Links to More Info: K000149905, BT1672249
1670225 : 'Last Error' field remains empty after initial monitor Down status post-reboot
Links to More Info: BT1670225
Component: Local Traffic Manager
Symptoms:
After rebooting the BIG-IP system, the 'Last Error' field in the /var/log/ltm log for a TCP monitor shows as empty (null) following the first occurrence of the monitor's down status.
mcpd[6893]: 01070638:5: Pool /Common/http_pool member /Common/192.168.10.71:80 monitor status down. [ /Common/my_tcp_monitor: down; last error: ] [ was up for 0hr:0min:41sec ]
And If pool member goes back to 'up' and then 'down' again, 'last error:' string is not empty, but the 'last error" string is not the most recent failure reason following.
mcpd[8820]: 01070638:5: Pool /Common/http_pool member /Common/10.2.116.207:80 monitor status down. [ /Common/myhttpmon: down; last error: /Common/myhttpmon: Response Code: 200 (OK) @2024/12/09 00:14:23. ] [ was up for 0hr:0min:32sec ]
Conditions:
The issue occurs when the monitor status of system is up and rebooted and during the first occurrence of a monitor's down status following the reboot, and pool member goes back to 'up' and then 'down' again.
Impact:
Users may not be able to determine the cause of monitor failures immediately after a system reboot, and pool member goes back to 'up' and then 'down' again. as the 'Last Error' field does not provide the necessary diagnostic information
Workaround:
None
Fixed Versions:
21.0.0
1636077 : Adding an operationally DOWN interface to existing LAG causes traffic disruption on r2k/r4k
Links to More Info: BT1636077
Component: Local Traffic Manager
Symptoms:
When an operationally DOWN interface is added to an existing LAG interface, traffic flow to the tenant stops on r2k/r4k based appliances.
Conditions:
-- Interface is marked down
-- Interface is added to an existing LAG interface
Impact:
Traffic flow gets impacted and the system misses the packets routed onto the LACP trunk to where the LAG member was added.
Workaround:
Restart tmm on all tenants that are associated with the trunk.
Fixed Versions:
21.0.0, 17.5.1
1635209 : Firewall NAT policy with SNAT automap does not work with ALG protocols in active mode
Links to More Info: BT1635209
Component: Advanced Firewall Manager
Symptoms:
Connection is dropping when firewall NAT policy uses SNAT automap and ALG.
Conditions:
-- Firewall NAT translation using source automap.
-- ALG protocol profile applied.
Impact:
-- Connection is dropped
Workaround:
None
Fix:
Done
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1635189 : TMM crashes when firewall NAT policy uses automap with Active FTP connection
Links to More Info: BT1635189
Component: Advanced Firewall Manager
Symptoms:
Tmm crashes when running an Active FTP connection through a virtual server that uses a firewall NAT policy with source automap.
Conditions:
-- Firewall NAT translation using source automap.
-- FTP profile applied on the virtual server (Active FTP connection).
-- Connection traverses a FW NAT policy referencing automap
Impact:
TMM crash/core.
Traffic disrupted while TMM restarts.
Workaround:
None
Fix:
TMM no longer restarts due to software failure.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1629701 : Attack signature is not shown in local event log for staged entity when not in learn/staging
Links to More Info: BT1629701
Component: Application Security Manager
Symptoms:
Attack signature is not shown in local event log for staged entity when the attack signatures are not in learning/staging.
Conditions:
- Security policy with staged URL, parameter or cookie;
- Attack signatures are not in learning or staging;
- Attack is detected by signature in request.
Impact:
Detected attack signature is not shown in local event log.
Workaround:
Possible workarounds:
- enable learning for attack signatures;
- examine detected signatures via remote log (if enabled).
Fix:
Detected attack signatures are now shown also for staged entities.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1628001 : TMM core when ACL operation is performed on a deleted session
Links to More Info: BT1628001
Component: Access Policy Manager
Symptoms:
TMM core
Conditions:
A session was deleted while performing an ACL iRule action.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
The TMM crash caused when performing iRule command
"[ACCESS::acl matched]" for a deleted session, this can be mitigated by adding a check for session existence like below
==================
set sessionid [ACCESS::session data get {session.user.sessionid}]
if {[ACCESS::session exists -sid $sessionid]} {
if {[ACCESS::acl matched] eq <ACL NAME>}
{
///Logic
}
} else {
log local0. "Session does not exist"
}
=============
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1626337-2 : RPMS not being included in the generated UCS with fix of ID985329 incorporated★
Links to More Info: K81310610, BT1626337
Component: Device Management
Symptoms:
While saving the UCS file after installing iAppLX RPMs, iAppLX RPMs are not included in the UCS file. The issue is observed in BIG-IP running software release that includes fix of ID985329.
Some possible symptoms:
-- AS3 replies with a "404 not found" error after upgrading
-- iAppLX applications that have a GUI, such as SSL Orchestrator, display a "Not Found" or "Access forbidden" error after upggrading
Conditions:
- Saving UCS using either CLI (Command Line Interface) or GUI
- BIG-IP running software release that includes fix of ID985329 (starting with verison 16.1.5, 17.1.2, 17.5.0)
Impact:
iAppLX RPMs and iAppLX declarations will be missing if UCS restore is performed. This can cause issues such as "NotFound" or "Access Forbidden" when trying to access the iAppLX.
This can be encountered following an upgrade from verison 16.1.5, 17.1.2, 17.5.0 to a later version.
Workaround:
Mitigation depends on the iAppLX package you are using because uninstall/reinstall approach is sometimes different.
SSL Orchestrator
Follow the recovery steps in K81310610: SSL Orchestrator Configuration: Access forbidden or Not Found or show wizard of new topology
https://my.f5.com/manage/s/article/K81310610
Access Guided Configuration
Follow the recovery steps in K55177400: Guided configuration displays: Not found - The requested URL was not found on this server
https://my.f5.com/manage/s/article/K55177400.
AS3 or any other manually-installed iAppLX
Follow the recovery steps in K000132348: AS3 declaration failure: mgmt shared service-discovery task update response=404 body
https://my.f5.com/manage/s/article/K000132348
Impact of workaround: uninstalling and reinstalling an iAppLX RPM should not impact the configuration data that the iAppLX was managing; for example uninstalling and reinstalling AS3 will not cause the previously-loaded AS3 declaration to be lost.
Fix:
If you upgrade from affected version to unaffected, you will still have to complete the workaround as described in K81310610 article.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1624557 : HTTP/2 with RAM cache enabled could cause BIG-IP to return HTTP 304 with content
Links to More Info: BT1624557
Component: Local Traffic Manager
Symptoms:
When the server replies to BIG-IP with HTTP 304 (not modified) and the BIG-IP system returns the contents of the RAM cache, it will not change the HTTP code 304 returned by the server when sending the cached content back to the client. The client will reject the HTTP 304 with content since it is expecting 200 OK with content.
Conditions:
-- Content in RAM cache has expired
-- The BIG-IP system requests an update from the origin server
-- The origin server returns 304 Not Modified.
Impact:
The BIG-IP system sends the response to the client as a 304 along with the content, causing the client to reject the content.
Workaround:
Disable RAM cache or alternatively have the server never return HTTP 304 but rather the content with 200 OK, even if unchanged.
Fix:
HTTP 200 OK is now returned by ram cache when server returns back 304 Not modified.
Fixed Versions:
21.0.0
1623941-1 : [AD] BIG-IP APM AD Auth agent sometimes prompts for new password (every login) after upgrade★
Links to More Info: BT1623941
Component: Access Policy Manager
Symptoms:
AD Auth agent always prompts for a new password after upgrading from v15.x to v17.1.x The user password is *NOT* expired in Active Directory. The user account does not have the "User must change password at next logon" option checked.
This can be seen any in any version upgrades.
Conditions:
Active Directory auth is configured
Impact:
After the upgrade to v17.1.x, v16.1.x, v15.1.x change password prompt appears every time you log in.
Workaround:
None
Fix:
Added the Client constructer as a part of the Client Initialisation
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6
1623597-2 : Nat46/64 hardware connection re-offload is not optimal.
Links to More Info: BT1623597
Component: TMOS
Symptoms:
Nat46/64 hardware connection re-offload is not optimal.
Conditions:
Nat46/64 configuration with hardware offload (fastl4).
Impact:
Not optimal resource usage.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1
1623197 : CVE-2024-37891 urllib3: proxy-authorization request header is not stripped during cross-origin redirects
Links to More Info: K000140711, BT1623197
1622789 : Traffic levels for NAT64/46 traffic might be different after an upgrade
Links to More Info: BT1622789
Component: TMOS
Symptoms:
Starting from version 16.X BIG-IP supports hardware acceleration of NAT64/46 traffic. Due to a software defect part of accelerated traffic might not be reported properly in connection statistics.
Conditions:
Nat64/46 virtual server with fastL4 PVA acceleration enabled.
Impact:
Part of accelerated traffic might not be reported properly in connection statistics.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1, 17.1.2
1622425-1 : Float the management ip to the next available ip when the connectivity of primary blade is lost
Links to More Info: BT1622425
Component: Local Traffic Manager
Symptoms:
When the connectivity of the primary blade is lost with the management interface, then the UI is also lost.
Conditions:
The primary blade lost connectivity on the management interface.
Impact:
Lost chassis monitoring/alerting and access to the Management GUI.
Workaround:
Manual switchover of the slot will solve the issue.
Fix:
Float the management ip to the next available ip when the primary blade loses connectivity on the management interface without disturbing the data plane.
Fixed Versions:
21.0.0, 17.5.1.2
1621269 : TMM restart loop when attaching large number of interfaces.
Links to More Info: BT1621269
Component: TMOS
Symptoms:
TMM is unable to finish initialization when attaching 9 or more Intel 710/E810 SR-IOV interfaces.
Conditions:
-- Using 9 or more Intel 710/E810 SR-IOV VFs
Impact:
BIG-IP is unable to go into the Active state because TMM restart loop is present.
Workaround:
Update Mcpd.KeepAliveCount DB variable to 127 and reboot the BIG-IP.
Fix:
DB variable Mcpd.KeepAliveCount was introduced to keep network connections between TMOS proccesses alive longer. Therefore, TMM would have enough time to finish initializing when attaching 9 or more Intel 710/E810 SR-IOV interfaces.
Fixed Versions:
21.0.0, 17.5.1
1621185 : A BD crash on a specific scenario, even after ID1553989
Links to More Info: BT1621185
Component: Application Security Manager
Symptoms:
A BD crash, failover.
Conditions:
Specific requests under specific conditions.
Impact:
Traffic disrupted while bd restarts.
Workaround:
None
Fix:
Fixed a bd crash while passing traffic.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1620785 : F5 cache mechanism relies only on Last-Modified/If-Modified-Since headers and ignores the etag/If-None-Match headers
Links to More Info: BT1620785
Component: Local Traffic Manager
Symptoms:
-- Server has a document x with etag - AAAA
-- When the client requests for x through BIG-IP, BIG-IP caches it and responds with 200 OK.
-- Document on Server changes; new etag is BBBB and cache in BIG-IP is expired
-- Clients sending requests with If None-Match: BBBB, should receive 304 with BBBB response but receiving 200 OK with AAAA.
Conditions:
-- Client having access to the server directly and through BIG-IP with cache enabled.
(Or)
-- Deployment containing two BIG-IPs with caching enabled one at a time.
Impact:
BIG-IP serves old documents when requested with etag of the latest document
Workaround:
When HTTP_REQUEST_RELEASE {
if { [HTTP::header exists If-None-Match] && [HTTP::header exists ETag] }{
HTTP::header remove If-None-Match
}
}
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8
1617037 : [PA]"navigator.userAgent" detects Chrome browser as Safari
Links to More Info: BT1617037
Component: Access Policy Manager
Symptoms:
You may observe an error like below in Developer tools console
Uncaught TypeError: TypeError: Cannot read properties of undefined (reading 'document')
Conditions:
Accessing applications through Portal Access
Impact:
Unable to access applications via Portal Access.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.2
1612885 : [PORTAL] Handle error in get_frameElement()
Links to More Info: BT1612885
Component: Access Policy Manager
Symptoms:
You may see get_frameElement() related errors in Devtools Console:
cache-fm-Modern.js:1494 Uncaught TypeError: Cannot read properties of undefined (reading 'document')
Conditions:
Portal Access configured on APM
Impact:
Failure in loading application through Portal Access.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1, 17.1.2, 16.1.6.1
1612345 : Improved Handling of BFD Session Traffic
Component: TMOS
Symptoms:
BFD sessions may experience timeouts under heavy traffic conditions.
Conditions:
This issue can occur when the system experiences heavy traffic loads, affecting the handling of BFD traffic over the datapath.
Impact:
BFD session stability may be affected, potentially causing interruptions in liveness detection.
Workaround:
Configure the system to distribute BFD traffic evenly across all TMMs to reduce congestion.
Fix:
The fix introduces improved handling and distribution of BFD traffic using round-robin DAG, which enhances stability in supported environments. These changes are applicable only to platforms that support this round-robin DAG feature.
- round robin DAG config on a vlan level and dag.roundrobin.udp.portlist targeting BFD port is required for this change to work properly.
- "tm.bfddagroundrobin" defaults to 'disabled' and requires a system restart when changed. This variable has to be enabled for this change to work properly.
- "tm.bfdprioritytimer" defaults to '900' (msec). This db variable should be set to be 100-200ms less then the lowest BFD RX timer configured on a system.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1612201 : Malformed certificates found in local /config/httpd/conf/ssl.crt/server.crt
Links to More Info: BT1612201
Component: Global Traffic Manager (DNS)
Symptoms:
The gtm_add command fails with:
"ERROR: found "END CERT..." without BEGIN at line: 0.
ERROR: Malformed certificates found in local /config/httpd/conf/ssl.crt/server.crt."
Conditions:
A device certificate in PEM format contains a newline as CRLF:
-- Create device certificate where "-----BEGIN CERTIFICATE-----" is terminated with CRLF ('\r\n' 0x0D 0x0A) instead of LF ('\n' 0x0A)
-- Perform the gtm_add.
Impact:
The gtm_add command fails with a malformed certificate error.
Workaround:
To mitigate use openssl x509 to convert CRLF to LF:
# cp /config/httpd/conf/ssl.crt/server.crt /config/httpd/conf/ssl.crt/server.crt-back
# openssl x509 -in /config/httpd/conf/ssl.crt/server.crt-back > /config/httpd/conf/ssl.crt/server.crt
Fixed Versions:
21.0.0
1602641 : Configuring verified-accept and SSL mirroring on the same virtual results in stalled connections.
Links to More Info: BT1602641
Component: Local Traffic Manager
Symptoms:
If a virtual server has SSL mirroring and with verified-accept enabled, the set handshake timeout value will be delayed during the SSL handshake client connections. The standby unit will not copy the connection to the virtual server.
Conditions:
- Verified accept enabled
- SSL mirroring enables
- An HA pair
Impact:
- SSL connections delayed inside the SSL handshake
- SSL connections are not mirrored to the peer unit.
Workaround:
Disable mirroring or disable verified-accept.
Fix:
Verified accept and SSL mirroring now work together.
Fixed Versions:
21.0.0
1602209-3 : The bigipTrafficMgmt.conf file is not copied from UCS to /config/snmp★
Links to More Info: BT1602209
Component: TMOS
Symptoms:
After restoring a UCS file, or after an upgrade, the file /config/snmp/bigipTrafficMgmt.conf is not updated.
Conditions:
The /config/snmp/bigipTrafficMgmt.conf has been modified.
Impact:
If the file was modified, the modifications are lost on upgrade or UCS install. The file will need to be modified again and snmpd restarted, and restarted on all blades/slots.
Workaround:
Edit the bigipTrafficMgmt.conf by hand after the upgrade.
After the above config file has been modified and saved, the "snmpd" daemon must be restarted, using one of two command variants:
(on a BIG-IP appliance or VE system)
# bigstart restart snmpd
(on a a multi-slot VIPRION or vCMP guest)
# clsh bigstart restart snmpd
Fix:
BigipTrafficMgmt.conf is copied to /conf/snmp on UCS load/upgrade.
Fixed Versions:
21.0.0
1600561 : CVE-2024-2961 glibc Vulnerability
Links to More Info: K000140901, BT1600561
1598405 : Intermittent TCP RST error 'HTTP internal error (bad state transition)' occurs for larger files when the Explicit Proxy virtual server uses HTTP_REQUEST_SEND iRule event
Links to More Info: BT1598405
Component: Local Traffic Manager
Symptoms:
BIG-IP sends a TCP RST with the error message ‘bad state transition’ when the HTTP_REQUEST_SEND iRule event is triggered after the completion of the TLS handshake and acknowledgement by BIG-IP from the server.
Conditions:
- BIG-IP1 is a proxy for clients
- BIG-IP2 is provisioned with LTM and APM, connects to the server
- BIG-IP2 has ACCESS::session iRule command in HTTP_REQUEST_SEND event
Impact:
Client-side traffic may get disrupted.
Workaround:
None
Fixed Versions:
21.0.0
1596097 : CVE-2023-37369 qtbase: buffer overflow in QXmlStreamReader
Links to More Info: K000148809, BT1596097
1596073 : CVE-2023-38197 qtbase: infinite loops in QXmlStreamReader
Links to More Info: K000148809, BT1596073
1592209 : Monitored objects stays "Offline (Enabled)" even after manually enabling the server object after reboot
Links to More Info: BT1592209
Component: Global Traffic Manager (DNS)
Symptoms:
A Generic host server object reports “Offline (Enabled)”.
When enabling the server object, the bellow message is logged to /var/log/gtm:
gtmd[xxxx]: 011a5004:1: SNMP_TRAP: Server /Common/[generic-server] (ip=192.1.1.51) state change blue --> red (No enabled virtual server available)
Conditions:
-- Any operations that cause GTMd to rebuild its probe list. Following are a few example operations:
- Monitored objects being disabled,
- GTMd restart,
- Loss of iQuery to other GTMs,
- Adding or removing probes.
-- BIG-IP is running on a software versions 17.1.1 or 16.1.5 or later versions in which the ID 1133201 is fixed.
Impact:
Virtual servers that are associated with the affected generic server object may stay unavailable. Hence, pool or wideIP, which uses the affected server object, may be unavailable too.
Workaround:
After the issue, restart the GTMd. Generic host server object will be get back to 'Available (Enabled)' status.
Following is an example command to restart the GTMd:
# tmsh restart /sys service gtmd
Global server load balancing is disrupted while gtmd is restarted.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1591821-4 : The TMM memory leak occurs due to race condition of early terminated connections.
Links to More Info: K000150637, BT1591821
1591813-3 : [APM][SAML] SP automation fails with error message 'cannot update (cert_type)'
Links to More Info: BT1591813
Component: Access Policy Manager
Symptoms:
Whenever a certificate is updated while fetching the metadata from the metadata URL in SAML automation for creating SP connector, an error occurs:
err mcpd[8894]: 01070712:3: Caught configuration exception (0), file:(/Common/sp_cert.crt) cannot update (cert_type).
Conditions:
- Configure BIG-IP as IDP with SP automation objects (metadata URL as internal virtual server URL)
- Configure a internal virtual server and attach an iRule to get the iFile based on the URI.
(https://1.1.1.1/PS0028JP)
-. Update the iFiles that returns metadata and wait till the SP-automation to update its sp-connector objects
PS0028JP -> ifile that returns metadata of SP with different cert ( self signed to CA and viceversa)
Impact:
Connector automation fails to create SP Connectors with new certificates.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6.1
1591481 : CVE-2017-1000381: C-ares Vulnerability iRulesLX
Links to More Info: K000149130, BT1591481
1591469 : CVE-2017-1000381 c-ares: NAPTR parser out of bounds access
Links to More Info: K000149130, BT1591469
1591249 : CVE-2018-6913 perl: heap buffer overflow in pp_pack.c
Links to More Info: K000141301, BT1591249
1591197 : Specific JSON enforcement is not working
Component: Application Security Manager
Symptoms:
An issue was detected with the JSON schema pattern attribute
Conditions:
When something is defined as a pattern in the JSON schema, it's enforcement can be bypassed on a specific scenario
Impact:
A missed JSON schema violation
Workaround:
None
Fixed Versions:
21.0.0
1590625 : CVE-2023-1667 libssh: NULL pointer dereference vulnerability
Links to More Info: K000148495
1590509 : CVE-2023-32573 qt: Uninitialized variable usage in m_unitsPerEm
Links to More Info: K000148690, BT1590509
1589661 : CVE-2019-3860 libssh2: Out-of-bounds reads with specially crafted SFTP packets
Links to More Info: K000149288, BT1589661
1589645 : CVE-2019-3859 libssh2: Unchecked use of _libssh2_packet_require and _libssh2_packet_requirev resulting in out-of-bounds read
Links to More Info: K000149288, BT1589645
1587453-1 : “default-all” profile is selected by default in “Dynamic LAN address spaces”
Links to More Info: BT1587453
Component: Access Policy Manager
Symptoms:
“default-all” profile is selected by default in “Dynamic LAN address spaces” when a new Network Access Connection is created
Conditions:
Create a new Network access resource
Impact:
Split tunnel will be ignored and the connection will be full tunnel due “default-all” profile being selected by default in “Dynamic LAN address spaces”
Workaround:
Remove "default-all" from “Dynamic LAN address spaces”
Fix:
"default-all" is no longer selected by default in “Dynamic LAN address spaces”
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1587421-1 : GUI issue when creating a new Network Access connection
Links to More Info: BT1587421
Component: Access Policy Manager
Symptoms:
In Basic view, selecting Split Tunnel does not show the LAN Address Space field.
The configuration is saved with default-all and creates a full tunnel.
Moving default-all to Available triggers an error:
LAN Address Space cannot be empty
Conditions:
Creating a new Network Access connection in Basic view with Split Tunnel enabled.
Impact:
Cannot configure Split Tunnel in Basic view.
Leads to full tunnel unless configured via the Advanced view.
Workaround:
Use Advanced view and set IPv4 LAN Address Space manually
Fix:
'IPv4 LAN address space' option is now available in 'Basic' view when split tunnel checkbox is selected
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1586537 : CVE-2024-0985 postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL
Links to More Info: K000140188, BT1586537
1585981-3 : High instances of OAuth in TMM memory leak
Links to More Info: BT1585981
Component: Access Policy Manager
Symptoms:
TMM memory increases over the time with OAuth PRP configuration.
Conditions:
BIG-IP is configured for each OAuth request using PRP.
Impact:
Leakage in TMM memory.
Workaround:
None
Fix:
Remove any conditional freeing on refresh and access tokens.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1585277 : Libexpat through 2.6.1 allows an XML Entity Expansion attack: CVE-2024-28757
Links to More Info: K000139637, BT1585277
1583745-1 : "Out of bounds" TCL error in VDI iRule
Links to More Info: BT1583745
Component: Access Policy Manager
Symptoms:
You may observe below error logs in /var/log/ltm
“Out of bounds” TCL error
Conditions:
Citrix VDI with an Integration mode.
Impact:
Unable to process VDI traffic.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3, 16.1.6.1
1583261-1 : Saml traffic can rarely cause tmm cores
Links to More Info: BT1583261
Component: Access Policy Manager
Symptoms:
Tmm seg faults in saml_sp_crypto_ctx_init.
Conditions:
This was seen when there was a permissions error loading the service provider key.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8
1582781 : CVE-2021-23177 libarchive: extracting a symlink with ACLs modifies ACLs of target
Links to More Info: K000140961, BT1582781
1581057 : Wr_urldbd IPC memory leak
Links to More Info: BT1581057
Component: Traffic Classification Engine
Symptoms:
Increase in wr_urldbd memory usage. wr_urldbd IPC message queue pileup.
Conditions:
BIG-IP with Service provider configuration which tries to achieve URL Categorization of subscriber traffic. SP DAG is configured. Most requests are being processed by the same TMM.
Impact:
Memory leak in wr_urldbd, leading to a stuck or inconsistent state.
Workaround:
Traffic disrupted while tmm restarts.
Fix:
Fix makes sure wr_urldbd IPC message queue pileup does not happen, hence memory leak will not happen.
Fixed Versions:
21.0.0, 17.1.3, 16.1.6
1580357 : CVE-2016-2037 CVE-2015-1197 cpio: out of bounds write
Component: TMOS
Symptoms:
The cpio_safer_name_suffix function in util.c in cpio 2.11 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted cpio file.
Conditions:
Extraction of a crafted archive using the cpio utility.
Impact:
The Vulnerability may lead to out-of-bounds write, potentially causing a crash or arbitrary code execution.
Workaround:
NA
Fix:
Patched cpio to fix the vulnerability.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1579533 : Jitterentropy read is restricted to FIPS mode or TMM usage only, for performance reasons★
Links to More Info: BT1579533
Component: Local Traffic Manager
Symptoms:
If jitterentropy-read from CPU jitter is used in all cases, a big performance problem is seen for most cases where BIG-IP works in non-FIPS mode. This can be encountered after upgrading to version 17.x from an earlier BIG-IP version.
Conditions:
The issues occur when BIG-IP operates in non-FIPS or FIPS mode and use jitterentropy to generate seed.
Impact:
Very high CPU utilization is seen when BIG-IP handles traffic while in non-FIPS mode.
Workaround:
None
Fix:
Jitterentropy-read of CPU jitter is now invoked in any one of these situations,
- Either BIG-IP operates in FIPS mode,
- TMM is processing traffic in non-FIPS and FIPS modes. In this case, none of the other components perform the stated jitter read operations and improves performance.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1577161-3 : BIG-IP tries to resume SSL sessions when session ID only matches partially
Links to More Info: BT1577161
Component: Local Traffic Manager
Symptoms:
After receiving the SSL session ID which partially matches a session ID in the cache VIP with the client SSL profile attempts to resume the session. For example - there is an existing Session ID:
session_id[32]=
28 67 9b 30 dc 8a 6e f4 d1 ef 80 f9 04 93 d6 3d
fb 2e ea b5 ac c2 be f1 6b e7 42 ef 54 a3 a6 cd
When a client sends Client Hello with
resume [32]=
12 11 11 12 12 12 12 12 11 11 80 f9 04 93 d6 3d
fb 2e ea b5 ac c2 be f1 6b e7 42 ef 54 a3 a6 cd
BIG-IP resumes the session.
Conditions:
- Create VIP with client SSL profile.
- Create a new TLS session (for example with 'openssl s_client')
- Try to reuse the existing session with some of the bytes of the session ID altered.
Impact:
The BIG-IP sends a ServerHello with a different Session ID from the one in the ClientHello and then attempts to resume a TLS session.
Workaround:
None
Fixed Versions:
21.0.0, 16.1.6.1, 15.1.10.8
1576897 : CVECVE-2016-9063 firefox: Possible integer overflow to fix inside XML_Parse in Expat
Links to More Info: K000139691, BT1576897
1576125 : Node.js vulnerability CVE-2024-27983
Links to More Info: K000139532, BT1576125
1572145 : CVE-2023-29469 libxml2: Hashing of empty dict strings isn't deterministic
Links to More Info: K000139592, BT1572145
1572053 : sqlite - CVE-2019-8457 , CVE-2017-10989,CVE-2020-35527, CVE-2019-13734,CVE-2020-35525,CVE-2019-19880,CVE-2019-20218
Links to More Info: K000141088, BT1572053
1567761-2 : [APM] AccessProfile name is missing in log User '<username>' belongs to domain '<domain_name>'
Links to More Info: BT1567761
Component: Access Policy Manager
Symptoms:
When a user logs in using the VPN using an alternate alias for the domain name, a log message is logged to the apm debug logs. But it does not include the access profile name in the log:
debug apmd[13866]: 0149017b:7: ::c9b6820d: AD module: User 'testuser@mysite.com' belongs to domain 'mysite.net'
Conditions:
User logged in using AD Auth with alternate alias for domain name.
Impact:
The debug log message is ambiguous.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6.1
1566997 : CVE-2016-10349 libarchive: Heap-based buffer over-read in the archive_le32dec function
Links to More Info: K000148259, BT1566997
1566533 : CVE-2017-18342 PyYAML: yaml.load() API could execute arbitrary code
Links to More Info: K000139901, BT1566533
1561689 : CVE-2016-10350 libarchive: Heap-based buffer over-read in the archive_read_format_cab_read_header function
Links to More Info: K000148259, BT1561689
1555525 : WCCP traffic may have its source port changed
Links to More Info: BT1555525
Component: Local Traffic Manager
Symptoms:
WCCP traffic may have its source port changed as it leaves the Linux host. This could cause WCCP sessions to not be established.
Conditions:
-- WCCP configured
-- BIG-IP Virtual Edition platform or r2000 or r4000 tenants.
Impact:
WCCP messages may not be successfully processed by the peer because the source port is not 2048.
Workaround:
Cat >> /config/tmm_init.tcl << EOF
proxy BIGSELF {
listen 0.0.0.0%\${rtdom_any} 2048 netmask 0.0.0.0 {
proto \$ipproto(udp)
srcport strict
idle_timeout 30
transparent
no_translate
no_arp
l2forward
tap enable all
protect
}
profile _bigself
}
EOF
bigstart restart tmm
Fixed Versions:
21.0.0, 17.5.1, 17.1.2, 16.1.6
1553169 : Parsing tcp payload using iRules can be inaccurate because of binary to string conversion
Links to More Info: BT1553169
Component: Local Traffic Manager
Symptoms:
When an iRule is used to parse tcp payload, the value returned as string can be inaccurate.
Conditions:
TCP payload is parsed using iRule.
Impact:
The iRule functionality may not work as expected, as the parsed data can be inaccurate.
Workaround:
None
Fix:
None
Fixed Versions:
21.0.0, 17.5.1.2
1552705-4 : New subsession reads access_token from per-session policy instead of per-request policy.
Links to More Info: BT1552705
Component: Access Policy Manager
Symptoms:
When BIG-IP is configured with OAuth Agents both in per-session policy and per-request policy, OAuth Flow fails to execute successfully.
Conditions:
When new subsessions are created TMM fails to read the access token from subsession variables. Therefore, gets the old token from the main session, i.e. per-session policy.
Impact:
BIG-IP Administrator will not be able to configure BIG-IP as OAuth Client & RS with both per-session policy and per-request policy.
Workaround:
Use OAuth Agents only in the per-request policy, configure per-session policy with just empty allow.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6
1550869 : Tmm leak on request-logging or response logging on FTP virtual server
Links to More Info: BT1550869
Component: Local Traffic Manager
Symptoms:
Tmm memory leak is observed.
Conditions:
Either of these conditions:
-- An LTM profile with request-logging enabled
-- response-logging enabled on a virtual server supporting FTP
Impact:
A tmm memory leak occurs.
Workaround:
Disable request/response logging on the FTP virtual server.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1549397 : Pool member from statically-configured node deleted along with ephemeral pool member using same IP address
Links to More Info: BT1549397
Component: Local Traffic Manager
Symptoms:
If an LTM pool is created containing both FQDN and statically-configured pool members using different port numbers, and the FQDN name resolves to the same IP address as the statically-configured node, if the FQDN name no longer resolves to that IP address, the statically-configured pool member may be deleted along with the ephemeral pool member with the same IP address.
In this configuration, the pool in question may be found to contain:
-- a statically-configured (not ephemeral) pool member referencing the statically-configured node
-- an ephemeral pool member with the same node name and IP address as the statically-configured node
Both pool members have the same node name and IP address, since only one node can exist for a given IP address. This prevents a separate ephemeral node from being created with the same IP address as the statically-configured node, forcing both pool members to reference the same statically-configured node with the given IP address.
Conditions:
-- The LTM pool contains both FQDN pool members and pool members referencing statically-configured nodes.
-- The FQDN and statically-configured pool members use different port numbers.
-- The FQDN name resolves to one or more IP addresses that match the statically-configured node.
-- The DNS server subsequently no longer resolves the FQDN name to that IP address.
Impact:
Pool members may be deleted unexpectedly when DNS records/name resolution changes.
Workaround:
To work around this issue:
-- Use the same port number for both statically-configured pool members and FQDN pool members.
-- Add the statically-configured pool member(s) to the pool before adding any FQDN pool members which resolve to the same IP address(es).
Fixed Versions:
21.0.0
1519001 : After a crash, tmm may experience memory corruption
Links to More Info: BT1519001
Component: Local Traffic Manager
Symptoms:
On an F5OS tenant on affected platforms, if tmm does not stop gracefully - meaning it crashed or was killed, it may experience memory corruption when it starts again, leading to another crash.
Conditions:
-- F5OS tenant on a VELOS system or an r5000, r10000, or r12000-series appliance.
-- Tmm does not shut down gracefully
r4000 and r2000 series appliances are not affected.
Impact:
Tmm may crash again when it starts up. Traffic disrupted while tmm restarts.
Workaround:
Reboot the tenant, or if tmm is able to start, shut down tmm gracefully and restart.
Fix:
The data mover no longer corrupts memory when tmm is starting after a crash.
Fixed Versions:
21.0.0, 17.5.1.2
1517561 : CVE-2023-28484 libxml2: NULL dereference in xmlSchemaFixupComplexType
Links to More Info: K000139641, BT1517561
1510477-1 : RD rule containing zones does not match expected traffic on the Network firewall policy
Links to More Info: BT1510477
Component: Advanced Firewall Manager
Symptoms:
The ICMP packets are dropped based on the default match rule, instead of the RD rule match.
Conditions:
ICMP firewall policies created with Zone include Route Domain (RD) with two or more VLANs in the created Zone.
Impact:
The ICMP packets are dropped based on the default match rule instead of using the RD rule match to drop.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1505649-2 : SSL Handshake fall back to full handshake during session resumption, if SNI string is more than 32 characters in length
Links to More Info: BT1505649
Component: Local Traffic Manager
Symptoms:
When the SNI string is longer than 32 characters, the SSL handshake switches to the full handshake when session resumption is attempted.
Conditions:
- SSL resumption should be enabled in the client's SSL profile of their BIG-IP.
- SNI string should be more than 32 characters in length of the SSL client Hello packet received from the user.
Impact:
SSL resumption would fail if the SNI string is more than 32 characters in length.
Workaround:
using strings lesser than 32 characters for SNI
Fixed Versions:
21.0.0, 17.5.1, 17.1.2
1505301 : CVE-2022-29154 rsync: remote arbitrary files write inside the directories of connecting peers
Component: TMOS
Symptoms:
A flaw was found in rsync that is triggered by a victim rsync user/client connecting to a malicious rsync server. The server can copy and overwrite arbitrary files in the client's rsync target directory and subdirectories. This flaw allows a malicious server, or in some cases, another attacker who performs a man-in-the-middle attack, to potentially overwrite sensitive files on the client machine, resulting in further exploitation.
Conditions:
NA
Impact:
This flaw allows a malicious server, or in some cases, another attacker who performs a man-in-the-middle attack, to potentially overwrite sensitive files on the client machine, resulting in further exploitation.
Workaround:
NA
Fix:
Patched rsync to fix this vulnerability
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1495381-1 : TMM core with SWG explicit forward proxy or PRP configuration
Links to More Info: BT1495381
Component: Access Policy Manager
Symptoms:
TMM core.
Conditions:
SWG explicit forward proxy or PRP with NTLM or Kerberos or LDAP credentials identification method.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6.1
1494229 : CVE-2023-2953 openldap: null pointer dereference in ber_memalloc_x function
Links to More Info: K000138814, BT1494229
1493765 : CVE-2021-22884 nodejs: DNS rebinding in --inspect
Component: iApp Technology
Symptoms:
A flaw was found in nodejs. A denial of service is possible when the whitelist includes “localhost6”. When “localhost6” is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS over the network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the “localhost6” domain. As long as the attacker uses the “localhost6” domain, they can still apply the attack described in CVE-2018-7160.
Conditions:
The Node.js application uses a whitelist for DNS rebinding protection that includes “localhost6”.
The system’s /etc/hosts file does not have an entry for "localhost6".
Impact:
The DNS rebinding protection may not function as intended, which could allow unauthorized connections to local resources via the “localhost6” domain.
Workaround:
Remove "localhost6" from the DNS rebinding protection whitelist.
Fix:
drop localhost6 as allowed host
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1492337 : TMM fails to start up using Xnet-DPDK-virtio due to out of bounds MTU
Links to More Info: BT1492337
Component: TMOS
Symptoms:
TMM goes into a restart loop and fails to start with an error message that the MTU is out of bounds
Log message:
notice virtio_mtu_set(): MTU should be between 68 and 1500
Conditions:
- Using Xnet-DPDK-virtio driver
- NIC is configured to have an MTU less than NDAL's configured MTU. By default, this is an MTU < 9198
Impact:
TMM goes into a restart loop and fails to start
Workaround:
Create /config/tmm_init.tcl with the following entry
ndal mtu <value> 1af4:1041
Replacing <value> with the corresponding value in the following log line in /var/log/tmm
notice virtio_mtu_set(): MTU should be between 68 and <value>
Fix:
Refactored code to not restart TMM if set MTU operation fails.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1470265-1 : DTLS over TCP results in unsupported behavior
Component: Local Traffic Manager
Symptoms:
DTLS traffic can be incorrectly negotiated and processed over a TCP connection.
Conditions:
This issue occurs when DTLS traffic is initiated over a TCP connection instead of UDP.
Impact:
Attempts to use DTLS over TCP will result in unsupported protocol behavior.
Workaround:
Ensure DTLS is used only over UDP.
For secure communication over TCP, use TLS instead of DTLS.
Fix:
It is now ensured that DTLS traffic over TCP connections is rejected, aligning with the protocol's design for DTLS to operate strictly over UDP.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8
1470177 : CVE-2023-46218 curl: information disclosure by exploiting a mixed case flaw
Links to More Info: K000138650, BT1470177
1469629 : CVE-2023-5981 & CVE-2024-0553: gnutls vulnerability on response times of ciphertexts
Links to More Info: K000138649, BT1469629
1469393 : Browser extension can cause Bot-Defense profile screen to misfunction
Links to More Info: BT1469393
Component: Application Security Manager
Symptoms:
One of the ad-blocker browser extensions is reported to cause bot-defense GUI not working properly.
Conditions:
Ad-blocker extension installed in browser
Impact:
Bot-defense screen might not work properly
Workaround:
Disable ad-blocker extension or use private/incognito mode.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1450181 : Improved Permission Handling in REST SNMP Endpoint and TMSH
Component: TMOS
Symptoms:
Certain requests to the REST SNMP endpoint and TMSH improperly handle user permissions, which may lead to inconsistent behavior or access concerns.
Conditions:
Not specified
Impact:
Security best practices are not followed.
Workaround:
Only allow trusted administrators to access the REST interface or TMSH. Restrict management access to secure and trusted networks.
Fix:
User permissions for both REST SNMP endpoint and TMSH are now handled as expected, ensuring proper enforcement of access controls.
Fixed Versions:
21.0.0, 17.1.3
1441577 : CVE-2023-42795 tomcat: improper cleaning of recycled objects could lead to information leak
Links to More Info: K000138178, BT1441577
1438801 : VLAN name greater than or equal to 32 characters causes VLAN to lose member information
Links to More Info: BT1438801
Component: F5OS Messaging Agent
Symptoms:
If VLAN name is greater than or equal to 32 characters, a tenant running on an r2000 or r4000-series appliance may fail to pass traffic on that VLAN. This occurs because the tenant loses track of the interface/trunk<>VLAN association when attempting to process configuration updates from the F5OS host.
Conditions:
- r2000 or r4000 system
- VLAN member with a name that is 32 characters or longer is assigned to a BIG-IP tenant.
Impact:
Traffic may not pass properly.
Workaround:
Use shorter VLAN names, with a maximum of 31 characters.
Fixed Versions:
21.0.0
1410441 : Large file transfer over SFTP/SSH proxy failure
Links to More Info: BT1410441
Component: Advanced Firewall Manager
Symptoms:
- Large file transfer (>110MB) fails using the SFTP PUT command through a virtual server configured with AFM SSH Proxy.
- Depending on the boundary byte that gets sent from BIG-IP towards the backend server, the server sends back a SSH2_MSG_UNIMPLEMENTED for a packet type corresponding to the incorrect byte being interpreted as the message type.
Conditions:
- SSH Proxy profile attached to BIG_IP Virtual Server.
- Large file (>110MB) is uploaded using PUT command through the virtual server.
Impact:
File transfer fails.
Workaround:
Workaround options are:
- Limit the file transfer rate through the SFTP client.
Ex:
sftp -l 1000 <VS-IP>
put <filename>
- Use a smaller buffer size (eg. 1400).
Ex:
sftp -B 1400 <VS-IP>
put <filename>
Fix:
None
Fixed Versions:
21.0.0
1401961-2 : A blade with a non-functional backplane may override the dag context for the whole system
Links to More Info: BT1401961
Component: TMOS
Symptoms:
A blade with a non-functional backplane may override the dag context for the whole system.
Conditions:
- a blade has backplane problems, as evidenced by "shared random" not being ready in `tmctl -d blade tmm/ready_for_world_stat`.
Impact:
The traffic is black-holed into a non-functional blade.
Workaround:
Depending on the nature of the blade fault, a workaround is to either disable or just reboot the non-functional blade.
Fix:
A blade with a non-functional backplane cannot override the dag context for the whole system anymore.
Fixed Versions:
21.0.0, 17.5.1
1400533-1 : TMM core dump include SIGABRT multiple times, on the Standby device.
Links to More Info: BT1400533
Component: Access Policy Manager
Symptoms:
The tmm running on the Standby device is repeatedly killed by sod. There are number of SessionDB ERROR messages on the tmm log.
/var/log/tmm1:
notice session_ha_context_callback: SessionDB ERROR: received invalid or corrupt HA message; dropped message.
Conditions:
-- BIG-IP configured for high availability (HA)
-- Mirroring enabled
-- APM enabled
-- Traffic is being passed on the active device
Impact:
Tmm restarts on the standby device. If a failover occurs while the tmm is restarting, traffic is disrupted.
Workaround:
None
Fix:
Persisting sub-session information only in the active device, after the expiry.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1394517 : CVE-2018-12122: Slowloris HTTP Denial of Service (NodeJS v6)
Links to More Info: K000137090, BT1394517
1393733 : CVE-2022-43750 kernel: memory corruption in usbmon driver
Links to More Info: K000139700, BT1393733
1390457 : CVE-2022-25147 apr-util: out-of-bounds writes in the apr_base64
Links to More Info: K000137702, BT1390457
1382313 : TMM might crash under certain conditions
Links to More Info: K000152341, BT1382313
1382181-1 : BIG-IP resets only server-side on idle timeout when used FastL4 profile with loose-* settings enabled★
Links to More Info: BT1382181
Component: Local Traffic Manager
Symptoms:
After upgrading to BIG-IP 17.1.0, observed that some of the client sessions are orphaned, this has caused multiple intermittent connection failures when connecting through BIG-IP.
When the FastL4 profile with loose-* settings enabled is used and an idle timeout of 300 seconds, after idle time of 300 seconds, the server-side connection resets but no reset is sent towards client.
Conditions:
- Use BIG-IP version 17.1.0 and above
- Use Fastl4 profile with loose-* settings enabled.
- Configure idle timeout values.
Impact:
Some client sessions will be orphaned and cause intermittent connection failures when trying to connect through BIG-IP.
Workaround:
If not required for a particular use case, then disable loose-close settings in Fastl4 profile.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1365629 : FPS signature and engine update fail to access sys db key proxy.password
Links to More Info: BT1365629
Component: Application Security Manager
Symptoms:
FPS signature and engine update via proxy with password authentication fails
Conditions:
FPS signature and engine update via proxy that requires password authentication
Impact:
Automatic updates of FPS signatures and engine do not work when an HTTP proxy is configured.
Workaround:
Manually upload the file
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.2, 15.1.10.8
1359817 : The setting of DB variable tm.macmasqaddr_per_vlan does not function correctly
Links to More Info: BT1359817
Component: F5OS Messaging Agent
Symptoms:
TMM is not configuring L2 listener entry for a new MASQUEREDE MAC created from a base MAC and VLAN ID when the DB variable tm.macmasqaddr_per_vlan is true.
Conditions:
- F5OS Tenant
- MAC MASQUEREDE is configured
- DB variable tm.macmasqaddr_per_vlan is true
Impact:
Connectivity issues may occur, pinging a self-IP will fail.
Workaround:
None
Fixed Versions:
21.0.0
1353609 : ZebOS BGP vulnerability CVE-2023-45886
Links to More Info: K000137315, BT1353609
1352649 : The trailing semicolon at the end of [HTTP::path] in the iRule is being omitted.
Links to More Info: BT1352649
Component: Local Traffic Manager
Symptoms:
When a http request with URL containing only one semi-colon at the end, it is omitted with HTTP::PATH
Conditions:
Basic http Virtual Server and request URL with ';' at the end
Impact:
[HTTP::PATH] incorrectly omits ';'
Workaround:
None
Fix:
Count on semicolon for HTTP::PATH even when there is no host-extension
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1350485 : When the parameter value contains '@', domain name is not properly extracted
Links to More Info: BT1350485
Component: Application Security Manager
Symptoms:
Request is blocked with Illegal Parameter type violation
Conditions:
-- Parameter value type set to 'Auto Detect'
-- Illegal data type violation is enabled
Impact:
Request blocked if the parameter Url values having '@' followed by other special characters
Workaround:
Change the type to alpha-numeric
Fixed Versions:
21.0.0
1336185 : NodeJS Vulnerability - CVE-2018-12123
Links to More Info: K000137090, BT1336185
1330801 : NodeJS Vulnerability CVE-2018-12123, CVE-2018-12121, CVE-2018-12122
Links to More Info: K000137090, BT1330801
1330213-1 : SIGABRT is sent when single quotes are not closed/balanced in TMSH commands
Links to More Info: BT1330213
Component: TMOS
Symptoms:
When a TMSH command is entered with only one single quote (unbalanced quotes), the TMSH aborts.
For example:
[root@test-mem-bigip:Active:Standalone] config # tmsh -c "list /net | grep 'foo"
terminate called after throwing an instance of 'CLI::SyntaxError'
what(): single quotes are not balanced
Aborted (core dumped)
Conditions:
When only one single quote is used in a TMSH command, the SIGABRT occurs.
For example:
# tmsh -c "list /net | grep 'foo"
or
# tmsh -c "list /net '"
Impact:
TMSH crashes and a core file is generated.
Workaround:
None
Fixed Versions:
21.0.0
1327169 : CVE-2023-24329 python: urllib.parse url blocklisting bypass
Links to More Info: K000135921, BT1327169
1326665 : CVE-2023-32067 c-ares: 0-byte UDP payload Denial of Service
Links to More Info: K000135831, BT1326665
1316821 : HTTP::disable not allowed after HTTP::respond
Links to More Info: BT1316821
Component: Local Traffic Manager
Symptoms:
Rule not processed and ltm logs shows this:
TCL error: /Common/connect-irule <HTTP_REQUEST> - Illegal value. HTTP::disable not supported when responding or retrying (line 1) invoked from within "HTTP::disable"
Conditions:
When an iRule has an HTTP::respond followed by an HTTP::disable, the disable is not allowed.
Impact:
iRule not processed.
Workaround:
N/A
Fixed Versions:
21.0.0
1314333 : Patch gnutls library for CVEs CVE-2018-10844, CVE-2018-10845, CVE-2018-10846
Component: TMOS
Symptoms:
These vulnerabilities affect the HMAC and CBC-mode processing in GnuTLS, making it susceptible to Lucky Thirteen-style timing attacks. By measuring response times for crafted TLS/DTLS packets, attackers can infer partial plaintext data. The high complexity of the attack, reliance on network conditions, and mitigations in later TLS versions result in an Attack Complexity (AC) of High.
Conditions:
NA
Impact:
CVE-2018-10844 – Affects HMAC-SHA-256 processing in GnuTLS, leading to possible plaintext recovery via statistical analysis of response times. CVE-2018-10845 – Targets CBC-mode padding handling, potentially exposing additional side-channel leaks. CVE-2018-10846 – Affects DTLS (Datagram TLS), making real-time encrypted communication (e.g., VoIP, VPNs) vulnerable to timing-based attacks.
Workaround:
Disable CBC-mode cipher suites in TLS configurations to prevent this attack vector.
Use TLS 1.3, as it eliminates CBC-mode ciphers and improves security.
Minimize the exposure of GnuTLS-based services to untrusted networks.
Fix:
Patched gnutls to fix the Vulnerability
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1309637 : Mac masquerade not working after VLAN movement on host interfaces
Links to More Info: BT1309637
Component: Local Traffic Manager
Symptoms:
Connectivity to the floating IP via the masquerade MAC fails when the VLAN is moved across interfaces.
Conditions:
-- BIG-IP is configured with a floating IP on a traffic group
-- MAC masquerade is enabled
-- The VLAN is assigned to a different interface
Impact:
Connectivity to the floating IP address fails following a failover.
Workaround:
After the VLAN movement, delete and reconfigure the MAC masquerade.
Fixed Versions:
21.0.0, 17.5.1
1306309 : CVE-2023-28709 Apache tomcat: Fix for CVE-2023-24998 was incomplete
Links to More Info: K000135262, BT1306309
1306305 : CVE-2023-24998 [Apache Tomcat]: FileUpload DoS with excessive parts
Links to More Info: K000133052, BT1306305
1305117 : SSL profile "no-dtlsv1.2" option is left disabled while upgrading from v14.x or v15.x to 17.1.0★
Links to More Info: BT1305117
Component: TMOS
Symptoms:
Starting from 16.0.0, given DTLSv1.2 support, "no-dtlsv1.2" option is newly available on SSL profile. Default value is "no-dtlsv1.2" option enabled.
While upgrading from older version to 16.0.0 or later, by default "no-dtlsv1.2" option is to be automatically enabled with following notification message.
> bigip1 warning mcpd[XXXX]: 0107185a:4: Warning generated, for version 16.0.0 or greater : /Common/[SSL-profile-name], default option no-dtlsv1.2 set.
However, when user directly upgrades from v14.x/v15.x to v17.1.0, "no-dtlsv1.2" option may not be automatically enabled on SSL profile.
Conditions:
- roll-forward upgrade from v14.x/v15.x to v17.1.0. upgrade from v16.x to v17.1.0 is not affected.
- custom client|server-ssl profile configured on pre-upgrade version v14.x/v15.x
Impact:
After upgrade to 17.1.0, "no-dtlsv1.2" option may not be enabled on SSL profile.
Workaround:
After upgrade to 17.1.0, manually enable "no-dtlsv1.2" option.
Fixed Versions:
21.0.0, 17.5.1.3
1304081 : CVE-2023-2650 openssl: Possible DoS translating ASN.1 object identifiers
Links to More Info: K000135178, BT1304081
1301545 : CVE-2023-0568 php: 1-byte array overrun in common path resolve code
Links to More Info: K000134747, BT1301545
1292605-2 : Uncaught ReferenceError: ReferenceError: REquest is not defined
Links to More Info: BT1292605
Component: Access Policy Manager
Symptoms:
The Cache-fm-Modern.js file has a typo.
Conditions:
This issue occurs when using Modern JS support EHF.
Impact:
A Javascript error occurs: "Uncaught ReferenceError: ReferenceError: REquest is not defined".
Workaround:
Correct the typo and give the iRule with iFile workaround.
Fix:
The word "REquest" should be "Request" at all the places where there is a typo error.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6.1, 15.1.10.8
1282837-3 : DTLS1.2 Handshakes are causing tmm crash with mTLS connection
Links to More Info: K000151309, BT1282837
1273161 : Secondary blades are unavailable, clusterd is reporting shutdown, and waiting for other blades
Links to More Info: BT1273161
Component: Local Traffic Manager
Symptoms:
On a multi-slot chassis, VCMP guest, or F5OS tenant, clusterd can enter a shutdown state causing some slots to become unavailable.
The event that can cause this is called a partition and occurs when clusterd stops receiving heartbeat packets from a slot over the mgmt_bp interface but is still receiving them over the tmm_bp interface.
Here is the error that is logged when this occurs:
Mar 17 10:38:28 localhost err clusterd[4732]: 013a0004:3: Marking slot 1 SS_FAILED due to partition detected on mgmt_bp from peer 2 to local 1
When this occurs, clusterd enters a shutdown state and at times will never recover.
Here is an example, tmsh show sys cluster command where clusterd is in the shutdown yet waiting state:
-----------------------------------------
Sys::Cluster: default
-----------------------------------------
Address 172.0.0.160/23
Alt-Address ::
Availability available
State enabled
Reason Cluster Enabled
Primary Slot ID 2
Primary Selection Time 03/17/23 10:38:30
----------------------------------------------------------------------------------
| Sys::Cluster Members
| ID Address Alt-Address Availability State Licensed HA Clusterd Reason
----------------------------------------------------------------------------------
| 1 :: :: unknown enabled false unknown shutdown ShutDown: default/1 waiting for blade 2
| 2 :: :: available enabled true standby running Run
Conditions:
Multi-slot chassis, VCMP guest, or F5OS tenant.
A blade determines there is a partition where it's receiving cluster packets over the tmm_bp interface but not the mgmt_bp interface.
Impact:
The unavailable slots/blades will not accept traffic.
Workaround:
Running tmsh show sys cluster will report the primary slot and all slot statuses.
For all blades reporting shutdown or (less likely) initializing and "waiting for blade(s)", restart clusterd on that slot with bigstart restart clusterd. Ensure you do not restart clusterd on the primary slot.
Fix:
None
Fixed Versions:
21.0.0, 17.5.1.2
1270257 : CVE-2023-0662 php: DoS vulnerability when parsing multipart request body
Links to More Info: K000133753, BT1270257
1269709 : GUI should throw the error when the VS is configured with both vdi and HTTP/2 profiles
Links to More Info: BT1269709
Component: Access Policy Manager
Symptoms:
As the VDI profile is currently not supported in the HTTP/2 environment for which there is no warning message on the BIG-IP GUI about this limitation.
Conditions:
When both VDI Profile and HTTP/2 Profile is attached to the VS.
Impact:
The customer wants this error to be displayed on the BIGIP GUI if vdi and http/2 profiles both are attached to the VS together.
Workaround:
None
Fix:
Display the warning message on the BIG-IP GUI for the Configuration error: "Virtual server cannot have vdi and http/2 profiles at the same time" when both vdi and http/2 profiles are attached on the VS.
Fixed Versions:
21.0.0, 17.5.1, 17.1.2, 16.1.5
1267221 : When TMM starts, Hyper-V shows no RX packets on the ethX interface★
Links to More Info: BT1267221
Component: Local Traffic Manager
Symptoms:
BIG-IP Virtual Edition (VE) running on a Hyper-V host, when TMM starts, it sets the NIC queue count. When this happens, due to a bug in Hyper-V, ingress packets are no longer received on the data plane interfaces.
Packets egressed from TMM are being correctly sent to peer devices on the network.
Conditions:
- After upgrading from BIG-IP version 12, none of the data plane interfaces show ingress counters incrementing and no traffic is seen on the interface. The Management interface works properly.
Impact:
The data plane interfaces does not show ingress counters incrementing and no traffic is seen on the interface.
Workaround:
In Hyper-V manager, save the machine state and then start it back up or use a legacy network adapter.
Fix:
This change provides a workaround to not set the NIC queue counts if they are already set properly. To utilize this workaround the amount of memory should be verified so that the number of TMMs equals the number of CPUs on the VM.
A new log message in /var/log/tmm will log whether or not TMM changed the queue count.
Fixed Versions:
21.0.0, 17.5.1
1266853 : CVE-2023-24998 Apache Commons FileUpload: FileUpload DoS with excessive parts
Links to More Info: K000133052, BT1266853
1240373 : CVE-2022-37436: Flaw in mod_proxy module of httpd
Links to More Info: K000132665, BT1240373
1217533-5 : BIG-IP SFTP hardening
Component: TMOS
Symptoms:
Under certain conditions SFTP does not follow current best practices.
Conditions:
- Authenticated high-privilege user
- SFTP file transfer
Impact:
BIG-IP does not follow best practices for sftp operations
Workaround:
NA
Fix:
The SFTP file transfer now follows current best practices.
Fixed Versions:
21.0.0
1209209-8 : CVE-2022-28733 grub2: Integer underflow in grub_net_recv_ip4_packets
Links to More Info: K000132893
1190753 : HTTP/2 Virtual Server ignores customized HTTP known-methods list
Links to More Info: BT1190753
Component: Local Traffic Manager
Symptoms:
An HTTP2 virtual server does not transfer the client request to the backend pool member.
Conditions:
- HTTP profile "Unknown Method : Reject".
- HTTP profile custom "Known Methods" list has non-default values, such as "PATCH".
- HTTP2 profile (and also HTTP profile) is attached to the virtual server.
- Client request is HTTP/2. And HTTP/2 request method is custom one (== method which isn't set as default "known-methods").
Impact:
HTTP2 virtual server traffic is disrupted.
Workaround:
None
Fixed Versions:
21.0.0
1173825 : Improper sanitisation in Qkview data
Component: Local Traffic Manager
Symptoms:
It was found that some of the data from Qkview dumps is improperly sanitised.
Conditions:
When using Qkview to dump data
Impact:
Improper sanitisation of data
Fix:
Qkview now properly sanitising the data.
Fixed Versions:
21.0.0
1166481 : The vip-targeting-vip fastL4 may core
Links to More Info: BT1166481
Component: Local Traffic Manager
Symptoms:
The TMM cores or VIP does not behave as expected.
Conditions:
- fastL4 virtual
- iRule uses virtual command to redirect flows to a second fastL4 virtual
- first virtual configuration is changed before a flow times out
Impact:
Configuration data is freed but continued to be used by the flow, leading to the configuration appearing to be corrupted causing cores or unexpected behavior.
Workaround:
Ensure that there are no active flows for the virtual being changed.
Fix:
None
Fixed Versions:
21.0.0
1144673 : Persistent Connection Issue in SSO v2 Plugin
Links to More Info: K000148816, BT1144673
1144421 : CVE-2019-14866 cpio: improper input validation when writing tar header fields leads to unexpected tar generation
Component: TMOS
Symptoms:
cpio does not properly validate the values written in the header of a TAR file through the to_oct() function. When creating a TAR file from a list of files and one of those is another TAR file with a big size, cpio will generate the resulting file with the content extracted from the input one. This leads to unexpected results as the newly generated TAR file could have files with permissions the owner of the input TAR file did not have or in paths he did not have access to.
Conditions:
Occurs when creating tar archives with unvalidated or specially crafted input filenames.
Impact:
This vulnerability may generate malformed tar files, leading to interoperability issues or unexpected behavior in downstream tools.
Workaround:
NA
Fix:
Patched python to fix the vulnerability.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1144057 : BIG-IP and BIG-IQ improvements disclosed by Rapid7
Links to More Info: K05403841
Component: TMOS
Symptoms:
See: https://support.f5.com/csp/article/K05403841
Conditions:
See: https://support.f5.com/csp/article/K05403841
Impact:
See: https://support.f5.com/csp/article/K05403841
Workaround:
See: https://support.f5.com/csp/article/K05403841
Fix:
See: https://support.f5.com/csp/article/K05403841
Fixed Versions:
21.0.0
1136905-3 : Request for Portal Access Hosted Content are RST with "No available SNAT addr"
Links to More Info: BT1136905
Component: Access Policy Manager
Symptoms:
A RST occurs with the following message in /var/log/apm:
- No available SNAT addr
Conditions:
- Portal Access with Hosted-Content.
Impact:
Unable to access hosted-content resources.
Workaround:
Use the following command:
- tmsh modify sys db ipv6.enabled value false
Fixed Versions:
21.0.0
1136113 : CVE-2022-25647: GSON Vulnerability
Links to More Info: K00994461
1134257 : TMM cores when pingaccess profile is modified multiple times and configuration is loaded
Links to More Info: BT1134257
Component: Local Traffic Manager
Symptoms:
TMM cores.
Conditions:
- The APM pingaccess profile is configured.
- Before configuration load, modify pingaccess profile multiple times.
Impact:
TMM cores.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1132449 : Incomplete or missing IPv6 IP Intelligence database results to connection reset and/or high TMM CPU usage
Links to More Info: BT1132449
Component: Advanced Firewall Manager
Symptoms:
The following IPv4 database load message is present in /var/log/ltm:
015c0010:5: Initial load of IPv4 Reputation database has been completed
Note the absence of the IPv6 version of the same message:
015c0010:5: Initial load of IPv6 Reputation database has been completed
Some scenarios can result in elevated TMM CPU utilization, for example, when using IPI in global policy.
The message "Scheduling priority: normal. Nice level: -19" is seen at a rate of about 100 lines per second, per tmm, in the /var/log/tmm* logs:
Conditions:
Failure to download IPv6 database from localdb-ipv6-daily.brightcloud.com.
Impact:
Any of the following:
- TCL error results when IPI is used in an iRule resulting in connection being reset.
- When using IPI in global policy, increased TMM CPU utilization may occur which leads to idle enforcer being triggered, TMM clock advanced messages appearing in LTM logs, or TMM restarting without core when MCPD is unable to communicate with TMM.
Workaround:
Ensure that BIG-IP is able to communicate using https with BrightCloud servers, including localdb-ipv6-daily.brightcloud.com. For more detailed troubleshooting steps, see K03011490 at https://my.f5.com/manage/s/article/K03011490.
Once the IPv6 reputation database has been retrieved and loaded issues should stop.
This line in ltm log shows load has completed:
015c0010:5: Initial load of IPv6 Reputation database has been completed
Fix:
None
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.6
1128685 : REST API requests using deleted expired tokens returns xml response when authentication fails
Links to More Info: BT1128685
Component: TMOS
Symptoms:
When authentication fails for REST API requests using deleted expired tokens, the response is returned in xml format after including the fix ID1033837
Conditions:
- Token needs to expire and has to be swept from /var/run/pamcache.
- Occurs during authentication attempts with deleted expired tokens after introducing the authentication layer at Apache as part of fix for ID1033837.
Impact:
Few scripts utilized by third party applications are failing because of xml response and expectation is to return a json response.
Workaround:
None
Fix:
To return a json response from REST Layer for requests using deleted expired tokens.
Fixed Versions:
21.0.0
1124865-3 : Removal of LAG member from an active LACP trunk on r2k and r4k systems requires tmm restart
Links to More Info: BT1124865
Component: Local Traffic Manager
Symptoms:
Removal of LAG member from an active LACP trunk stops the traffic flow to the tenant launched on R2x00/R4x00 based appliances.
Conditions:
Removal of LAG member from an active LACP trunk on R2x00 and R4x00 appliances.
Impact:
Traffic flow gets impacted and the system misses the packets routed onto the LACP trunk from where the LAG member was removed.
Workaround:
- Restart tmm on all tenants that are associated with the trunk
Fix:
When removing a LAG member from an Active LACP trunk stops traffic flow on an R2x00/R4x00 appliance system, restarting tmm in the tenants resolves the issue.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3, 15.1.9
1121517 : Interrupts on Hyper-V are pinned on CPU 0
Links to More Info: BT1121517
Component: TMOS
Symptoms:
CPU 0 utilization is much higher relative to other CPUs due to high amount of softirq.
Conditions:
BIG-IP is deployed on a Hyper-V platform.
Impact:
Performance is degraded.
Fix:
Interrupts are balanced across all CPUs.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3, 16.1.4, 15.1.10
1100081 : Error message "http_process_state_prepend - Invalid action:0x10a091" for version 15 and "http_process_state_prepend - Invalid action:0x107061" for versions 16 and 17 appears in the LTM log★
Links to More Info: K21440462, BT1100081
Component: Access Policy Manager
Symptoms:
The error message "http_process_state_prepend - Invalid action:0x10a091" ("http_process_state_prepend - Invalid action:0x107061") erroneously appears in the /var/log/ltm log file.
The error message "Access encountered error: Access pcb policy result is neither not_started nor inprogress: 3" also appears in the /var/log/apm log file.
Conditions:
An http(s) virtual server that also has an Access profile and per-request-policy configured.
Impact:
There is no impact.
Workaround:
None
Fix:
N/A
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1099369 : CVE-2018-25032 [NodeJS]zlib: A flaw found in zlib, when compressing (not decompressing!) certain inputs.
1082197 : RNAME and MNAME field order reversed for Synthetic SOAs sent for negative response
Links to More Info: BT1082197
Component: Global Traffic Manager (DNS)
Symptoms:
Synthetic SOA returned by BIG-IP has the MNAME and RNAME fields reversed, resulting in the wrong values being noted as the primary name server and mailbox of administrator, respectively.
Conditions:
-- Set the failure-rcode-response enabled and failure-rcode-ttl on a down WIP.
-- Perform a DNS query.
-- Observe the SOA.
Impact:
Per RFC (rfc1035) the order of the fields is significant and MNAME must come before RNAME. When reversed, consumers of the synthetic SOA will associate the wrong values with the wrong fields.
Fixed Versions:
21.0.0
1081245-2 : [APM] SSO OAuth Bearer passthrough inserts an old access token instead of the latest one.
Links to More Info: BT1081245
Component: Access Policy Manager
Symptoms:
SSO Bearer authorization fails.
Conditions:
APM PRP is configured with just an OAuth Scope and SSO Bearer attached to PSP.
Impact:
Fails to read new token from request and forwards old token in session variables to backend pool after validation.
Workaround:
1. Configure a PSP of type 'OAuth-RS'
a. Add OAuth Scope
b. Add Variable assign with following expression
apm policy agent variable-assign /Common/RStype_AP_act_variable_assign_ag {
variables {
{
expression "mcget {session.oauth.client.last.access_token}"
secure true
varname session.oauth.client./Common/oauth-aad-server.access_token
}
}
}
2. Configure PRP with Gating Criteria (As per your setup)
a. Add a Variable-Assign inside SBR (subroutine)
apm policy agent variable-assign /Common/empty_act_variable_assign_ag {
variables {
{
expression "mcget -secure {subsession.oauth.client.last.access_token}"
secure true
varname session.oauth.client./Common/oauth-aad-server.access_token
}
}
}
Fix:
N/A
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1078713 : Windows 11 not included in client OS check and Windows Info agent.
Links to More Info: BT1078713
Component: Access Policy Manager
Symptoms:
Branches/rules are not available for Windows 11 in the access policy.
Conditions:
-- Client OS check.
-- Windows Info agent.
Impact:
Unable to use client OS check and Windows Info agent for Windows 11.
Workaround:
Windows 10 and 11 share the same major and minor version and Windows 11 is differentiated by its build number, 22000.
Adding a "Windows Registry" agent such as this before the "Windows Info" agent do branch off Windows 11 machines.
"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion"."CurrentBuildNumber">="22000"
Fix:
N/A
Fixed Versions:
21.0.0, 17.5.1
1071385 : SSL session resumption is incorrectly logging handshake failure messages
Links to More Info: BT1071385
Component: Local Traffic Manager
Symptoms:
Handshake failure messages are logged when the handshake was successful.
Conditions:
-- Client establishes connection with session resumption option
Impact:
Inaccurate information in log.
Workaround:
None
Fix:
None
Fixed Versions:
21.0.0, 17.5.1.3
1069949 : CVE-2018-1000007 curl: HTTP authentication leak in redirects
Component: TMOS
Symptoms:
libcurl might accidentally leak authentication data to third parties.
When asked to send custom headers in its HTTP requests, libcurl will send that set of headers first to the host in the initial URL but also, if asked to follow redirects and a 30X HTTP response code is returned, to the host mentioned in URL in the `Location:` response header value.
Sending the same set of headers to subsequent hosts is, in particular, a problem for applications that pass on custom `Authorization:` headers, as this header often contains privacy-sensitive information or data that could allow others to impersonate the libcurl-using client's request.
Conditions:
NA
Impact:
Sensitive information could be disclosed to an unauthorised user
Workaround:
NA
Fix:
Patched curl to fix the vulnerability.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1069341 : CVE-2016-4738 libxslt: Heap overread due to an empty decimal-separator
Component: TMOS
Symptoms:
libxslt in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site
Conditions:
NA
Impact:
It can result in DoS.
Workaround:
NA
Fix:
libxslt has been patched to address this vulnerability.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1061485 : CVE-2019-19527: Linux kernel vulnerability
Component: TMOS
Symptoms:
A vulnerability was found in hiddev_open in drivers/hid/usbhid/hiddev.c in the USB Human Interface Device class subsystem, where an existing device must be validated prior to its access. The device should also ensure the hiddev_list cleanup occurs at failure, as this may lead to a use-after-free problem, or possibly escalate privileges to an unauthorized user.
Conditions:
NA
Impact:
Unauthorised access to BIGIP device
Workaround:
NA
Fix:
Patched kernel to fix the vulnerability.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1059229 : CVE-2019-16994 kernel: Memory leak in sit_init_net() in net/ipv6/sit.c
Component: TMOS
Symptoms:
A flaw was found in the way the sit_init_net function in the Linux kernel handled resource cleanup on errors. This flaw allows an attacker to use the error conditions to crash the system.
Conditions:
Linux kernel versions before 5.0
Impact:
It can result in DoS.
Workaround:
N/A
Fix:
kernel has been patched to address this vulnerability.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1058197 : CVE-2019-14973: LibTIFF Vulnerability
Component: TMOS
Symptoms:
_TIFFCheckMalloc and _TIFFCheckRealloc in tif_aux.c in LibTIFF through 4.0.10 mishandle Integer Overflow checks because they rely on compiler behaviour that is undefined by the applicable C standards. This can, for example, lead to an application crash.
Conditions:
NA
Impact:
It could lead to minor disruptions in service (availability impact) and may expose or modify some non-sensitive information (confidentiality and integrity impact)
Workaround:
unauthorized users cannot access the systems
Fix:
Patched LibTIFF to fix the vulnerability.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1057141 : CVE-2018-14647 python: Missing salt initialization in _elementtree.c module
Links to More Info: K000151007, BT1057141
1052445-2 : CVE-2019-19537 kernel: race condition caused by a malicious USB device in the USB character device driver layer
Component: TMOS
Symptoms:
A flaw was found in the Linux kernel, where there is a race condition bug that can be caused by a malicious USB device in the USB character device driver layer. An attacker who can hotplug at least two devices of this class can cause a use-after-free situation.
This affects the generic character device layer devices and not a specific device driver.
Conditions:
NA
Impact:
A flaw was found in the Linux kernel, where there is a race condition bug that can be caused by a malicious USB device in the USB character device driver layer. An attacker who can hotplug at least two devices of this class can cause a use-after-free situation.
This affects the generic character device layer devices and not a specific device driver.
Workaround:
NA
Fix:
Patched kernel to fix the vulnerability
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1052437-2 : CVE-2019-19532 kernel: malicious USB devices can lead to multiple out-of-bounds write
Component: TMOS
Symptoms:
In the Linux kernel before 5.3.9, there are multiple out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers, aka CID-d9d4b1e46d95. This affects drivers/hid/hid-axff.c, drivers/hid/hid-dr.c, drivers/hid/hid-emsff.c, drivers/hid/hid-gaff.c, drivers/hid/hid-holtekff.c, drivers/hid/hid-lg2ff.c, drivers/hid/hid-lg3ff.c, drivers/hid/hid-lg4ff.c, drivers/hid/hid-lgff.c, drivers/hid/hid-logitech-hidpp.c, drivers/hid/hid-microsoft.c, drivers/hid/hid-sony.c, drivers/hid/hid-tmff.c, and drivers/hid/hid-zpff.c.
Conditions:
NA
Impact:
In the Linux kernel before 5.3.9, there are multiple out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers, aka CID-d9d4b1e46d95. This affects drivers/hid/hid-axff.c, drivers/hid/hid-dr.c, drivers/hid/hid-emsff.c, drivers/hid/hid-gaff.c, drivers/hid/hid-holtekff.c, drivers/hid/hid-lg2ff.c, drivers/hid/hid-lg3ff.c, drivers/hid/hid-lg4ff.c, drivers/hid/hid-lgff.c, drivers/hid/hid-logitech-hidpp.c, drivers/hid/hid-microsoft.c, drivers/hid/hid-sony.c, drivers/hid/hid-tmff.c, and drivers/hid/hid-zpff.c.
Workaround:
NA
Fix:
Patched kernel to fix this vulnerability
Fixed Versions:
21.0.0, 17.1.3
1052433-2 : CVE-2019-19530: use-after-free caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver
Component: TMOS
Symptoms:
use-after-free flaw was found in the acm_probe USB subsystem in the Linux kernel. A race condition occurs when a destroy() procedure is initiated allowing the refcount to decrement on the interface so early that it is never undercounted. A malicious USB device is required for exploitation. System availability is the largest threat from the vulnerability, however, data integrity and confidentiality are also threatened.
Conditions:
NA
Impact:
A malicious USB device is required for exploitation. System availability is the largest threat from the vulnerability, however, data integrity and confidentiality are also threatened.
Workaround:
NA
Fix:
Patched kernel to fix this vulnerability
Fixed Versions:
21.0.0, 17.1.3
1052333 : CVE-2018-16885: Linux kernel vulnerability
Component: TMOS
Symptoms:
A flaw was found in the Linux kernel that allows the userspace to call memcpy_fromiovecend() and similar functions with a zero offset and buffer length. This can cause a read beyond the buffer boundaries flaw and, in certain cases, cause a memory access fault and a system halt by accessing an invalid memory address.
Conditions:
NA
Impact:
This can cause a read beyond the buffer boundaries flaw.
Workaround:
NA
Fix:
Patched kernel to fix the vulnerability.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1052253 : CVE-2018-13095 kernel: NULL pointer dereference in fs/xfs/libxfs/xfs_inode_buf.c
Component: TMOS
Symptoms:
An issue was discovered in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.17.3. A denial of service (memory corruption and BUG) can occur for a corrupted xfs image upon encountering an inode that is in extent format, but has more extents than fit in the inode fork.
Conditions:
Linux kernel version up to including 4.17.3 is vulnerable to this CVE.
Impact:
Exploitation of the vulnerability could cause the system to become unavailable (DoS).
Workaround:
NA
Fix:
Patched kernel to fix the vulnerability.
Fixed Versions:
21.0.0, 17.1.3
1052249 : CVE-2018-13094 kernel: NULL pointer dereference in xfs_da_shrink_inode function
Component: TMOS
Symptoms:
An issue was discovered in the XFS filesystem in fs/xfs/libxfs/xfs_attr_leaf.c in the Linux kernel. A NULL pointer dereference may occur for a corrupted xfs image after xfs_da_shrink_inode() is called with a NULL bp. This can lead to a system crash and a denial of service.
Conditions:
NA
Impact:
Exploitation of the vulnerability could cause the system to become unavailable (DoS).
Workaround:
Limit physical or local access to the system
Fix:
Patched kernel to fix the vulnerability.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1052245 : CVE-2018-13093 kernel: NULL pointer dereference in lookup_slow function
Component: TMOS
Symptoms:
An issue was discovered in the XFS filesystem in fs/xfs/xfs_icache.c in the Linux kernel. There is a NULL pointer dereference leading to a system panic in lookup_slow() on a NULL inode->i_ops pointer when doing path walks on a corrupted xfs image. This occurs because of a lack of proper validation that cached inodes are free during an allocation.
Conditions:
Linux kernel versions before 4.17.3 are vulnerable
Impact:
It can result in DoS.
Workaround:
N/A
Fix:
kernel has been patched to address this vulnerability.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1052217 : CVE-2018-19985 kernel: oob memory read in hso_probe in drivers/net/usb/hso.c
Component: TMOS
Symptoms:
A flaw was found in the Linux kernel in the function hso_probe() which reads if_num value from the USB device (as an u8) and uses it without a length check to index an array, resulting in an OOB memory read in hso_probe() or hso_get_config_data(). An attacker with forged USB device with a physical access to a system (needed to connect such a device) can cause a system crash and a denial-of-service.
Conditions:
NA
Impact:
The primary impact of this vulnerability is a denial-of-service (DoS) due to the kernel crash
Workaround:
NA
Fix:
Patched kernel to fix the vulnerability.
Fixed Versions:
21.0.0, 17.5.1, 17.1.3
1052181 : CVE-2018-7191 kernel: denial of service via ioctl call in network tun handling
Component: TMOS
Symptoms:
In the tun subsystem in the Linux kernel, a local attacker could issue an ioctl to call dev_get_valid_name which is not called before register_netdevice. This allows local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character.
Conditions:
Linux kernel versions before 4.13.14 are vulnerable
Impact:
It can result in DoS.
Workaround:
N/A
Fix:
kernel has been patched to address this vulnerability.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1051869 : CVE-2018-20169: Linux kernel vulnerability
Component: TMOS
Symptoms:
A flaw was discovered in the Linux kernel's USB subsystem in the __usb_get_extra_descriptor() function in the drivers/usb/core/usb.c which mishandles a size check during the reading of an extra descriptor data. By using a specially crafted USB device which sends a forged extra descriptor, an unprivileged user with physical access to the system can potentially cause a privilege escalation or trigger a system crash or lock up and thus to cause a denial of service (DoS).
Conditions:
NA
Impact:
Unauthorized access to sensitive information, Unauthorized modification or corruption of data
Workaround:
Limit access to the affected systems to trusted networks or users.
Fix:
Patched kernel to fix the vulnerability.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1051769 : CVE-2019-10140 kernel: overlayfs: NULL pointer dereference in ovl_posix_acl_create function in fs/overlayfs/dir.c
Component: TMOS
Symptoms:
An attacker with local access can create a denial of service situation via a NULL pointer dereference in ovl_posix_acl_create function in fs/overlayfs/dir.c. This can allow attackers with the ability to create directories on overlayfs to crash the kernel creating a denial of service (DOS).
Conditions:
Linux kernel versions before 3.10 are vulnerable
Impact:
It can result in DoS.
Workaround:
N/A
Fix:
kernel has been patched to address this vulnerability.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1051697 : CVE-2019-11833 kernel: fs/ext4/extents.c leads to information disclosure
Component: TMOS
Symptoms:
A flaw was found in the Linux kernels implementation of ext4 extent management which did not correctly initialize memory regions in the extent tree block which may be exported to a local user to obtain sensitive information by reading empty/uninitialized data from the filesystem.
Conditions:
Linux kernel versions before 5.1.2 are vulnerable
Impact:
It can result in information disclosure
Workaround:
N/A
Fix:
kernel has been patched to address this vulnerability.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3
1047789 : [APM] MCP err msg seen when editing/applying resource assign in VPE
Links to More Info: BT1047789
Component: Access Policy Manager
Symptoms:
An error message is found in /var/log/apm
MCP message handling failed in 0xb0ad80 (16973840): Sep 3 09:56:22 on 2 - MCP Message:
Conditions:
When VPE (or via CLI) "Advanced Resource Assign" agent is re-configured
Impact:
No functional impact.
Workaround:
None
Fixed Versions:
21.0.0, 17.5.1
1041889 : RRSIG missing for CNAME with RDATA in different zone
Links to More Info: BT1041889
Component: Global Traffic Manager (DNS)
Symptoms:
RRSIG missing for CNAME.
Conditions:
-- CNAME record with RDATA in different zone.
-- One zone dynamically signed.
-- The other zone in local BIND (ZoneRunner) with static DNSSEC records.
Impact:
DNSSEC validation failure.
Fixed Versions:
21.0.0, 17.5.1.2
1036645 : Running keyswap.sh on a VIPRION or VCMP platform may not complete successfully
Links to More Info: BT1036645
Component: Local Traffic Manager
Symptoms:
When running keyswap.sh to synchronize ssh keys on a multi-bladed system, keyswap.sh may not complete successfully.
Conditions:
-- A multi-bladed environment such as VIPRION or VCMP
-- The keyswap.sh script is run
Impact:
The keyswap.sh script may not complete successfully
Workaround:
Run keyswap.sh on the console
(or)
nohup /usr/bin/keyswap.sh -genkeys
(or)
stop csyncd before running keyswap.sh and then re-start it:
tmsh stop sys service csyncd
keyswap.sh -genkeys
tmsh start sys service csyncd
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1033937 : HTTP message router stats do not increment for virtual servers and pools
Links to More Info: BT1033937
Component: Local Traffic Manager
Symptoms:
The HTTP MR stats for virtual servers and pools do not increment
Conditions:
- BIG-IP system with HTTP using httprouter and passing traffic.
- View the MRF stats
Impact:
Virtual server and pool stats do not increment.
Fixed Versions:
21.0.0
1032001 : Statemirror address can be configured on management network or clusterd restarting
Links to More Info: BT1032001
Component: TMOS
Symptoms:
- Able to create statemirror address on the same network as management or cluster network.
- Validation issues when attempting to remove a management address.
- Clusterd process restarts constantly.
Conditions:
- Management/cluster address set up with IPv6 and statemirror address is configured with IPv4.
Impact:
- Unable to make configuration changes to the management or cluster address until the statemirror address is removed.
- Clusterd process restarts constantly causing the blade or cluster to report as offline.
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3, 15.1.3.1
1029173 : MCPD fails to reply and does not log a valid message if there are problems replicating a transaction to PostgreSQL
Links to More Info: BT1029173
Component: TMOS
Symptoms:
In rare circumstances MCPD fails to reply to a request from TMSH, GUI, or any daemon, for example, SNMPD.
Following is an example error message:
Mar 29 00:03:12 bigip1 err mcpd[15865]: 01070734:3: Configuration error: MCPProcessor::processRequestNow: std::exception
If snmpd is the daemon that is impacted you might see this warning message:
warning snmpd[15561]: 010e0004:4: MCPD query response exceeding 270 seconds
Conditions:
- AFM is provisioned.
- MCPD fails to connect PostgreSQL.
Impact:
TMSH command save sys config might be hung.
SNMPD stops replying to SNMP GET requests.
Workaround:
If there are any hung TMSH commands, then quit.
If SNMPD stops responding to SNMP requests, then use the command bigstart restart snmpd to restart SNMPD.
Fixed Versions:
21.0.0
1028701 : CVE-2019-9947 python: CRLF injection via the path part of the url passed to urlopen()
Links to More Info: K000151516, BT1028701
1028541 : CVE-2018-18384: Unzip Vulnerability
Component: TMOS
Symptoms:
Info-ZIP UnZip 6.0 has a buffer overflow in list.c, when a ZIP archive has a crafted relationship between the compressed-size value and the uncompressed-size value, because a buffer size is 10 and is supposed to be 12.
Conditions:
NA
Impact:
Exploitation requires high-privileged local user access and user interaction, causing only a limited availability impact (denial of service).
Workaround:
NA
Fix:
Patched unzip to resolve the vulnerability
Fixed Versions:
21.0.0, 17.5.1.3, 17.1.3
1027237 : Cannot edit virtual server in GUI after loading config with traffic-matching-criteria
Links to More Info: BT1027237
Component: TMOS
Symptoms:
After creating a virtual server with a traffic-matching-criteria and then loading the configuration, you are unable to make changes to it in the GUI. Attempting to do so results in an error similar to:
0107028f:3: The destination (0.0.0.0) address and mask (::) for virtual server (/Common/test-vs) must be be the same type (IPv4 or IPv6).
Conditions:
-- A virtual server that has traffic-matching-criteria (i.e., address and/or port lists).
-- The configuration has been saved at least once.
-- Attempting to edit the virtual server in the GUI.
Impact:
Unable to use the GUI to edit the virtual server.
Workaround:
Use TMSH to modify the virtual server.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3, 16.1.6.1, 15.1.10.8
1014361-4 : Config sync fails after provisioning APM or changing BIG-IP license
Links to More Info: BT1014361
Component: TMOS
Symptoms:
Clustered high availability (HA) devices cannot establish ConfigSync connection, and the prompt status reports disconnected.
MCPD is logging a message similar to this repeatedly, even though all TMMs are up and running:
err mcpd[4247]: 0107142f:3: Can't connect to CMI peer 192.0.2.1, TMM outbound listener not yet created
Conditions:
This can occur in either of the following conditions:
-- Some provisioning operations (i.e. provisioning APM), when TMM restarts during the provisioning. This has primarily been seen with BIG-IP instances running in Google Cloud.
-- Changing the license of a BIG-IP VE when the new license changes the number of TMM instances that will run on the BIG-IP (i.e. upgrading from a 1Gbps to 3Gbps VE license)
Impact:
BIG-IP devices are not able to perform ConfigSync operations.
Workaround:
Restart MCPD on the affected system.
Note: This will disrupt traffic while system services restart.
Fix:
Enhanced MCPD logic to maintain the connected state when a license change event occurs.
Fixed Versions:
21.0.0, 17.5.1.3
1012009 : MQTT Message Routing virtual may result in TMM crash
Links to More Info: BT1012009
Component: Local Traffic Manager
Symptoms:
The BIG-IP system provides an option to use Message Routing virtual servers for MQTT traffic. It uses a different approach to associate a client side and a server side than a standard virtual server. In some instances, a server side is incorrectly handled.
Conditions:
-- A Message Routing virtual with MQTT protocol.
-- A client attempts to reconnect.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fix:
When a client attempts to reconnect, and an existing server side connection is used, TMM correctly handles the connection's state and no longer crashes for this reason.
Fixed Versions:
21.0.0, 15.1.4.1
1010129 : A segmentation fault occurs
Links to More Info: BT1010129
Component: Global Traffic Manager (DNS)
Symptoms:
When BIG-IP is out of memory, dns_cache_find_delegation could core because ns->name could not be allocated.
Conditions:
BIG-IP is out of memory.
Impact:
A segmentation fault occurs
Workaround:
None
Fix:
Fixed segmentation fault when calling dns_cache_find_delegation and BIG-IP is out of memory
Fixed Versions:
21.0.0
1009161-4 : SSL mirroring protect for null sessions
Links to More Info: BT1009161
Component: Local Traffic Manager
Symptoms:
Possible tmm crash during ssl handshake with connection mirroring enabled.
Conditions:
14.1 after changes applied for ID760406 and ssl handshake dropped during ssl handshake session state.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Disable connection mirroring
Fix:
Prevent possible crash on ssl connection mirroing in 14.1
Fixed Versions:
21.0.0, 15.1.5.1, 14.1.4.5
1008885-2 : Sessiondump CPU is showing unknown for Mac OS and BIG-IP platform
Links to More Info: BT1008885
Component: Access Policy Manager
Symptoms:
After APM session, when a user creates an access session using Mac OS based clients, the session dump shows CPU as unknown in session.client.cpu value.
Conditions:
Mac OS based client is used.
Impact:
If session.client.cpu variable is used for any access policy decisions, it will fail as CPU is unknown.
Workaround:
None
Fix:
CPU should be shown properly like x86_64 or any other.
Fixed Versions:
21.0.0, 17.5.1.2, 17.1.3, 16.1.6.1
1005097 : CVE-2020-17507: Vulnerability in Phantomjs
Links to More Info: K11542555
Known Issues in BIG-IP v21.0.x
TMOS Issues
| ID Number | Severity | Links to More Info | Description |
| 921069 | 3-Major | BT921069 | Neurond cores while adding or deleting rules |
| 2143141 | 3-Major | Unzip package is removed from tmos | |
| 1644497 | 3-Major | BT1644497 | TMM retains old Certificate Revocation List (CRL) data in memory until the existing connections are closed |
| 1600617-4 | 3-Major | BT1600617 | Few virtio driver configurations may result in excessive memory usage |
| 1403869 | 3-Major | BT1403869 | CONNFLOW_FLAG_DOUBLE_LB flows might route traffic to a stale next hop |
| 1325737 | 4-Minor | BT1325737 | Standby tenant cannot access floating traffic group when MAC masquerade is enabled |
Local Traffic Manager Issues
| ID Number | Severity | Links to More Info | Description |
| 1785385 | 1-Blocking | BT1785385 | Intermittent traffic failures when tenant is running BIG-IP v17.1.2 or above and host is on version prior to F5OS-A 1.8.0 or F5OS-C 1.8.0★ |
| 901569 | 3-Major | BT901569 | Loopback traffic might get dropped when VLAN filter is enabled for a virtual server. |
| 739475 | 3-Major | BT739475 | Site-Local IPv6 Unicast Addresses support. |
| 2141233-2 | 3-Major | BT2141233 | Client authentication profile as "Request" in FIPS-CC mode causes connection termination without certificate |
| 1788105 | 3-Major | BT1788105 | TLS1.3 connections between BIG-IP and server hangs with an APM policy that is invoked after the server's SSL handshake finishes★ |
| 1440409 | 3-Major | BT1440409 | TMM might crash or leak memory with certain logging configurations |
| 1352213-1 | 3-Major | BT1352213 | Handshake fails with FFDHE key share extension |
| 932553 | 4-Minor | BT932553 | An HTTP request is not served when a remote logging server is down |
| 1285981 | 4-Minor | BT1285981 | The iRule HTTP::respond with TCP:close fails at HTTP_RESPONSE |
| 1004953 | 4-Minor | BT1004953 | HTTP does not fall back to HTTP/1.1★ |
Advanced Firewall Manager Issues
| ID Number | Severity | Links to More Info | Description |
| 760355-1 | 4-Minor | BT760355 | Firewall rule to block ICMP/DHCP from 'required' to 'default'★ |
Policy Enforcement Manager Issues
| ID Number | Severity | Links to More Info | Description |
| 1934073 | 3-Major | BT1934073 | PEM policy rule incorrectly matching when using a flow condition |
F5OS Messaging Agent Issues
| ID Number | Severity | Links to More Info | Description |
| 2008409-1 | 4-Minor | BT2008409 | MAC masquerade does not work on an F5OS tenant if there are no floating self-ips configured on the VLAN |
Known Issue details for BIG-IP v21.0.x
932553 : An HTTP request is not served when a remote logging server is down
Links to More Info: BT932553
Component: Local Traffic Manager
Symptoms:
BIG-IP systems provide an option to sanitize HTTP traffic via the http_security profile. When the profile is configured to alarm on a violation, it is possible that a connection to the violating client is reset if a remote logging server is marked down.
Conditions:
-- A BIG-IP system has an HTTP profile and and an http_security profile with the alarm option set.
-- A remote logging server is configured via a BIG-IP pool.
-- The pool has a monitor that marks all the pool members down.
-- A request with an HTTP violation is processed and triggers an alarm configured in the http_security profile.
Impact:
-- A TCP connection to a client is reset by the BIG-IP system.
-- The web page may not render, or may not render as expected.
-- Data are not delivered to a server with a POST request.
Workaround:
None.
921069 : Neurond cores while adding or deleting rules
Links to More Info: BT921069
Component: TMOS
Symptoms:
Neurond cores if it receives error while adding or deleting rules in neuron hardware.
Conditions:
Adding or deleting rules in neuron hardware
Impact:
Neurond cores
Workaround:
None
901569 : Loopback traffic might get dropped when VLAN filter is enabled for a virtual server.
Links to More Info: BT901569
Component: Local Traffic Manager
Symptoms:
Loopback traffic (local traffic) destined to a virtual server might get dropped when the incoming packet matches a terminating connection flow.
Conditions:
-- VLAN filter is enabled on the virtual server created for loopback traffic processing.
-- An incoming packet matches a terminating connection flow (i.e., the connection flow terminates because of timeout, being dropped by iRule, etc.).
Impact:
Traffic that is matched against a terminating connection flow of a virtual is not processed by the virtual server.
Workaround:
Because this filter is ignored for loopback traffic, removing the 'Enabled On VLAN' filter at the virtual server mitigates the issue.
760355-1 : Firewall rule to block ICMP/DHCP from 'required' to 'default'★
Links to More Info: BT760355
Component: Advanced Firewall Manager
Symptoms:
If a firewall is configured on the management port with an ICMP rule, after upgrading to v14.1.x or later, the ICMP rule does not work.
Conditions:
- Firewall is configured on the management port.
- Firewall is configured with an ICMP rule to block.
- Firewall is configured with an ICMP rule to allow.
Impact:
ICMP packets cannot be blocked with a firewall rule to drop on the management port. ICMP packets are allowed from the management port and will not increase the counter even if explicitly allowed by a rule.
Workaround:
Run the following commands after upgrading to v14.1.x or later from earlier versions.
# /sbin/iptables -N id760355
# /sbin/iptables -I INPUT 1 -j id760355
# /sbin/iptables -A id760355 -i mgmt -p icmp --icmp-type 8 -s 172.28.4.32 -j DROP
739475 : Site-Local IPv6 Unicast Addresses support.
Links to More Info: BT739475
Component: Local Traffic Manager
Symptoms:
No reply to Neighbor Advertisement packets.
Conditions:
Using FE80::/10 addresses in network.
Impact:
Cannot use FE80::/10 addressees in network.
Workaround:
None
2143141 : Unzip package is removed from tmos
Component: TMOS
Symptoms:
As part of the DynaCache package removal, which was not being used by any tmos component, the unzip package was also removed. This is expected behavior since DynaCache depended on unzip during the build process. Once DynaCache was removed, unzip was no longer included as it was no longer required. As there were no other dependencies on unzip apart from DynaCache, the package was not included in the build, which resulted in a missing unzip command.
Conditions:
If customer uses unzip from tmos then only it will be impacted
Impact:
Unzip command cannot be used
Workaround:
None
2141233-2 : Client authentication profile as "Request" in FIPS-CC mode causes connection termination without certificate
Links to More Info: BT2141233
Component: Local Traffic Manager
Symptoms:
SSL handshakes timeout instead of finishing.
Conditions:
1. Clientssl profile configured with Client Authentication enabled with "Request" option
2. BIG-IP is in FIPS-CC mode
3. Client does not provide a certificate
Impact:
SSL handshakes do not finish but instead timeout.
Workaround:
Workaround 1:
Disable Client authentication.
Workaround 2:
Configure CRL on the Client SSL profile
Workaround 3:
Enable Client Certificate Constrained Delegation (c3d) feature on the SSL profiles(requires Server-SSL profile and this feature forges client cert to server upon cert request from app-server).
2008409-1 : MAC masquerade does not work on an F5OS tenant if there are no floating self-ips configured on the VLAN
Links to More Info: BT2008409
Component: F5OS Messaging Agent
Symptoms:
Network traffic fails on a VLAN that is shared by multiple tenants.
Conditions:
-- F5OS tenants sharing a VLAN
-- MAC masquerade enabled on both tenants
-- No floating self-ips configured
Impact:
MAC masquerade may not work properly causing traffic failures such as packets not arriving on the tenant. Or excessive DLFs on the network.
Workaround:
Add floating self-ips to all traffic VLANs that are using MAC masquerade.
1934073 : PEM policy rule incorrectly matching when using a flow condition
Links to More Info: BT1934073
Component: Policy Enforcement Manager
Symptoms:
When a PEM policy rule is configured to match the destination IP address and port, the message might match the source IP and port instead.
Conditions:
PEM policy rule is using flow conditions to match IP address and port
Impact:
An incorrect policy rule might be matched
Workaround:
None
1788105 : TLS1.3 connections between BIG-IP and server hangs with an APM policy that is invoked after the server's SSL handshake finishes★
Links to More Info: BT1788105
Component: Local Traffic Manager
Symptoms:
A TLS1.3 connection between the BIG-IP system and the server hangs.
Other reported symptoms:
-- SSL decryption fails
-- SSL handshake failure
-- SSL Orchestrator explicit proxy stops responding
This can be encountered after an upgrade to an affected version.
Conditions:
A virtual server that uses
1. TLS1.3 in the serverSSL profile
2. An APM policy that uses events that trigger after the SSL handshake on the server has completed
In an SSL Orchestrator setting, inline HTTP and ICAP services make use of APM policies that use L7 protocol lookup. Server Certificate and L7 protocol lookup conditions also make use of events that trigger the APM policy after the SSL handshake has completed.
Impact:
The connection hangs and the client is unable to connect to the server.
Workaround:
Apply either of these workarounds
1. Disable TLS1.3 on the serverSSL profile
2. Avoid using events that trigger the policy after the SSL handshake on the server has completed (for example avoid Event Wait and L7 protocol Lookup)
1785385 : Intermittent traffic failures when tenant is running BIG-IP v17.1.2 or above and host is on version prior to F5OS-A 1.8.0 or F5OS-C 1.8.0★
Links to More Info: BT1785385
Component: Local Traffic Manager
Symptoms:
Intermittent traffic failures for a tenant running BIG-IP v17.1.2 or above.
This often manifests as ICMP monitors failing.
Conditions:
- Tenant running BIG-IP v17.1.2 or above
- Host is one of the following platforms:
-- r5000, r10000, or r12000-series appliance
-- VELOS
- Host is running a version prior to F5OS-A 1.8.0 (rSeries appliance) or F5OS-C 1.8.0 (VELOS chassis)
Impact:
Intermittent traffic disruption. This often manifests as ICMP monitors intermittently failing, but will also impact virtual server traffic and other protocols (e.g. UDP and TCP).
Workaround:
Upgrade F5OS to version 1.8.0 or higher.
1644497 : TMM retains old Certificate Revocation List (CRL) data in memory until the existing connections are closed
Links to More Info: BT1644497
Component: TMOS
Symptoms:
In TMM memory, the old CRL data is available until the existing connections are closed. This may exhaust TMM memory.
Conditions:
- Connections last for a long time.
- Frequent updates on the CRL.
Impact:
TMM memory exhausts.
Workaround:
- Dynamic CRL or CRLDP on the Client-SSL profile can be configured to dynamically verify the SSL certificate revocation status.
or
- Online Certificate Status Protocol (OCSP) can be enabled on the Client-SSL profile to validate SSL certificate revocation status.
1600617-4 : Few virtio driver configurations may result in excessive memory usage
Links to More Info: BT1600617
Component: TMOS
Symptoms:
Certain virtio driver configurations may result in excessive memory usage, which in some cases, leads to issues with forwarding traffic.
'tmctl page_stats' output can be examined on a newly launched system to verify if any of the TMMs except for TMM0 have their memory exhausted.
Conditions:
Virtio driver memory usage scales up with:
- Number of queues.
- Number of TMMs.
- Number of interfaces.
- Queue size.
Increasing these numbers might cause a problem trigger.
Impact:
Excessive memory usage, in some cases, leads to problems with traffic forwarding.
Workaround:
Scale down on the number of queues and their size. Reduce the number of interfaces.
1440409 : TMM might crash or leak memory with certain logging configurations
Links to More Info: BT1440409
Component: Local Traffic Manager
Symptoms:
TMM might crash or leak memory with certain logging configurations.
Conditions:
Virtual-to-virtual chaining is used for handling syslog messages.
Impact:
Memory leak or Crash.
Workaround:
None
1403869 : CONNFLOW_FLAG_DOUBLE_LB flows might route traffic to a stale next hop
Links to More Info: BT1403869
Component: TMOS
Symptoms:
Pool members configured with IP encapsulation or any type of flow using CONNFLOW_FLAG_DOUBLE_LB flag might take some time to refresh its nexthops.
Conditions:
BIG-IP receives an ECMP route towards a server over two different BGP peers and the server is a pool member with IPIP encapsulation enabled. One of the BGP peers goes down and the route gets removed immediately, but BIG-IP is still forwarding traffic to this peer for the next few seconds, even though tmm.inline_route_update is enabled.
Impact:
The connection is using the old, invalid next hop for a few seconds.
Workaround:
None
1352213-1 : Handshake fails with FFDHE key share extension
Links to More Info: BT1352213
Component: Local Traffic Manager
Symptoms:
SSL handshake fails to complete and various errors show in the LTM logs
01010025:2: Device error: crypto codec Couldn't create an OpenSSL EC group object OpenSSL error:00000000:lib(0):func(0):reason(0)
01010282:3: Crypto codec error: sw_crypto-1 Couldn't initialize the elliptic curve parameters.
01010025:2: Device error: crypto codec No codec available to initialize request context.
Conditions:
An SSL profile uses TLS1.3, and a TLS Client Hello attempts to use FFDHE as part of the key share extension.
Impact:
SSL handshake fails and results in connection failure.
Workaround:
Set the SSL profile to disallow using FFDHE groups.
1325737 : Standby tenant cannot access floating traffic group when MAC masquerade is enabled
Links to More Info: BT1325737
Component: TMOS
Symptoms:
A standby BIG-IP tenant running on an r2000 or r4000 appliance cannot access addresses in the floating traffic group if MAC masquerade is enabled. For instance, the standby tenant will not be able to ping the floating self IP address.
External devices can access the floating self IP address without issue.
If the tenants swap HA roles (the active device becomes standby, and the standby device becomes active), the problem follows the standby device -- the newly-standby system is not able to ping the floating self IP address.
Conditions:
-- F5 r2000 or BIG-IP r4000 system
-- BIG-IP tenant with MAC masquerade configured for floating traffic group
Impact:
Standby tenant unable to access resources in the floating traffic group when MAC masquerade is configured.
Workaround:
None
1285981 : The iRule HTTP::respond with TCP:close fails at HTTP_RESPONSE
Links to More Info: BT1285981
Component: Local Traffic Manager
Symptoms:
If a server response is sent in multiple packets, HTTP::respond never serves the response to the client.
Conditions:
- Basic HTTP virtual server with below iRule:
when HTTP_RESPONSE {
HTTP::respond 200 content "CONTENT DATA in HTTP_RESPONSE\n" noserver connection close
TCP::close
}
-- The actual server response arrives in multiple packets.
Impact:
Connection towards the client is closed before HTTP::respond is served.
Workaround:
Use HTTP_RESPONSE_RELEASE instead of HTTP_RESPONSE.
1004953 : HTTP does not fall back to HTTP/1.1★
Links to More Info: BT1004953
Component: Local Traffic Manager
Symptoms:
After upgrading, the BIG-IP system's HTTP profile no longer falls back to HTTP/1.1 if a client sends a corrupted URI.
Conditions:
-- Client sends a corrupted URI (for example a URI containing a space).
Impact:
The BIG-IP system treats the URI as an HTTP/0.9 request (as per RFC) and forwards only the first request line. In previous releases, the BIG-IP system treated the URI as a HTTP/1.1 request.
Workaround:
None.
★ This issue may cause the configuration to fail to load or may significantly impact system performance after upgrade
For additional support resources and technical documentation, see:
- The F5 Technical Support website: http://www.f5.com/support/
- The MyF5 website: https://my.f5.com/manage/s/
- The F5 DevCentral website: http://community.f5.com/