Original Publication Date: 05/05/2026
Updated Date: 05/05/2026
Version: 21.1.0
Build: 38.0
Note: This content is current as of the software release date
Updates to bug information occur periodically. For the most up-to-date bug data, see Bug Tracker.
| The blue background highlights fixes |
Known Issues in BIG-IP v21.1.x
Vulnerability Fixes
| ID Number | CVE | Links to More Info | Description | Fixed Versions |
| 2196137 | CVE-2026-2507 | K000160003, BT2196137 | Issue observed only in BIG-IP 17.5.1.4: traffic processed by AFM or DDoS Hybrid Defender may cause TMM to restart | 21.1.0, 17.5.1.5 |
| 2144389 | CVE-2025-40780 | K000157948, BT2144389 | CVE-2025-40780 BIND vulnerability | 21.1.0, 17.5.1.4, 17.1.3.1 |
| 2140621 | CVE-2025-8677 | K000157317, BT2140621 | CVE-2025-8677: Resource exhaustion via malformed DNSKEY handling | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 928901 | CVE-2020-11022 | K02453220 | jQuery vulnerability CVE-2020-11022 | 21.1.0 |
| 1988993-1 | CVE-2024-42516 | K000153074, BT1988993 | CVE-2024-42516 Apache HTTP Server vulnerability | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 1983349-2 | CVE-2023-2454, CVE-2023-39417, CVE-2023-39418, CVE-2023-5868, CVE-2023-5869, CVE-2023-5870 | K000152931, BT1983349 | CVE-2023-2454, CVE-2023-39417, CVE-2023-39418, CVE-2023-5868, CVE-2023-5869, CVE-2023-5870 PostgreSQL vulnerabilities | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 1893473 | CVE-2021-40438 | K01552024, BT1893473 | Apache vulnerability CVE-2021-40438 | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 1505309 | CVE-2021-23337 | K12492858, BT1505309 | CVE-2021-23337 nodejs-lodash: command injection via template | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 1498949 | CVE-2023-2283 | K000138682, BT1498949 | CVE-2023-2283 libssh: authorization bypass in pki_verify_data_signature | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 1083937 | CVE-2002-20001, CVE-2022-40735 | K83120834, BT1083937 | CVE-2002-20001, CVE-2022-40735 DH Key Agreement vulnerability - OpenSSH Server | 21.1.0, 21.0.0.1 |
| 1069381 | CVE-2022-1468 | K15101402 | iControl REST rate limiting and connection handling improvements | 21.1.0 |
| 929709 | CVE-2020-11023 | K66544153 | jQuery vulnerability CVE-2020-11023 | 21.1.0 |
| 912797 | CVE-2020-11868 | K44305703, BT912797 | NTP Vulnerability: CVE-2020-11868 | 21.1.0, 21.0.0.1, 17.5.1.3, 17.1.3 |
| 714238 | CVE-2018-1301 | K78131906, BT714238 | CVE-2018-1301: Apache Vulnerability | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 551462-8 | CVE-2014-9730 | K17447 | CVE-2014-9730 - Linux Kernel UDF Filesystem Denial of Service Vulnerability | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 2053165 | CVE-2025-47268 | K000158112, BT2053165 | CVE-2025-47268 iputils: Signed Integer Overflow in Timestamp Multiplication in iputils ping | 21.1.0, 17.5.1.4 |
| 1893905 | CVE-2023-40217 | K000139685, BT1893905 | Python vulnerability CVE-2023-40217 | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 1324085 | CVE-2023-3446,CVE-2023-3817 | K000137969 | Multiple OpenSSL Vulnerabilities | 21.1.0 |
| 1086325 | CVE-2016-4658 | K49419538, BT1086325 | CVE-2016-4658 libxml2 vulnerability | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 745334-10 | CVE-2016-7099 | K24444803 | CVE-2016-7099 NodeJS Vulnerability | 21.1.0, 21.0.0.1 |
| 2187529-2 | CVE-2025-12818 | K000160291, BT2187529 | CVE-2025-12818: postgresql: libpq undersizes allocations, via integer wraparound | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 2137805 | CVE-2023-36478, CVE-2024-6763, CVE-2024-8184, CVE-2023-26049 | K000157844 | Jetty vulnerabilities CVE-2023-36478, CVE-2024-6763, CVE-2023-26049, CVE-2024-8184, and CVE-2023-41900 | 21.1.0 |
Functional Change Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2152397 | 1-Blocking | BIG-IP support for f5optics packages built after October 2025★ | 21.1.0 | |
| 578989-16 | 3-Major | Maximum request body size is limited to 25 MB | 21.1.0, 17.5.1.4 | |
| 2201813 | 3-Major | BT2201813 | BIG-IP enforces maximum concurrent streams limit immediately over HTTP/2 connection | 21.1.0 |
| 1589269-5 | 3-Major | BT1589269 | The maximum value of sys db provision.extramb was reduced from 8192 to 4096 MB★ | 21.1.0, 17.5.1.4, 17.1.3.1 |
| 1033537 | 3-Major | Cookie persistence handling with duplicate cookie names | 21.1.0 | |
| 1787457 | 4-Minor | GRPC communication may fail when server responds without trailers and any payload | 21.1.0 |
TMOS Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 658943 | 1-Blocking | BT658943 | Errors when platform migration process is loading UCS using trunks on vCMP guest/F5OS Tenants | 21.1.0, 21.0.0.1, 14.1.4.1 |
| 2179729 | 1-Blocking | BT2179729 | MCPD memory leaks during repetitive configuration create/modify/delete cycles combined with ongoing config-sync activity. | 21.1.0, 21.0.0.1 |
| 2144513 | 1-Blocking | BT2144513 | Cannot install any BIG-IP version with ISO signature verification enabled★ | 21.1.0, 21.0.0.1 |
| 2144497 | 1-Blocking | BT2144497 | Mellanox driver timeouts and packet drops on Azure instances with high NIC count | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 2141205 | 1-Blocking | BT2141205 | Tpm-status returns: "System Integrity: Invalid" on BIG-IP versions released since October 2025 | 21.1.0 |
| 2130485-2 | 1-Blocking | BT2130485 | Warning: the current license is not valid - Fault code: 51133 | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 935633 | 2-Critical | BT935633 | VCMP guests or F5OS tenants may experience constant clusterd restart after host upgrade★ | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 901989 | 2-Critical | BT901989 | Corruption detected in /var/log/btmp | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 2264133 | 2-Critical | TMSH improvements | 21.1.0 | |
| 2263721 | 2-Critical | BT2263721 | TMM crashes on Azure VE when virtual function is removed during runtime | 21.1.0 |
| 2259157-1 | 2-Critical | Parsing failure may interpret data as a Memcached command | 21.1.0 | |
| 2258981-1 | 2-Critical | Remove Unnecessary internal User account from Non-Supported BIG-IP Platforms | 21.1.0 | |
| 2257689 | 2-Critical | Improvement in system account | 21.1.0 | |
| 2257421 | 2-Critical | TMSH enhancements | 21.1.0 | |
| 2252233 | 2-Critical | MCPD Crashes When Worker Connection Destructor Accesses Main-Thread Data Structures | 21.1.0 | |
| 2241493 | 2-Critical | User facing login issues with newly created password-based Azure VMs | 21.1.0 | |
| 2229613 | 2-Critical | BT2229613 | F5OS Tenant Inoperative Due to Incorrect Permissions on /etc/nsswitch.conf File | 21.1.0 |
| 2229273 | 2-Critical | BT2229273 | LDAP authentication fails when multiple LDAP servers are configured | 21.1.0 |
| 2229021 | 2-Critical | iControl REST issue | 21.1.0 | |
| 2225017 | 2-Critical | Config Sync not working in an HA setup | 21.1.0 | |
| 2224937 | 2-Critical | HA Devices staying out of sync | 21.1.0 | |
| 2221585 | 2-Critical | BT2221585 | When tenant renews DHCP lease on eth2, the interface IP address on mgmt also gets modified | 21.1.0 |
| 2221493 | 2-Critical | SCP Improvement | 21.1.0 | |
| 2221445 | 2-Critical | Improving scripts of Failover | 21.1.0 | |
| 2221413 | 2-Critical | SCP Improvement | 21.1.0 | |
| 2219173 | 2-Critical | TMSH improvements | 21.1.0 | |
| 2217713 | 2-Critical | TMSH improvements | 21.1.0 | |
| 2217545 | 2-Critical | Unable to License BIG-IP Booted on KVM UEFI Machine | 21.1.0 | |
| 2217485 | 2-Critical | TMSH Improvements | 21.1.0 | |
| 2202097 | 2-Critical | Apply limitations on certain object creation | 21.1.0 | |
| 2201965 | 2-Critical | TMSH improvement | 21.1.0 | |
| 2201789 | 2-Critical | TMSH improvements | 21.1.0 | |
| 2201769 | 2-Critical | TMSH improvements | 21.1.0 | |
| 2201745 | 2-Critical | TMSH improvements | 21.1.0 | |
| 2201725 | 2-Critical | TMSH improvements | 21.1.0 | |
| 2201697 | 2-Critical | TMSH improvements | 21.1.0 | |
| 2200561 | 2-Critical | Repeated MCPD service crashes | 21.1.0 | |
| 2200437 | 2-Critical | SNMP Improvement | 21.1.0 | |
| 2200421 | 2-Critical | SNMP Improvement | 21.1.0 | |
| 2200209 | 2-Critical | Support NVMe-based disk (newer generation instance families) | 21.1.0 | |
| 2197173 | 2-Critical | Insufficient sanitization in SNMP configuration | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 2196761-3 | 2-Critical | TMM core found while doing DAG and SP DAG related tests | 21.1.0 | |
| 2187365-1 | 2-Critical | BT2187365 | BIG-IP v21.0.0 VE or F5OS tenant remains INOPERATIVE after cold boot | 21.1.0, 21.0.0.1 |
| 2185485 | 2-Critical | BT2185485 | The value of /proc/sys/vm/min_free_kbytes might be too big on Hyper-V and Azure VEs with multiple cores and multiple NICs★ | 21.1.0 |
| 2163585 | 2-Critical | BT2163585 | Migration fails "Spanning Tree Protocol (STP) is not supported on this platform" | 21.1.0, 21.0.0.1 |
| 2162849-3 | 2-Critical | BT2162849 | Removing the active controller does not trigger an immediate tenant failover | 21.1.0, 21.0.0.1, 17.5.1.4 |
| 2154057 | 2-Critical | BT2154057 | MCPD validations not throwing error when snmpv3 password contains more than 77 characters★ | 21.1.0 |
| 2153489 | 2-Critical | BT2153489 | MCPD crash in FolderMgr::validate_deleted_folder_queue due to race condition clearing folder_delete_queue mid-iteration (v21) | 21.1.0, 21.0.0.1 |
| 2153425-1 | 2-Critical | BT2153425 | MCPD worker core | 21.1.0, 21.0.0.1 |
| 2130913 | 2-Critical | BT2130913 | PUT request errors when trying to modify a firewall rule-list and firewall management-ip-rules | 21.1.0 |
| 2125953 | 2-Critical | Insufficient access control to REST endpoint and TMSH for some CLI versions. | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 1983145 | 2-Critical | K000153024, BT1983145 | Memory Corruption due to xnet-DPDK★ | 21.1.0 |
| 1959549 | 2-Critical | BT1959549 | Upgrade to 17.5.0 or later overwrites #TMSH-VERSION in bigip_base.conf when source UCS is pre-17.5.0★ | 21.1.0, 17.5.1.4 |
| 1943217-3 | 2-Critical | BT1943217 | BGP - using 'no bgp default ipv4-unicast' might lead to a crash | 21.1.0, 17.5.1.3, 17.1.3.1 |
| 1826345 | 2-Critical | Security improvements in ca-bundle.crt | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 1783677-3 | 2-Critical | BT1783677 | HSB v3.11.8.0 bitstream release for VIPRION B4450N and B4460N blades | 21.1.0, 17.5.1.4, 17.1.3.1 |
| 1678105 | 2-Critical | BT1678105 | F5OS tenant, TMM crashing after loading a UCS | 21.1.0 |
| 1327649-1 | 2-Critical | BT1327649 | Invalid certificate order within cert-chain associated to JWK configuration | 21.1.0 |
| 977953 | 3-Major | BT977953 | Show running config interface CLI could not fetch the interface info and crashes the imi | 21.1.0 |
| 904401 | 3-Major | BT904401 | Guestagentd or devmgmtd core | 21.1.0 |
| 842525 | 3-Major | BT842525 | TMSH - Modifying sys httpd ssl-verify-client attribute to 'optional-no-ca' results in error | 21.1.0 |
| 791365-9 | 3-Major | BT791365 | Bad encryption password error on UCS save | 21.1.0 |
| 783077-6 | 3-Major | BT783077 | IPv6 host defined via static route unreachable after BIG-IP reboot | 21.1.0, 17.5.1.4 |
| 760451-2 | 3-Major | Enabling user to configure nonce disabled/enabled from Mgmt GUI login as well as CLI | 21.1.0 | |
| 658850 | 3-Major | BT658850 | Loading UCS with the platform-migrate parameter could unexpectedly set or unset management DHCP | 21.1.0 |
| 584607 | 3-Major | Harden authentication infrastructure | 21.1.0 | |
| 566995-8 | 3-Major | BT566995 | bgpd might crash in rare circumstances. | 21.1.0, 17.5.1.4, 17.1.3.1 |
| 528314 | 3-Major | K16816, BT528314 | Generating new default certificate and key pairs for BIG-IP ssl profiles via CLI will not be reflected in GUI or in tmsh | 21.1.0, 17.5.1.4 |
| 2262265 | 3-Major | Backup UCS enhancements | 21.1.0 | |
| 2262249 | 3-Major | iControl REST hardening | 21.1.0 | |
| 2227441 | 3-Major | TMSH hardening | 21.1.0 | |
| 2225201 | 3-Major | iControl REST hardening | 21.1.0 | |
| 2224681 | 3-Major | iControl REST improvement | 21.1.0 | |
| 2224673 | 3-Major | iControl REST improvement | 21.1.0 | |
| 2221689-1 | 3-Major | TMSH hardening | 21.1.0 | |
| 2221517 | 3-Major | BIG-IP SCP hardening | 21.1.0 | |
| 2221169-4 | 3-Major | iControl REST Hardening | 21.1.0 | |
| 2221161-1 | 3-Major | TMSH hardening | 21.1.0 | |
| 2220369 | 3-Major | BIG-IP GUI/API Improvements | 21.1.0 | |
| 2219889 | 3-Major | BT2219889 | Specific iRule with undefined var in remote syslog via HSL leads to crash | 21.1.0 |
| 2219745 | 3-Major | iControl REST hardening | 21.1.0 | |
| 2218261 | 3-Major | iControl REST Improvements | 21.1.0 | |
| 2218109 | 3-Major | Unable to delete LTM Policy Strategy with Address Selector via UI. VE goes offline and displays an error after manual deletion of the MCPD shared database file during operations such as reboot. | 21.1.0 | |
| 2217053 | 3-Major | HTML5 Citrix Client Bundle Upload Fails with Unpack Error Due to Invalid Entry Filename | 21.1.0 | |
| 2216645 | 3-Major | UCS Backup Improvements | 21.1.0 | |
| 2208913-3 | 3-Major | iControl SOAP hardening | 21.1.0 | |
| 2202281 | 3-Major | Primary Admin DB Change to Non-Existing User Results in Admin User Lockout | 21.1.0 | |
| 2202005-1 | 3-Major | BT2202005 | IPsec can send packets across tunnels on standby node. | 21.1.0 |
| 2201877 | 3-Major | BT2201877 | SCTP multihoming fails with ICMP unreachable for alternate paths. | 21.1.0 |
| 2201377 | 3-Major | iControl REST improvements | 21.1.0 | |
| 2199289 | 3-Major | Updating systemauth.primaryadminuser from system-defined admin user (admin) to a user-defined admin user using iControl REST returns 500 error | 21.1.0 | |
| 2198701 | 3-Major | TMSH/MCP validation of management route dependencies | 21.1.0 | |
| 2198661 | 3-Major | BT2198661 | Resource administrator not working as expected | 21.1.0 |
| 2197289 | 3-Major | BT2197289 | Enabling SSH access via the GUI blocks MCPD for 90 seconds | 21.1.0 |
| 2186009 | 3-Major | BT2186009 | Increased TX IQ size for netvsc | 21.1.0 |
| 2184897-3 | 3-Major | BT2184897 | Tenant disk size modification is ineffective for var/log folder | 21.1.0, 21.0.0.1, 17.5.1.3, 17.1.3.1 |
| 2183241 | 3-Major | BT2183241 | Trunk egress traffic is not balanced on some platforms. | 21.1.0 |
| 2182357 | 3-Major | Inconsistent Default Source Address Selection for Virtual Server Between POST and PUT Requests | 21.1.0 | |
| 2182061 | 3-Major | BT2182061 | Management routes not installed on reboots when interface route is recursively required. | 21.1.0 |
| 2162801-1 | 3-Major | BT2162801 | MCP hung during shutdown when any exception/ abnormal restart while booting up | 21.1.0, 21.0.0.1 |
| 2161077-1 | 3-Major | BT2161077 | Bot profile properties page does not load when there are large number of SSL certs (> 1000) | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 2152877 | 3-Major | BT2152877 | Exclude /opt/CrowdStrike directory from Integrity Test | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 2152601-1 | 3-Major | BT2152601 | Repeated restarts of the MCPD service result in a continuous restart loop accompanied by error messages: An unexpected failure has occurred, MCO_ERR_EV_SYN - Synchronous events | 21.1.0, 21.0.0.1 |
| 2152301-1 | 3-Major | BT2152301 | After upgrading from version 17.1.2 to 17.5.1.3, the guest-role user is unable to run the command show running-config in TMSH.★ | 21.1.0, 17.5.1.4 |
| 2152137 | 3-Major | New DB variable ve.ndal.driver.netvsc to provide driver selection for Azure/HyperV deployments | 21.1.0 | |
| 2150525 | 3-Major | Improvements in iControl SOAP | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 2150489 | 3-Major | BT2150489 | Most DB keys encrypted by SecureVault master key are not persisted to BigDB.dat when the system master key is changed. | 21.1.0, 17.5.1.4, 17.1.3.1 |
| 2144445 | 3-Major | Insufficient sanitization in TMSH | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 2140905 | 3-Major | BT2140905 | System Integrity Test on VE is halting the whole system in FIPS mode | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 2140213 | 3-Major | BT2140213 | Xnet-netvsc driver crash | 21.1.0, 17.5.1.4 |
| 2137977 | 3-Major | BT2137977 | Clicking on a policy in a virtual server's resource page navigates to the full policy list, instead of the specific policy★ | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 2137861-1 | 3-Major | BT2137861 | MCPD throws a validation error during upgrade to v17.1.3.x when TACACS servers are configured with hostname★ | 21.1.0, 17.1.3.1 |
| 2132213 | 3-Major | BT2132213 | Hyper-V/Azure: Unable to pass traffic with tagged vlans when using the default dpdk driver. | 21.1.0 |
| 2131861 | 3-Major | Snapshot file count decreases over time. | 21.1.0 | |
| 2131833 | 3-Major | BT2131833 | F5OS/rSeries r2xxx/r4xxx BIG-IP Tenant management interface not reachable | 21.1.0 |
| 2083257 | 3-Major | 502 error from BIG-IP during large AFM rule deployment | 21.1.0 | |
| 2078297-2 | 3-Major | Unexpected PVA traffic spike | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 2063265 | 3-Major | Improvements in HTTP headers | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 2058541-3 | 3-Major | BT2058541 | [BGP] BIG-IP does not follow updated section of rfc4724.html#section-4.2 when handling a new connection from peer. | 21.1.0, 17.1.3.1 |
| 2047429 | 3-Major | BT2047429 | PostgreSQL should dump a corefile when not exiting | 21.1.0, 21.0.0.1 |
| 1989033 | 3-Major | BT1989033 | IPsec IKEv2 tunnel may fail to initiate or respond due to ERR_PORT | 21.1.0 |
| 1975297 | 3-Major | BT1975297 | TMM may fail to start up with max number of interfaces for Azure instances <= 16 vCPUs | 21.1.0 |
| 1974701 | 3-Major | BT1974701 | PVA stats may be double incremented when pva mode is dedicated | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 1967485-1 | 3-Major | Old Logs in /var/log Not Deleted When Storage Exceeds Threshold | 21.1.0 | |
| 1966941 | 3-Major | BT1966941 | High CPU or increased translation errors following upgrade or restart when DAG distribution changes | 21.1.0, 17.5.1.4 |
| 1966633 | 3-Major | BT1966633 | Non-eth0 management interface unbound after tmm restart on 17.5.0 in AWS★ | 21.1.0, 21.0.0.1, 17.5.1.4 |
| 1933105 | 3-Major | BT1933105 | TMM does not fragment the output before encapsulating the payload | 21.1.0 |
| 1927521 | 3-Major | BT1927521 | DPDK has dependency on SSSE3 | 21.1.0 |
| 1925485-2 | 3-Major | CVE-2020-12655 kernel: sync of excessive duration via an XFS v5 image with crafted metadata | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 1925369-2 | 3-Major | CVE-2018-10322 kernel: Invalid pointer dereference in xfs_ilock_attr_map_shared() when mounting crafted xfs image allowing denial of service | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 1925045-2 | 3-Major | CVE-2024-35849 - Linux Kernel Btrfs Information Leak Vulnerability | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 1925029-2 | 3-Major | CVE-2023-1611 - Linux Kernel btrfs Use-After-Free Vulnerability Leading to System Crash and Information Leak | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 1923997-2 | 3-Major | CVE-2023-1668-openvswitch: ip proto 0 triggers incorrect handling | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 1893369-2 | 3-Major | CVE-2021-33033 kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 1849265-5 | 3-Major | BT1849265 | A VCMP guest may not exit hardware syncookie mode | 21.1.0, 17.5.1.4 |
| 1826505 | 3-Major | BT1826505 | Restjavad API usage statistics memory leak | 21.1.0 |
| 1813505-3 | 3-Major | BT1813505 | Snmpd may seg fault on systems with large amounts of virtual memory | 21.1.0, 17.5.1.4 |
| 1677429 | 3-Major | BT1677429 | BFD: TMM might not agree on session ownership. | 21.1.0, 17.5.1.4, 17.1.3.1 |
| 1670465 | 3-Major | BT1670465 | TMMs might not agree on session ownership when multiple cluster geometry changes occur. | 21.1.0, 17.5.1.4, 17.1.3.1 |
| 1642533 | 3-Major | ipv4 forwarding is enabled on F5OS tenants | 21.1.0 | |
| 1621417 | 3-Major | WALinuxAgent Updated to Version 2.14.0.1 | 21.1.0 | |
| 1580369 | 3-Major | BT1580369 | MCPD thrown exception when syncing from active device to standby device. | 21.1.0, 17.5.1.4, 17.1.3.1 |
| 1497061 | 3-Major | BT1497061 | Added support for VLANs above 512 with xnet-IAVF driver | 21.1.0, 17.1.3 |
| 1489817 | 3-Major | BT1489817 | Fix crash due to number of VLANs | 21.1.0, 17.1.3 |
| 1455741 | 3-Major | BT1455741 | Httpd consumes excessive amount of CPU in FIPS mode | 21.1.0 |
| 1450481 | 3-Major | TMSH hardening | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 1403869-6 | 3-Major | BT1403869 | CONNFLOW_FLAG_DOUBLE_LB flows might route traffic to a stale next hop | 21.1.0, 17.5.1.4 |
| 1401569 | 3-Major | Engineering Hotfix readme file refers to non-applicable "full_box_reboot" command★ | 21.1.0 | |
| 1377737-2 | 3-Major | BT1377737 | SSL Orchestrator does not pass traffic when MAC masquerading is configured on R4k or R2k systems | 21.1.0, 17.5.1.4, 17.1.3 |
| 1322413 | 3-Major | BT1322413 | After config sync, FQDN node status changes to Unknown/Unchecked on peer device | 21.1.0 |
| 1256757 | 3-Major | BT1256757 | Suspect keymgmtd memory leak while using dynamic CRL. | 21.1.0 |
| 1231889 | 3-Major | BT1231889 | Mismatched VLAN names (or VLANs in non-Common partitions) do not work properly BIG-IP tenants running on r2000 / r4000-series appliances | 21.1.0 |
| 1183529-1 | 3-Major | BT1183529 | OCSP request burst when cert-ldap authentication is enabled | 21.1.0 |
| 1148185 | 3-Major | K05403841 | getdb insufficient sanitisation | 21.1.0, 21.0.0.1 |
| 1137269-7 | 3-Major | BT1137269 | MCPD fails to reply if a request is proxied to another daemon and the connection to that daemon closes | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 1106489 | 3-Major | BT1106489 | GRO/LRO is disabled in environments using the TMM raw socket "sock" driver. | 21.1.0, 17.1.3, 16.1.4, 15.1.10 |
| 1016273 | 3-Major | BT1016273 | Standby TMM can core or cause incorrect mirroring during upgrade when session mirroring is enabled★ | 21.1.0 |
| 857973 | 4-Minor | BT857973 | GUI sets FQDN Pool Member "Auto Populate" value Enabled by default | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 761853 | 4-Minor | BT761853 | Send HOST header in OCSP responder request | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 659579-9 | 4-Minor | BT659579 | Timestamps in icrd, restjavad, and restnoded logs are not synchronized with the system time | 21.1.0, 17.5.1.4 |
| 2223665 | 4-Minor | BT2223665 | When sdag.shuffle.table is non-zero on a clustered tenant, tmm may not go ready-for-world | 21.1.0 |
| 2186153 | 4-Minor | CVE-2025-8194 cpython: Cpython infinite loop when parsing a tarfile | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 2171845 | 4-Minor | BT2171845 | Manual Sync in Sync-Failover device group may result in differences in attached Logging Profiles on virtual server | 21.1.0 |
| 2163321 | 4-Minor | BT2163321 | Broken Address List hyperlink in the destination field of Virtual Server list | 21.1.0, 17.5.1.4 |
| 2151505 | 4-Minor | BT2151505 | Cmp_dest_velos is automatically installed on system startup. | 21.1.0 |
| 2151173 | 4-Minor | BT2151173 | Starting this release, file uploads that include the percent sign (%) in the filename will be rejected by server-side validation. | 21.1.0 |
| 2141305 | 4-Minor | BT2141305 | SSH Proxy Profile Properties page does not render | 21.1.0, 21.0.0.1 |
| 2131597-4 | 4-Minor | BT2131597 | BGP graceful restart might not accept a new connection immediately after neighbor failover. | 21.1.0 |
| 2131225 | 4-Minor | BT2131225 | Unclear Actions Displayed with L7 Profiles in Rule Creation | 21.1.0, 21.0.0.1 |
| 2099441 | 4-Minor | BT2099441 | Garbled character in warning message when HA peer is added | 21.1.0, 21.0.0.1 |
| 2035641 | 4-Minor | APMd resource exhaustion | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 1966669-3 | 4-Minor | BT1966669 | [PVA] Provide a DB variable disabling NAT46/64 snoop inserts. | 21.1.0, 17.5.1.4 |
| 1924693-2 | 4-Minor | CVE-2020-26939 bouncycastle: Address OAEP decoding side-channel leaking RSA private exponent | 21.1.0 | |
| 1701177 | 4-Minor | HTTP request handling improvements | 21.1.0 | |
| 1624701 | 4-Minor | Security improvement in BIGIP GUI | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 1341517 | 4-Minor | BT1341517 | With longer vlan names qkview generates invalid proc_module.xml file and ihealth parsing fails. | 21.1.0, 21.0.0.1 |
| 1325737 | 4-Minor | BT1325737 | Standby tenant cannot access floating traffic group when MAC masquerade is enabled | 21.1.0, 17.5.1.4, 17.1.3 |
| 1178225-5 | 4-Minor | Scalability issues with F5-VE deployments | 21.1.0, 17.5.1.4, 17.1.3.1 | |
| 1065385 | 4-Minor | BIG-IP: NPM vulnerabilities | 21.1.0, 17.1.3.1 | |
| 1052477-2 | 4-Minor | CVE-2020-10751 kernel: SELinux netlink permission check bypass | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 |
Local Traffic Manager Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2162705 | 1-Blocking | BT2162705 | Tmm restarting on multi-NUMA AWS instances with ENA interfaces★ | 21.1.0, 21.0.0.1, 17.5.1.4 |
| 2141125-1 | 1-Blocking | BT2141125 | Multicast traffic is dropped with incorrect VLAN tagging | 21.1.0 |
| 1967005 | 1-Blocking | BT1967005 | TMM crash on R2x00/R4x00 platforms | 21.1.0 |
| 886045 | 2-Critical | BT886045 | Multi-NIC instances fail to come up when trying to use memory-mapped virtio device | 21.1.0 |
| 2284709 | 2-Critical | BT2284709 | TMM might restart with certain network traffic | 21.1.0 |
| 2259109 | 2-Critical | External users can run the track command | 21.1.0 | |
| 2246933 | 2-Critical | BT2246933 | Memory leak in QUIC under rare sequence of packets/events | 21.1.0 |
| 2229881 | 2-Critical | BT2229881 | Multi-slot tenant may become inoperative after tenant upgrade followed by tmsh reboot slot all | 21.1.0 |
| 2229857 | 2-Critical | BT2229857 | Full load from text files fails with "01020036:3: The requested device (/Common/<device-name>) was not found" if deprecatedApiAllowed is false★ | 21.1.0 |
| 2222041-4 | 2-Critical | HTTP cookie handling resource usage | 21.1.0 | |
| 2221001 | 2-Critical | TMM might restart with certain network traffic | 21.1.0 | |
| 2219381 | 2-Critical | TMSH improvement | 21.1.0 | |
| 2199565 | 2-Critical | BT2199565 | TMSH and TMUI accessiblity issue during monitors at scale | 21.1.0 |
| 2152785 | 2-Critical | TMM may crash under certain conditions. | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 2144521 | 2-Critical | BT2144521 | WAF plugin gets incorrect response body when SSE profile is configured on virtual server | 21.1.0, 21.0.0.1 |
| 2131085 | 2-Critical | BT2131085 | Running 'tmsh reboot slot all' on multi-slot tenant or vCMP guest causes it to get stuck in unhealthy state | 21.1.0, 17.5.1.4 |
| 2038393-4 | 2-Critical | BT2038393 | Looped dtls virtual can cause crash due to NULL dereference | 21.1.0, 17.5.1.4 |
| 2017137-1 | 2-Critical | BT2017137 | Pkcs11d Crash Risk Due to Unbounded Label/Password Length from MCPd | 21.1.0, 21.0.0.1, 17.5.1.2, 17.1.3 |
| 1923793-2 | 2-Critical | CVE-2019-5739: DoS with keep-alive HTTP connection | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 1825357 | 2-Critical | BT1825357 | Possible tmm crash or traffic loss after making vlan interface changes with an empty trunk | 21.1.0, 17.5.1.4 |
| 1623325 | 2-Critical | BT1623325 | VLAN groups or VLAN group members may be deleted on F5OS tenant | 21.1.0 |
| 1539997 | 2-Critical | BT1539997 | Secure HA connections cannot be established due to zombie HA flow | 21.1.0, 17.5.1.4, 17.1.3.1 |
| 1481889-6 | 2-Critical | BT1481889 | High CPU utilization or crash when CACHE_REQUEST iRule parks. | 21.1.0, 17.5.1.4, 17.1.3.1 |
| 1053561 | 2-Critical | BT1053561 | TLS 1.3 Handshake fails when 0RTT enabled on the client-side SSL and iRule is specified | 21.1.0 |
| 950665 | 3-Major | BT950665 | Pool and pool members created for dynamic ECMP routes are not freed | 21.1.0 |
| 901569 | 3-Major | BT901569 | Loopback traffic might get dropped when VLAN filter is enabled for a virtual server. | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 881041 | 3-Major | BIG-IP system may forward IP broadcast packets back to the incoming VLAN interface via a forwarding virtual server. | 21.1.0 | |
| 2262981 | 3-Major | BT2262981 | TMM may corrupt stack during class lookup | 21.1.0 |
| 2259173-1 | 3-Major | Sanitize key in memcache library | 21.1.0 | |
| 2251517 | 3-Major | BT2251517 | Stream profile is not supported on HTTP/2 Full proxy (HTTP MRF Router enabled) | 21.1.0 |
| 2244413 | 3-Major | BT2244413 | Client Certificates are cached even when Retain Certificate is disabled on a Clientssl profile | 21.1.0 |
| 2244393 | 3-Major | BT2244393 | TLS 1.3 sessions are unnecessarily cached | 21.1.0 |
| 2230709 | 3-Major | BT2230709 | iRule class match fails after modifying IP data group entries with route-domains | 21.1.0 |
| 2230597 | 3-Major | BT2230597 | Under syncookie mode, temporary listeners may fail to complete connections | 21.1.0 |
| 2227513 | 3-Major | BT2227513 | Tmm crash in Google Cloud during a live migration | 21.1.0 |
| 2224537 | 3-Major | BT2224537 | Tmm crash in Google Cloud during a live migration | 21.1.0 |
| 2221017-4 | 3-Major | BT2221017 | The BIG-IP virtio driver may core during startup | 21.1.0 |
| 2220389 | 3-Major | BT2220389 | Enabling tm.ipv4dagfrag results in tmm not ready for world on a cluster with more than 4 blades | 21.1.0 |
| 2219929 | 3-Major | BT2219929 | Tmm running in Hyper-V environments might not receive multicast traffic | 21.1.0 |
| 2217093 | 3-Major | BT2217093 | L2 traffic to masquarade MAC on Standby might be flooded when multiple interfaces are used | 21.1.0 |
| 2211133 | 3-Major | BT2211133 | ICMP error length does not follow RFC 812 guidance | 21.1.0 |
| 2209157 | 3-Major | BT2209157 | FastL4 late binding does not proxy MSS when establishing server-side connection. | 21.1.0 |
| 2199469 | 3-Major | BT2199469 | Serverssl-use-sni not working in HTTP2 to HTTP gateway setups. | 21.1.0 |
| 2197305 | 3-Major | BT2197305 | BIG-IP generates invalid SSL key share | 21.1.0 |
| 2195321 | 3-Major | Validations for certificate's notBefore and notAfter to comply with CC/FIPS/STIP Certifications | 21.1.0 | |
| 2186933 | 3-Major | ILX Plugin may not work after use of npm install command on workspace. | 21.1.0 | |
| 2185833 | 3-Major | VLAN Modification and Transition Between Q-in-Q and Non-Q-in-Q Configurations failed | 21.1.0 | |
| 2185829 | 3-Major | VLAN Modification and Transition Between Q-in-Q and Non-Q-in-Q Configurations failed | 21.1.0 | |
| 2183353 | 3-Major | BT2183353 | TMM Intel E810 VF driver updates the link state with 1 second delay | 21.1.0, 17.5.1.4, 17.1.3.1 |
| 2182045 | 3-Major | BT2182045 | The iavf driver might drop some IPv6 packets that contain destination option or routing type 2 headers | 21.1.0, 17.1.3.1 |
| 2161073 | 3-Major | Certificate Bundle Improvement | 21.1.0 | |
| 2154001 | 3-Major | BT2154001 | Virtual server statistics dashboard "Requests" column does not increment when http2 MRF option is in use | 21.1.0 |
| 2151885 | 3-Major | BT2151885 | When using service-down-action reset/drop on a pool attached to a DHCP virtual TMM might experience a crash. | 21.1.0 |
| 2149253 | 3-Major | BT2149253 | QUIC connection stalls with early data | 21.1.0, 21.0.0.1 |
| 2149233 | 3-Major | TMM crashes when using SSL | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 2144309 | 3-Major | BT2144309 | TMM might experience a crash when using a fix for Bug783077 | 21.1.0 |
| 2143177 | 3-Major | Add Drop Action to LTM Policy | 21.1.0 | |
| 2141365 | 3-Major | BT2141365 | Certificates fail to load when whitespace characters are present in multi-cert PEM file | 21.1.0 |
| 2141233 | 3-Major | BT2141233 | Client authentication profile as "Request" in FIPS-CC mode causes connection termination without certificate★ | 21.1.0, 21.0.0.1, 17.5.1.4 |
| 2141061 | 3-Major | iControl REST API Endpoints enhancements | 21.1.0 | |
| 2140901 | 3-Major | Add new ssl-certificate subject and issuer DN conditions to LTM Policy. | 21.1.0 | |
| 2139637 | 3-Major | BT2139637 | TMM crash because of invalid context | 21.1.0 |
| 2137973 | 3-Major | BT2137973 | Common Criteria requirements mandate strict values for notBefore and notAfter that current implementation does not satisfy | 21.1.0, 17.5.1.4 |
| 2135621 | 3-Major | BT2135621 | Poor TCP performance on Hyper-V non-accelerated deployments with Cisco VIC interfaces | 21.1.0 |
| 2132209 | 3-Major | BT2132209 | TMM crash while sending ACKs in invalid context | 21.1.0 |
| 2132185 | 3-Major | Add Action SSL Proxy with Bypass Intercept options to LTM Policy | 21.1.0 | |
| 2035177-4 | 3-Major | BT2035177 | Use of OCSP responder with SSL C3D enabled in virtual server may leak SSL handshake instances | 21.1.0, 17.5.1.4 |
| 2033781-5 | 3-Major | BT2033781 | Memory allocation failed: can't allocate memory to extend db size | 21.1.0 |
| 1987309 | 3-Major | BT1987309 | Bigd may get stuck in legacy mode | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 1972541 | 3-Major | BT1972541 | Tmsh load sys config verify leaks compiled ltm (CPM) policies | 21.1.0 |
| 1969889-2 | 3-Major | BT1969889 | Expired certificates sent to clients by tmm due to network time synchronization | 21.1.0 |
| 1959629 | 3-Major | BT1959629 | CSR generation via the GUI removes Subject Alternative Name (SAN) string. Also, when SAN is configured with small prefix chars "dns:", no error is thrown. | 21.1.0 |
| 1930897 | 3-Major | BT1930897 | Tmm core due to overflow of ifc ref counts with flow forwarding | 21.1.0, 17.1.3 |
| 1923817-2 | 3-Major | CVE-2017-11499: Constant Hashtable Seeds vulnerability (NodeJS v6.9.1) | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 1889845 | 3-Major | Improvements in Radius Monitor | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 1849029-4 | 3-Major | BT1849029 | Debug TMM crashes in FIPS/CC mode | 21.1.0, 21.0.0.1, 17.1.3, 16.1.6.1 |
| 1824985 | 3-Major | BT1824985 | In rare cases the Nitrox hardware compression queue may stop servicing requests. | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 1818137 | 3-Major | BT1818137 | Tmm IPv4 fragmentation handling distribution | 21.1.0, 21.0.0.1 |
| 1788105 | 3-Major | BT1788105 | TLS1.3 connections between BIG-IP and server hangs with an APM policy that is invoked after the server's SSL handshake finishes★ | 21.1.0, 21.0.0.1, 17.1.3 |
| 1778793 | 3-Major | BT1778793 | Database health monitors may use the wrong connection when attempting to connect to database | 21.1.0 |
| 1623921-4 | 3-Major | BT1623921 | IPencap monitor probes from bigd are prone to connection re-use. | 21.1.0, 17.5.1.4, 17.1.3.1 |
| 1600617-6 | 3-Major | BT1600617 | Few virtio driver configurations may result in excessive memory usage | 21.1.0 |
| 1589629 | 3-Major | BT1589629 | An ICMPv6 Neighbor Solicitation sent to the last address on an IPv6 subnet uses the wrong Destination MAC address | 21.1.0 |
| 1497633 | 3-Major | BT1497633 | TMC incorrectly set /32 mask for virtual-address 0.0.0.0/0 when attached to a VS | 21.1.0 |
| 1474877-6 | 3-Major | BT1474877 | Unable to download large files through VIP due RST Compression error. | 21.1.0, 17.5.1.4, 17.1.3.1 |
| 1473913 | 3-Major | BT1473913 | Proxy Connections drop due to wrong counting | 21.1.0, 17.5.1.4, 17.1.3, 16.1.6 |
| 1463089-3 | 3-Major | BT1463089 | TMM crash because of corrupted MQTT queue | 21.1.0 |
| 1440409 | 3-Major | BT1440409 | TMM might crash or leak memory with certain logging configurations | 21.1.0, 17.5.1.4, 17.1.3.1 |
| 1380009 | 3-Major | BT1380009 | TLS 1.3 server-side resumption resulting in TMM crash due to NULL session | 21.1.0, 17.5.1.4, 17.1.3.1 |
| 1352213-6 | 3-Major | BT1352213 | Handshake fails with FFDHE key share extension | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3 |
| 1325649-5 | 3-Major | BT1325649 | POST request with "Expect: 100-Continue" and HTTP::collect + HTTP::release is not being passed to pool member | 21.1.0, 17.5.1.4, 17.1.3 |
| 1281493 | 3-Major | BT1281493 | Tmsh and gui errors when checking tmm memory | 21.1.0 |
| 1271341 | 3-Major | Unable to use DTLS without TMM crashing | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 1189909 | 3-Major | BT1189909 | Active SSL Connections Curve is always kept at Zero on Performance Graph | 21.1.0 |
| 1161169 | 3-Major | TLS X25519 hardware offload support | 21.1.0 | |
| 1125381-4 | 3-Major | BT1125381 | Extraneous warnings recorded in when using only intermediate certificates | 21.1.0 |
| 1100421 | 3-Major | BT1100421 | HTTP/2 full-proxy virtual server uses wrong source MAC address and incorrect SNAT address selection | 21.1.0 |
| 1057305 | 3-Major | BT1057305 | On deployments that use DPDK, "-c" may be logged as the TMM process/thread name. | 21.1.0 |
| 2266005 | 4-Minor | BT2266005 | HTTP/3 blocks an unknown HTTP method | 21.1.0 |
| 2258705 | 4-Minor | BT2258705 | A policy with overlapping range in different rules may never match | 21.1.0 |
| 2227209 | 4-Minor | BT2227209 | Current session increases | 21.1.0 |
| 2099449 | 4-Minor | BT2099449 | Cannot configure websocket profile on a performance virtual server from the GUI | 21.1.0 |
| 2077357 | 4-Minor | BT2077357 | Virtual-wire with proxy listener may generate packets with 00:00:00:00:00:00 source MAC. | 21.1.0 |
| 1953369-4 | 4-Minor | BT1953369 | DB monitor queries repeatedly if recv string configured but response does not match | 21.1.0, 17.5.1.4 |
| 1429861 | 4-Minor | CVE-2019-5737: HTTP or HTTPS Denial of Service in keep-alive mode (NodeJS v6) | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 1341093 | 4-Minor | BT1341093 | MCPD returns configuration error when attaching a client SSL profile containing TLS 1.3 to a virtual server with HTTP/2 profile | 21.1.0 |
| 1004953-9 | 4-Minor | BT1004953 | HTTP does not fall back to HTTP/1.1★ | 21.1.0, 17.5.1.4 |
Performance Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1574521 | 5-Cosmetic | BT1574521 | Intermittent high packet latency on R4000 and R2000 tenants | 21.1.0, 17.5.1.4, 17.1.3.1 |
Global Traffic Manager (DNS) Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 931149 | 2-Critical | BT931149 | Some RESOLV::lookup queries, including PTR lookups for RFC1918 addresses, return empty strings | 21.1.0, 21.0.0.1 |
| 887681 | 2-Critical | BT887681 | Tmm SIGSEGV in rrset_array_lock,services/cache/rrset.c | 21.1.0, 21.0.0.1 |
| 2238473 | 2-Critical | BT2238473 | MCP DNS rule validation for DNS type64 or type65 results in SIGSEGV | 21.1.0 |
| 2221177 | 2-Critical | K000159906, BT2221177 | Big3d cannot validate certificates after they are renewed | 21.1.0 |
| 2197377 | 2-Critical | TMM crashes under specific traffic. | 21.1.0, 21.0.0.1 | |
| 1103833 | 2-Critical | BT1103833 | Tmm core with SIGSEGV in gtmpoolmbr_UpdateStringProc | 21.1.0 |
| 1083405-9 | 2-Critical | BT1083405 | "Error connecting to named socket" from zrd | 21.1.0, 17.5.1.4, 17.1.3.1 |
| 2258929 | 3-Major | Deleting/Adding virtual server on the LTM device object can change other disabled virtual server status on the LTM device object. | 21.1.0 | |
| 2219053 | 3-Major | CVE-2025-13878: Malformed BRID/HHIT records can cause named to terminate unexpectedly | 21.1.0 | |
| 2217445 | 3-Major | GTM Virtual Server can be deleted while referenced by GTM Pools | 21.1.0 | |
| 2200389 | 3-Major | BT2200389 | CDS and CDNSKEY not included in DNSX zone transfer data | 21.1.0 |
| 2200217 | 3-Major | BT2200217 | DNSSEC validation failures due to missing DS records in zone transfers | 21.1.0 |
| 2199701-3 | 3-Major | BT2199701 | big3d was stuck in high CPU after network disruption | 21.1.0 |
| 2172069 | 3-Major | BT2172069 | GTM topology regions updates do not take effect within tmm | 21.1.0, 17.5.1.4, 17.1.3.1 |
| 2172041 | 3-Major | BT2172041 | Zone transfer fails for dnsx when the zone file contains TLSA records | 21.1.0 |
| 2162573 | 3-Major | Per Cache setting to turn off QNAME minimization | 21.1.0 | |
| 2153893 | 3-Major | BT2153893 | With DNS64 configured, resolution aborts early on the first error response without trying other name servers. | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 2144353 | 3-Major | BT2144353 | BIND upgrade to stable version 9.18.41 | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 2141245 | 3-Major | Undisclosed traffic to TMM can lead to resource exhaustion | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 2106789 | 3-Major | BIGIP LTM Monitors Hardening | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 1983209 | 3-Major | BT1983209 | Zone does not sync correctly when record is modified | 21.1.0 |
| 1970969 | 3-Major | BT1970969 | Stale Record Answers counter increments for SERVFAIL responses from DNS resolver cache | 21.1.0 |
| 1966405 | 3-Major | BT1966405 | Changes to DNS cache resolver may cause service disruption on BIG-IP DNS v17.1.2.1★ | 21.1.0, 21.0.0.1 |
| 1953273 | 3-Major | BT1953273 | Big3d high CPU with thousands of https monitors with SNI | 21.1.0 |
| 1943269 | 3-Major | BT1943269 | GTM Server can be deleted while referenced by GTM Pools | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 1933357 | 3-Major | BT1933357 | DNS64 stats between cache resolver and TMM non-cache have inconsistent behavior. | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 1627093 | 3-Major | DNS's HTTP Monitor provides the ability to show Response Code in Logs | 21.1.0 | |
| 1602345-3 | 3-Major | BT1602345 | Resource records are not always created when wideips are created in a bundle | 21.1.0, 17.1.3.1 |
| 1473189 | 3-Major | BT1473189 | Offending IP is not logged when rate limiting is triggered | 21.1.0, 21.0.0.1 |
| 1379649 | 3-Major | BT1379649 | GTM iRule not verifying WideIP type while getting pool from TCL command | 21.1.0, 21.0.0.1, 17.1.3.1 |
| 1325633 | 3-Major | BT1325633 | Limit the value of MAX_DP_TARGET_COUNT in processQueryTargets. | 21.1.0 |
| 1271453 | 3-Major | BT1271453 | DNS requests with NSEC or NSEC3 RR type Responding with no NSEC3 and no authority section from BIG-IP authoritative server. | 21.1.0 |
| 2186625 | 4-Minor | BT2186625 | Zone transfer from dns express with dnssec enabled includes extra RRSIG | 21.1.0 |
Application Security Manager Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2173429 | 2-Critical | Digest and NTLM Authorizations Not Functioning | 21.1.0 | |
| 2139921 | 2-Critical | BT2139921 | Invalid Length PCRE Expression Was Allowed Through REST API | 21.1.0 |
| 1934373 | 2-Critical | BT1934373 | DoS attack is blocking while transparent | 21.1.0 |
| 1787645 | 2-Critical | BT1787645 | BD process fail to startup on specific XML configuration | 21.1.0 |
| 1623601 | 2-Critical | BT1623601 | Invalid PCRE expressions are allowed | 21.1.0 |
| 919917 | 3-Major | BT919917 | File permission errors during bot-signature installation | 21.1.0 |
| 911661 | 3-Major | BT911661 | Remote event logs may truncate at 5k when maximum entry length is configured to 64k | 21.1.0 |
| 2260293 | 3-Major | LiveUpdate status stuck on Pending after successful installation | 21.1.0 | |
| 2256725 | 3-Major | Unable to trigger "Disallowed file upload content detected" violation in some cases | 21.1.0 | |
| 2251649 | 3-Major | `sig_cve` and `staged_sig_cves` Fields Appear as N/A in Data Sent to Remote Syslog | 21.1.0 | |
| 2225313 | 3-Major | ASM CAPTCHA refresh and audio icons are missing after policy import | 21.1.0 | |
| 2221781 | 3-Major | BT2221781 | The DOS process utilizes CPU resources during configuration updates that are unrelated to its operation. | 21.1.0 |
| 2219081 | 3-Major | BT2219081 | Live Update configuration sync failure in HA setup | 21.1.0 |
| 2213605 | 3-Major | BT2213605 | "Live Update" ASU File Listed as Not Installed After Successful Scheduled Installation | 21.1.0 |
| 2208709 | 3-Major | BT2208709 | Failure to match specific WAF signatures | 21.1.0 |
| 2200537 | 3-Major | BT2200537 | Audio captcha script error | 21.1.0 |
| 2187385 | 3-Major | BT2187385 | Brute force set to CAPTCHA also raises a violation and blocks traffic | 21.1.0 |
| 2185109 | 3-Major | High memory usage in REST query for ASM policies and virtualServers with huge L7 policy | 21.1.0 | |
| 2162189 | 3-Major | BT2162189 | "Live Update" reinstalls the genesis ASU file, while the latest ASU file is installed manually★ | 21.1.0, 17.5.1.4, 17.1.3.1 |
| 2152689 | 3-Major | BT2152689 | ASM GUI "Failed to load requests" pop-up | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 2152445 | 3-Major | BT2152445 | "Live Update" API is unresponsive after upgrade and recover only after tomcat restart★ | 21.1.0, 17.5.1.4, 17.1.3.1 |
| 2143305 | 3-Major | BT2143305 | Tmm crash | 21.1.0, 21.0.0.1 |
| 2038277 | 3-Major | BT2038277 | Double memory release in the enforcer | 21.1.0 |
| 2016465 | 3-Major | BT2016465 | Policy auto merge does not work for Base64 Decoding | 21.1.0 |
| 1938101 | 3-Major | BT1938101 | Performance issue on specific parameters extractions | 21.1.0 |
| 1933373 | 3-Major | BT1933373 | Newly added Threat Campaigns are missing REST ID | 21.1.0, 17.1.3.1 |
| 1922661 | 3-Major | BT1922661 | JSON profile settings not displayed in REST API after attaching schema files | 21.1.0, 17.1.3.1 |
| 1920973 | 3-Major | Ordering nested JSON objects during full json policy export | 21.1.0 | |
| 1920637 | 3-Major | BT1920637 | Duplicate user-defined Signature Set based on Attack Type is created upon policy import during upgrade★ | 21.1.0 |
| 1825057 | 3-Major | BT1825057 | 'vs_name' field truncated at 64 characters with ASM's remote logging | 21.1.0 |
| 1814413 | 3-Major | BT1814413 | Dynamic parameters are not extracted and cookies are not generated | 21.1.0 |
| 1772353 | 3-Major | BT1772353 | Defaults for Associated Violations are re-added to a policy | 21.1.0 |
| 1696965 | 3-Major | BT1696965 | When URL is created from session and login, the staging on the URL is disabled | 21.1.0, 17.1.3, 16.1.6 |
| 1632385 | 3-Major | BT1632385 | Non-ASCII UTF-8 characters are mangled in JSON policy export | 21.1.0 |
| 1623669 | 3-Major | BT1623669 | False “Illegal dynamic parameter value” violations when extracting parameters from links (HREF) | 21.1.0, 17.1.3.1 |
| 1583381 | 3-Major | BT1583381 | "Insert Secure Attribute" must be enabled and "Insert SameSite Attribute" must be set to "Lax" for pure wildcard cookie in all templates by default | 21.1.0 |
| 1562733 | 3-Major | Bd can crash using JSON schema | 21.1.0 | |
| 1552341 | 3-Major | BT1552341 | Excessive tmm memory during bot signature updates | 21.1.0, 21.0.0.1 |
| 1057557 | 3-Major | BT1057557 | Exported policy has greater-than sign '>' not escaped to '>' with response_html_code tag. | 21.1.0 |
| 2230277 | 4-Minor | Help Content Missing on Live Update Page in Certain Scenarios | 21.1.0 | |
| 2228753 | 4-Minor | BT2228753 | Violation_details may contain unexpected line break | 21.1.0 |
| 2201693 | 4-Minor | Empty Detected Value Length for Parameters with Empty Values | 21.1.0 | |
| 2199485 | 4-Minor | BT2199485 | Export and re-import of a security policy in XML format fails due to invalid 'openapi-array' user_input_format value | 21.1.0 |
| 2162589 | 4-Minor | BD crash with a specific configuration | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 2140949 | 4-Minor | BT2140949 | Need a clean up of dns-resolver f5-aws-dns | 21.1.0 |
| 2139901 | 4-Minor | BT2139901 | Server-ssl profile "do-not-remove-without-replacement" is recreated | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 2078277 | 4-Minor | BT2078277 | BD crash with an inappropriate configuration for request_max_chunks_number | 21.1.0 |
| 2046941 | 4-Minor | BT2046941 | Distributed Cloud-facing BIG-IP instance with bot-defense profile might block XC health monitor | 21.1.0, 17.5.1.4, 17.1.3.1 |
| 2007433 | 4-Minor | BT2007433 | CAPTCHA submit button text not configurable | 21.1.0 |
| 1505257 | 4-Minor | BT1505257 | False positive with "illegal base64 value" for Authorization header | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 1036221 | 4-Minor | BT1036221 | "Illegal parameter value length" is reported with parsing product length. | 21.1.0, 21.0.0.1, 17.5.1.4 |
Application Visibility and Reporting Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2183705 | 3-Major | K000156643, BT2183705 | Improper access control on SMTP | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 |
Access Policy Manager Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2149197 | 1-Blocking | Rotated Public key used for signature verification of apmclients iso bundle in BIG-IP | 21.1.0 | |
| 2259165-1 | 2-Critical | Input Validation on APM Logon Page | 21.1.0 | |
| 2259065 | 2-Critical | Access framework hardening | 21.1.0 | |
| 2259061 | 2-Critical | Access framework hardening | 21.1.0 | |
| 2257673 | 2-Critical | RSA SecurID improvements | 21.1.0 | |
| 2257669-3 | 2-Critical | APM my.policy improvement | 21.1.0 | |
| 2230009-1 | 2-Critical | BT2230009 | Access Policy memory is not cleared between access policy executions | 21.1.0 |
| 2219209 | 2-Critical | BT2219209 | Resetting profile statistics may lead to memory corruption | 21.1.0 |
| 2211137 | 2-Critical | BT2211137 | EPSEC upgrade fails when default package is pre-uploaded★ | 21.1.0 |
| 2162861 | 2-Critical | BT2162861 | 'Connectors' creation screen does not appear | 21.1.0 |
| 2152269 | 2-Critical | BT2152269 | Low reputation URIs are found in the URL DB binary | 21.1.0, 21.0.0.1, 21.0.0, 17.5.1.4, 17.1.3.1 |
| 2138077 | 2-Critical | BT2138077 | SAML redirect signature validation fails when RelayState is present with want-detached-signature=true in BIG-IP APM 17.1.x | 21.1.0, 21.0.0.1 |
| 1991297-2 | 2-Critical | BT1991297 | [APD][SAML-SSO]high memory due to SAML SSO leak | 21.1.0, 21.0.0.1 |
| 1282769 | 2-Critical | Localdb user can change the password of other user | 21.1.0 | |
| 781761 | 3-Major | BIG-IP allows enabling deprecated Network Access compression, causing intermittent tunnel traffic drops with Edge Client | 21.1.0 | |
| 2258853 | 3-Major | BT2258853 | [APM][SAML] SP automation fails to update, when bound to an IdP with a SAML Resource | 21.1.0 |
| 2241445 | 3-Major | Portal Access: JavaScript XHR requests fail with about:// origin in about:blank frames due to incorrect F5_Deflate_origin() rewriting | 21.1.0 | |
| 2241393 | 3-Major | BT2241393 | MutationObserver may not work in some cases | 21.1.0 |
| 2229773 | 3-Major | F5_document can be null resulting in GetCookie/SetCookie failures | 21.1.0 | |
| 2225513 | 3-Major | BT2225513 | Some named properties in document are not accessible in Portal Access | 21.1.0 |
| 2219801 | 3-Major | BT2219801 | Visual Policy Editor AD group search is limited to current page | 21.1.0 |
| 2218181-2 | 3-Major | JSESSIONID missing from APM NTLM SSO responses after successful login | 21.1.0 | |
| 2185281 | 3-Major | BT2185281 | Per-request policy variable assignment of perflow.category_lookup.result.primarycategory may lead to crash | 21.1.0 |
| 2183233 | 3-Major | BT2183233 | TMM crash due to extra trailing CR/LF in iSession reconnects | 21.1.0 |
| 2162941-2 | 3-Major | BT2162941 | Support MDM with GCC High / DoD Environments | 21.1.0 |
| 2152545-1 | 3-Major | BT2152545 | [APM][SAML] High TMM memory sso_saml leak | 21.1.0 |
| 2143165 | 3-Major | BT2143165 | Oauth tokens are not shown in UI | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 2141337 | 3-Major | BT2141337 | Auto-upgrade of the BIG-IP APM Edge Client does not upgrade the MachineTunnel Service on Windows systems★ | 21.1.0, 17.5.1.4 |
| 2053289-4 | 3-Major | BT2053289 | Increased OAuth instances in TMM memory | 21.1.0 |
| 2050177-1 | 3-Major | BT2050177 | LDAP cache optimisation, required as session establishment, takes more time | 21.1.0 |
| 2047137 | 3-Major | BT2047137 | TMM core may occur while using APM VDI with Blast UDP | 21.1.0, 17.1.3.1 |
| 2034753-2 | 3-Major | BT2034753 | Domain name validation does not align with the error message on GUI | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 1998985-3 | 3-Major | BT1998985 | "Page Unresponsive" error message when editing Active Directory group resource with large AD group count | 21.1.0, 17.5.1.4 |
| 1966965 | 3-Major | Client Download page update for linux client packages | 21.1.0 | |
| 1818949-1 | 3-Major | BT1818949 | [APM] BIG-IP as OAuth AS sending invalid grant error when refresh token expired. | 21.1.0, 21.0.0.1 |
| 1772317-1 | 3-Major | BT1772317 | [APM][SAML SP] sp fails authentication with error "SAML assertion is invalid, error: NameID is missing" | 21.1.0, 21.0.0.1 |
| 1756897 | 3-Major | BT1756897 | [APM][PA]Failed to execute 'observe' on 'MutationObserver': parameter 1 is not of type 'Node' | 21.1.0, 17.5.1.4 |
| 1752873-1 | 3-Major | BT1752873 | [APM][SAML SP] Order of SAML attribute values saml.last.attr.name is reversed★ | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 1554961-3 | 3-Major | BT1554961 | APM - Websso leeway time of 60 seconds | 21.1.0, 17.5.1.4 |
| 1290937-3 | 3-Major | 'contentWindow' of a dynamically genereated iframe becomes null | 21.1.0 | |
| 1166929 | 3-Major | BT1166929 | [AdminUI][Rewrite Profile][PA] Add "*://*" to to rewrite list if an RCL has been entered | 21.1.0 |
| 1074285-6 | 3-Major | BT1074285 | Apmd crashes while handling JWT tokens. | 21.1.0, 17.5.1.4, 17.1.3.1 |
| 1071021-6 | 3-Major | BT1071021 | Some URLs such as *cdn.onenote.net configured in the Office 365 dynamic address space are not processed by APM | 21.1.0, 17.1.3.1 |
| 937665 | 4-Minor | BT937665 | Relaystate in SLO request results in two Relaystates in SLO Response | 21.1.0, 17.5.1.4 |
| 2200653 | 4-Minor | BT2200653 | [LocalUserDB Auth]: UID parameter ignored during user deletion – deletes all users instead of specified user | 21.1.0 |
| 1787701 | 4-Minor | BT1787701 | [APM]Customization in German contains French language | 21.1.0 |
| 1696641 | 4-Minor | BT1696641 | aced core running out of file descriptors | 21.1.0, 17.5.1.4 |
| 1181933 | 4-Minor | Portal Access support for ES8/9/10/11 | 21.1.0 |
Service Provider Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2252481 | 2-Critical | Undisclosed network traffic can cause a TMM crash | 21.1.0 | |
| 1268373 | 2-Critical | BT1268373 | MRF flow tear down can fill up the hudq causing leaks | 21.1.0, 17.5.1.4 |
| 1977057-4 | 3-Major | BT1977057 | Memory leak when using an iRule to overwrite MR peer route | 21.1.0, 17.5.1.4 |
Advanced Firewall Manager Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2262353 | 1-Blocking | Pccd may crash when deleting a Zone with VLAN association | 21.1.0 | |
| 2257857 | 2-Critical | Config Reload Fails When Rolling Back F5OS Platform Software from 2.0.0+ to Versions Below 2.0.0 | 21.1.0 | |
| 2229569 | 2-Critical | BT2229569 | Evict FSD Received While SPVADWL Is Uninitialized | 21.1.0 |
| 2162937-1 | 2-Critical | BT2162937 | TMM crash when AFM is enabled | 21.1.0, 21.0.0.1 |
| 2162905 | 2-Critical | BT2162905 | AFM GUI does not display Port List members in Properties panel | 21.1.0, 21.0.0.1, 17.5.1.4 |
| 2150669 | 2-Critical | BT2150669 | TCP Packet loss after upgrade with AFM provisisoned★ | 21.1.0 |
| 2139965 | 2-Critical | BT2139965 | AFM DNS DOS logging protocol_dns_dos_nxdomain_field_attack_name() | 21.1.0 |
| 1671149 | 2-Critical | BT1671149 | Timestamp cookies may cause issue for PVA-accelerated connections | 21.1.0 |
| 2291353-2 | 3-Major | BT2291353 | PCCD enters a loop while compiling NAT rules | 21.1.0 |
| 2251813 | 3-Major | BT2251813 | BIG-IP AFM: mcpd may crash when modifying address lists with cyclic nested references | 21.1.0 |
| 2222185 | 3-Major | BT2222185 | Even if it's possible to configure multiple stanzas under the auth-info section of a security ssh profile, the SSH proxy will always choose the first one that has a private key | 21.1.0 |
| 2218157 | 3-Major | BT2218157 | IP Intelligence database load log displayed periodically | 21.1.0 |
| 2208701 | 3-Major | BT2208701 | Tmm crash when the spvawl_timer_sweep callback_timer is being processed | 21.1.0 |
| 2163777-1 | 3-Major | BT2163777 | Tmm core on fw_nat_classify() while nat rule configuration is being changed | 21.1.0 |
| 2143101 | 3-Major | BT2143101 | SNMP Malfunctioning for IPI BL: Incorrect Statistics Reported | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 2077525 | 3-Major | BT2077525 | Incomplete or missing IP Intelligence databases result in connection reset, high TMM CPU usage and/or TMM crash | 21.1.0, 21.0.0.1 |
| 2077465-1 | 3-Major | BT2077465 | Missing audit logs for dropped IP option packets (LSR/SSR/RR) prior to attack detection | 21.1.0, 17.5.1.4 |
| 2064333 | 3-Major | BT2064333 | [AFM] pccd cores during the service restart | 21.1.0 |
| 1820489 | 3-Major | BT1820489 | Rule list order changes when modifying a rule using Filer Active Rules List | 21.1.0, 17.5.1.4, 17.1.3.1 |
| 760355-1 | 4-Minor | BT760355 | Firewall rule to block ICMP/DHCP from 'required' to 'default'★ | 21.1.0, 17.1.2, 16.1.4, 15.1.9, 15.0.1.1, 14.1.2.1 |
| 1044053 | 4-Minor | The db variable pccd.maxblobsize can only be set to a minimum of 512 | 21.1.0 |
Policy Enforcement Manager Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2262537 | 2-Critical | BT2262537 | pem_sessiondump crashes when listing subscriber sessions with custom attributes | 21.1.0 |
| 2230405 | 3-Major | PEM memory handling update | 21.1.0 | |
| 2200009 | 3-Major | BT2200009 | PEM HA failover may cause traffic drops for new connections | 21.1.0 |
| 2198757 | 3-Major | BT2198757 | PEM: use-after-free of mw_msg in session_del_msg_entries hash | 21.1.0 |
| 2086097 | 3-Major | PEM iRules causing traffic disruption | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 2046553 | 3-Major | BT2046553 | Memory leak when modifying PEM policies with flow-info-filters | 21.1.0, 17.5.1.4, 17.1.3.1 |
| 1934073 | 3-Major | BT1934073 | PEM policy rule incorrectly matching when using a flow condition | 21.1.0, 21.0.0.1, 17.5.1.3, 17.1.3, 16.1.6.1 |
| 1785145-4 | 3-Major | BT1785145 | TMM SIGSEGV core due to NULL check is not handled properly in PEM | 21.1.0, 17.5.1.3, 17.1.3 |
| 2195709 | 4-Minor | BT2195709 | TCP fingerprint tethering detection does not work when a subscriber's traffic comes from a tethering Mac OS system. | 21.1.0 |
Carrier-Grade NAT Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 518333 | 3-Major | BT518333 | New LSN Stat,Total End Points (IPv4/IPv6), deprecates the stat Total End Points | 21.1.0 |
Anomaly Detection Services Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1959361 | 2-Critical | BT1959361 | When running a tenant with more than 72 VCPUs / cores, adminstall crashes | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 2263657 | 3-Major | BT2263657 | Crash in Bados Signature Management operations results in a memory leak | 21.1.0 |
| 2258257 | 3-Major | BT2258257 | Zombie connections after switching dos profile may cause tmm crash. | 21.1.0 |
| 2230841 | 3-Major | Admd Crash During Restart Under Heavy Load | 21.1.0 | |
| 2186897 | 3-Major | BT2186897 | TMM core SIGSEVG upon replacing L7 DOS policy | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 |
Traffic Classification Engine Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2141109 | 1-Blocking | BT2141109 | The URL categorisation daemon's DNS cache is never refreshed | 21.1.0 |
Device Management Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 718796 | 2-Critical | K22162765, BT718796 | iControl REST token issue after upgrade★ | 21.1.0 |
| 996129 | 3-Major | BT996129 | The /var partition is full as cleanup of files on secondary is not executing | 21.1.0 |
| 563144 | 3-Major | Changing the system's admin user causes many errors in the REST framework. | 21.1.0 | |
| 2187185 | 3-Major | BT2187185 | BIG-IP v21.0 REST framework incorrectly processes Content-Range in HTTP GET requests | 21.1.0 |
| 2186697 | 3-Major | BIG-IP REST Improvements | 21.1.0 | |
| 1678597 | 3-Major | Rate-limit external iControl REST API calls on BIG-IP | 21.1.0 | |
| 1001429 | 4-Minor | HTTP header Sanitization | 21.1.0, 21.0.0.1 |
iApp Technology Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2227725 | 3-Major | iApp Template Improvements | 21.1.0 | |
| 2154005 | 4-Minor | BT2154005 | Importing iApp RPM may not provide a message about already installed, upgrading, or downgrading. | 21.1.0 |
| 2151785 | 4-Minor | BT2151785 | Importing iApp RPM may provide an incorrect downgrading warning message | 21.1.0 |
| 1505813 | 4-Minor | CVE-2018-16487 lodash: Prototype pollution in utilities | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 1505297 | 4-Minor | CVE-2020-8203 nodejs-lodash: prototype pollution in zipObjectDeep function | 21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1 |
Protocol Inspection Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 760740-8 | 3-Major | BT760740 | Mysql error is displayed when saving UCS configuration on BIG-IP system when MySQL is not running | 21.1.0 |
| 2228789 | 3-Major | BT2228789 | IPS ID10008 triggered by large ADDITIONAL SECTION in DNS response | 21.1.0 |
SSL Orchestrator Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1959181 | 3-Major | Proxy Select Agent does not persist clients to their selected upstream proxy | 21.1.0 | |
| 1953357 | 3-Major | Persistence Profiles do not work on SSLO inspection service virtual servers | 21.1.0 | |
| 1628129 | 4-Minor | BT1628129 | SSL Orchestrator traffic summary log does not display url-category for HTTP request if a SWG as a service blocks the connection | 21.1.0, 17.5.1.4, 17.1.3 |
Bot Defense Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2163545 | 3-Major | Bot Defense profile does not support js tag injection for compressed html pages. | 21.1.0 | |
| 2077329 | 4-Minor | BT2077329 | IBD profile is injecting the Javascript tag in non html pages | 21.1.0 |
F5OS Messaging Agent Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2240945 | 1-Blocking | platform_agent crash when deleting a virtual_server. | 21.1.0 | |
| 1758957 | 2-Critical | BT1758957 | If two tenants share the same VLAN, TMM may egress broadcast traffic even when VLANs are disabled in F5OS | 21.1.0, 17.5.1.4, 17.1.3.1 |
| 2263257 | 3-Major | VLAN Recreation Fails for MAC Masquerade Created by Floating Virtual Address | 21.1.0 | |
| 2132153 | 3-Major | `tmsh show sys hardware` doesn't show F5OS version | 21.1.0 | |
| 1690005-1 | 3-Major | BT1690005 | Unable to ping the floating self addresses from the Standby tenant | 21.1.0 |
| 2008409-1 | 4-Minor | BT2008409 | MAC masquerade does not work on an F5OS tenant if there are no floating self-ips configured on the VLAN | 21.1.0, 21.0.0.1 |
Leak Signal Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2217721 | 5-Cosmetic | Delete checkbox in dcp policy for adding endpoint is not seen for endpoint >37 char and string is out of text box | 21.1.0 |
Cumulative fix details for BIG-IP v21.1.0 that are included in this release
996129 : The /var partition is full as cleanup of files on secondary is not executing
Links to More Info: BT996129
Component: Device Management
Symptoms:
The system does not boot because the /var partition is full.
You see a large number of "storageXXXX.zip" files in /var/config/rest/
Conditions:
This may be observed on multi-blade vCMP guests and hosts, as well as on multi-blade tenants.
Impact:
The partition housing /var/config/ may become 100% full, impacting future disk IO operation and it may cause unexpected traffic disruption.
Workaround:
Important: This workaround is temporary, and may need to be periodically performed either manually or from a script.
Impact of Workaround: While these steps are performed, the BIG-IP REST API will be temporarily inaccessible, and higher disk IO may be seen.
Run the following commands, in sequence:
bigstart stop restjavad
rm -rf /var/config/rest/storage*.zip
rm -rf /var/config/rest/*.tmp
bigstart start restjavad
Manual application of these workaround steps clears the 100% utilized space condition and allows the partition to resume normal operation.
Fix:
N/A.
Fixed Versions:
21.1.0
977953 : Show running config interface CLI could not fetch the interface info and crashes the imi
Links to More Info: BT977953
Component: TMOS
Symptoms:
The confd command 'show running-config' does not display interface information if nsm and bgpd are the only processes running.
If you run 'show running-config interface', imi crashes.
Conditions:
1. nsm and bgpd are the daemons running.
2. Run the "show running-config" command
Impact:
Imish cannot retrieve interface information from the show running-config command.
Workaround:
* Enable OSPF. For example,
# tmsh modify /net route-domain 0 routing-protocol add { BGP OSPFv3 }
# ps -ef | egrep -i ospf
root 11954 4654 0 11:25 ? S 0:00 ospf6d%0
Fixed Versions:
21.1.0
950665 : Pool and pool members created for dynamic ECMP routes are not freed
Links to More Info: BT950665
Component: Local Traffic Manager
Symptoms:
-- Dynamic ECMP routes.
-- High usage of TMM memory may be reported.
-- The ltm log may record the following errors:
err merged[9436]: 011b0900:3: TMSTAT error tmstat_remerge: Cannot allocate memory.
Conditions:
Dynamic routing is used and routes with more then one nexthop are repeatedly added and removed by the router(s)
Impact:
- tmm memory leak
- tmstat segments for tmm could grow very large.
Workaround:
Use a default gateway pool instead of dynamic routing for routes with more then one nexthop - https://support.f5.com/csp/article/K15582
Fixed Versions:
21.1.0
937665 : Relaystate in SLO request results in two Relaystates in SLO Response
Links to More Info: BT937665
Component: Access Policy Manager
Symptoms:
When BIG-IP APM acts as the SAML IdP and receives a redirect binding single logout (SLO) request that contains a relaystate, the BIG-IP APM generates an SLO response that contains two relaystates.
Conditions:
-- BIG-IP APM configured as IdP
-- Redirect binding SLO request contains a relaystate
Impact:
SLO processing on SP may not work.
Workaround:
None.
Fixed Versions:
21.1.0, 17.5.1.4
935633 : VCMP guests or F5OS tenants may experience constant clusterd restart after host upgrade★
Links to More Info: BT935633
Component: TMOS
Symptoms:
Sometimes, when vCMP guests or F5OS tenants are started after the host has been upgraded, the guests or tenants may enter an unhealthy state due to clusterd constantly restarting.
Conditions:
-- vCMP guest or F5OS tenant has Mirroring IP configured.
-- vCMP guest or F5OS tenant is powered on after vCMP host upgrade.
-- vCMP guest or F5OS tenant is powered on and receives a new license file from the host during startup.
Impact:
-- This issue might prevent the guest or tenant from servicing traffic if the system fails to load the config and clusterd keeps restarting.
-- During startup of the guest or tenant, the following message is logged to /var/log/ltm:
err mcpd[6519]: 0107146f:3: Self-device state mirroring address cannot reference the non-existent Self IP ([IP address]); Create it in the /Common folder first.
-- /var/log/ltm shows clusterd constantly restarting.
-- One or more slots are in INOPERATIVE state, while the host shows slots as RUN/Healthy.
Workaround:
-- To avoid the issue before it occurs:
1. Prior to shutting down vCMP guests or F5OS tenants before host upgrade, ensure guests or tenants have free space in the /var partition.
2. Ensure any license updates (e.g., reactivation) are applied before shutting down the vCMP guest or F5OS tenant.
3. Issue 'tmsh save sys config' on the vCMP guest or F5OS tenant.
4. Issue 'ls /var/db/mcp*' and confirm the presence of mcpdb.bin and mcpdb.info in the /var/db directory.
5. Proceed with vCMP guest or F5OS tenant shutdown and host upgrade as per standard F5 recommended process.
-- To mitigate after the issue has been experienced on a vCMP guest or F5OS tenant:
1. Set the vCMP guest or F5OS tenant to the Configured state and wait for it to complete transition to Configured.
2. Set vCMP guest or F5OS tenant to Deployed state.
3. Review startup logs and confirm 'Self-device state mirroring address cannot reference the non-existent Self IP' message is no longer present.
4. Review /var/log/ltm and confirm clusterd is no longer restarting.
5. If issue persists, delete and recreate the vCMP guest or F5OS tenant.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
931149 : Some RESOLV::lookup queries, including PTR lookups for RFC1918 addresses, return empty strings
Links to More Info: BT931149
Component: Global Traffic Manager (DNS)
Symptoms:
RESOLV::lookup returns an empty string.
Conditions:
The name being looked up falls into one of these categories:
-- Forward DNS lookups in these zones:
- localhost
- onion
- test
- invalid
-- Reverse DNS lookups for:
- 127.0.0.0/8
- ::1
- 10.0.0.0/8
- 172.16.0.0/12
- 192.168.0.0/16
- 0.0.0.0/8
- 169.254.0.0/16
- 192.0.2.0/24
- 198.51.100.0/24
- 203.0.113.0/24
- 255.255.255.255/32
- 100.64.0.0/10
- fd00::/8
- fe80::/10
- 2001:db8::/32
- ::/64
Impact:
RESOLV::lookup fails.
Workaround:
Use a DNS Resolver ('net dns') and RESOLVER::name_lookup / DNSMSG:: instead of RESOLV::lookup:
1. Configure a local 'net dns' resolver, replacing '192.88.99.1' with the IP address of your DNS resolver:
tmsh create net dns-resolver resolver-for-irules answer-default-zones no forward-zones add { . { nameservers add { 192.0.2.1:53 } } }
2. Use an iRule procedure similar to this to perform PTR lookups for IPv4 addresses:
proc resolv_ptr_v4 { addr_v4 } {
# Convert $addr_v4 into its constituent bytes
set ret [scan $addr_v4 {%d.%d.%d.%d} a b c d]
if { $ret != 4 } {
return
}
# Perform a PTR lookup on the IP address $addr_v4, and return the first answer
set ret [RESOLVER::name_lookup "/Common/resolver-for-irules" "$d.$c.$b.$a.in-addr.arpa" PTR]
set ret [lindex [DNSMSG::section $ret answer] 0]
if { $ret eq "" } {
# log local0.warn "DNS PTR lookup for $addr_v4 failed."
return
}
# Last element in '1.1.1.10.in-addr.arpa. 600 IN PTR otters.example.com'
return [lindex $ret end]
}
-- In an iRule, instead of:
RESOLV::lookup @192.0.2.1 $ipv4_addr
Use:
call resolv_ptr_v4 $ipv4_addr
Fixed Versions:
21.1.0, 21.0.0.1
929709 : jQuery vulnerability CVE-2020-11023
Links to More Info: K66544153
928901 : jQuery vulnerability CVE-2020-11022
Links to More Info: K02453220
919917 : File permission errors during bot-signature installation
Links to More Info: BT919917
Component: Application Security Manager
Symptoms:
When you install Bot-Sig IM file through LU, /var/log/ltm shows file permission errors.
Cannot open lock file (/var/run/config_lock), permission denied.
Cannot open command history file (/root/.tmsh-history-root), Permission denied : framework/CmdHistoryFile.cpp, line 92.
Conditions:
Installing bot-signature.
Impact:
If the BIG-IP device is rebooted, or the mcpd process is restarted, following an automatic bot-signature installation, without the config first being saved, the bot-signature installation will be reverted.
Workaround:
Save the BIG-IP configuration manually after the automatic bot-signature update has completed.
Fixed Versions:
21.1.0
911661 : Remote event logs may truncate at 5k when maximum entry length is configured to 64k
Links to More Info: BT911661
Component: Application Security Manager
Symptoms:
Remote event logs are truncated at 5k instead of the configured 64k maximum entry length
Conditions:
Remote logging is configured with maximum entry length set to 64k
Impact:
Remote event logs are truncated at 5k, resulting in incomplete log entries
Workaround:
As a temporary workaround, change the maximum entry length to 2k or 10k, save the configuration, then change it back to 64k. Follow the same steps if the issue occurs again.
Fixed Versions:
21.1.0
904401 : Guestagentd or devmgmtd core
Links to More Info: BT904401
Component: TMOS
Symptoms:
Guestagentd or devmgmtd crashes on a vCMP guest.
Conditions:
This can occur during normal operation in a vCMP environment.
Impact:
Guestagentd crashes on the vCMP guest, and the vCMP host does not have accurate guest information, such as version, provisioning, high availability (HA) status, and tmm status.
Or if it is Devmgmtd that crashed on vCMP guest, the device management daemon will not establishes and maintains device trust group functionality.
Workaround:
None.
Fixed Versions:
21.1.0
901989 : Corruption detected in /var/log/btmp
Links to More Info: BT901989
Component: TMOS
Symptoms:
The boot_marker is written to /var/log/btmp, but /var/log/btmp is a binary file.
A message similar to:
warning <process>[10901]: pam_lastlog(<process>:session): corruption detected in /var/log/btmp
... may be logged to /var/log/secure.
Conditions:
This issue is triggered following a reboot of the BIG-IP system. Subsequently, you may observe the log message appearing in relation to various administrative activities, such as logging in through the console or restarting the tomcat service.
Impact:
Since this file is unknowingly corrupt after each boot, any potential investigation needing this data may be compromised.
Workaround:
Option 1; After bootup you can truncate the file.
$ truncate --size 0 /var/log/btmp
This will remove any instances of failed logins from the file.
--or--
Option 2; this will stop boot_markers from logging to /var/log/btmp:
CAVEATS:
- If the system has FIPS enabled, do not use this workaround! Modifying this file will cause FIPS validation to fail the next time it runs, and the system will halt on next boot.
- This workaround will not persist on software upgrades.
- Familiarity with vi is required to perform this.
Backup:
cp /etc/sysconfig/sysinit/01bootlogmarker.sysinit /var/tmp/01bootlogmarker.sysinit.bak
Open in vi:
vi /etc/sysconfig/sysinit/01bootlogmarker.sysinit
Change the following line to include "btmp":
old: excludeFiles=( "lastlog" "wtmp" "tmm*tech.out" "*.json" )
new: excludeFiles=( "lastlog" "wtmp" "btmp" "tmm*tech.out" "*.json" )
Force save and quit with (required since file is RO):
:wq!
Truncate the "/var/log/btmp" file:
truncate --size 0 /var/log/btmp
Reboot
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
901569 : Loopback traffic might get dropped when VLAN filter is enabled for a virtual server.
Links to More Info: BT901569
Component: Local Traffic Manager
Symptoms:
Loopback traffic (local traffic) destined to a virtual server might get dropped when the incoming packet matches a terminating connection flow.
Conditions:
-- VLAN filter is enabled on the virtual server created for loopback traffic processing.
-- An incoming packet matches a terminating connection flow (i.e., the connection flow terminates because of timeout, being dropped by iRule, etc.).
Impact:
Traffic that is matched against a terminating connection flow of a virtual is not processed by the virtual server.
Workaround:
Because this filter is ignored for loopback traffic, removing the 'Enabled On VLAN' filter at the virtual server mitigates the issue.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
887681 : Tmm SIGSEGV in rrset_array_lock,services/cache/rrset.c
Links to More Info: BT887681
Component: Global Traffic Manager (DNS)
Symptoms:
TMM Cored with SIGSEGV.
Conditions:
N/A.
Impact:
Traffic disrupted while tmm restarts.
Fixed Versions:
21.1.0, 21.0.0.1
886045 : Multi-NIC instances fail to come up when trying to use memory-mapped virtio device
Links to More Info: BT886045
Component: Local Traffic Manager
Symptoms:
Multi-NIC instances fail to come up while using memory-mapped virtio device.
Running the command 'lspci -s <pci-id> -vv' results in the 'region' field reporting 'Memory at xxxxx'.
Conditions:
TMM crashes as soon as the BIG-IP system tries to come up.
Impact:
The BIG-IP system fails to attach to the underlying virtio devices.
Workaround:
Switch to the sock driver by overriding tmm_init.tcl.
For instructions on how to enable the sock driver, see the workaround in K74921042: BIG-IP VE may fail to process traffic after upgrading the VMware ESXi 6.7 host to Update 2 (or later), available at https://support.f5.com/csp/article/K74921042.
Fixed Versions:
21.1.0
881041 : BIG-IP system may forward IP broadcast packets back to the incoming VLAN interface via a forwarding virtual server.
Component: Local Traffic Manager
Symptoms:
Some received packets are retransmitted back on the incoming VLAN interface.
Conditions:
The symptom is found with the following conditions:
1. A forwarding virtual server is configured.
2. A packet is received whose destination MAC address is its unicast VLAN MAC address and the destination IP address is the broadcast address of that subnet.
Impact:
Broadcast packets are forwarded back to the incoming VLAN interface might result in loops if there are multiple gateways on the network.
Workaround:
Apply an iRule to network-forwarding virtual servers that drops packets destined to the broadcast IP address of local vlans. For example:
ltm data-group internal /Common/local_broadcast_ips {
records {
10.1.1.255/32 { }
10.1.2.255/32 { }
}
type ip
}
ltm rule do_not_fwd_to_bcast_addrs {
priority 5
when CLIENT_ACCEPTED {
if { [class match [IP::local_addr] equals local_broadcast_ips ] } {
drop
}
}
}
Fix:
Should not see packets retransmitted on the incoming vlan interface with forwarding virtual server is configured.
Fixed Versions:
21.1.0
857973 : GUI sets FQDN Pool Member "Auto Populate" value Enabled by default
Links to More Info: BT857973
Component: TMOS
Symptoms:
In the GUI, the "autopopulate" value is Enabled by default when creating an FQDN template Pool Member, but Disabled by default when creating an FQDN template Node.
Conditions:
This is observed when using FQDN names to configure Pool Members and/or Nodes in the GUI.
Impact:
Differing default "autopopulate" values displayed in the GUI are confusing.
The "autopopulate" value for an FQDN Pool Member cannot be set to "enabled" if the "autopopulate" value of the corresponding FQDN Node is set to the default value of "disabled".
Attempting to do so via tmsh will generate an error similar to:
01070734:3: Configuration error: Cannot enable pool member to autopopulate: node (<fqdn node name>) has autopopulate set to disabled
Workaround:
Be careful to select the appropriate option for the "Auto Populate" parameter when configuring FQDN Pool Members using the GUI.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
842525 : TMSH - Modifying sys httpd ssl-verify-client attribute to 'optional-no-ca' results in error
Links to More Info: BT842525
Component: TMOS
Symptoms:
Error is seen when configuring the ssl-verify-client to optional-no-ca via tmsh
tmsh modify sys httpd ssl-verify-client optional-no-ca
01070920:3: Application error for confpp: AH00526: Syntax error on line 166 of /etc/httpd/conf.d/ssl.conf:
SSLVerifyClient: Invalid argument 'optional-no-ca'
Conditions:
Seen when configuring ssl-verify-client to optional-no-ca in httpd profile
Impact:
Unable to configure ssl-verify-client to optional-no-ca - impacts authentication
Workaround:
None
Fix:
You can now successfully execute
tmsh modify sys httpd ssl-verify-client optional-no-ca
Fixed Versions:
21.1.0
791365-9 : Bad encryption password error on UCS save
Links to More Info: BT791365
Component: TMOS
Symptoms:
When a user with the admin role attempts to save a UCS with a passphrase, the following error is encountered:
[resource-admin@inetgtm1dev:Active:Standalone] ucs # tmsh save sys ucs /var/local/ucs/test-ucs passphrase password
Saving active configuration...
Error: Bad encryption password. <=========
Operation aborted.
/var/tmp/configsync.spec: Error creating package
WARNING:There are error(s) during saving.
Not everything was saved.
Be very careful when using this saved file!
Error creating package
Error during config save.
Unexpected Error: UCS saving process failed.
Conditions:
1) Log into the BIG-IP system as a user with admin role that has Advanced Shell access.
2) Attempt to create a UCS with a passphrase.
Impact:
Unable to save UCS with a passphrase.
Workaround:
This affects users logged in with the Admin role; you will be able to create a UCS with a passphrase while logged in firstly as root user and then use 'resource-admin' user to save a ucs with passphrase.
Fixed Versions:
21.1.0
783077-6 : IPv6 host defined via static route unreachable after BIG-IP reboot
Links to More Info: BT783077
Component: TMOS
Symptoms:
Static route unreachable after BIG-IP system reboot.
Conditions:
-- Add a static route.
-- Issue a ping (works fine).
-- Reboot the BIG-IP system.
-- Issue a ping (cannot pint the route).
Impact:
Static route exists in both kernel and LTM routing table but unable to ping the route after rebooting the BIG-IP system.
Workaround:
Workaround-1:
Delete the IPv6 route entry and recreate the route by issuing the following commands in sequence:
tmsh delete net route IPv6
tmsh create net route IPv6 network 2a05:d01c:959:8408::b/128 gw fe80::250:56ff:fe86:2065 interface internal
Workaround-2:
net route /Common/IPv6 {
gw fe80::456:54ff:fea1:ee02 <-- Change this address to unicast address from 2a05:d01c:959:8409::/64 network
interface /Common/Internal
mtu 1500
network 2a05:d01c:959:8408::b/128
}
Fixed Versions:
21.1.0, 17.5.1.4
781761 : BIG-IP allows enabling deprecated Network Access compression, causing intermittent tunnel traffic drops with Edge Client
Component: Access Policy Manager
Symptoms:
Intermittent tunnel traffic drops when Network Access compression is enabled.
Tunnel stability is restored when Compression is disabled.
No client-side errors clearly indicating unsupported configuration.
Conditions:
-- BIG-IP APM with Network Access resource configured
-- Compression enabled on Network Access resource
-- Edge Client version 7.2.6 or later
-- VPN tunnel established
-- Intermittent traffic flow over the tunnel
Impact:
-- Intermittent VPN tunnel instability
-- Hard-to-diagnose issues, potentially leading to unknowingly enabling unsupported configurations
Workaround:
Disable compression in the BIG-IP Network Access config and connectivity profile config.
Fix:
Compression settings is now removed in Network access page in Admin webUI.
Fixed Versions:
21.1.0
761853 : Send HOST header in OCSP responder request
Links to More Info: BT761853
Component: TMOS
Symptoms:
As per the Digicert documentation, the OCSP/CRL connections require either HTTP1.1 or HTTP1.0 with host header. (Digicert).
LTM uses HTTP1.1 without the host header in OCSP responder request
Conditions:
OCSP and CRL Authentication uses HTTP1.0 for OCSP responder requests
Impact:
OCSP in the current BIG-IP relies on OpenSSL for its operations and current version of OpenSSL that is available in BIG-IP is 1.0.2za
OpenSSL 1.0.2 is only capable of generating HTTP/1.0 requests for OCSP and CRL fetches; it does not support HTTP/1.1.
This limitation prevents clients from communicating with OCSP/CRL endpoints that require HTTP/1.1, resulting in failures for revocation checks in environments where modern protocols are mandated.
Workaround:
Add either of these iRules to the Virtual Server
Modify HTTP 1.0 to HTTP1.1
when HTTP_REQUEST {
HTTP::version "1.1"
}
Add Host header
when HTTP_REQUEST {
HTTP::host "[HTTP::host]”
}
Fix:
Support for HTTP1.1 is added. The OCSP requests for auth should now use HTTP1.1 version
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
760740-8 : Mysql error is displayed when saving UCS configuration on BIG-IP system when MySQL is not running
Links to More Info: BT760740
Component: Protocol Inspection
Symptoms:
When saving the configuration to a UCS file, the process tries save the IPS learning information stored in the MySQL database.
MySQL runs only when particular modules are provisioned. If MySQL was previously running as a result of different provisioning, but is not currently running, saving the configuration to a UCS file succeeds, but the system reports a spurious message during the operation:
Can't connect to local MySQL server through socket '/var/lib/mysql/mysql.sock.
Conditions:
-- Saving the configuration to a UCS file.
-- BIG-IP system provisioning only includes modules that do not require MySQL. These modules may include:
+ LTM
+ FPS
+ GTM (DNS)
+ LC
+ SWG
+ iLX
+ SSLo
-- BIG-IP system was previously provisioned with a module that starts MySQL, which results in the creation of the file /var/db/mysqlpw. These modules may include:
+ APM
+ ASM
+ AVR
+ PEM
+ AFM
+ vCMP
Impact:
The error message is cosmetic and has no impact on the UCS save process.
Workaround:
None.
Fixed Versions:
21.1.0
760451-2 : Enabling user to configure nonce disabled/enabled from Mgmt GUI login as well as CLI
Component: TMOS
Symptoms:
When Remote client cert-ldap authentication is enabled in BIG-IP and ocsp-responder is configured. By default nonce was always added in ocsp request
Conditions:
-- Remote client cert-ldap authentication is enabled in BIG-IP and ocsp-responder is configured.
Impact:
A new configurable parameter "ssl-ocsp-use-request-nonce" is introduced in httpd, to configure whether to send the nonce in ocsp request. Default value is On
Workaround:
None
Fix:
1.Configure BIG-IP for Remote-cert-ldap authentication
2.Set httpd ssl-ocsp-use-request-nonce on in httpd profile
3.Capture the ocsp packet
4.When httpd ssl-ocsp-use-request-nonce is on, ocsp request should contain OCSP nonce in the extensions
Fixed Versions:
21.1.0
760355-1 : Firewall rule to block ICMP/DHCP from 'required' to 'default'★
Links to More Info: BT760355
Component: Advanced Firewall Manager
Symptoms:
If a firewall is configured on the management port with an ICMP rule, after upgrading to v14.1.x or later, the ICMP rule does not work.
Conditions:
- Firewall is configured on the management port.
- Firewall is configured with an ICMP rule to block.
- Firewall is configured with an ICMP rule to allow.
Impact:
ICMP packets cannot be blocked with a firewall rule to drop on the management port. ICMP packets are allowed from the management port and will not increase the counter even if explicitly allowed by a rule.
Workaround:
Run the following commands after upgrading to v14.1.x or later from earlier versions.
# /sbin/iptables -N id760355
# /sbin/iptables -I INPUT 1 -j id760355
# /sbin/iptables -A id760355 -i mgmt -p icmp --icmp-type 8 -s 172.28.4.32 -j DROP
Fix:
ICMP firewall rule has been moved from the f5-required to f5-default.
Fixed Versions:
21.1.0, 17.1.2, 16.1.4, 15.1.9, 15.0.1.1, 14.1.2.1
745334-10 : CVE-2016-7099 NodeJS Vulnerability
Links to More Info: K24444803
718796 : iControl REST token issue after upgrade★
Links to More Info: K22162765, BT718796
Component: Device Management
Symptoms:
When upgrading to version 13.1.0.x or later, users who previously had permissions to make calls to iControl REST lose the ability to make those calls.
Conditions:
You will notice this issue when you use iControl REST and are upgrading to version 13.1.0.x or later.
You can also detect if the user is impacted by this issue with the following steps
1. Run below API to for impacted user account XYZ.
# curl -ik -u username:XYZ -XPOST https://localhost/mgmt/shared/authn/login --data-binary '{"username":"XYZ", "password":"XYZpass", "loginProviderName":"tmos"}' -H "Content-Type: application/json"
2. Find user XYZ's 'link' path under 'token' in previous output
There are two formats possible for 'link'
a. Path will have a UUID
For example "token"->"link"->"https://localhost/mgmt/cm/system/authn/providers/tmos/1f44a60e-11a7-3c51-a49f-82983026b41b/users/<UUID>"
b. Path will have a username (not UUID)
For example "token"->"link"->"https://localhost/mgmt/shared/authz/users/<username>"
3. Run below API to get list of user roles.
# restcurl -u "admin:<admin-user-pass>" /shared/authz/roles | tee /var/tmp/rest_shared_authz_roles.json
4. Check user XYZ's link path from step 2 in above output.
Check under the "userReferences" section for group "iControl_REST_API_User" . You will see the link path in one of the two formats listed in 2a/2b. If you do not see the user link path then you are impacted by this bug
Impact:
A previously privileged user can no longer query iControl REST. In addition, some remotely authenticated users may lose access to the Network Map and Analytics view after the upgrade.
Workaround:
You can repair the current users permissions with the following process:
1) Delete the state maintained by IControlRoleMigrationWorker and let it rerun by restarting restjavad process:
# restcurl -X DELETE "shared/storage?key=shared/authz/icontrol-role-migrator"
2) Restart services
# bigstart restart restjavad *or* tmsh restart /sys service restjavad
3) Now, the permissions should start in a healthy state. Re-try making an iControl REST call with an affected user.
4) If this still does not resolve the issue you could update shared/authz/roles/iControl_REST_API_User userReference list to add all affected users' accounts using PUT. Here you may need to use the UUID path as described under 'Conditions'
# restcurl shared/authz/roles/iControl_REST_API_User > role.json
# vim role.json
a. add { "link": "https://localhost/mgmt/shared/authz/users/[your-user-name]" } object to userReferences list
OR
b. add { "link": "https://localhost/mgmt/cm/system/authn/providers/tmos/1f44a60e-11a7-3c51-a49f-82983026b41b/users/<UUID>" } object to userReferences list
# curl -u admin:admin -X PUT -d@role.json http://localhost/mgmt/shared/authz/roles/iControl_REST_API_User
Fix:
When upgrading to version 13.1.0.x or later, users who previously had permissions to make calls to iControl REST retain the ability to make those calls.
Fixed Versions:
21.1.0
659579-9 : Timestamps in icrd, restjavad, and restnoded logs are not synchronized with the system time
Links to More Info: BT659579
Component: TMOS
Symptoms:
Logs on icrd, restnoded, and restjavad are in the UTC time zone and are not aligned to the system time, which makes it difficult to determine the time during troubleshooting operations.
Conditions:
Checking the icrd, restnoded, and restjavad logs timestamps.
Impact:
Difficult to troubleshoot as the logs are not aligned with system time.
Workaround:
None
Fixed Versions:
21.1.0, 17.5.1.4
658943 : Errors when platform migration process is loading UCS using trunks on vCMP guest/F5OS Tenants
Links to More Info: BT658943
Component: TMOS
Symptoms:
During the platform migration from a physical BIG-IP system to a BIG-IP vCMP guest/F5OS Tenant, the load fails with one of the following messages:
01070687:3: Link Aggregation Control Protocol (LACP) is not supported on this platform. Unexpected Error: Loading configuration process failed.
01070338:3: Cannot create trunk [name of trunk], maximum limit reached Unexpected Error: Loading configuration process failed.
Conditions:
-- The source device is a physical BIG-IP device with one or more trunks with or without LACP in its configuration.
-- The destination device is a vCMP guest/F5OS Tenant.
Impact:
The platform migration fails and the configuration does not load.
Workaround:
You can use one of the following workarounds:
-- Remove all trunks from the source configuration prior to generation of the UCS.
-- Before loading the UCS archive onto the target BIG-IP, edit the archive and remove the trunk configuration from ./config/bigip_base.conf, and then repack the UCS.
-- After the UCS load fails, edit the configuration manually on the destination to remove trunk references, and then reload the configuration.
-- K50152613
Fixed Versions:
21.1.0, 21.0.0.1, 14.1.4.1
658850 : Loading UCS with the platform-migrate parameter could unexpectedly set or unset management DHCP
Links to More Info: BT658850
Component: TMOS
Symptoms:
When you load a UCS file using the platform-migrate parameter, the mgmt-dhcp value (enabled, disabled, or unset) will overwrite the value on the destination. Depending on the effect, this could change the destination's management IP and default management route.
If the UCS does not have mgmt-dhcp explicitly written out, note that its value is treated as the default for the local system, which varies by the type of system. On Virtual Edition (VE) platforms, the default is to enable DHCP. On all other platforms, the default is to disable DHCP.
Conditions:
This occurs when loading a UCS using the platform-migrate parameter:
tmsh load sys ucs <ucs_file_from_another_system> platform-migrate
Impact:
Changing the mgmt-dhcp value on the destination can result in management changing from statically configured to DHCP or DHCP to statically configured. This can result in loss of management access to the device, requiring in-band or console access.
Workaround:
There are a few ways to avoid this issue:
1. Specify the "keep-current-management-ip" parameter to the "load sys ucs" command, for instance:
tmsh load sys ucs <ucs_file_from_another_system> platform-migrate keep-current-management-ip
Note: The "keep-current-management-ip" parameter is undocumented and will not appear in context help or tab completion.
2. If you want to reset the target device to use a static IP, run the following commands after loading the UCS with the platform-migrate command:
tmsh modify sys global-settings mgmt-dhcp disabled
tmsh create sys management-ip <ip>/<mask>
tmsh delete sys management-route default
tmsh create sys management-route default gateway <ip>
Fixed Versions:
21.1.0
584607 : Harden authentication infrastructure
Component: TMOS
Symptoms:
The authentication infrastructure for administrative interfaces does not implement all current recommended security practices.
Impact:
The authentication infrastructure for administrative interfaces does not implement all current recommended security practices.
Fix:
Implement all current recommended security practices in the administrative interfaces authentication infrastructure.
Fixed Versions:
21.1.0
578989-16 : Maximum request body size is limited to 25 MB
Component: Access Policy Manager
Symptoms:
When a POST request with body size exceeds 25 MB is sent to APM virtual server, the request fails.
Conditions:
POST request body size exceeded 25 MB.
Impact:
The POST request fails. The maximum request body size is limited to 25 MB
Workaround:
There is no workaround at this time.
Behavior Change:
Request body size is increased.
Fixed Versions:
21.1.0, 17.5.1.4
566995-8 : bgpd might crash in rare circumstances.
Links to More Info: BT566995
Component: TMOS
Symptoms:
Under unspecified conditions and in rare cases, bgpd might crash. Although bgpd restarts right away, routing table might be impacted.
Conditions:
The conditions under which this occurs are not known.
Impact:
This might impact routing table and reachability.
Workaround:
None known.
Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1
563144 : Changing the system's admin user causes many errors in the REST framework.
Component: Device Management
Symptoms:
The iControl REST log at /var/log/icrd will have entries similar to the following:
notice icrd_child[32206]: 01420003:5: Cannot load user credentials for user "admin" Current session has been terminated.
Conditions:
Change the default admin user, for example, by following the steps in the Article K15632: Disabling the admin and root accounts using the BIG-IP Configuration utility or the Traffic Management Shell: https://support.f5.com/csp/article/K15632.
Impact:
Many REST APIs do not function, and functionality that depends on REST fails.
Workaround:
There is no workaround. You must use the default admin in order for iControl REST calls to work.
Fix:
You can now use iControl REST with alternate local admin usernames.
Note: Depending on the software version you use, you might experience bug 754547, which requires a requires a manual restart of restjavad following a change to systemauth.primaryadminuser:
tmsh restart sys service restjavad
Fixed Versions:
21.1.0
551462-8 : CVE-2014-9730 - Linux Kernel UDF Filesystem Denial of Service Vulnerability
Links to More Info: K17447
528314 : Generating new default certificate and key pairs for BIG-IP ssl profiles via CLI will not be reflected in GUI or in tmsh
Links to More Info: K16816, BT528314
Component: TMOS
Symptoms:
Using the CLI to generate new default certificate and key pairs for BIG-IP ssl profiles are not reflected in the GUI or tmsh.
Conditions:
Using OpenSSL commands to generate a new default certificate and key pair, as described in SOL13579: Generating new default certificate and key pairs for BIG-IP ssl profiles, available here: https://support.f5.com/kb/en-us/solutions/public/13000/500/sol13579.html.
Impact:
After the renewal, tmsh list sys file ssl-cert default.crt command or the general properties in the GUI SSL Cert List shows the old one. This is a cosmetic issue only. The system uses the new default.
Workaround:
Perform a force reload of mcpd by running the following commands: -- touch /service/mcpd/forceload. -- tmsh restart sys service mcpd.
Fix:
After renewing certificates with OpenSSL, you can now use the simpler command "tmsh install sys crypto cert default.crt from-local-file /config/ssl/ssl.crt/default.crt" and the new certificate is immediately reflected in tmsh list and the GUI. Alternatively, "tmsh load sys config" also now properly recognizes the renewed certificate. No manual mcpd restart is required with either method.
Fixed Versions:
21.1.0, 17.5.1.4
518333 : New LSN Stat,Total End Points (IPv4/IPv6), deprecates the stat Total End Points
Links to More Info: BT518333
Component: Carrier-Grade NAT
Symptoms:
The stat Total End Points displays an incorrect value when an IPv6 address with a small prefix is configured in LSN Pool.
Conditions:
Any IPv6 address with a small prefix is configured as pool member for an LSN pool.
Impact:
The statistic shows incorrect values when an IPv6 address with small prefix is configured in LSN pools.
Workaround:
None.
Fix:
This release introduces a new stat, Total Endpoints (IPv4/IPv6), which displays the correct statistic values. Refer to the new statistic, Total End Points (IPv4/IPv6) for correct information when IPv6 addresses are added in LSN Pool.
Fixed Versions:
21.1.0
2291353-2 : PCCD enters a loop while compiling NAT rules
Links to More Info: BT2291353
Component: Advanced Firewall Manager
Symptoms:
When this issue arises, the PCCD CPU usage increases to 100% and stays at that level until the PCCD daemon is restarted.
Conditions:
The issue arises when NAT configurations are deleted and reapplied in a specific order. However, not all delete and reapply operations cause the problem.
Impact:
Once PCCD enters this state, it is unable to process or compile any new configurations until the daemon is restarted.
Workaround:
Restart the PCCD daemon to recover from the issue.
Fix:
Implemented logic to ignore stale data from previous operations during NAT rule compilation, allowing the current compilation process to continue without entering a loop.
Fixed Versions:
21.1.0
2284709 : TMM might restart with certain network traffic
Links to More Info: BT2284709
Component: Local Traffic Manager
Symptoms:
TMM is not handling specific HTTP/3 traffic as expected.
Conditions:
A Virtual Server with an HTTP/3 profile.
Impact:
Traffic is disrupted while TMM restarts.
Workaround:
None.
Fix:
TMM is handling specific HTTP/3 traffic as expected.
Fixed Versions:
21.1.0
2266005 : HTTP/3 blocks an unknown HTTP method
Links to More Info: BT2266005
Component: Local Traffic Manager
Symptoms:
An HTTP/3 virtual server does not transfer a client's request to the backend pool member if the HTTP profile's "Unknown Method" is set to Allow and the HTTP method is unknown.
Conditions:
-- A HTTP/3 profile (and also an HTTP profile) is attached to the virtual server.
-- HTTP profile with "Unknown Method : Allow".
-- Client request is HTTP/3. The HTTP/3 request method is an unknown HTTP method.
Impact:
HTTP/3 virtual server traffic is disrupted.
Workaround:
None.
Fix:
HTTP/3 allows unknown HTTP methods when the HTTP configuration is set to Allow unknown methods.
Fixed Versions:
21.1.0
2264133 : TMSH improvements
Component: TMOS
Symptoms:
TMSH is not following best practices
Conditions:
NA
Impact:
Unexpected behavior
Fix:
Implemented best practices in TMSH
Fixed Versions:
21.1.0
2263721 : TMM crashes on Azure VE when virtual function is removed during runtime
Links to More Info: BT2263721
Component: TMOS
Symptoms:
TMM crashes unexpectedly on BIG-IP VE running on Microsoft Azure when an accelerated networking virtual function (VF) is removed at runtime.
Conditions:
- BIG-IP VE deployed on Microsoft Azure with Accelerated Networking enabled.
- Azure platform performs host maintenance, live migration, or other operation that removes and restores accelerated networking virtual functions.
Impact:
Traffic disruption. TMM crashes and must be restarted. If running in an HA pair, failover occurs.
Workaround:
There is no workaround. Deploy BIG-IP VE in an HA (Active/Standby) configuration to minimize traffic disruption during a crash.
Fix:
TMM no longer crashes when accelerated networking virtual functions are removed and restored on Azure VE during platform maintenance events.
Fixed Versions:
21.1.0
2263657 : Crash in Bados Signature Management operations results in a memory leak
Links to More Info: BT2263657
Component: Anomaly Detection Services
Symptoms:
The ADMD does not manage response control messages related to the creation or modification of signatures.
Conditions:
When using heavy configuration file with bados signatures, where signatures are saved or modified.
Impact:
Either MCPD or ADMD may encounter a crash.
Workaround:
NA
Fix:
Bados handles potential memory leak.
Fixed Versions:
21.1.0
2263257 : VLAN Recreation Fails for MAC Masquerade Created by Floating Virtual Address
Component: F5OS Messaging Agent
Symptoms:
VLAN recreation does not work for a MAC masquerade created by a floating virtual address.
Conditions:
The fix for ID2008409 is in effect.
A VLAN is recreated.
Impact:
It is not possible to recreate a VLAN.
Workaround:
bigstart restart platform_agent
Fix:
Fixed the VLAN recreation for a MAC masquerade created by a floating virtual address.
Fixed Versions:
21.1.0
2262981 : TMM may corrupt stack during class lookup
Links to More Info: BT2262981
Component: Local Traffic Manager
Symptoms:
TMM core
Log may contain
can'tt read "domain": no such variable while executing "class match -value percentage contains ${path}/${domain}-cluster
Conditions:
The iRule uses a class match (class match -value percentage contains ${path}/${domain}-cluster) and fails if the path/domain doesn’t exist or the class name exceeds 265 characters.
Impact:
Tmm does not operate during reboot
Workaround:
Update the iRule to avoid using a class or path longer than 265 characters, or ensure the class exists.
Fix:
N/A
Fixed Versions:
21.1.0
2262537 : pem_sessiondump crashes when listing subscriber sessions with custom attributes
Links to More Info: BT2262537
Component: Policy Enforcement Manager
Symptoms:
On BIG-IP, running pem_sessiondump --list when PEM subscriber sessions have custom attributes may crash with a segmentation fault and generate a core in /var/core.
Conditions:
This happens when PEM is provisioned with RADIUS subscriber sessions that have custom attributes and a transient memcached connection interruption occurs while pem_sessiondump is iterating sessions.
Impact:
The pem_sessiondump diagnostic utility crashes. No impact to data-plane traffic or TMM. Administrators are unable to use pem_sessiondump to list subscriber sessions until the utility is re-run.
Workaround:
Re-run pem_sessiondump --list. The crash occurs only when a transient memcached connection interruption coincides with the session iteration. Retrying typically succeeds.
Fixed Versions:
21.1.0
2262353 : Pccd may crash when deleting a Zone with VLAN association
Component: Advanced Firewall Manager
Symptoms:
The pccd process may crash when AFM Zone/ACL configuration is removed.
Conditions:
- Security Zone is configured with one or more Vlans.
- Occurs when a Zone that references one or more VLANs is deleted and MCPD batches zone_vlan remove and zone remove messages in the same transaction.
Impact:
Pccd daemon crash
Workaround:
By avoiding deleting Zone+VLAN bindings in the same change set. Deleting separately will not cause crash
Fix:
When MCP processing removes the zone-VLAN association, the zone cleanup path no longer attempts to remove it a second time (prevents an assertion in pc_cfg_set_remove, resolving crash issue).
Fixed Versions:
21.1.0
2262265 : Backup UCS enhancements
Component: TMOS
Symptoms:
Backup UCS is not working as expected
Impact:
Can lead to unexpected behaviour
Workaround:
NA
Fix:
Backup UCS is now working as expected.
Fixed Versions:
21.1.0
2262249 : iControl REST hardening
Component: TMOS
Symptoms:
iControl REST not following best practices
Impact:
Can lead to unexpected behaviour
Fix:
iControl REST now following best practices
Fixed Versions:
21.1.0
2260293 : LiveUpdate status stuck on Pending after successful installation
Component: Application Security Manager
Symptoms:
The update installs successfully as scheduled, but its status remains "Pending."
Conditions:
Race condition occurs during automatic installation
Impact:
The incorrect status is fixed at the next scheduled time.
Fixed Versions:
21.1.0
2259173-1 : Sanitize key in memcache library
Component: Local Traffic Manager
Symptoms:
Users may be able to store invalid keys in Memcached using client request
Conditions:
Invalid key value pair is passed in client request
Impact:
Fetching values for that key may fail and my provide unexpected values
Workaround:
-NA-
Fix:
Memcached should not allow invalid keys to be set
Fixed Versions:
21.1.0
2259165-1 : Input Validation on APM Logon Page
Component: Access Policy Manager
Symptoms:
The logon page in the per-session policy currently lacks user input validation for invalid characters.
Conditions:
The logon page is configured within the APM per session policy
Impact:
The logon page does not validate user input and directly stores the provided value as a session variable.
Workaround:
None
Fix:
The logon page has been updated to include the following input validations:
-- Fields of type TEXT now restrict the use of specific characters: single-quote (ASCII value 0x27), double-quote (ASCII value 0x22), pipe (ASCII value 0x7C), greater-than (ASCII value 0x3E), and less-than (ASCII value 0x3C).
-- For TEXT fields with the parameter name "username," the input is limited to a maximum length of 256 characters.
Fixed Versions:
21.1.0
2259157-1 : Parsing failure may interpret data as a Memcached command
Component: TMOS
Symptoms:
Some data-body commands (add, set, replace, incr, decr) failed to close connections properly on error, causing request data to be misinterpreted as commands.
Conditions:
There is a parsing failure in commands that require data in the request body.
Impact:
Connection remains open even in the event of command failures, which can result in data being accepted as a command.
Workaround:
N/A
Fixed Versions:
21.1.0
2259109 : External users can run the track command
Component: Local Traffic Manager
Symptoms:
The memcached proxy track command has been removed from the codebase to maintain optimal performance.
Conditions:
When users use the track command to monitor session events.
Impact:
End user can run the track command.
Workaround:
N/A
Fixed Versions:
21.1.0
2259065 : Access framework hardening
Component: Access Policy Manager
Symptoms:
Access framework not working as expected
Conditions:
NA
Impact:
It may lead to unexpected behavior
Fix:
Access framework now working as expected
Fixed Versions:
21.1.0
2259061 : Access framework hardening
Component: Access Policy Manager
Symptoms:
Access framework not working as expected
Conditions:
NA
Impact:
It may lead to unexpected behavior
Fix:
Access framework now working as expected
Fixed Versions:
21.1.0
2258981-1 : Remove Unnecessary internal User account from Non-Supported BIG-IP Platforms
Component: TMOS
Symptoms:
Occurs when an unnecessary internal user account is present on BIG-IP platforms that do not support LCD hardware.
Conditions:
NA
Impact:
No Functional Impact
Workaround:
NA
Fix:
This fix ensures the removal of unnecessary internal user account from BIG-IP platforms that do not support LCD hardware
Fixed Versions:
21.1.0
2258929 : Deleting/Adding virtual server on the LTM device object can change other disabled virtual server status on the LTM device object.
Component: Global Traffic Manager (DNS)
Symptoms:
After adding/deleting unrelated virtual server on the LTM device object, disabled virtual server on the same LTM device object change its status from "available/disabled" (black circle icon on GUI) to "offline/disabled" (black rhombus icon on GUI). "no reply from big3d: timed out" error is thrown, despite there is no problem in iquery communication between DNS system and LTM system.
bigipdns.local alert gtmd[21078]: 011ae0f2:1: Monitor instance /Common/bigip 10.1.1.192:80 UP --> DOWN from /Common/bigipdns (no reply from big3d: timed out)
bigipdns.local alert gtmd[21078]: 011a6006:1: SNMP_TRAP: virtual server vs2 (ip:port=10.1.1.192:80) (Server /Common/bigipltm) state change green --> red ( Monitor /Common/bigip : no reply from big3d: timed out: disabled directly)
Conditions:
All of the following conditions need to be met.
-- DNS system manages remote LTM device and its virtual servers.
-- DNS system retrieves LTM virtual server monitor status from big3d running on remote LTM device via iquery.
-- There are disabled virtual servers on LTM device object.
-- "Monitor Disabled Object" parameter under "DNS >> Settings : GSLB : General" is unchecked (default).
-- Changes to virtual server (i.e., adding / deleting) on LTM device object is performed on DNS system.
Additionally, the issue can be triggered by either of the following sequences:
Disabling and then re-enabling a GTM Link, after which some or all associated virtual servers remain down until big3d is restarted.
Re-establishing iQuery and then re-enabling the "link"; in some environments, all VSes may remain disabled after this sequence.
Impact:
Disabled virtual server status change from "available/disabled" (black circle icon on GUI) to "offline/disabled" (black rhombus icon on GUI).
Once this problem occurs on disabled virtual servers, even after re-enabling those affected virtual servers on LTM device, the affected virtual servers stayed at "offline/enabled" (red rhombus icon on GUI) status.
Workaround:
To rescue already affected virtual servers, on the DNS system, temporarily assign any monitor object to the affected virtual servers and revert it back to none.
# tmsh modify gtm server bigipltm virtual-servers modify { vs1 { monitor gateway_icmp } vs2 { monitor gateway_icmp } }
# tmsh modify gtm server bigipltm virtual-servers modify { vs1 { monitor none } vs2 { monitor none } }
# tmsh save /sys config gtm-only
Or alternatively, restarting gtmd on DNS system can also rescue affected virtual servers.
# tmsh restart sys service gtmd
To prevent issues from recurring in the future, you can change "gtm global-settings general monitor-disabled-objects" parameter to "yes".
# tmsh modify /gtm global-settings general monitor-disabled-objects yes
# tmsh save /sys config gtm-only
Fix:
The issue is fixed.
Fixed Versions:
21.1.0
2258853 : [APM][SAML] SP automation fails to update, when bound to an IdP with a SAML Resource
Links to More Info: BT2258853
Component: Access Policy Manager
Symptoms:
SAML SP connector automation fails whenever the metadata changes, i.e., a change in certificate.
In IDP initiated SAML, SAML service is configured in SAML resource which prevents the certificate update in the filestore.
Conditions:
SAML connector automation to create SP connectors.
Impact:
Unable to create SP connectors through connector automation.
Fixed Versions:
21.1.0
2258705 : A policy with overlapping range in different rules may never match
Links to More Info: BT2258705
Component: Local Traffic Manager
Symptoms:
An LTM policy with multiple rules may fail to match correctly if a rule matches an IP address range from the first rule but not the associated URL. Even if the same IP address fits the criteria for the second rule, it will not match the second rule.
Conditions:
An LTM policy rule with a 'tcp match address' statement that matches against an address range in the first rule will prevent any further rule to be check for if the IP address match
For example, if rule 1 contains
values { 10.16.0.0/12 } and URL foo.com
while rule 2 contains
values { 10.31.236.18 10.255.255.1 } with URL example.com
Then if the source IP address is 10.31.236.18 with example.com, it will be rejected ecause 10.31.236.18 would match the range 10.16.0.0/12 in rule 1 but not foo.com
Impact:
The policy rule fails to match even when it meets the specified criteria.
Workaround:
Avoid overlapping IP range in different rules
Fix:
This issue is fixed.
Fixed Versions:
21.1.0
2258257 : Zombie connections after switching dos profile may cause tmm crash.
Links to More Info: BT2258257
Component: Anomaly Detection Services
Symptoms:
Tmm can crash in rare cases
Conditions:
When switching a dos profile (with bados enabled), while connections are still active for aa long time after the switch, tmm crash might occur.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fixed Versions:
21.1.0
2257857 : Config Reload Fails When Rolling Back F5OS Platform Software from 2.0.0+ to Versions Below 2.0.0
Component: Advanced Firewall Manager
Symptoms:
Reloading config from a higher version of F5OS 2.0.0 fails when software is rolled back to a lower version, like 1.8.3.
Reports an error indicating qinq is not supported, like below
01071bd8:3: The tag-mode for requested member 1.1 has to be 'none' on platforms that do not support QinQ.
Unexpected Error: Loading configuration process failed.
Conditions:
Tenant version is 21.1.0 or above, and
F5OS platform software running F5OS 2.0.0 or above is rolled back to a version below 2.0.0.
This is seen with only r2k and r4k platforms.
Impact:
Config reload fails and need to fix the config manually to set
net vlan <vlan-name>{
dag-adjustment none
fwd-mode l3
if-index 224
interfaces {
x.y{
tag-mode service
tagged
}
}
tag <value>
}
tag-mode from "service" to "none".
Workaround:
Change the VLAN configuration to set "tag-mode service" to " tag-mode none".
Use the BIG-IP software that fixes this problem.
Fix:
When QinQ is not supported, force the tag-mode to none.
Fixed Versions:
21.1.0
2257689 : Improvement in system account
Component: TMOS
Symptoms:
System account was not working as expected.
Conditions:
Use the system account.
Impact:
Can lead to unexpected behaviour.
Fix:
The system account is now working as expected.
Fixed Versions:
21.1.0
2257673 : RSA SecurID improvements
Component: Access Policy Manager
Symptoms:
The RSA SecurID agent is not working as expected
Conditions:
An access policy uses the RSA SecurID agent.
Impact:
Can lead to unexpected behaviour
Fix:
The RSA SecurID agent now working as expected
Fixed Versions:
21.1.0
2257669-3 : APM my.policy improvement
Component: Access Policy Manager
Symptoms:
my.policy is not working as expected
Conditions:
NA
Impact:
Can lead to unexpected behaviour
Fix:
my.policy is now working as expected
Fixed Versions:
21.1.0
2257421 : TMSH enhancements
Component: TMOS
Symptoms:
TMSH not working as expected
Conditions:
NA
Impact:
Unexpected behavior.
Workaround:
N/A
Fix:
TMSH is now working as expected
Fixed Versions:
21.1.0
2256725 : Unable to trigger "Disallowed file upload content detected" violation in some cases
Component: Application Security Manager
Symptoms:
The "Disallowed file upload content detected" violation is not triggered in some cases.
Conditions:
Under a specific traffic scenario, the violation is not triggered.
Impact:
Traffic with violation passes through.
Workaround:
N/A
Fix:
The violation is now detected correctly.
Fixed Versions:
21.1.0
2252481 : Undisclosed network traffic can cause a TMM crash
Component: Service Provider
Symptoms:
Undisclosed network traffic can cause a TMM crash.
Conditions:
NA
Impact:
TMM crashing and restarting.
Fix:
TMM now working as expected
Fixed Versions:
21.1.0
2252233 : MCPD Crashes When Worker Connection Destructor Accesses Main-Thread Data Structures
Component: TMOS
Symptoms:
mcpd_worker core generated with the following backtrace
[ 00 ] libc-2.17.so raise ( raise.c:56 )
[ 01 ] libc-2.17.so abort ( abort.c:90 )
[ 02 ] libc-2.17.so __assert_fail_base ( assert.c:92 )
[ 03 ] libc-2.17.so __assert_fail ( assert.c:101 )
[ 04 ] libmcpdcommon.so MCPConnection::sendMessage() ( MCPConnection.cpp:1267 )
[ 05 ] libmcpdcommon.so MCPConnection::send(_mcpmsg_t*) ( MCPConnection.cpp:1540 )
[ 06 ] libmcpdcommon.so request_group::reply(bool, _mcpmsg_t*, bool) ( request_group.cpp:2496 )
[ 07 ] libmcpdcommon.so request_group::delete_connection(MCPConnection*, bool&) ( request_group.cpp:2637 )
[ 08 ] libmcpdcommon.so MCPProcessor::delete_connection(MCPConnection*) ( MCPProcessor.cpp:2808 )
[ 09 ] libmcpdcommon.so MCPConnection::~MCPConnection() ( MCPConnection.cpp:543 )
[ 10 ] libmcpdcommon.so MCPConnection::~MCPConnection() ( MCPConnection.cpp:555 )
[ 11 ] libmcpdcommon.so operator() ( functional:2471 )
[ 12 ] libmcpdcommon.so EpollManager::run() ( epoll.cpp:274 )
[ 13 ] libmcpdcommon.so MCP_worker_service::worker_run() ( MCPWorkerService.cpp:242 )
[ 14 ] libmcpdcommon.so MCP_worker_service::thread_entry(void*) ( MCPWorkerService.cpp:80 )
[ 15 ] libpthread-2.17.so start_thread ( pthread_create.c:308 )
Conditions:
When a workers connection socket errors or closes
Impact:
Mcpd will be restarted, along with other control plane daemons that depend on it.
Workaround:
None
Fix:
MCPd will not be restarted if the MCPd worker thread connection socket error or is closed.
Fixed Versions:
21.1.0
2251813 : BIG-IP AFM: mcpd may crash when modifying address lists with cyclic nested references
Links to More Info: BT2251813
Component: Advanced Firewall Manager
Symptoms:
Modifying an address list (such as adding or deleting an entry) can cause mcpd to crash with a segmentation fault (SIGSEGV).
Conditions:
Address lists are configured with nested references.
Impact:
Mcpd process crashes. Traffic disrupted while mcpd restarts.
Workaround:
Review and correct address list configurations to ensure no cycles exist
Fixed Versions:
21.1.0
2251649 : `sig_cve` and `staged_sig_cves` Fields Appear as N/A in Data Sent to Remote Syslog
Component: Application Security Manager
Symptoms:
While transmitting data to the remote syslog in BIG-IP, the sig_cve and staged_sig_cves fields may be displayed as "N/A"
Conditions:
The issue was introduced by the changes made in fix 911661. Therefore, it may surface only if a hotfix or version is installed that includes 911661 without the resolution for this problem
Impact:
The remote event log might incorrectly display "N/A" for the sig_cve and staged_sig_cves fields.
Workaround:
None
Fix:
sig_cve and staged_sig_cves fields are properly included in the remote logs.
Fixed Versions:
21.1.0
2251517 : Stream profile is not supported on HTTP/2 Full proxy (HTTP MRF Router enabled)
Links to More Info: BT2251517
Component: Local Traffic Manager
Symptoms:
Trying to add a stream profile to a virtual server gets rejected
tmsh modify ltm virtual vs_http2_stream profiles add { stream_simonSIMON }
01070734:3: Configuration error: Profile(s) found on /Common/vs_http2_stream that are not allowed: Only (TCP Profile, UDP Profile, QUIC Profile, ClientSSL Profile, ServerSSL Profile, HTTP Profile, HTTP2 Profile, HTTP3 Profile, HTTP Compression Profile, Application Visibility and Reporting Profile, DNS Profile, DOH Proxy Profile, profile statistics, Protection Profile, Bot Defense Profile, Bot Defense ASM Profile, Web Security Profile, HTTP Router Profile, Web Accelerator Profile, Request Logging Profile, TDR Profile, ATI Profile, BD Profile, CSD Profile, AP and AI Profile)
Conditions:
The virtual server contains a profile with http/http2 and httprouter
/Common/http { }
/Common/http2 { }
/Common/httprouter { }
Same issue if an http2/httprouter profile is attempted to be added to virtual server with a stream profile in it
Impact:
Not able to add a stream profile
Workaround:
None
Fix:
Now able to add stream profile to a virtual server with http2 and httprouter
Fixed Versions:
21.1.0
2246933 : Memory leak in QUIC under rare sequence of packets/events
Links to More Info: BT2246933
Component: Local Traffic Manager
Symptoms:
QUIC experiences a slow/small memory leak.
Conditions:
On a system with heavy load on crypto operations, QUIC will leak some data on specific rare sequence of packets/events which can exhaust the memory slowly and eventually could lead to a crash due to OOM.
Impact:
TMM crashes due to OOM.
Workaround:
N/A
Fix:
QUIC handles rare sequence of packets/events without a leak.
Fixed Versions:
21.1.0
2244413 : Client Certificates are cached even when Retain Certificate is disabled on a Clientssl profile
Links to More Info: BT2244413
Component: Local Traffic Manager
Symptoms:
Client certificates are cached which can drive up memory usage.
Conditions:
TLS 1.2 sessions that are resumed with session tickets where the client also presents a certificate to the BIG-IP.
Impact:
Memory usage may increase due to caching certificates
Workaround:
None
Fixed Versions:
21.1.0
2244393 : TLS 1.3 sessions are unnecessarily cached
Links to More Info: BT2244393
Component: Local Traffic Manager
Symptoms:
More sessions than necessary are getting cached which can cause an increase in memory usage.
Conditions:
TLS 1.3 is enabled and used.
Impact:
Memory usage increases.
Workaround:
Disable the Retain Certificate setting in the SSL profile (https://my.f5.com/manage/s/article/K19802202).
Fixed Versions:
21.1.0
2241493 : User facing login issues with newly created password-based Azure VMs
Component: TMOS
Symptoms:
User is facing login issues with newly created password-based Azure VMs
Conditions:
Applicable to all Azure VM types
Impact:
User facing login issues with newly created password-based Azure VMs
Workaround:
User can create ssh-based Azure VMs
Fix:
Fixed the issues in the bundled WALinuxAgent.
Fixed Versions:
21.1.0
2241445 : Portal Access: JavaScript XHR requests fail with about:// origin in about:blank frames due to incorrect F5_Deflate_origin() rewriting
Component: Access Policy Manager
Symptoms:
-- Applications accessed through Portal Access may fail to load or operate correctly when JavaScript code constructs XHR request URLs using document.location.origin and document.location.pathname.
-- In affected scenarios, the browser console shows CORS errors referencing an about://blank/... URL.
-- The application may partially load, but API calls (such as XSRF token refresh) fail, resulting in incomplete or broken functionality.
-- This issue is observed after application upgrades that introduce new XSRF endpoint logic or modern JavaScript patterns.
Conditions:
-- Portal Access is enabled and actively rewriting JavaScript in the application.
-- The application builds API request URLs at runtime using document.location.origin and/or document.location.pathname.
-- The affected JavaScript executes in a browser context where the frame’s location is about:blank (for example, in dynamically created iframes, popups, or after single-page application (SPA) navigation).
-- The issue is most frequently observed in browsers (such as Edge and Chrome), but may also occur in other browsers.
Impact:
-- Application API calls (such as XSRF token refresh) fail after the first request.
-- Users experience application load failures, incomplete page rendering, or the inability to perform actions that require API calls.
-- Browser console displays CORS errors referencing about://blank/... URLs.
-- The application is unusable through Portal Access until a workaround or fix is applied.
Workaround:
when REWRITE_REQUEST_DONE
{
if {[HTTP::path] contains ".cache.js"} {
REWRITE::post_process 1
set rewrite_hist_str 1
}
}
when REWRITE_RESPONSE_DONE
{
if {[info exists rewrite_hist_str]}
{
unset rewrite_hist_str
set rewrite_str {c.open('POST', /*F5_*/ F5_g_document /*_5F#document#*/ .location.origin+ /*F5_*/ F5_g_document /*_5F#document#*/ .location.pathname+b+'/PortalWebapp/xsrf/getNewXsrfToken',false)}
set rewrite_str_len [string length $rewrite_str]
set strt [string first $rewrite_str [REWRITE::payload]]
if {$strt > 0} {
log local0. "REPLACING PAYLOAD"
REWRITE::payload replace $strt $rewrite_str_len {c.open('POST', /*F5_*/ F5_g_top.document /*_5F#document#*/ .location.origin+ /*F5_*/ F5_g_top.document /*_5F#document#*/ .location.pathname+b+'/PortalWebapp/xsrf/getNewXsrfToken',false) }
}
}
}
Fix:
Actual Origin is returned when JavaScript runs inside a frame with about:blank context
Fixed Versions:
21.1.0
2241393 : MutationObserver may not work in some cases
Links to More Info: BT2241393
Component: Access Policy Manager
Symptoms:
MutationObserver may not work in some cases
Conditions:
MutationObservers used in application run through portal access
Impact:
Funtionality that depends on mutationObservers wont work (i.e. Promises).
Workaround:
None
Fixed Versions:
21.1.0
2240945 : platform_agent crash when deleting a virtual_server.
Component: F5OS Messaging Agent
Symptoms:
platform_agent may crash when deleting a virtual server.
Conditions:
- The system has the fix for ID2008409;
- A Mac masquerade is configured on a traffic group;
- A tunnel terminating at a BIG-IP or a vlan-group is used;
- A virtual server is deleted.
Impact:
platform_agent will restart, dumping a core.
This should have no impact on passing traffic.
Workaround:
NA
Fix:
platform_agent no longer crashes when deleting a virtual_server.
Fixed Versions:
21.1.0
2238473 : MCP DNS rule validation for DNS type64 or type65 results in SIGSEGV
Links to More Info: BT2238473
Component: Global Traffic Manager (DNS)
Symptoms:
MCPD is crashing when an iRule is attached to a wideip of type64 or type65.
Conditions:
Configure a wideip of type64 or type65, attach an iRule, and then MCPD crashes.
Impact:
MCPD crashes
Fix:
Added the iRule dependency validation check.
Fixed Versions:
21.1.0
2230841 : Admd Crash During Restart Under Heavy Load
Component: Anomaly Detection Services
Symptoms:
Admd crash during the restart process.
Conditions:
Under heavy system load, if the admd anomaly process hangs, the system triggers an admd restart. However, the shutdown sequence does not release objects in the correct order, potentially causing a crash. Introducing a proper shutdown sequence resolves this issue.
Impact:
Core is created, though there is no functionality problem, as the admd was on its way to restart itself
Workaround:
None
Fix:
BADOS restarts performing a silent shutdown.
Fixed Versions:
21.1.0
2230709 : iRule class match fails after modifying IP data group entries with route-domains
Links to More Info: BT2230709
Component: Local Traffic Manager
Symptoms:
After adding and then removing an IP data group entry that includes a route-domain (for example, 10.0.0.0%10/8), iRule class match commands against the data group stop matching entries that were previously working. All traffic may be treated as if it does not match the data group.
Conditions:
- An IP data group is in use by an iRule with a class match command.
- An entry with a route-domain qualifier (for example, %10) is added to the data group and then removed.
Impact:
iRule class match lookups against the affected data group return no match, causing traffic to be classified incorrectly. For example, traffic that should match an internal users data group may be treated as external.
Workaround:
Restart TMM (bigstart restart tmm — causes a traffic disruption), reboot the BIG-IP system, or create a new data group with the same entries and update the iRule to reference the new data group.
Fix:
TMM now correctly preserves the route-domain when processing IP data group entries. Entries with the same IP address but different route-domains coexist correctly without corrupting the data group. Existing data groups and iRule class match behavior are unaffected.
Fixed Versions:
21.1.0
2230597 : Under syncookie mode, temporary listeners may fail to complete connections
Links to More Info: BT2230597
Component: Local Traffic Manager
Symptoms:
Temporary listeners might not complete a connection under a syncookie mode.
Conditions:
Occurs when,
- Temporary listener is used for handling traffic (for example FTP).
- Device under syncookie mode.
Impact:
BIG-IP may fail to establish a proxied TCP connection if it doesn’t complete the TCP three-way handshake with the pool member.
Workaround:
1. Disable syncookies.
2. Disable inheritance when possible. For example, FTP ephemeral listeners inherit syncookie behavior from the FTP virtual server; disabling inherit-parent-profile prevents the ephemeral listener from inheriting syncookies.
Fix:
N/A
Fixed Versions:
21.1.0
2230405 : PEM memory handling update
Component: Policy Enforcement Manager
Symptoms:
Increased memory usage over time.
Conditions:
PEM enabled.
Impact:
Could lead to unexpected behavior over time.
Workaround:
NA
Fix:
Updated handling
Fixed Versions:
21.1.0
2230277 : Help Content Missing on Live Update Page in Certain Scenarios
Component: Application Security Manager
Symptoms:
When clicking the Live Update tab from another screen under Software Management (for example, the Update Check screen), the content in the Help tab is not displayed.
Instead, the following message appears:
"No help is available for this topic."
Conditions:
-- In the GUI, go to System ›› Software Management: Live Update.
-- Open the Help tab.
Result: Help content is available.
-- Click Update Check while the Help view remains open.
-- Click back on Live Update.
-- Open the Help tab again.
Result: The following message is displayed:
"No help is available for this topic."
Impact:
The user cannot see the help content.
Workaround:
Navigate to the Live Update page from another screen that is not under the Software Management tab.
For example:
Security ›› Application Security: Security Policies: Policies List
Fix:
The Live Update help content is displayed correctly.
Fixed Versions:
21.1.0
2230009-1 : Access Policy memory is not cleared between access policy executions
Links to More Info: BT2230009
Component: Access Policy Manager
Symptoms:
APD has a Tcl interpreter that can process commands provided inside an Access policy, for variable assignment or other purposes.
The Tcl environment provided does not reliably clear Tcl variables assigned in prior executions, so care must be taken to initialize the potentially dirty variables if they are used.
Conditions:
User uses some Tcl variables that can potentially be not initialized. For example, a variable assign:
session.test = regexp {(.+)@example.com} "[mcget {session.logon.last.username}]" foo captured; return $captured
Note that here, the regex may match or not match depending on the user input. If it does not match, the variable "captured" *may* contain the results from a different user who logged in previously.
Impact:
Unexpected results from Access Policy execution.
Workaround:
To work around the problem, any variable that was used must be checked. For example, instead of the regex statement above, this could be used:
if { [regexp {(.+)example.com} "[mcget {session.logon.last.username}]" foo captured] == 1 } { return $captured; } else { return "nomatch"; }
This way, if the regex does NOT match, then the result will be "nomatch" instead of potentially containing results from a previous session.
Fix:
APMD variable assign agent regex expression execution isolated from other sessions using namespace
Fixed Versions:
21.1.0
2229881 : Multi-slot tenant may become inoperative after tenant upgrade followed by tmsh reboot slot all
Links to More Info: BT2229881
Component: Local Traffic Manager
Symptoms:
After upgrading the tenant, if the command tmsh reboot slot all is executed on a multi-slot tenant, the tenant may fail to come back to an operational state and remain stuck in an inoperative state.
Load sys configuration process fails with the error: Could not find master-key object
slot2/tenant1 err tmsh[10271]: 01420006:3: Loading configuration process failed.
slot2/tenant1 emerg load_config_files[10255]: "/usr/bin/tmsh -n -g -a load sys config partitions all base " - failed. -- 01070710:3: Could not find master-key object - sys/validation/MasterKey.cpp, line 3070
All slots will have an Availability of "offline" as reported in tmsh show sys cluster:
root@tenant1:/S2-red-P::INOPERATIVE:Standalone] config # tmsh show sys cluster
-----------------------------------------
Sys::Cluster: default
-----------------------------------------
Address 10.144.192.210/22
Alt-Address ::
Availability available
State enabled
Reason Cluster Enabled
Primary Slot ID 2
Primary Selection Time 02/26/26 15:23:52
---------------------------------------------------------------------------------------------------------
| Sys::Cluster Members
| ID Address Alt-Address Availability State Licensed HA Clusterd Reason
---------------------------------------------------------------------------------------------------------
| 1 :: :: offline enabled false offline running Run, HA TABLE offline
| 2 :: :: offline enabled true offline running Run, HA TABLE offline
| 3 :: :: offline enabled false offline running Run, HA TABLE offline
Mcpd state will be base-config-load-failed
[root@tenant1:/S2-red-P::INOPERATIVE:Standalone] config # tmsh show sys mcp-state
-------------------------------------------------------
Sys::mcpd State:
-------------------------------------------------------
Running Phase platform
Last Configuration Load Status base-config-load-failed
End Platform ID Received true
Cluster Quorum Reached true
Conditions:
1. A tenant upgrade is performed on a multi-slot F5OS tenant.
2. All slots of the tenant are rebooted using tmsh reboot slot all or clsh reboot.
Impact:
All slots remain offline and are inoperable from a traffic processing standpoint. Additionally, loading the system configuration fails
Workaround:
To bring the system back to a working state:
reboot the current primary slot to change the primary slot, and then restart mcpd on the new primary slot using command: bigstart restart mcpd
tmsh show sys cluster will report the "Primary Slot ID"
# tmsh show sys cluster
-----------------------------------------
Sys::Cluster: default
-----------------------------------------
Address 10.144.192.210/22
Alt-Address ::
Availability available
State enabled
Reason Cluster Enabled
Primary Slot ID 2
Primary Selection Time 02/26/26 15:23:52
Fixed Versions:
21.1.0
2229857 : Full load from text files fails with "01020036:3: The requested device (/Common/<device-name>) was not found" if deprecatedApiAllowed is false★
Links to More Info: BT2229857
Component: Local Traffic Manager
Symptoms:
- After a reboot, upgrade, or otherwise forcing MCPD to load its configuration from the text config files (refer to K13030: Forcing the mcpd process to reload the BIG-IP configuration), MCPD remains inoperative and fails to load the configuration.
- The configuration fails to load with the following error:
01020036:3: The requested device (/Common/<device-name>) was not found.
Conditions:
- deprecatedApiAllowed is set to false in /config/api_settings/availability.conf. The default is "true".
Impact:
The system remains inoperative and the configuration will not load.
Workaround:
Do not set deprecatedApiAllowed to false.
If the configuration currently will not load, log into the system as root and do the following:
1. Edit /config/api_settings/availability.conf and set "deprecatedApiAllowed" to "true". This can be done by running:
sed -i -e 's,deprecatedApiAllowed":false,deprecatedApiAllowed":true,' /config/api_settings/availability.conf
2. Load the configuration:
tmsh load sys config
Fixed Versions:
21.1.0
2229773 : F5_document can be null resulting in GetCookie/SetCookie failures
Component: Access Policy Manager
Symptoms:
In some apps, like PeopleSoft with cookie operations, the GetCookie/SetCookie functions fail due to F5_document being null.
Conditions:
Have the PeopleSoft application run through portal access.
Impact:
GetCookie/ SetCookie functions are failing, resulting in the application not working properly.
Workaround:
None.
Fix:
Updated logic in GetCookie/SetCookie functionality to mitigate issues when F5_document is null.
Fixed Versions:
21.1.0
2229613 : F5OS Tenant Inoperative Due to Incorrect Permissions on /etc/nsswitch.conf File
Links to More Info: BT2229613
Component: TMOS
Symptoms:
Platform_agent cannot connect to api-svc-gateway, resulting in the tenant being inoperative.
Repeated entries are found at /var/log/ltm log file:
Feb 23 16:14:53 localhost.localdomain warning platform_agent[5887]: 01e10005:4: Unable to subscribe for stats.
Conditions:
A manually modified UCS archive that is loaded on the BIG-IP tenant has incorrect permissions/ownership of the ./etc/nsswitch.conf file.
Once UCS is loaded, the system file: /etc/nsswitch.conf does not contain the proper permissions/ownership, e.g.
[root@hostname:INOPERATIVE:] config # ls -lZ /etc/nsswitch.conf
-rw-------. tester abc system_u:object_r:etc_t:s0 /etc/nsswitch.conf
Impact:
The tenant is inoperative.
Workaround:
After loading the UCS, run the commands that update file ownership and permissions and restart platform_agent:
chown root:root /etc/nsswitch.conf
chmod 644 /etc/nsswitch.conf
bigstart restart platform_agent
Fix:
Update /etc/nsswitch.conf file permissions to 644 and ownership to root:root.
Fixed Versions:
21.1.0
2229569 : Evict FSD Received While SPVADWL Is Uninitialized
Links to More Info: BT2229569
Component: Advanced Firewall Manager
Symptoms:
The issue occurs when spvadwl, a hash data structure, is uninitialized, and an EVICT FSD request is received from the SEP driver.
Conditions:
The system expects the spvadwl hash to be initialized before handling an EVICT FSD request. If this assumption is incorrect, operations dependent on the hash fail due to its uninitialized state.
Impact:
tmm cores
Workaround:
N/A
Fix:
A NULL check has been added to the `spvadwl_search` function to confirm the spvadwl hash is properly initialized before processing. If the hash is uninitialized, the system will ignore the 'EVICT FSD' request, ensuring proper operation and preventing errors.
Fixed Versions:
21.1.0
2229273 : LDAP authentication fails when multiple LDAP servers are configured
Links to More Info: BT2229273
Component: TMOS
Symptoms:
When 2 or more ldap servers are configured for ldap authentication, auth fails due to timer expired (PAM timeout).
Conditions:
-- Multiple ldap servers are configured for Remote-LDAP authentication
-- The bind-timeout and search-timeout values are set to 30 seconds (this is the default)
Impact:
LDAP authentication fails due to PAM timeout- even when one of the servers responds with success.
Workaround:
Set the bind-timeout and search-timeout to lower values i.e 5 seconds
Fix:
1. Configure BIG-IP for remote-LDAP authentication
2. Configure multiple LDAP servers (first few servers should be unreachable/not responding)
3. Test authentication from browser using remote user
4. Auth should be successful
Fixed Versions:
21.1.0
2229021 : iControl REST issue
Component: TMOS
Symptoms:
Under undisclosed conditions iControl REST is not following best practices.
Conditions:
Undisclosed conditions
Impact:
Unexpected impact
Fix:
iControl REST now working as expected.
Fixed Versions:
21.1.0
2228789 : IPS ID10008 triggered by large ADDITIONAL SECTION in DNS response
Links to More Info: BT2228789
Component: Protocol Inspection
Symptoms:
IPS violation ID10008 drops DNS-over-TCP responses larger of 6948 bytes
Conditions:
DNS responses with large ADDITIONAL sections (multiple NS records + DNSSEC keys) exceeding MAX_DNSSEC_SIZE byte IPS parsing limit
Impact:
DNS traffic blocked
Workaround:
Modify ID10008 action from "drop" to required in IPS profile
Fixed Versions:
21.1.0
2228753 : Violation_details may contain unexpected line break
Links to More Info: BT2228753
Component: Application Security Manager
Symptoms:
Violation_details field may contain an unexpected line break, such as 0x0d or 0x0a.
Conditions:
- Using remote logging
- Sending violation_details
- Using "Maximum Request Size" with a specified length, not Any
Impact:
Remote logging server may be confused by the line break.
Workaround:
Do not send violation_details or use "Maximum Request Size: Any".
Fixed Versions:
21.1.0
2227725 : iApp Template Improvements
Component: iApp Technology
Symptoms:
iApp template were not processing as expected
Conditions:
NA
Impact:
May lead to unexpected behaviour
Workaround:
N/A
Fix:
iApp is now processing templates as expected
Fixed Versions:
21.1.0
2227513 : Tmm crash in Google Cloud during a live migration
Links to More Info: BT2227513
Component: Local Traffic Manager
Symptoms:
When running in Google Cloud and a live migration occurs tmm may crash.
Conditions:
- BIG-IP is running in Google Cloud
- tmm is utilizing the virtio driver
- A live migration is occurring
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Disable live migration in GCP.
or
Use the sock driver.
Fixed Versions:
21.1.0
2227441 : TMSH hardening
Component: TMOS
Symptoms:
TMSH not working as expected
Conditions:
NA
Impact:
Can lead to unexpected behaviour
Fix:
TMSH is now working as expected
Fixed Versions:
21.1.0
2227209 : Current session increases
Links to More Info: BT2227209
Component: Local Traffic Manager
Symptoms:
The stats of current session -
tmsh show ltm pool http_pool
increase beyond the current connections.
---------------------------------------------------------------------------------------
Ltm::Pool: http_pool
---------------------------------------------------------------------------------------
Status
Availability : available
State : enabled
Reason :
Monitor : none
Minimum Active Members : 0
Priority Groups : 0/0/0 (highest/current/lowest)
Current Active Members : 0
Available Members : 1
Total Members : 1
Total Requests : 285
Current Sessions : 9 <<<<<< even though no current connections exist
Traffic ServerSide
Bits In 963.8K
Bits Out 25.6M
Packets In 1.7K
Packets Out 1.7K
Current Connections 0
Maximum Connections 18
Total Connections 285
Conditions:
If a TCP connection is aborted, the statistics may not decrease when the connection closes.
Impact:
Wrong information displayed.
Workaround:
N/A
Fix:
The statistic is now accurate
Fixed Versions:
21.1.0
2225513 : Some named properties in document are not accessible in Portal Access
Links to More Info: BT2225513
Component: Access Policy Manager
Symptoms:
Some named properties in an HTML document are not accessible when hosted in Portal Access
Conditions:
HTML document contains named properties
Impact:
Functionality broken
Workaround:
None
Fixed Versions:
21.1.0
2225313 : ASM CAPTCHA refresh and audio icons are missing after policy import
Component: Application Security Manager
Symptoms:
ASM CAPTCHA refresh, and audio icons may be missing when a policy is imported and applied directly.
Conditions:
A policy is imported and applied directly.
Impact:
ASM CAPTCHA refresh and audio icons may be missing.
Workaround:
Make a spurious change to any Blocking Response Page and apply policy.
Fix:
ASM CAPTCHA refresh and audio icons are populated correctly.
Fixed Versions:
21.1.0
2225201 : iControl REST hardening
Component: TMOS
Symptoms:
iControl REST not working as expected
Conditions:
NA
Impact:
Unexpected behaviour
Fix:
iControl REST now working as expected
Fixed Versions:
21.1.0
2225017 : Config Sync not working in an HA setup
Component: TMOS
Symptoms:
Config Sync not working in an HA setup
Conditions:
User has an HA setup.
Impact:
Config Sync not working
Fix:
Resolved the connection issue required for the config sync to work.
Fixed Versions:
21.1.0
2224937 : HA Devices staying out of sync
Component: TMOS
Symptoms:
On first attempt after creation of device group, devices are not getting into the "In Sync" state.
Conditions:
Reproducible on the instances with HA setup
Impact:
Devices stay out of sync for a longer duration blocks config sync and failover
Workaround:
Multiple attempts and after few minutes, devices get into the sync
Fix:
Added relevant TCP headers and updated the package handling.
Fixed Versions:
21.1.0
2224681 : iControl REST improvement
Component: TMOS
Symptoms:
iControl REST is not working as expected
Conditions:
NA
Impact:
Can lead to unexpected behaviour
Fix:
iControl REST is working as expected
Fixed Versions:
21.1.0
2224673 : iControl REST improvement
Component: TMOS
Symptoms:
iControl REST is not working as expected
Conditions:
NA
Impact:
Can lead to unexpected behaviour
Fix:
iControl REST is working as expected
Fixed Versions:
21.1.0
2224537 : Tmm crash in Google Cloud during a live migration
Links to More Info: BT2224537
Component: Local Traffic Manager
Symptoms:
When running in Google Cloud and a live migration occurs tmm may crash.
Conditions:
- BIG-IP is running in Google Cloud
- tmm is utilizing the virtio driver
- A live migration is occurring
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Disable live migration in GCP.
or
Use the sock driver.
Fixed Versions:
21.1.0
2223665 : When sdag.shuffle.table is non-zero on a clustered tenant, tmm may not go ready-for-world
Links to More Info: BT2223665
Component: TMOS
Symptoms:
A tenant may not pass traffic after a reboot or a re-deploy if the sdag.shuffle.table db var is set to a non-default value.
The following command
tmctl -d blade tmm/ready_for_world_stat
the value is "not_ready = dag_transition"
Conditions:
Cluster platform.
sdag.shuffle.table is changed from the default (0).
Impact:
Tmm may not go ready-for-world.
Workaround:
Set sdag.shuffle.table back to zero and restart tmm.
Fix:
Changing sdag.shuffle.table no longer causes tmm to be not ready for world after a restart.
Fixed Versions:
21.1.0
2222185 : Even if it's possible to configure multiple stanzas under the auth-info section of a security ssh profile, the SSH proxy will always choose the first one that has a private key
Links to More Info: BT2222185
Component: Advanced Firewall Manager
Symptoms:
In a security ssh profile, it's possible to configure multiple stanzas under the 'auth-info' section.
For example, using this configuration:
security ssh profile f5-test-ssh-proxy {
...
auth-info {
ed25519 {
proxy-server-auth {
private-key ...
public-key ...
}
proxy-client-auth {
private-key ...
public-key ...
}
real-server-auth {
public-key ...
}
}
rsa {
proxy-server-auth {
private-key ...
public-key ...
}
proxy-client-auth {
private-key ...
public-key ...
}
real-server-auth {
public-key ...
}
}
}
description none
lang-env-tolerance common
timeout 0
}
Conditions:
- AFM module licensed and provisioned.
- security ssh profile configured with multiple stanzas under the auth-info section.
Impact:
On the client-side session establishment (external client to AFM), the SSH proxy will always choose the first section that has an entry with a proxy-server-auth private-key.
Workaround:
Configure only one stanza under the auth-info section of a security ssh profile.
Fix:
Updated SSH proxy host-key selection logic in security SSH profiles to process all configured auth-info stanzas, loads valid proxy-server keys for supported algorithms (RSA, DSA, ECDSA, ED25519), and enforce one key per algorithm type while skipping invalid or duplicate entries.
Fixed Versions:
21.1.0
2222041-4 : HTTP cookie handling resource usage
Component: Local Traffic Manager
Symptoms:
Cookie handling may not follow best practices under certain configurations.
Conditions:
NA
Impact:
Could lead to unexpected behavior.
Workaround:
NA
Fix:
Updated handling to work as expected.
Fixed Versions:
21.1.0
2221781 : The DOS process utilizes CPU resources during configuration updates that are unrelated to its operation.
Links to More Info: BT2221781
Component: Application Security Manager
Symptoms:
The dosl7d process consumes high CPU resources during config updates that are unrelated to its operation.
Conditions:
- ASM provisioned
- Configuration update
- Verify CPU consumption of dosl7d
Impact:
The dosl7d process unnecessarily consumes CPU resources.
Workaround:
None.
Fix:
Fixed dosl7d to avoid internal locking during unrelated config updates.
Fixed Versions:
21.1.0
2221689-1 : TMSH hardening
Component: TMOS
Symptoms:
TMSH is not working as expected
Conditions:
NA
Impact:
Can lead to unexpected behaviour
Fix:
TMSH now working as expected.
Fixed Versions:
21.1.0
2221585 : When tenant renews DHCP lease on eth2, the interface IP address on mgmt also gets modified
Links to More Info: BT2221585
Component: TMOS
Symptoms:
When eth2 DHCP lease renews on rSeries tenant, management interface IP is incorrectly changed to eth2 IP (100.69.1.1/24) causing loss of remote management access.
This can occur when eth2 renews the lease after 999 days or when executing manual command to renew eth2's DHCP lease (dhclient -r).
Logs similar to the following can be seen from the tenant's /var/log/boot.log:
info dhcp_config[20430]: management_ip = 100.69.1.1
info dhcp_config[20430]: F5::COAPI::TransactionalSave Succeeded.
info dhcp_config[20430]: domain_search = <default.svc.cluster.local. svc.cluster.local. cluster.local. chassis.local.>
info dhcp_config[20430]: domain_name = <default.svc.cluster.local>
info dhcp_config[20430]: In update_ltcfg_field().
info dhcp_config[20430]: LTCFG Field => ('dns', 'search', 'dns')
info dhcp_config[20430]: New value => 'default.svc.cluster.local.,svc.cluster.local.,cluster.local.,chassis.local.'
info dhcp_config[20430]: Existing value => 'localhost'
info dhcp_config[20430]: dns_servers = <10.10.1.10>
info dhcp_config[20430]: In update_ltcfg_field().
info dhcp_config[20430]: LTCFG Field => ('dns', 'nameservers', 'dns')
info dhcp_config[20430]: New value => '10.10.1.10'
info dhcp_config[20430]: Existing value => '10.10.1.241,10.10.1.242,10.10.1.243'
info dhcp_config[20430]: In update_ltcfg_config_source() for 'dns'.
info dhcp_config[20430]: New 'config_source' value => '0'
info dhcp_config[20430]: Existing value => '0'
info dhcp_config[20430]: No change in 'config_source' for 'dns'. Skip update.
info dhcp_config[20430]: In update_ltcfg_field().
info dhcp_config[20430]: LTCFG Field => ('dns', 'description', 'dns')
info dhcp_config[20430]: New value => 'configured-by-dhcp'
info dhcp_config[20430]: Existing value => ''
info dhcp_config[20430]: F5::COAPI::TransactionalSave Succeeded.
info dhcp_config[20430]: hostname = 'bigip1.default.svc.cluster.local'
info dhcp_config[20430]: In update_ltcfg_field().
info dhcp_config[20430]: LTCFG Field => ('system', 'hostname', 'system')
info dhcp_config[20430]: New value => 'bigip1.default.svc.cluster.local'
info dhcp_config[20430]: Existing value => 'bigip1.default.svc.cluster.local'
info dhcp_config[20430]: No change in ltcfg field 'hostname'. Skip update.
info dhcp_config[20430]: Successfully finished the execution of /usr/libexec/dhcp-config.
Notice that in addition to changing the management IP address it also changes the DNS and hostname.
Conditions:
- rSeries tenant running for 999 days and its DHCP-enabled eth2 interface renews the lease.
- This may also occur if an administrator manually executes a command that forces eth2 to renew its lease.
Impact:
Loss of remote connectivity to management interface.
Workaround:
Reboot the affected BIG-IP tenant or
change tenant state from "deployed" to "configured" and back to "deployed" via F5OS host.
DNS and hostname settings may also need to be changed back to their previous value.
Fixed Versions:
21.1.0
2221517 : BIG-IP SCP hardening
Component: TMOS
Symptoms:
SCP does not follow current best practices.
Impact:
Can lead to undesirable behaviour
Fix:
SCP is now following best practices.
Fixed Versions:
21.1.0
2221493 : SCP Improvement
Component: TMOS
Symptoms:
SCP is not following best practices
Conditions:
NA
Impact:
Could lead to unexpected behaviour
Fix:
SCP now following best practices.
Fixed Versions:
21.1.0
2221445 : Improving scripts of Failover
Component: TMOS
Symptoms:
Failover scripts not working as expected
Conditions:
NA
Impact:
Can lead to unexpected behaviour
Fix:
Failover scripts working as expected
Fixed Versions:
21.1.0
2221413 : SCP Improvement
Component: TMOS
Symptoms:
SCP is not following best practices
Conditions:
NA
Impact:
Could lead to unexpected behaviour
Workaround:
NA
Fix:
SCP now following best practices.
Fixed Versions:
21.1.0
2221177 : Big3d cannot validate certificates after they are renewed
Links to More Info: K000159906, BT2221177
Component: Global Traffic Manager (DNS)
Symptoms:
After renewing your big3d certificates, LTM virtual servers become unavailable in GTM, and the bigip_add command starts failing.
Logs in /varl/og/ltm
"big3d SSL cert EXPIRED at IP <IP_ADDRESS>"
"SSL error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed"
"SSL error:14094413:SSL routines:ssl3_read_bytes:sslv3 alert unsupported certificate"
Conditions:
-- BIG-IP DNS (GTM)
-- A Public CA is used to sign the certificates used by big3d
Impact:
Big3d fails to verify the new certificate.
Note: This can also occur if you use a public CA to sign the device certificate used for high availability.
Workaround:
Follow the worksteps described in K000159906: BIG-IP GTM/DNS iQuery Connection Failure Due to Missing Extended Key Usage (EKU) Extensions in Device Certificates, available at https://my.f5.com/manage/s/article/K000159906
Fix:
Both `gtmd` and `big3d` traditionally use the device certificate for mutual TLS connections. This works if the certificate supports both client and server authentication or lacks extended key usage.
If the device certificate is limited to server authentication, configure a client certificate using DB variables `gtm.ssl.crt` and `gtm.ssl.key`. Once set, `gtmd` immediately uses the new certificates, and the `gtm_add` script exchanges them for TLS connections.
Updating the DB variables while in a sync group breaks existing TLS connections. Restore trust using `bigip_add`, `big3d_install`, or manually installing the client certificate as trusted on remote devices.
Fixed Versions:
21.1.0
2221169-4 : iControl REST Hardening
Component: TMOS
Symptoms:
iControl REST not working as expected
Conditions:
NA
Impact:
Leads to undesirable behaviour
Fix:
iControl REST now working as expected
Fixed Versions:
21.1.0
2221161-1 : TMSH hardening
Component: TMOS
Symptoms:
TMSH not working as expected
Conditions:
NA
Impact:
Leads to undesirable behaviour
Fix:
TMSH now working as expected.
Fixed Versions:
21.1.0
2221017-4 : The BIG-IP virtio driver may core during startup
Links to More Info: BT2221017
Component: Local Traffic Manager
Symptoms:
If a failure occurs in the BIG-IP's virtio driver during startup, it may core when attempting to modify statistics that have not yet been initialized.
Conditions:
-- Virtio driver in use.
-- BIG-IP is starting up.
-- An error occurs that is tracked by a statistic.
Impact:
TMM cores and restarts.
Fixed Versions:
21.1.0
2221001 : TMM might restart with certain network traffic
Component: Local Traffic Manager
Symptoms:
TMM is not handling specific traffic as expected.
Conditions:
When configured with Multipath TCP configuration.
Impact:
Traffic disrupted while TMM restarts.
Fix:
TMM is now handling traffic as expected.
Fixed Versions:
21.1.0
2220389 : Enabling tm.ipv4dagfrag results in tmm not ready for world on a cluster with more than 4 blades
Links to More Info: BT2220389
Component: Local Traffic Manager
Symptoms:
If tm.ipv4dagfrag is enabled on a multi slot system, tmm on all blades may not fully start up.
Conditions:
-- F5OS tenant or chassis with more than 4 blades.
- -tm.ipv4dagfrag enabled
Impact:
-- tmsh show sys cluster will show "TMM not ready"
-- The affected blades will not pass traffic
Workaround:
Disable tm.ipv4dagfrag
Fixed Versions:
21.1.0
2220369 : BIG-IP GUI/API Improvements
Component: TMOS
Symptoms:
BIG-IP management plane (GUI/API) is not following best practices.
Conditions:
When LDAP authentication is configured.
Impact:
Unexpected behaviour on BIG-IP.
Workaround:
NA
Fix:
BIG-IP management plane (GUI/API) is now following best practices.
Fixed Versions:
21.1.0
2219929 : Tmm running in Hyper-V environments might not receive multicast traffic
Links to More Info: BT2219929
Component: Local Traffic Manager
Symptoms:
Multicast is being sent towards the BIG-IP, but a capture on the BIG-IP does not show multicast packets arriving.
Conditions:
BIG-IP running on Hyper-V using the dpdk driver:
The interface is using the xnet driver:
# tmctl -d blade tmm/device_probed
pci_bdf pseudo_name type available_drivers driver_in_use
------------ ----------- --------- ----------------- -------------
0000:00:e1.0 1.1 F5DEV_PCI xnet, sock, xnet
And the xnet driver is using the dpdk driver:
# tmctl -d blade tmm/xnet/device_probed
id available_drivers driver_selected driver_in_use
------ ----------------- --------------- -------------
{UUID} sock, dpdk, dpdk Yes
Impact:
Tmm does not see multicast packets. If the BIG-IP us using IPv6, this will cause IPv6 neighbor discovery to fail for addresses on the BIG-IP.
It can also impact other multicast based traffic.
Workaround:
Switch to the sock driver: https://my.f5.com/manage/s/article/K000153024
Fixed Versions:
21.1.0
2219889 : Specific iRule with undefined var in remote syslog via HSL leads to crash
Links to More Info: BT2219889
Component: TMOS
Symptoms:
Tmm crashes when an iRule command is triggered.
Conditions:
1. An iRule invokes HSL::send on an undefined variable and which reference an HSL pool
2. Syslog messages are configured to be sent to the same HSL pool, which causes a log recursion to occur on the error message
# See undefined $hsl
ltm rule /Common/c_hsl_rule {
when CLIENT_DATA {
# Log the raw payload to /var/log/ltm for debugging
log local0. "Payload received from [IP::client_addr]:[UDP::client_port] -> [UDP::payload]"
# Send the raw payload to the C pool
HSL::send $hsl "[UDP::payload]"
}
}
which leads to logging of the error
And syslog is redirected to the same pool, thus causing errors generated by the iRule to end up recursing into MDS.
sys log-config destination remote-high-speed-log /Common/clog-rhl {
pool-name /Common/clog
protocol udp
}
sys log-config destination remote-syslog /Common/clog-rs {
remote-high-speed-log /Common/clog-rhl
}
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Make sure variable is defined.
Potentially use a "catch" as well.
Fixed Versions:
21.1.0
2219801 : Visual Policy Editor AD group search is limited to current page
Links to More Info: BT2219801
Component: Access Policy Manager
Symptoms:
The Search in AD Groups in the Visual Policy Editor is limited to the current page instead of a global search
Conditions:
1. Access Policy -> Edit
2. AD Groups Resource Assign -> Add new entry -> edit
3. Have multiple pages of AD groups
Impact:
Won't be able to search among AD Groups spanning multiple pages
Workaround:
None
Fixed Versions:
21.1.0
2219745 : iControl REST hardening
Component: TMOS
Symptoms:
iControl REST is not working as expected
Conditions:
NA
Impact:
Can lead to unexpected behaviour
Fix:
iControl REST is working as expected
Fixed Versions:
21.1.0
2219381 : TMSH improvement
Component: Local Traffic Manager
Symptoms:
TMSH is not working as expected
Conditions:
NA
Impact:
Can lead to unexpected behaviour
Workaround:
None
Fix:
TMSH is working as expected
Fixed Versions:
21.1.0
2219209 : Resetting profile statistics may lead to memory corruption
Links to More Info: BT2219209
Component: Access Policy Manager
Symptoms:
TMM may crash or generate wrong behavior
Conditions:
API Protection profile statistics have been reset, an issue internally might overwrite memory in other area.
Impact:
Can cause unexpected behavior or even a crash
Workaround:
N/A
Fix:
Profile statistics can safely be reset.
Fixed Versions:
21.1.0
2219173 : TMSH improvements
Component: TMOS
Symptoms:
TMSH is not following best practices
Conditions:
NA
Impact:
Unexpected behavior
Fix:
Implemented best practices in TMSH
Fixed Versions:
21.1.0
2219081 : Live Update configuration sync failure in HA setup
Links to More Info: BT2219081
Component: Application Security Manager
Symptoms:
The Live Update log records a YamlReader error for full_sync_asm-live-update, causing the Live Update configuration sync to fail.
Conditions:
The Live Update log shows a YamlReader error for the full_sync_asm-live-update file.
Impact:
Some servers in the HA setup may have incorrect Live Update configurations.
Workaround:
N/A
Fix:
Live Update sync process uses simplified YAML file
Fixed Versions:
21.1.0
2219053 : CVE-2025-13878: Malformed BRID/HHIT records can cause named to terminate unexpectedly
Component: Global Traffic Manager (DNS)
Symptoms:
Malformed BRID/HHIT records can cause `named` to terminate unexpectedly. This issue affects BIND 9 versions 9.18.40 through 9.18.43, 9.20.13 through 9.20.17, 9.21.12 through 9.21.16, 9.18.40-S1 through 9.18.43-S1, and 9.20.13-S1 through 9.20.17-S1.
Conditions:
Triggered by specially crafted or malicious DNS queries.
Impact:
Potential denial of service (DoS) for DNS services.
Workaround:
None
Fix:
Upgraded BIND to a patched version that resolves CVE-2025-13878.
Fixed Versions:
21.1.0
2218261 : iControl REST Improvements
Component: TMOS
Symptoms:
iControl REST was not following best practices.
Conditions:
NA
Impact:
Could lead to unexpected behaviour.
Workaround:
NA
Fix:
iControl REST is now following best practices.
Fixed Versions:
21.1.0
2218181-2 : JSESSIONID missing from APM NTLM SSO responses after successful login
Component: Access Policy Manager
Symptoms:
When APM uses NTLM SSO to a backend application, the backend first returns 401 Unauthorized with WWW-Authenticate: NTLM and a Set-Cookie for JSESSIONID. After NTLM completes, APM sends a 200 OK to the client but does not include the JSESSIONID cookie. The client does not receive the backend session cookie. Packet captures show the backend sent the JSESSIONID during the NTLM challenge, but APM did not pass this cookie in the final 200 OK.
Conditions:
Occurs when,
- APM is configured for NTLM SSO to a backend application.
- The backend issues a session cookie (e.g., JSESSIONID) during the NTLM handshake.
- The client depends on that session cookie to maintain application state.
- APM terminates the client connection and proxies authentication to the backend.
Impact:
Applications that rely on the backend JSESSIONID may not establish or maintain sessions, leading to repeated authentication prompts, errors, or unexpected redirects after NTLM login.
Workaround:
N/A
Fix:
N/A
Fixed Versions:
21.1.0
2218157 : IP Intelligence database load log displayed periodically
Links to More Info: BT2218157
Component: Advanced Firewall Manager
Symptoms:
IP Intelligence database load log is displayed periodically in TMM log files.
Conditions:
- Configuration refers to IP intelligence feature.
- No active subscription for IP intelligence.
- IP intelligence database load fails periodically.
Impact:
- TMM log files contain messages similar to:
<13> Sep 24 09:55:01 bigip1 notice Failed to open /var/IpRep/F5IpRep.dat
<13> Sep 24 09:55:01 bigip1 notice Failed to open /var/IpRep/F5IpV6Rep.dat
- LTM log files contain messages similar to this one, logged by each tmm into the every 5 minutes:
Sep 24 10:00:05 f5test.localhost err tmm2[1492]: 01010377:3: Failed to open IpRep database file /var/IpRep/F5IpV6Rep.dat
Workaround:
- Update the license to include an IP Intelligence subscription
or
- Remove the ip-intelligence objects from the configuration
Fixed Versions:
21.1.0
2218109 : Unable to delete LTM Policy Strategy with Address Selector via UI. VE goes offline and displays an error after manual deletion of the MCPD shared database file during operations such as reboot.
Component: TMOS
Symptoms:
Not able to delete LTM "policy-strategy" with the address selector from the UI. When attempting operations such as "load sys license" or rebooting by manually deleting the MCPD shared DB file, the virtual edition (VE) gets stuck offline and displays an error.
Conditions:
The issue occurs under the following circumstances:
The system contains a policy-strategy with the "address" selector.
Impact:
The virtual edition (VE) becomes stuck offline, rendering it non-operational.
Fix:
Ensure Virtual Edition (VE) remains online and error-free during operations, such as reboot, by adding the address selector to the policy strategy schema.
Fixed Versions:
21.1.0
2217721 : Delete checkbox in dcp policy for adding endpoint is not seen for endpoint >37 char and string is out of text box
Component: Leak Signal
Symptoms:
When creating or editing a DCP policy, if an endpoint name exceeds 37 characters, the delete checkbox/button for that endpoint becomes invisible. Additionally, the endpoint name overflows outside of the text box, resulting in a UI rendering issue. As a result, users are unable to edit or delete the affected endpoint.
Conditions:
This issue arises when a user creates or edits a DCP policy by entering an endpoint name that exceeds 37 characters. It affects all versions prior to the fix.
Impact:
Users are unable to delete or edit endpoints with names longer than 37 characters in DCP policies.
Workaround:
Limit endpoint names to 37 characters or fewer when creating DCP policies. This can be accomplished by using wildcard (*) characters in the endpoint name.
Fix:
Updated CSS to wrap endpoint name characters to a new line on overflow, ensuring the delete button remains visible and accessible for endpoint names of any length.
Fixed Versions:
21.1.0
2217713 : TMSH improvements
Component: TMOS
Symptoms:
TMSH not following best practices
Conditions:
NA
Impact:
Can lead to unexpected behaviour
Fix:
TMSH is now following best practices.
Fixed Versions:
21.1.0
2217545 : Unable to License BIG-IP Booted on KVM UEFI Machine
Component: TMOS
Symptoms:
For a BIG-IP booted on a KVM UEFI machine, licensing is failing
Conditions:
When trying to license a BIG-IP on a KVM UEFI machine
Impact:
User will not be able to license BIG-IP on a KVM UEFI machine
Workaround:
None
Fix:
With the addition of a new platform ID for the KVM UEFI platform, the licensing will now work.
Fixed Versions:
21.1.0
2217485 : TMSH Improvements
Component: TMOS
Symptoms:
TMSH is not following best practices
Conditions:
NA
Impact:
Unexpected behavior.
Fix:
TMSH is now following best practices.
Fixed Versions:
21.1.0
2217445 : GTM Virtual Server can be deleted while referenced by GTM Pools
Component: Global Traffic Manager (DNS)
Symptoms:
A GTM virtual server object can be deleted even if it is referenced by GTM pools. Deleting the server will also remove it from the associated pool members without any warning.
Conditions:
Occurs when a GTM virtual server is referenced in one or more GTM pools.
Impact:
This may cause unexpected behavior or service disruption if the server is deleted while still in use.
Workaround:
None.
Fix:
A validation check has been added to prevent deletion of a GTM virtual server that is referenced by GTM pools, and a warning is now displayed to the user. This behavior is controlled by the DB variable gtm.gtmserverdeletevalidation, which is disabled by default and must be enabled to enforce the deletion restriction.
Fixed Versions:
21.1.0
2217093 : L2 traffic to masquarade MAC on Standby might be flooded when multiple interfaces are used
Links to More Info: BT2217093
Component: Local Traffic Manager
Symptoms:
On platforms without the switch (i2000/i4000) configured with multiple interfaces under a single VLAN, traffic to masquerade MAC address will be flooded to all available interfaces and will not follow FDB entries.
Conditions:
- Switchless platform (like i2000/i4000).
- Multiple interfaces configured under a single VLAN. For example:
net vlan vlan2 {
interfaces {
2.0 {
tagged
}
trunk1 {
tagged
}
}
}
- traffic to masquarade MAC is misdirected to Standby unit.
Impact:
Unnecessary flooding occurs.
Workaround:
None.
Fixed Versions:
21.1.0
2217053 : HTML5 Citrix Client Bundle Upload Fails with Unpack Error Due to Invalid Entry Filename
Component: TMOS
Symptoms:
When uploading an HTML5 Citrix client bundle (ZIP file) to BIG‑IP through the Configuration utility, the upload fails with an unpack error indicating that the archive contains invalid or special characters in one or more entry filenames.
Conditions:
This issue occurs when all of the following conditions are met:
The latest HTML5 Citrix client executable is downloaded from citrix.com
The client is installed on a supported Windows Server using the default installation settings
The HTML5Client directory is manually compressed into a ZIP file using Windows Explorer
The ZIP archive is uploaded as a Windows Package File under Access Policy > Application Access > Remote Desktops > Citrix Client Bundles
The bundle name includes html5
Impact:
The HTML5 Citrix client bundle cannot be uploaded or configured on BIG‑IP. As a result, administrators are unable to deploy or update the HTML5 Citrix client for remote desktop access.
Fix:
it is fixed now
Fixed Versions:
21.1.0
2216645 : UCS Backup Improvements
Component: TMOS
Symptoms:
UCS Backup is not following best practices.
Conditions:
When BIG-IP is under Appliance mode.
Impact:
Could lead to unexpected behaviour.
Workaround:
NA
Fix:
UCS Backup is now working as expected.
Fixed Versions:
21.1.0
2213605 : "Live Update" ASU File Listed as Not Installed After Successful Scheduled Installation
Links to More Info: BT2213605
Component: Application Security Manager
Symptoms:
The "Live Update" ASU file appears with a "Pending" status in the GUI, even though it was successfully downloaded and installed.
Conditions:
Installations run in "Scheduled" mode
Impact:
The system provides incorrect reporting on the installation status of the latest "Live Update" ASU file.
Workaround:
Click on "Install" button for latest "Pending" ASU file
Fixed Versions:
21.1.0
2211137 : EPSEC upgrade fails when default package is pre-uploaded★
Links to More Info: BT2211137
Component: Access Policy Manager
Symptoms:
After upgrading BIG-IP APM from version 17.1.2 to 17.1.3, the APM directories /var/apm/lib and /var/apm/www are missing. The system shows an empty EPSEC version (apm.epsec.version = ""), and APM functionality is impacted. This issue occurs on both units in an HA pair.
Conditions:
This issue occurs when all of the following conditions are met:
1. BIG-IP APM is running version 17.1.2 (default EPSEC package version 1749)
2. EPSEC package version 1915 was uploaded via GUI but not installed on the 17.1.2 system
3. System is upgraded to version 17.1.3 (which has EPSEC 1915 as the default package)
4. The upgrade creates an upload marker for EPSEC 1915 in the configuration filestore
Impact:
Endpoint security checks cannot be performed, APM policies and access profiles may fail to function properly, and end users may be unable to access APM-protected resources.
Workaround:
Upload and install a newer EPSEC package (version 1941 or later) via the GUI:
1. Navigate to Access > System > File Management > Endpoint Software Management
2. Upload a newer EPSEC package (e.g., epsec-1.0.0-1941.0.iso or later)
3. Install the uploaded package
4. Verify the directories are created: ls -l /var/apm/
5. Confirm EPSEC version: tmsh list sys db apm.epsec.version
Fixed Versions:
21.1.0
2211133 : ICMP error length does not follow RFC 812 guidance
Links to More Info: BT2211133
Component: Local Traffic Manager
Symptoms:
Only 8 bytes of original payload is included in ICMP error message sent from BIG-IP. RFC 1812 section 4.3.2.3 indicates systems should include as much as possible, up to 576 bytes total.
Conditions:
ICMP error message sent from BIG-IP.
Impact:
With only 8 bytes included in the ICMP error message, provides limited context for debugging. The TCP and UDP headers are truncated mid-header.
Workaround:
None.
Fixed Versions:
21.1.0
2209157 : FastL4 late binding does not proxy MSS when establishing server-side connection.
Links to More Info: BT2209157
Component: Local Traffic Manager
Symptoms:
FastL4 late binding does not proxy MSS when establishing server-side connection.
Conditions:
FastL4 profile with late-binding option enabled.
Impact:
Sub-optimal connection performance.
Workaround:
MSS-overwrite option can be used to manually adjust server-side MSS.
Fixed Versions:
21.1.0
2208913-3 : iControl SOAP hardening
Component: TMOS
Symptoms:
iControl SOAP not following best practices
Conditions:
NA
Impact:
Can lead to unexpected behaviour
Fix:
iControl SOAP now following best practices
Fixed Versions:
21.1.0
2208709 : Failure to match specific WAF signatures
Links to More Info: BT2208709
Component: Application Security Manager
Symptoms:
A signature is not matched as expected.
Conditions:
Specific configuration and traffic.
Impact:
A false negative on a specific scenario.
Workaround:
None.
Fixed Versions:
21.1.0
2208701 : Tmm crash when the spvawl_timer_sweep callback_timer is being processed
Links to More Info: BT2208701
Component: Advanced Firewall Manager
Symptoms:
TMM crash occurs when HSB delivers events to incorrect TMM threads. The crash happens due to accessing uninitialized per-thread resources (spvawl_timer_sweep).
Conditions:
TMM passing traffic through HSB; the conditions under which this are encountered are rare and difficult to reproduce.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fix:
Entry Point Validation: Unrecognized FSU subtypes are caught, marked as INVALID, and dropped immediately.
Early Data Validation: Check for spva.type == SPVA_TYPE_INVALID during function entry. Drop corrupted or garbage data immediately without processing.
Fixed Versions:
21.1.0
2202281 : Primary Admin DB Change to Non-Existing User Results in Admin User Lockout
Component: TMOS
Symptoms:
When the `systemauth.primaryadminuser` value is changed to a non-existing user, the primary admin value is updated to the non-existing user, resulting in an admin user lockout scenario.
Conditions:
When a user does not existing in the system and primary admin value is changed to non existing user value.
Impact:
-- The admin user becomes disabled, logged out of TMUI and TMSH, and is unable to log back in.
-- If the root account login is also disabled, both the root and admin users are logged out of the system.
Workaround:
None
Fix:
When the primary admin DB is udated below operations takes place; in case of failure to update sys db these will get rollbacked.
-> Writes localusers file
-> Writes URP file
-> Clears PAM cache
-> Writes f5_public file
Fixed Versions:
21.1.0
2202097 : Apply limitations on certain object creation
Component: TMOS
Symptoms:
Creation with certain objects could cause unexpected behavior.
Conditions:
NA
Impact:
Could result in unexpected behavior.
Fix:
The objects now have limitations to avoid the unexpected behavior.
Fixed Versions:
21.1.0
2202005-1 : IPsec can send packets across tunnels on standby node.
Links to More Info: BT2202005
Component: TMOS
Symptoms:
IPsec is sending packets over the tunnel from the standby node, which should not occur.
Conditions:
In an HA setup with IPsec configured, once the tunnel is established, there is a possibility that the standby node may send packets.
Impact:
IPsec functionality may be impacted if both the active and standby nodes send ESP packets to the peer.
Workaround:
Added an HA check that first verifies the device status, if it is in standby, the packet is dropped accordingly.
Fix:
Added an HA check that first verifies the device status, if it is in standby, the packet is dropped accordingly.
Fixed Versions:
21.1.0
2201965 : TMSH improvement
Component: TMOS
Symptoms:
TMSH is not working as expected.
Conditions:
NA
Impact:
Can lead to unexpected behaviour
Fix:
TMSH is working as expected.
Fixed Versions:
21.1.0
2201877 : SCTP multihoming fails with ICMP unreachable for alternate paths.
Links to More Info: BT2201877
Component: TMOS
Symptoms:
SCTP multihoming fails with ICMP protocol unreachable for alternate paths.
Conditions:
- SCTP profile with multihoming and alternate addresses configured.
- Alternate address is a self-ip configured on a system.
Impact:
Unable to establish alternate path connection.
Workaround:
None
Fixed Versions:
21.1.0
2201813 : BIG-IP enforces maximum concurrent streams limit immediately over HTTP/2 connection
Links to More Info: BT2201813
Component: Local Traffic Manager
Symptoms:
BIG-IP negotiates a number of concurrent streams over HTTP/2 connection per RFC requirement. It immediately enforces this limitation once the protocol is agreed and first SETTINGS frame is issued.
Conditions:
-- BIG-IP virtual server with a http2 profile.
-- A client connects to the virtual server and negotiates or starts HTTP/2 connection.
Impact:
The client may send more requests than the limit set by BIG-IP over the established HTTP/2 connection and it causes the BIG-IP system to reset the extra streams. If Reset Stream Protection is enabled, it may result in the connection being shutdown by the BIG-IP system.
Workaround:
None.
Fix:
BIG-IP no longer sends RST_STREAM frames when the number of streams exceeded the configured limit until SETTINGS/ACK is received to designate the honoring of the the limit by BIG-IP peer.
Behavior Change:
On initial period until SETTINGS/ACK frame is arrived from the peer, TMM follows HTTP/2 RFC and assumes "unlimited" number of concurrent streams rather than enforcing the configured limit right away. If SETTINGS/ACK is not received, the timeout of 1 (one) seconds is used to start the stream concurrency enforcement. Until the enforcement starts, TMM queues stream-specific frames and "softly" enforces the limit to the configured one, allowing 128 frames and 128K of frame body (frame->length) at most.
Fixed Versions:
21.1.0
2201789 : TMSH improvements
Component: TMOS
Symptoms:
TMSH is not following best practices
Conditions:
NA
Impact:
Unexpected behavior
Workaround:
None
Fix:
Implemented best practices in TMSH
Fixed Versions:
21.1.0
2201769 : TMSH improvements
Component: TMOS
Symptoms:
TMSH is not following best practices
Conditions:
NA
Impact:
Unexpected behavior
Workaround:
None
Fix:
Implemented best practices in TMSH
Fixed Versions:
21.1.0
2201745 : TMSH improvements
Component: TMOS
Symptoms:
TMSH is not following best practices
Conditions:
NA
Impact:
Unexpected behavior
Workaround:
None
Fix:
Implemented best practices in TMSH
Fixed Versions:
21.1.0
2201725 : TMSH improvements
Component: TMOS
Symptoms:
TMSH is not following best practices
Conditions:
NA
Impact:
Unexpected behavior
Workaround:
None
Fix:
Implemented best practices in TMSH
Fixed Versions:
21.1.0
2201697 : TMSH improvements
Component: TMOS
Symptoms:
TMSH is not following best practices
Conditions:
NA
Impact:
Unexpected behavior
Workaround:
None
Fix:
Implemented best practices in TMSH
Fixed Versions:
21.1.0
2201693 : Empty Detected Value Length for Parameters with Empty Values
Component: Application Security Manager
Symptoms:
When a request contains a parameter with a zero-length value, the system fails to recognize it as having zero length and instead displays the parameter as having an empty value.
Conditions:
Using GUI with "Illegal parameter value length" violation
Impact:
GUI displays parameter length with an empty value when the parameter has zero length
Workaround:
Modify checking the parameter length also for zero length
Fix:
Modified the condition logic to use <= instead of < when comparing parameter lengths, ensuring zero-length values are correctly set
Fixed Versions:
21.1.0
2201377 : iControl REST improvements
Component: TMOS
Symptoms:
iControl REST is not following best practices
Conditions:
NA
Impact:
It can lead to unexpected system behaviour
Fix:
iControl REST is now following best practices
Fixed Versions:
21.1.0
2200653 : [LocalUserDB Auth]: UID parameter ignored during user deletion – deletes all users instead of specified user
Links to More Info: BT2200653
Component: Access Policy Manager
Symptoms:
You try to delete the user using the UID, but the UID seems to be ignored, and all users in that instance are deleted instead of just the specified user.
Conditions:
1) Create a localdb instance and create a few users. Verify using "ldbutil --allusers --list"
2) Using ldbutil command, try to delete a specific user by passing their UID in the request.
Ex: ldbutil --delete --uid="22222" --instance="/Common/sbudemgari-localdb-01"
3) Observe the behavior after the deletion request is executed.
Impact:
All users in the instance are deleted, ignoring the provided UID.
Workaround:
None
Fixed Versions:
21.1.0
2200561 : Repeated MCPD service crashes
Component: TMOS
Symptoms:
Repeated restart of the MCPD service in HA setup, or when a modified object is getting deleted in the same transaction.
Conditions:
In the same transaction when a modified object is getting deleted then it leads to restart of mcpd service due to SW issue.
Impact:
Restart of MCPD service which implies that the data path is disrupted due to TMM restart triggered as a result of MCPD crash.
Workaround:
There is no workaround other than to patch the software with a new release version.
Fix:
Avoid modification to the deleted object in the same transaction.
Fixed Versions:
21.1.0
2200537 : Audio captcha script error
Links to More Info: BT2200537
Component: Application Security Manager
Symptoms:
A script error in audio captcha on specific browsers
Conditions:
-- Audio captcha is required.
-- The user is using Internet Explorer on Windows 11
Impact:
Error in the captcha page. Unable to use captcha causing client side enforcement to fail.
Workaround:
None
Fixed Versions:
21.1.0
2200437 : SNMP Improvement
Component: TMOS
Symptoms:
SNMP is not following best practices
Conditions:
NA
Impact:
Could lead to unexpected behaviour
Workaround:
NA
Fix:
SNMP now following best practices
Fixed Versions:
21.1.0
2200421 : SNMP Improvement
Component: TMOS
Symptoms:
SNMP is not following best practices
Conditions:
NA
Impact:
Could lead to unexpected behaviour
Workaround:
NA
Fix:
SNMP now following best practices
Fixed Versions:
21.1.0
2200389 : CDS and CDNSKEY not included in DNSX zone transfer data
Links to More Info: BT2200389
Component: Global Traffic Manager (DNS)
Symptoms:
CDS and CDNSKEY not included in DNSX zone transfer data
Conditions:
Dnssec zone with "Publish CDS/CDNSKEY" option is enabled
Impact:
Missing CDS/CDNSKEY in zone transfer
Workaround:
None
Fixed Versions:
21.1.0
2200217 : DNSSEC validation failures due to missing DS records in zone transfers
Links to More Info: BT2200217
Component: Global Traffic Manager (DNS)
Symptoms:
DNSSEC validation failures occur when querying child zones despite proper DNSSEC configuration, caused by missing DS records in parent zone transfers. The issue affects child zone delegations that use nameservers located outside the child zone itself, such as external nameservers or nameservers under the parent zone. Only delegations where nameservers are within the child zone's own domain hierarchy work correctly. This breaks the DNSSEC chain of trust between parent and child zones, preventing secure DNS resolution for affected delegations.
Conditions:
- DNSSEC is enabled on both parent and child zones.
- Child zones have DS records configured in the system.
- Child zone delegations use nameservers that are either external or located under the parent zone.
-Zone transfers are being performed for the parent zone.
Impact:
DNSSEC chain of trust broken.
Workaround:
None
Fixed Versions:
21.1.0
2200209 : Support NVMe-based disk (newer generation instance families)
Component: TMOS
Symptoms:
The newer generation of instance families were not being supported for BIG IP Images
Conditions:
All prior versions of BIG-IP that did not have the NVMe Support flag set
Impact:
Enabling the NVMe support flag enhances disk I/O performance and ensures compatibility with modern Alibaba Cloud instance types, which utilize NVMe devices for disk exposure. This adjustment modifies the way block devices are identified and accessed at the operating system level.
Workaround:
Save the image as a custom image and set the NVMe support flag to yes
Fix:
Newer images are being published with the relevant flag turned on
Fixed Versions:
21.1.0
2200009 : PEM HA failover may cause traffic drops for new connections
Links to More Info: BT2200009
Component: Policy Enforcement Manager
Symptoms:
All traffic belonging to some connections established to the new Active unit immediately after a failover between PEM units could be dropped.
Conditions:
- PEM units in HA pair.
- New connections established to the new Active unit immediately after a failover.
Impact:
All traffic belonging to new connections established immediately after a failover could be dropped.
Workaround:
None
Fixed Versions:
21.1.0
2199701-3 : big3d was stuck in high CPU after network disruption
Links to More Info: BT2199701
Component: Global Traffic Manager (DNS)
Symptoms:
big3d consuming high CPU
Conditions:
Network disruption
Impact:
big3d overloaded with high CPU usage
Fixed Versions:
21.1.0
2199565 : TMSH and TMUI accessiblity issue during monitors at scale
Links to More Info: BT2199565
Component: Local Traffic Manager
Symptoms:
TMUI and TMSH were unreachable/ inaccessible, when monitors are configured at scale.
SSH connectivity is also impacted due to the same reason.
Conditions:
When monitors are configured at scale and active probing is enabled, access via tmsh, TMUI, and SSH degrades, resulting in BIG-IP system inaccessibility.
Impact:
Access via tmsh, TMUI, and SSH degrades, resulting in BIG-IP system inaccessibility.
Workaround:
ARP Cache threshold and NF connection tracking configuration values have been fine tuned to reduce the ARP cache flooding and connection tracking limit.
Fix:
ARP Cache threshold and NF connection tracking configuration values have been fine tuned to reduce the ARP cache flooding and connection tracking limit.
ARP cache threshold configs:
net.ipv4.neigh.default.gc_thresh1, thresh2, thresh3
net.ipv6.neigh.default.gc_thresh1, thresh2, thresh3
Connection tracking:
net.netfilter.nf_conntrack_max
Fixed Versions:
21.1.0
2199485 : Export and re-import of a security policy in XML format fails due to invalid 'openapi-array' user_input_format value
Links to More Info: BT2199485
Component: Application Security Manager
Symptoms:
Import fails with error: Field 'parameter/user_input_format' may not contain the value 'openapi-array'.
Conditions:
URL level parameter configured with Parameter value type: User-input value and Data type: URI
Impact:
Import of security policy in XML format fails.
Workaround:
Manually change user_input_format from openapi-array to uri in the xml file before importing.
Fixed Versions:
21.1.0
2199469 : Serverssl-use-sni not working in HTTP2 to HTTP gateway setups.
Links to More Info: BT2199469
Component: Local Traffic Manager
Symptoms:
Virtual server's 'serverssl-use-sni' setting does not work when virtual server has HTTP2 profile attached on the client-side and HTTP profile on the server-side.
Conditions:
HTTP2 to HTTP gateway config with 'serverssl-use-sni' option enabled.
Impact:
Incorrect serverssl profile might be selected when establishing server-side connection.
Workaround:
iRule can be used to select the profile based on presented SNI, for example:
when CLIENTSSL_CLIENTHELLO {
binary scan [SSL::extensions -type 0] @9a* sni
log local0. "SNI: $sni"
}
when SERVER_CONNECTED {
switch -glob [string tolower $sni] {
"foo.com" {
SSL::profile foo-serverssl
}
"bar.com" {
SSL::profile bar-serverssl
}
}
}
Fixed Versions:
21.1.0
2199289 : Updating systemauth.primaryadminuser from system-defined admin user (admin) to a user-defined admin user using iControl REST returns 500 error
Component: TMOS
Symptoms:
Updating systemauth.primaryadminuser sys DB parameter from system-defined admin user (admin) to a user-defined admin user (i.e., 'newadmin') returns the following error:
PATCH /mgmt/tm/sys/db/systemauth.primaryadminuser
{
"value": "newadmin"
}
---
500 Server Error
{
"code": 500,
"message": "MCP Session terminated",
"errorStack": [],
"apiError": 32768003
}
Conditions:
Occurs while updating systemauth.primaryadminuser sys DB parameter from system-defined admin user to a user-defined admin user
Impact:
The REST response returns '500 Server Error' with 'MCP Session terminated' response even though the request is successfully processed
Workaround:
The error response can be ignored
Fix:
Updating systemauth.primaryadminuser sys DB parameter from system-defined admin user (admin) returns 200 OK:
PATCH /mgmt/tm/sys/db/systemauth.primaryadminuser
{
"value": "newadmin"
}
---
200 OK
{
"value": "newadmin"
}
Make a GET call to verify the update:
GET/mgmt/tm/sys/db/systemauth.primaryadminuser:
200 OK
{
"kind": "tm:sys:db:dbstate",
"name": "systemauth.primaryadminuser",
"fullPath": "systemauth.primaryadminuser",
"generation": 127,
"selfLink": "https://localhost/mgmt/tm/sys/db/systemauth.primaryadminuser?ver=21.0.0",
"defaultValue": "admin",
"scfConfig": "true",
"value": "newadmin",
"valueRange": "string"
}
Fixed Versions:
21.1.0
2198757 : PEM: use-after-free of mw_msg in session_del_msg_entries hash
Links to More Info: BT2198757
Component: Policy Enforcement Manager
Symptoms:
There is a rare scenario where tmm crashes while passing PEM traffic.
Conditions:
-- PEM is licensed and enabled.
-- Policies are assigned from the PCRF. Subscriber additions and deletions are happening regularly.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None.
Fix:
The delayed response or timeout of the request is now handled gracefully.
Fixed Versions:
21.1.0
2198701 : TMSH/MCP validation of management route dependencies
Component: TMOS
Symptoms:
Deleting an interface route that serves as a gateway leaves dependent routes intact, creating orphan routes with invalid next-hop references.
Conditions:
Occurs when an interface route (gateway provider) has dependent routes using it as the next hop.
If that interface route is deleted without dependency validation, those dependent routes become orphaned.
Impact:
Leads to orphan routes causing traffic failures and inconsistent routing behavior.
Workaround:
Avoid deleting interface routes that are in use; first identify and update or remove all dependent routes (or ensure an alternate valid gateway exists) before deletion.
Fix:
Implemented dependency validation for interface route deletion: block deletion if dependent routes exist, and allow deletion only when those routes still have at least one alternate valid interface route (gateway).
Fixed Versions:
21.1.0
2198661 : Resource administrator not working as expected
Links to More Info: BT2198661
Component: TMOS
Symptoms:
The resource administrator user role is not working as expected
Conditions:
NA
Impact:
Unexpected behaviour
Workaround:
None
Fix:
Resource administrator user is now working as expected.
Fixed Versions:
21.1.0
2197377 : TMM crashes under specific traffic.
Component: Global Traffic Manager (DNS)
Symptoms:
The TMM crashes when handling a specific traffic.
Conditions:
A virtual with a DNS resolver or validating cache is configured.
Impact:
Traffic is interrupted as TMM restarts.
Fix:
TMM is now handling traffic as expected.
Fixed Versions:
21.1.0, 21.0.0.1
2197305 : BIG-IP generates invalid SSL key share
Links to More Info: BT2197305
Component: Local Traffic Manager
Symptoms:
SSL handshakes fail on the client due to an Illegal Parameter alert.
Conditions:
ClientSSL that mixes both FFDHE and Non-FFDHE groups and has session tickets enabled.
The client tries to resume an SSL session with a Non-FFDHE key share that used FFDHE previously.
Impact:
SSL handshake fails and the connection terminates
Workaround:
None
Fixed Versions:
21.1.0
2197289 : Enabling SSH access via the GUI blocks MCPD for 90 seconds
Links to More Info: BT2197289
Component: TMOS
Symptoms:
- Disconnections from the GUI occur (no responses to color advisory probe)
- SNMP query timeouts
- iQuery interruptions
Conditions:
-- SSH access is disabled via the GUI
-- SSH access is then enabled via the GUI
Impact:
-- MCPD is blocked for 90 seconds
-- sshd service does not come up for the first 90 seconds after enabling SSH access
Workaround:
None
Fixed Versions:
21.1.0
2197173 : Insufficient sanitization in SNMP configuration
Component: TMOS
Symptoms:
SNMP configuration is not sanitizing input properly.
Conditions:
NA
Impact:
It can lead to unexpected behaviour.
Workaround:
Restrict SNMP access to localhost.
Fix:
SNMP configuration is now properly sanitizing the inputs.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2196761-3 : TMM core found while doing DAG and SP DAG related tests
Component: TMOS
Symptoms:
TMM crashes and restarts.
Conditions:
In an F5OS multi-slot tenant environment, during boot-up after a tmsh reboot slot all or upgrading to a new volume, a switch of the primary slot can occur between the slots due to slot readiness states. If tmm sends a shared_random_data message before receiving the updated primary slot ID from mcpd, it might use the previous primary slot ID, resulting in a data mismatch and causing tmm to crash and restart.
Note: This issue occurs very rarely as it depends on a race condition.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None.
Fix:
The issue has been fixed by skipping the setting of shared random data when this race condition occurs. The operation will be retried after TMM receives the primary slot change notification.
Fixed Versions:
21.1.0
2196137 : Issue observed only in BIG-IP 17.5.1.4: traffic processed by AFM or DDoS Hybrid Defender may cause TMM to restart
Links to More Info: K000160003, BT2196137
2195709 : TCP fingerprint tethering detection does not work when a subscriber's traffic comes from a tethering Mac OS system.
Links to More Info: BT2195709
Component: Policy Enforcement Manager
Symptoms:
TCP fingerprinting tethering detection does not work when a subscriber's traffic comes from a tethering Mac OS system.
Conditions:
- PEM tethering detection, is configured in a PEM policy rule like this one:
pem policy policy-01 {
rules {
detect-01 {
dtos-tethering {
dtos-detect enabled
report {
dest {
hsl {
publisher default-ipsec-log-publisher
}
}
}
tethering-detect enabled
}
precedence 1000
}
}
transactional enabled
}
- The subscriber connects through a Windows, Android or IoS phone, and the phone OS is recognised in the PEM "Device OS" PEM session field, for example:
Device Name Nokia_Corporation-Nokia_Lumia_710
Device OS Windows_Mobile_8
- An iRule to detect tethering is configured in the relevant virtual server, for example:
ltm rule tethering-detection {
when CLIENT_ACCEPTED {
set ip [IP::client_addr]
set tether [PEM::session info tethering detected $ip]
if {$tether eq "1"} {
log local0. "Tethering detected !"
} else {
log local0. "no tethering detected"
}
}
}
- The subscriber is tethering through the phone using a MacOS operating system.
Impact:
Tethering from a MacOS operating system is never detected.
Workaround:
None
Fixed Versions:
21.1.0
2195321 : Validations for certificate's notBefore and notAfter to comply with CC/FIPS/STIP Certifications
Component: Local Traffic Manager
Symptoms:
To conform to Certification Requirements specified in the FIPS 140-3, Common Criteria, and SSL/TLS Inspection Proxy (STIP) standards, the following validations to temporarily-issued (i.e. forged) certificates are added:
1. notBefore field test: If the established server certificate's notBefore time precedes the current time as well as the notBefore field of the CA certificate, then the forged certificate should have a notBefore value that does not precede the current time (except, perhaps, by a small amount).
2a. notAfter field test: IF the following hold, based upon the maximum duration specified in the configuration:
(i). The notAfter field of the CA certificate does not exceed the current time by more than the maximum duration, AND
(ii). The notAfter field of the server certificate exceeds the current time by more than the maximum duration, THEN:
The notAfter field in the forged certificate should not exceed that in the CA certificate.
2b. notAfter field test: IF the following hold, based upon the maximum duration specified in the configuration:
(i) The notAfter field of the CA certificate exceeds the current time by more than the maximum duration, AND
(ii). The notAfter field of the server certificate exceeds the notAfter field in the CA certificate by more than the maximum duration, THEN:
The notAfter field in the forged certificate should not exceed the maximum duration.
2c. notAfter field test: If the notAfter field in the server certificate precedes both that in the CA certificate as well as the (current time + maximum duration), then the notAfter field in the forged certificate should not exceed that in the server certificate.
Conditions:
-- The BIG-IP device should necessarily be in CC/FIPS/STIP mode
-- Forward Proxy should be enabled
-- TLS/SSL profile is configured for forward proxy, along with a front-end client and a back-end server. The back-end server will also contain an issuer (i.e., CA) certificate that issued its own (server) certificate.
Impact:
This change is only for BigIP TMOS, in particular the newer versions starting BigIP17.5.x being newly certified to conform to STIP standards. Existing TMOS versions, configured in CC/FIPS/STIP modes, will continue to ignore the absent validations but these are already certified and will not be impacted.
There is no impact on BigIP device that are not in FIPS / CC / STIP mode(s).
Workaround:
None, in CC/FIPS/STIP modes.
Not applicable to devices not configured in any of the aforementioned modes.
Fix:
CC/FIPS/STIP certification validations have been added to notBefore and notAfter dates in BIG-IP temporarily-issued (i.e. forged) certificates for Forward Proxy configurations.
Fixed Versions:
21.1.0
2187529-2 : CVE-2025-12818: postgresql: libpq undersizes allocations, via integer wraparound
Links to More Info: K000160291, BT2187529
2187385 : Brute force set to CAPTCHA also raises a violation and blocks traffic
Links to More Info: BT2187385
Component: Application Security Manager
Symptoms:
Brute force is raised, but the config is set to CAPTCHA. Brute force contributes to the violation rating, and traffic is blocked by the violation rating, instead of triggering a CAPTCHA.
Conditions:
Brute force and violation Rating threat detected are both enabled.
Impact:
CAPTCHA does not occur as expected.
Workaround:
None
Fixed Versions:
21.1.0
2187365-1 : BIG-IP v21.0.0 VE or F5OS tenant remains INOPERATIVE after cold boot
Links to More Info: BT2187365
Component: TMOS
Symptoms:
BIG-IP VE or F5OS tenant fails to reach an operational state after cold boot. For example, after stopping and starting the VM, or power cycling the rSeries appliance.
A message similar to the following is observed in /var/log/ltm:
err mcpd[983]: 01070596:3: An unexpected failure has occurred, Can't load structure (global_sync_status.sync_status) status:52 transaction: 2, status: 52 - EdbStructData.cpp, line 39, exiting...
Conditions:
- BIG-IP VE or F5OS tenant running TMOS v21.0.0
- Cold boot of the BIG-IP VE or F5OS tenant
- First startup of the BIG-IP VE or F5OS tenant ("cold boot")
Impact:
- MCPD starts but never becomes ready; the system remains INOPERATIVE
- ecmd CPU utilization is elevated
- Configuration management and control-plane services are unavailable due to MCPD not becoming ready
- High CPU utilization by ecmd can impact overall system stability and resource availability
Workaround:
From bash, delete the /var/db/mcpdb.bin and /var/db/mcpd.info files and reboot the BIG-IP VE or F5OS tenant:
rm -fv /var/db/mcpdb.bin /var/db/mcpdb.info
reboot
MCPD will perform a full configuration load on the next startup and the system will return to operation.
Note: In some cases the workaround may need to be applied more than once before a successful startup and configuration load will occur.
Fixed Versions:
21.1.0, 21.0.0.1
2187185 : BIG-IP v21.0 REST framework incorrectly processes Content-Range in HTTP GET requests
Links to More Info: BT2187185
Component: Device Management
Symptoms:
On BIG-IP v21.0, REST-based file download requests may fail with errors such as “attempt to read past end of file” when the client includes a Content-Range header in an HTTP GET request. This occurs when the specified byte range exceeds the actual size of the requested file.
The failure is triggered by the BIG-IP REST framework incorrectly attempting to process the Content-Range header for GET requests, resulting in an invalid file offset calculation and an EOF read condition. As a result, the REST request is terminated and the file download does not complete.
Conditions:
HTTP GET request includes a Content-Range header
The byte range specified in Content-Range exceeds the actual size of the requested file
Impact:
REST-based file downloads fail unexpectedly
Workaround:
Determine the actual size of the target file and ensure that any Content-Range header sent by the client specifies a byte range that does not exceed the file length.
Alternatively, remove the Content-Range header entirely from HTTP GET requests, as it is not required and may cause request failures.
Fixed Versions:
21.1.0
2186933 : ILX Plugin may not work after use of npm install command on workspace.
Component: Local Traffic Manager
Symptoms:
After using the 'npm install' command on the workspace.
The below message will be logged in ltm logs after plugin reload:
err sdmd[21349]: 018e0018:3: pid[17783] plugin[<plugin-name>.<extension-name>] Error: Cannot find module 'f5-nodejs'
err sdmd[21349]: 018e0010:3: Extension <plugin-name>.<extension-name> exceeded the maximum number of restarts (5) over the last 60 seconds and has been disabled
Conditions:
1. The ILX plugin is in use with node version 6.
2. ILX workspace has been modified with npm install command.
3. Plugin has been reloaded after 'npm install'
Impact:
Traffic processing on virtual server with plugin attached will fail with the following logs:
Could not find ILX extension <extension-name> in path <workspace-name>
Workaround:
To prevent the issue:
1. Use NPM install command with '--no-package-lock' flag.
- npm install --no-package-lock <package-name>
If already Encountered the issue:
1. Restore package.json from /usr/share/packages
- tar -xzf /usr/share/packages/nodejs/f5-nodejs-6.tgz -C /var/ilx/workspaces/Common/<workspace-name>/extensions/<extension-name>/node_modules
2. Update package.json at path /var/ilx/workspaces/Common/<workspace-name>/extensions/<extension-name>/
- Set the "f5-nodejs" version to "1.0.0" instead of "0.0.3".
3. Reload the plugin.
Fixed Versions:
21.1.0
2186897 : TMM core SIGSEVG upon replacing L7 DOS policy
Links to More Info: BT2186897
Component: Anomaly Detection Services
Symptoms:
On rare cases of expired connection, tmm can crash.
Conditions:
BADOS L7 configured
Replacing DOS policy under traffic
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fix:
TMM does not crash upon replacing L7 DOS policy.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2186697 : BIG-IP REST Improvements
Component: Device Management
Symptoms:
BIG-IP REST is not following best practices
Conditions:
NA
Impact:
BIG-IP GUI can behave unexpectedly.
Workaround:
None
Fix:
BIG-IP REST is following best practices and GUI is working as expected.
Fixed Versions:
21.1.0
2186625 : Zone transfer from dns express with dnssec enabled includes extra RRSIG
Links to More Info: BT2186625
Component: Global Traffic Manager (DNS)
Symptoms:
AXFR zone transfer includes extra RRSIG for A/AAAA records.
Conditions:
When delegated NS record includes multiple name servers.
Impact:
Extra RRSIGs added to records that do not need RRSIG.
Workaround:
None
Fixed Versions:
21.1.0
2186153 : CVE-2025-8194 cpython: Cpython infinite loop when parsing a tarfile
Component: TMOS
Symptoms:
A flaw was found in the Python tarfile module. Processing a specially crafted tar archive, specifically an archive with negative offsets, can cause an infinite loop and deadlock. This issue results in a denial of service in the Python application using the tarfile module.
Conditions:
The application uses the Python tarfile module to process an attacker-supplied malicious tar archive containing negative offsets.
Impact:
It can cause an infinite loop leading to application hang or denial of service.
Workaround:
Update to a patched Python version and avoid processing untrusted tar archives, or validate archives before extraction
Fix:
Upgrade to a Python version that includes the tarfile module fix for this issue.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2186009 : Increased TX IQ size for netvsc
Links to More Info: BT2186009
Component: TMOS
Symptoms:
In some environments, during periods of high traffic, messages could build up in the TX internal queue due to xnet-DPDK being slow to inform that messages were sent. If this goes for long enough, the internal queue will fill up and become stuck.
Conditions:
1) Using xnet-DPDK driver
2) Azure or Hyper-V
3) Sustained high (multi-GB/s) traffic rate
Impact:
Internal queue gets stuck preventing BIG-IP from being able to send messages and causing traffic disruption.
Workaround:
Create '/config/tmm_init.tcl' and add the following line
ndal tx_iq_sz 1024 f5f5:f550
Afterwards, restart tmm with 'bigstart restart tmm' to apply change.
Fix:
Increased default size of TX IQ when netvsc driver is being used
Fixed Versions:
21.1.0
2185833 : VLAN Modification and Transition Between Q-in-Q and Non-Q-in-Q Configurations failed
Component: Local Traffic Manager
Symptoms:
Direct switching between Non-QinQ and QinQ modes, or vice versa, is not permitted. The configuration will not be applied to the tenant, and the attempt will be rejected, leaving the previous configuration intact on the tenant.
Conditions:
The following steps are required to switch between QinQ and Non-QinQ:
-- Remove the VLAN from the F5OS UI
-- Delete all tenant vlans configurations (tmsh delete net vlan all)
-- Apply a fresh configuration with the required type (Q-in-Q or Non-Q-in-Q)
Impact:
VLAN Modification and Transition Between Q-in-Q and Non-Q-in-Q Configurations failed
Workaround:
The following steps are required to switch between QinQ and Non-QinQ:
-- Remove the VLAN from the F5OS UI
-- Delete all tenant vlans configurations (tmsh delete net vlan all)
-- Apply a fresh configuration with the required type (Q-in-Q or Non-Q-in-Q)
Fix:
Added proper validation and proper steps to do switching between Non-QinQ and QinQ modes
Fixed Versions:
21.1.0
2185829 : VLAN Modification and Transition Between Q-in-Q and Non-Q-in-Q Configurations failed
Component: Local Traffic Manager
Symptoms:
Direct switching between Non-QinQ and QinQ modes, and QinQ to Non-QinQ modes, is not allowed. The configuration will not be applied to the tenant, and the change will be rejected, retaining the previous configuration on the tenant side.
Conditions:
The following steps are required to switch between QinQ and Non-QinQ:
-- Remove the VLAN from the F5OS UI
-- Delete all tenant vlans configurations (tmsh delete net vlan all)
-- Apply a fresh configuration with the required type (Q-in-Q or Non-Q-in-Q)
Impact:
VLAN Modification and Transition Between Q-in-Q and Non-Q-in-Q Configurations failed
Workaround:
Below steps are required to switching between QinQ and Non-QinQ:
-- Remove the VLAN from the F5OS UI
-- Delete all tenant vlans configurations (tmsh delete net vlan all)
-- Apply a fresh configuration with the required type (Q-in-Q or Non-Q-in-Q)
Fix:
Added proper validation and proper steps to do switching between Non-QinQ and QinQ modes
Fixed Versions:
21.1.0
2185485 : The value of /proc/sys/vm/min_free_kbytes might be too big on Hyper-V and Azure VEs with multiple cores and multiple NICs★
Links to More Info: BT2185485
Component: TMOS
Symptoms:
After a software upgrade to one of the affected versions, the value of /proc/sys/vm/min_free_kbytes might too big on Hyper-V and Azure VEs with multiple cores and multiple NICs.
This can prevent the Virtual Edition from booting into the new software volume installed with one of the affected versions.
Conditions:
BIG-IP VE running on Hyper-V hypervisor or on Azure with:
- more than 4 cores and more than 4 NICs configured
- 16GB of RAM or less allocated
Attempt to upgrade to one of the affected versions.
Impact:
After an upgrade to one of the affected versions, the BIG-IP VE boot process hangs, or the VE takes hours to boot into the new volume and is so slow to result unusable.
Workaround:
There are two possible workarounds:
(1)
Before booting into the new volume, shutdown the VE and increase the total allocated RAM to 32GB.
(2)
- Install the new software volume.
- Take note of the current value <KBYTES> of /proc/sys/vm/min_free_kbyte :
# cat /proc/sys/vm/min_free_kbyte
- Before rebooting into the new software volume, mount the "vg--db--vda-set.<N>.root" disk volume on a temporary directory, where <N> is the number of the new volume after the dot.
E.G.: if the new volume is "HD1.2", then <N> is 2.
# mkdir /mnt/temp
# mount /dev/mapper/vg--db--vda-set.<N>.root /mnt/temp/
- Edit the /etc/rc.sysinit.f5 file:
# vi /mnt/temp/etc/rc.sysinit.f5
- Replace this line:
echo $VADC_MIN_FREE_KB > /proc/sys/vm/min_free_kbytes
with this line (use the <KBYTES> value noted before):
echo <KBYTES> > /proc/sys/vm/min_free_kbytes
- Unmount the disk volume:
# umount /mnt/temp/
- Reboot into the new software volume
Fixed Versions:
21.1.0
2185281 : Per-request policy variable assignment of perflow.category_lookup.result.primarycategory may lead to crash
Links to More Info: BT2185281
Component: Access Policy Manager
Symptoms:
Assigning a wrong value longer than 4096 to perflow.category_lookup.result.primarycategory may lead to a TMM crash.
Conditions:
-- Per-request policy
-- Assign the value of an incompatible variable to perflow.category_lookup.result.primarycategory
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Do not assign values that are not supposed to be category id to perflow.category_lookup.result.primarycategory.
If such value is assigned change variable assign to correct one.
Fixed Versions:
21.1.0
2185109 : High memory usage in REST query for ASM policies and virtualServers with huge L7 policy
Component: Application Security Manager
Symptoms:
A REST query for ASM policies with associated Virtual Servers fails and causes the ASM-config daemon process to consume massive amounts of memory. This only occurs if there is a large LTM policy on the system with many ASM policy associations.
Conditions:
There is a large LTM policy on the system with many ASM policy associations, and a REST query for ASM policies with associated Virtual Servers is issued.
Impact:
The REST query fails and causes the ASM-config daemon process to consume massive amounts of memory.
Fix:
ASM policies with Virtual Server associations can be successfully retrieved in REST.
Fixed Versions:
21.1.0
2184897-3 : Tenant disk size modification is ineffective for var/log folder
Links to More Info: BT2184897
Component: TMOS
Symptoms:
Due to insufficient free disk space on the VM, the /var/log resize operation could not be applied on reboot.
Conditions:
When available disk space on the VM is insufficient for the requested directory resizing.
Impact:
You will not know if resizing will succeed/fail ahead of time.
Workaround:
Manually calculate and allocate disk space within the range of available disk space.
Fix:
Improved validation has been added for directory resize operations. If the available disk space is less than the requested size, the command now fails immediately with a clear error message, allowing users to identify resize issues at the time of requesting.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.3, 17.1.3.1
2183705 : Improper access control on SMTP
Links to More Info: K000156643, BT2183705
Component: Application Visibility and Reporting
Symptoms:
Security best practices are not being followed for SMTP in BIGIP.
Conditions:
NA
Impact:
Unexpected behaviour
Fix:
Security best practices are being followed.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2183353 : TMM Intel E810 VF driver updates the link state with 1 second delay
Links to More Info: BT2183353
Component: Local Traffic Manager
Symptoms:
TMM gets the old link state from the driver level. It leads to 1 second delay for the link state change.
The problem may also create link flapping messages in /var/log/ltm for the same interface in some conditions:
Sep 17 15:02:22 notice mcpd[7553]: 01b5004a:5: Link: 1.8 is UP
Sep 17 15:02:22 notice mcpd[7553]: 01b5004a:5: Link: 1.2 is UP
Sep 17 15:02:22 notice mcpd[7553]: 01b5004a:5: Link: 1.8 is DOWN
Sep 17 15:02:22 notice mcpd[7553]: 01b5004a:5: Link: 1.2 is DOWN
Sep 17 15:02:22 notice mcpd[7553]: 01b5004a:5: Link: 1.8 is UP
Conditions:
- The interface link state is changed.
- Multiple VFs of the same physical interface are attached to BIG-IP VE.
Impact:
Link state is updated with a delay.
Workaround:
None
Fix:
TMM correctly get the link state from the driver layer.
Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1
2183241 : Trunk egress traffic is not balanced on some platforms.
Links to More Info: BT2183241
Component: TMOS
Symptoms:
Trunk egress traffic (out) distribution might not be balanced on the following platforms:
- C117 iSeries i2000
- C117 iSeries i850 (Japan)
- C115 iSeries i4000
Conditions:
- Trunk configured.
- Platform on the affected list:
C117 iSeries i2000
C117 iSeries i850 (Japan)
C115 iSeries i4000
Impact:
Trunk egress (out) traffic is not balanced.
Workaround:
None
Fixed Versions:
21.1.0
2183233 : TMM crash due to extra trailing CR/LF in iSession reconnects
Links to More Info: BT2183233
Component: Access Policy Manager
Symptoms:
On BIG-IP APM systems, a Traffic Management Microkernel (TMM) crash may occur when a client device sends an extra trailing carriage return/line feed (CR/LF) during an iSession tunnel reconnect. This issue was observed to be triggered by a specific client device and user scenario, where the Edge Client installation was a hybrid of multiple versions, resulting in the transmission of unexpected CR/LF characters after the iSession request.
Conditions:
iSession tunnels in use.
Client device sends an extra CR/LF after the iSession request, often due to a hybrid or corrupted Edge Client installation.
Impact:
Traffic disrupted while tmm restarts.
Disruption of user sessions.
The issue is highly specific to certain client configurations and is not expected to be widespread.
Workaround:
None.
Fix:
The fix addresses the scenario where the HTTP filter does not unpause ingress when moving to passthrough mode, and iSession/VPN filters may mishandle unexpected CR/LF data.
The fix ensures that extra CR/LF data does not cause the TMM to crash during iSession reconnects.
Engineering Hotfixes (EHF) are available for 17.1.3 (including rollup with EHF 0.20.11).
Fixed Versions:
21.1.0
2182357 : Inconsistent Default Source Address Selection for Virtual Server Between POST and PUT Requests
Component: TMOS
Symptoms:
When a PUT request is made without specifying a source address, the system defaults to an IPv6 address (::). If the destination address is IPv4, this causes a validation error due to the mismatch between the source and destination address types.
Conditions:
A PUT request issued without a source address, having the destination address IPv4
The system attempts to apply a default IPv6 source address
Impact:
The request fails with an address type mismatch error, requiring users to specify a compatible source address. This inconsistency between POST and PUT operations may cause confusion for users.
Workaround:
Explicitly specify a source address that matches the type (IPv4 or IPv6) of the destination address in the request payload.
Fix:
The behavior of PUT requests has been updated to match that of POST requests. If a source address is not specified, the system now selects an appropriate default (IPv4 or IPv6) based on the destination address, ensuring consistency and avoiding address type mismatch errors.
Fixed Versions:
21.1.0
2182061 : Management routes not installed on reboots when interface route is recursively required.
Links to More Info: BT2182061
Component: TMOS
Symptoms:
Management routes might not be installed on reboots or config loads when interface route is recursively required.
Conditions:
Have an interface mgmt route, similar to:
sys management-route /Common/mgmt_gw {
network 10.10.10.10/32
type interface
}
And a mgmt route that uses a hop defined by an interface route:
sys management-route r1{
gateway 10.10.10.10
network 10.10.20.1/32
}
Impact:
Some management routes are not installed properly post reboot or config load.
Workaround:
None
Fixed Versions:
21.1.0
2182045 : The iavf driver might drop some IPv6 packets that contain destination option or routing type 2 headers
Links to More Info: BT2182045
Component: Local Traffic Manager
Symptoms:
Some IPv6 packets that contain a destination option header and/or a routing type 2 header are processed by the BIG-IP.
A tcpdump on the BIG-IP does not show the packets.
The tmm/xnet_rx_stats:cd_empty stat is incremented
The tmm/xnet/iavf/per_q_stats:rx_sw_drop might be incremented.
Conditions:
A platform that utilizes the iavf driver:
R2800
R4800
VE with SR-IOV with an Intel 810 NIC
IPv6 traffic is sent to the BIG-IP that contains a destination option or routing type 2 header.
Impact:
Packets are dropped and not processed.
Workaround:
None
Fixed Versions:
21.1.0, 17.1.3.1
2179729 : MCPD memory leaks during repetitive configuration create/modify/delete cycles combined with ongoing config-sync activity.
Links to More Info: BT2179729
Component: TMOS
Symptoms:
The eXtremeDB configuration database grows continuously over time in long‑duration testing, even when objects are deleted.
Conditions:
-- Long duration run with create, modify, delete configuration objects.
-- High Availability (HA) enabled
Impact:
MCPD memory becomes very large on lab HA devices.
Workaround:
None
Fixed Versions:
21.1.0, 21.0.0.1
2173429 : Digest and NTLM Authorizations Not Functioning
Component: Application Security Manager
Symptoms:
-- Bruteforce violations are not raised for NTLM or Digest authorization types.
Conditions:
-- Bruteforce with NTLM or Digest authorization enabled
Impact:
-- Bruteforce enforcement is not happening for Digest and NTLM Authorization types
Workaround:
None
Fix:
Digest and NTLM authorizations work as expected
Fixed Versions:
21.1.0
2172069 : GTM topology regions updates do not take effect within tmm
Links to More Info: BT2172069
Component: Global Traffic Manager (DNS)
Symptoms:
GTM topology regions updates do not take effect within tmm
Conditions:
Modifications made to gtm topology regions do not take effect when only one client is sending queries. Note that this issue is tmm-thread specific, meaning one or more tmm threads can get into this state, as long as DNS queries keep hitting the same tmm thread(s), coming from the same source IP address(es)
This is a very unlikely scenario in most production environments, and is likely to only be seen during lab testing with client traffic from one or few IP addresses.
Impact:
GTM not answering with latest GTM topology region updates.
Workaround:
Restart tmm, or perform the DNS lookup from a different client IP address (not the same address that the affected tmm thread previously processed a topology-based DNS query from)
Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1
2172041 : Zone transfer fails for dnsx when the zone file contains TLSA records
Links to More Info: BT2172041
Component: Global Traffic Manager (DNS)
Symptoms:
Dns express zone transfer fails.
Conditions:
Zone containing TLSA records.
Impact:
Zone not able to be transferred to dns express.
Workaround:
None
Fixed Versions:
21.1.0
2171845 : Manual Sync in Sync-Failover device group may result in differences in attached Logging Profiles on virtual server
Links to More Info: BT2171845
Component: TMOS
Symptoms:
Devices show "In Sync" but have different logging profiles attached to the same Virtual Server.
Conditions:
- Manual with Incremental sync or Manual with Full sync in sync and overwrite scenario
Impact:
Discrepancy in attached logging profiles on the Virtual Server across HA devices.
Workaround:
Manually align logging profiles
Fixed Versions:
21.1.0
2163777-1 : Tmm core on fw_nat_classify() while nat rule configuration is being changed
Links to More Info: BT2163777
Component: Advanced Firewall Manager
Symptoms:
TMM may crash with a segmentation fault in fw_nat_classify() during NAT rule configuration changes, causing service disruption.
Conditions:
Occurs during NAT rule delete configuration modification
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fixed Versions:
21.1.0
2163585 : Migration fails "Spanning Tree Protocol (STP) is not supported on this platform"
Links to More Info: BT2163585
Component: TMOS
Symptoms:
Migration fails due to "Spanning Tree Protocol (STP) is not supported on this platform".
STP is a configuration for physical interfaces; F5OS tenants use interfaces/vlans defined in the F5OS underlying operating system.
Conditions:
migration to F5OS tenant from bare-metal BIG-IP with STP configured (e.g. from iSeries bare-metal to F5OS tenant).
Impact:
migration fails with:
010713d0:3: Symmetric Unit Key decrypt failure - decrypt failure
Unexpected Error: Loading configuration process failed.
/var/log/ltm shows:
Dec 2 13:55:11 localhost.localdomain err mcpd[7147]: 010713d0:3: Symmetric Unit Key decrypt failure - decrypt failure
...
Dec 2 13:55:14 localhost. localdomain err mcpd[7147]: 01070686:3: Spanning Tree Protocol (STP) is not supported on this platform.
Dec 2 13:55:14 localhost.localdomain err tmsh[20673]: 01420006:3: Loading configuration process failed.
Dec 2 13:55:14 localhost.localdomain emerg load_config_files[20656]: "/usr/bin/tmsh -n -g -a load sys config partitions all platform-migrate" - failed. -- Loading schema version: <BIG-IP-version>
Workaround:
Modify the "net stp-globals" object to not contain "mode" stp/mstp/rstp
Fix:
STP configuration is removed during the migration to F5OS tenant.
Fixed Versions:
21.1.0, 21.0.0.1
2163545 : Bot Defense profile does not support js tag injection for compressed html pages.
Component: Bot Defense
Symptoms:
Bot defense Javascript injection does not occur if the HTML pages are compressed.
Conditions:
Virtual server is configured with a bot defense profile. Virtual server serving content from a backend server that serves compressed html pages.
Impact:
Compressed html page is sent to the client without the injected Javascript. As a result, Bot Defense checks are not performed for sessions that serve compressed HTML pages from the backend server.
Workaround:
None
Fixed Versions:
21.1.0
2163321 : Broken Address List hyperlink in the destination field of Virtual Server list
Links to More Info: BT2163321
Component: TMOS
Symptoms:
Clicking on the Address List hyperlink in the destination field of Virtual Server list directs the user to a Create new address list page instead of the expected address list page
Conditions:
1) A Virtual Server is set up with an address list
2) User clicks on the address list hyperlink in the Virtual Server list
Impact:
Hyperlink takes you to the wrong page.
Workaround:
None
Fixed Versions:
21.1.0, 17.5.1.4
2162941-2 : Support MDM with GCC High / DoD Environments
Links to More Info: BT2162941
Component: Access Policy Manager
Symptoms:
Endpoint Management Systems for Intune communicate only with commercial Intune endpoints. Now MDM needs to be integrated with Microsoft GCC High and DoD environments.
Conditions:
When MDM needs to be integrated with the Microsoft GCC High and DoD environment
Impact:
User may not be able to use Microsoft GCC High and DoD environments because of non-configurable Graph and Auth URLs in APM.
Workaround:
None
Fix:
User should have configurable options for Microsoft Graph and Auth URLs.
Fixed Versions:
21.1.0
2162937-1 : TMM crash when AFM is enabled
Links to More Info: BT2162937
Component: Advanced Firewall Manager
Symptoms:
The BIG-IP system experiences repeated TMM crashes when handling DNS DoS traffic.
Conditions:
This issue occurs on BIG-IP AFM version 21.0.0 with DNS DoS
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fix:
Handled malformed packets.
Fixed Versions:
21.1.0, 21.0.0.1
2162905 : AFM GUI does not display Port List members in Properties panel
Links to More Info: BT2162905
Component: Advanced Firewall Manager
Symptoms:
AFM GUI fails to display port-list members in the Properties pane
Conditions:
Occurs when viewing any Port List object in the AFM Policy Editor GUI
Impact:
Administrators cannot visually verify port-list contents in the GUI
Workaround:
Tmsh list security firewall port-list <port_list_name>
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4
2162861 : 'Connectors' creation screen does not appear
Links to More Info: BT2162861
Component: Access Policy Manager
Symptoms:
When you click Access > Authentication from the WebUI, select AAA Server By Type > Connectors & Configurations from the pull-down menu, and click the Create button, the creation screen does not appear.
Conditions:
Connectors & Configurations from AAA Server by Type
Impact:
Creation screen does not appear.
Workaround:
None
Fixed Versions:
21.1.0
2162849-3 : Removing the active controller does not trigger an immediate tenant failover
Links to More Info: BT2162849
Component: TMOS
Symptoms:
When a system controller is removed from a VELOS chassis, any Active BIG-IP tenants running from that controller do not automatically fail over.
Conditions:
-- BIG-IP Tenant is active for a traffic group
-- The BIG-IP tenant is running on a controller that is active for the partition on which the tenant is running
-- The Active system controller is removed or powered off using AOM
Impact:
Tenant failover is delayed by up to 4 minutes when an active system controller of the active tenant is pulled out .
Workaround:
None
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4
2162801-1 : MCP hung during shutdown when any exception/ abnormal restart while booting up
Links to More Info: BT2162801
Component: TMOS
Symptoms:
The MCP would hang during shutdown if any exceptions or abnormal restarts occurred while booting up.
Conditions:
Rarely getting this, so there is no specific scenario
Impact:
MCPD will not be up and running
Workaround:
MCPD restart
Fix:
Make sure it kills the proper PID while rebooting.
Fixed Versions:
21.1.0, 21.0.0.1
2162705 : Tmm restarting on multi-NUMA AWS instances with ENA interfaces★
Links to More Info: BT2162705
Component: Local Traffic Manager
Symptoms:
Tmm is in the restart loop because dpdk driver is failing to attach with the error message in tmm log:
notice dpdk: [0000:00:06.0]: Multiple NUMA nodes usage is unsupported.
Conditions:
- BIG-IP VE large instance deployed on AWS cloud.
- NUMA node count more than 1 (check "lscpu | grep NUMA").
Impact:
Unable to use dpdk driver on some large AWS instances.
Workaround:
Switch to sock driver: https://my.f5.com/manage/s/article/K10142141
Fix:
DPDK correctly initializes the memory on multi-NUMA AWS instances.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4
2162589 : BD crash with a specific configuration
Component: Application Security Manager
Symptoms:
BD daemon crash and restart
Conditions:
Navigation parameter is configured
Impact:
traffic disturbance, failover.
Workaround:
Remove navigation parameter from the configuration.
Fix:
BD working properly.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2162573 : Per Cache setting to turn off QNAME minimization
Component: Global Traffic Manager (DNS)
Symptoms:
QNAME minimization is turned on by default in BIGIP (RFC 7816: DNS Query Name Minimisation to Improve Privacy).
BIGIP now provides the ability to turn it off.
Conditions:
NA
Impact:
NA
Workaround:
Not a defect but an improvement.
Fix:
BIGIP provides a setting to turn off QNAME minimization
Fixed Versions:
21.1.0
2162189 : "Live Update" reinstalls the genesis ASU file, while the latest ASU file is installed manually★
Links to More Info: BT2162189
Component: Application Security Manager
Symptoms:
When operating in automatic mode, Live Update installs the genesis Automatic Signature Update (ASU) file instead of the manually installed latest ASU file.
Conditions:
Live Update is operating in automatic mode, there are only 2 installations in ASU files installations list, one is genesis file and another is latest ASU file that was published on ESDM.
Impact:
BIG-IP will not install the latest signatures.
Workaround:
Live Update should be switched to manual mode. The latest ASU file should be installed manually again instead of the genesis ASU file. When the newer ASU file is available on ESDM, do not install it manually, but switch Live Update to automatic mode again.
Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1
2161077-1 : Bot profile properties page does not load when there are large number of SSL certs (> 1000)
Links to More Info: BT2161077
Component: TMOS
Symptoms:
When a large number of SSL certs are present, the Bot Defense profile properties page (Security > Bot Defense > Bot Profile Properties) does not load correctly
Conditions:
- ASM is provisioned
- SSL cert count > 1000
Impact:
Bot Defense profile properties page does not load
Workaround:
Use tmsh to manage the Bot profiles.
Fix:
Increase restjavad memory to 1.3GB after applying the fix and restart restjavad
> tmsh modify sys db provision.restjavad.extramb value 1280
> bigstart restart restjavad
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2161073 : Certificate Bundle Improvement
Component: Local Traffic Manager
Symptoms:
Certificate Bundle is not following best practices
Conditions:
NA
Impact:
Can lead to unexpected behaviour.
Workaround:
No workaround.
Fix:
Certificate bundle is now following best practices
Fixed Versions:
21.1.0
2154057 : MCPD validations not throwing error when snmpv3 password contains more than 77 characters★
Links to More Info: BT2154057
Component: TMOS
Symptoms:
After upgrading, mcpd goes into a restart loop. /var/log/ltm contains the following:
err mcpd[13691]: 0107102b:3: Master Key decrypt failure - decrypt failure - final
notice mcpd[13691]: 01071029:5: Master decrypt final
notice mcpd[13691]: 01071027:5: Master key OpenSSL error: 4006860532:error:0606506D:digital envelope routines:EVP_DecryptFinal_ex:wrong final block length:evp_enc.c:653:
notice mcpd[13691]: 01b00001:5: Processed value is empty: class name (usmuser) field name ()
err mcpd[13691]: 01071684:3: Unable to encrypt application variable (/Common/snmpv3user auth_password usmuser /Common/snmpd).
Conditions:
-- SNMPv3 configuration that uses a password containing more than 77 characters
-- An upgrade is performed
This also occurs within a release by saving the config and then forcing a load from text files (`touch /service/mcpd/forceload && pkill mcpd`)
This may also occur with auth-password or privacy-password values that are 78 characters in length or longer
Impact:
- SNMP configuration does not function.
- If the device is rebooted or MCPD is restarted, the system will remain INOPERATIVE or MCPD will be in a restart loop.
Workaround:
If a device is currently in an inoperative state and affected by this issue:
- Create a backup copy of /config/bigip_base.conf
- Manually edit bigip_base.conf and remove the SNMPv3 users and traps
- If the system does not recover automatically, restart MCPD or reboot the device once.
Fixed Versions:
21.1.0
2154005 : Importing iApp RPM may not provide a message about already installed, upgrading, or downgrading.
Links to More Info: BT2154005
Component: iApp Technology
Symptoms:
No warning messages appear when importing an RPM for an iApp Package already installed.
Conditions:
Multiple different iApp RPMs are installed, and trying to import an RPM for one of them.
Impact:
User is not presented with warning messages about the RPM:
-- Already Installed
-- Upgrading the RPM
-- Downgrading the RPM
Workaround:
Previously, the JavaScript code tracked only the most recently installed package when comparing against the current package, ignoring older packages. This issue has been fixed by adding support to track all packages.
Fix:
Previously, the JavaScript code tracked only the most recently installed package when comparing against the current package, ignoring older packages. This issue has been fixed by adding support to track all packages.
Fixed Versions:
21.1.0
2154001 : Virtual server statistics dashboard "Requests" column does not increment when http2 MRF option is in use
Links to More Info: BT2154001
Component: Local Traffic Manager
Symptoms:
When running tmsh show ltm virtual, it shows
Total Requests=0 even when there is traffic to the virtual server.
Conditions:
Http2 MRF enabled per
https://techdocs.f5.com/kb/en-us/products/big-ip_ltm/manuals/product/big-ip-http2-full-proxy-configuration-14-1-0/01.html
Impact:
Virtual server stats not reflecting reality
Workaround:
None
Fixed Versions:
21.1.0
2153893 : With DNS64 configured, resolution aborts early on the first error response without trying other name servers.
Links to More Info: BT2153893
Component: Global Traffic Manager (DNS)
Symptoms:
When multiple name servers for a zone are known, as soon as one name server responds with an error rcode, resolution is aborted and other name server are not tried.
Conditions:
-- DNS64 is configured.
-- More than one name server is configured for a zone.
-- One name server responds with an error rcode.
Impact:
DNS resolution will intermittently fail. DNS resolution will succeed only if the cache randomly selects a working name server to contact first.
Workaround:
Disable DNS64.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2153489 : MCPD crash in FolderMgr::validate_deleted_folder_queue due to race condition clearing folder_delete_queue mid-iteration (v21)
Links to More Info: BT2153489
Component: TMOS
Symptoms:
-- System crashes with a segmentation fault during folder deletion operations.
-- Core dump observed in FolderMgr::validate_deleted_folder_queue.
Conditions:
Concurrent Operations
Thread 1 is performing a folder deletion and iterating over folder_delete_queue in FolderMgr::validate_deleted_folder_queue.
Thread 2 is processing a virtual server query and calls AuthZ::current_context (setter), which invokes FolderMgr::reset_deleted_folder_queue().
Impact:
Traffic and management disrupted while mcpd restarts.
Workaround:
None
Fixed Versions:
21.1.0, 21.0.0.1
2153425-1 : MCPD worker core
Links to More Info: BT2153425
Component: TMOS
Symptoms:
MCPD worker core due to a possible double free.
Conditions:
While the main thread is processing the folders, the worker is processing the query and, in doing so, sets the context, which resets the delete folder queue as well. This causes the main thread to access an empty queue and could lead to a crash.
Impact:
MCPD core
Fix:
Make sure the worker is not going to delete folders while handling the folder context
Fixed Versions:
21.1.0, 21.0.0.1
2152877 : Exclude /opt/CrowdStrike directory from Integrity Test
Links to More Info: BT2152877
Component: TMOS
Symptoms:
CrowdStrike directory needs to be excluded from Integrity Test
Conditions:
CrowdStrike directory not present in Integrity Test exception list
Impact:
System integrity fails after Crowdstrike installation via falcon sensor
Workaround:
None
Fix:
CrowdStrike directory added Integrity Test exclusion
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2152785 : TMM may crash under certain conditions.
Component: Local Traffic Manager
Symptoms:
TMM crashes when HTTP/2 traffic
Conditions:
When HTTP/2 profile is configured on TMM.
Impact:
Traffic is disrupted
Workaround:
Add http router to the virtual, converting to HTTP/2 Full Proxy mode from HTTP/2 Gateway mode.
Fix:
TMM handling HTTP/2 traffic properly
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2152689 : ASM GUI "Failed to load requests" pop-up
Links to More Info: BT2152689
Component: Application Security Manager
Symptoms:
A "Failed to load requests" pop-up appears on the page.
REST framework responds with:
{"code":400,"message":"A valid filename must be supplied"}
This is visible in the log of the web browser's interaction with the BIG-IP UI (.har file).
Conditions:
A user with username that contains a slash i.e. "my\name"
clicking
on Security -> Event Logs -> Application -> Requests
or Security -> Event Logs -> Bot Defense -> Bot Requests
Impact:
Can't view request details
Workaround:
Do not use '/' in the username
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2152601-1 : Repeated restarts of the MCPD service result in a continuous restart loop accompanied by error messages: An unexpected failure has occurred, MCO_ERR_EV_SYN - Synchronous events
Links to More Info: BT2152601
Component: TMOS
Symptoms:
Continuous restart of MCPD accompanied by error messages: An unexpected failure has occurred, MCO_ERR_EV_SYN - Synchronous events.
Conditions:
This occurs after 10 restarts of MCPD service.
Impact:
BIGIP services are impacted as MCPD is down.
Workaround:
Reboot device.
Fix:
This issue is fixed by cleaning up the resource during every MCPD restart.
Fixed Versions:
21.1.0, 21.0.0.1
2152545-1 : [APM][SAML] High TMM memory sso_saml leak
Links to More Info: BT2152545
Component: Access Policy Manager
Symptoms:
Tmm crashes due to out of memory while passing SAML-SSO traffic
Conditions:
-- Configure a BIG-IP as SAML-SP with ACS binding.
-- Configure SSO for IDP.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fixed Versions:
21.1.0
2152445 : "Live Update" API is unresponsive after upgrade and recover only after tomcat restart★
Links to More Info: BT2152445
Component: Application Security Manager
Symptoms:
After upgrading BIG-IP, the Live Update GUI displays an empty installation list. Errors are logged in the Tomcat log file. When attempting to refresh the Live Update page, additional errors appear in the Live Update log file.
Conditions:
"Live Update" has very long list of installations of ASU files.
Impact:
After the upgrade, BIG-IP retains the latest signatures that were present before the upgrade. The Live Update feature becomes non-functional until it is restarted.
Workaround:
Before upgrading, shorten ASU file installations by removing old entries. This helps prevent issues. If a problem occurs, restart the Live Update system.
Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1
2152397 : BIG-IP support for f5optics packages built after October 2025★
Component: TMOS
Symptoms:
-- F5optics v1.0.0 packages released in November 2025 (build 66.0) or later cannot be installed on BIG-IP or BIG-IQ versions released during November 2025 or earlier.
-- If F5optics v1.0.0 packages prior to build 67.0 (January 2026) are included in an Engineering Hotfix, the F5optics v1.0.0 package will not be upgraded successfully.
Conditions:
This may occur under the following conditions:
-- Attempting to install an updated f5optics v1.0.0 package build 66.0 (November 2025) or later, on a BIG-IP or BIG-IQ version released November 2025 or earlier.
-- Installing an Engineering Hotfix containing F5optics v1.0.0 package build 66.0 or earlier.
Impact:
-- You cannot install the latest f5optics v1.0.0 package.
-- You may not be able to update the f5optics v1.0.0 package when included in an Engineering Hotfix.
Workaround:
None
Fix:
F5optics v1.0.0 packages released in November 2025 (build 66.0) or later can now be successfully installed.
F5optics v1.0.0 packages released in January 2026 (build 67.0) or later can now be successfully installed via an Engineering Hotfix.
Behavior Change:
BIG-IP and BIG-IQ releases with this fix will not allow installation of f5optics v1.0.0 packages prior to build 66.0.
Fixed Versions:
21.1.0
2152301-1 : After upgrading from version 17.1.2 to 17.5.1.3, the guest-role user is unable to run the command show running-config in TMSH.★
Links to More Info: BT2152301
Component: TMOS
Symptoms:
Guest-role user is unable to run the command show running-config in TMSH.
Executing this command from TMSH results in an error:
"Unexpected Error: Can't display all items, can't get object count from mcpd"
MCPD throws error:
result_message "01070823:3: Read Access Denied: user (myguest) type (HPKE Key)"
Conditions:
Except for all these 4 user roles, all the other user roles (operator, cert manager, app editor...etc) hit the same error.
- admin
- resource-admin
- log-manager
- auditor
Impact:
Unable to show the running config, or use list or list sys commands.
Workaround:
Login with an account with admin access.
Fixed Versions:
21.1.0, 17.5.1.4
2152269 : Low reputation URIs are found in the URL DB binary
Links to More Info: BT2152269
Component: Access Policy Manager
Symptoms:
Publishing BIG-IQ image to Azure cloud is blocked due to malware scan detecting these low reputed URLs.
Conditions:
When uploading the image on Azure Cloud and these low reputed URLs are detected in malware scanners.
Impact:
No impact on the functionality
Workaround:
None.
Fix:
Low reputation URIs such as che168, cssplay, newliveplayer, tinypic.info referring test code are removed from the product.
Fixed Versions:
21.1.0, 21.0.0.1, 21.0.0, 17.5.1.4, 17.1.3.1
2152137 : New DB variable ve.ndal.driver.netvsc to provide driver selection for Azure/HyperV deployments
Component: TMOS
Symptoms:
Starting v17.5.0, data-plane interfaces in BIG-IP VE deployed in HyperV or Azure automatically use the high-speed, user-space "dpdk" as the default driver.
Conditions:
BIG-IP VE deployments on Microsoft Azure or HyperV with multiple interfaces.
Impact:
None
Workaround:
No mitigation needed as this is not a bug.
Fix:
The new DB variable ve.ndal.driver.netvsc is introduced to allow to switch the driver back to sock.
To switch to sock driver:
tmsh modify sys db ve.ndal.driver.netvsc value sock && reboot
To switch back to dpdk driver:
tmsh modify sys db ve.ndal.driver.netvsc value dpdk && reboot
Fixed Versions:
21.1.0
2151885 : When using service-down-action reset/drop on a pool attached to a DHCP virtual TMM might experience a crash.
Links to More Info: BT2151885
Component: Local Traffic Manager
Symptoms:
When using service-down-action reset/drop on a pool attached to a DHCP virtual TMM might experience a crash.
Conditions:
DCHP virtual-server with a pool member using service-down-action feature set to 'reject' or 'drop'.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Re-configure service-down-action on a pool member to 'none'.
Fixed Versions:
21.1.0
2151785 : Importing iApp RPM may provide an incorrect downgrading warning message
Links to More Info: BT2151785
Component: iApp Technology
Symptoms:
When importing an iApp RPM, the following warning is shown:
"You are downgrading an iApp package"
Conditions:
Have a an RPM with a version or release that contains a single digit number, and trying upgrade to a newer RPM with a version or release that contains a double digit number.
Impact:
User is presented with a misleading message that the iApp is going to be downgraded.
Workaround:
While the message indicates the iApp is being downgraded, this is misleading and the iApp can still be upgraded.
Fixed Versions:
21.1.0
2151505 : Cmp_dest_velos is automatically installed on system startup.
Links to More Info: BT2151505
Component: TMOS
Symptoms:
/var/run/cmp_dest_velos is automatically installed on tenant startup.
You no longer need to download it from the host containers.
Conditions:
A need to use the VELOS version of the cmp_dest utility.
Impact:
Previously, the cmp_dest utility had to be manually downloaded from the host containers.
Workaround:
Manually download cmp_dest from the host containers.
Fix:
/var/run/cmp_dest_velos is now automatically installed on tenant startup.
Fixed Versions:
21.1.0
2151173 : Starting this release, file uploads that include the percent sign (%) in the filename will be rejected by server-side validation.
Links to More Info: BT2151173
Component: TMOS
Symptoms:
The percent character is reserved for URL encoding and can potentially introduce decoding-related issues. Rejecting '%' in filenames reduces this risk and improves the security of file handling.
Conditions:
Filename with % (URL encoded as %25)
Impact:
Uploads that include '%' in the filename will fail with a validation error.
Workaround:
Rename files to remove or replace '%' before uploading.
Fix:
Upload attempts with a '%' in the filename will return a validation error and the file will not be accepted.
Fixed Versions:
21.1.0
2150669 : TCP Packet loss after upgrade with AFM provisisoned★
Links to More Info: BT2150669
Component: Advanced Firewall Manager
Symptoms:
After an upgrade, disabled hardware DOS vectors may use old values.
Conditions:
-- F5OS tenant
-- Upgrade
-- AFM provisioned
Impact:
DOS thresholds may be incorrectly set or set too low resulting in packet loss that causes poor throughput.
Workaround:
Disable and re-enable the disabled DOS vectors.
Log into the BIG-IP GUI and navigate to
Security ›› DoS Protection : Device Protection
Filter attack vectors: tcp
click the "Network" text
Enable all the disabled vectors by clicking on the vector name and changing state from "disabled" to "mitigate".
Then disable the vectors by clicking on the vector name and changing state from "mitigate" to "disabled".
Fixed Versions:
21.1.0
2150525 : Improvements in iControl SOAP
Component: TMOS
Symptoms:
Security best practices were not being followed in iControl SOAP.
Conditions:
NA
Impact:
Can lead to unexpected behaviour.
Workaround:
NA
Fix:
iControl SOAP now has security best practices.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2150489 : Most DB keys encrypted by SecureVault master key are not persisted to BigDB.dat when the system master key is changed.
Links to More Info: BT2150489
Component: TMOS
Symptoms:
After restarting mcpd, mcpd is stuck in a restart loop.
Conditions:
-- You set a DB variable that's encrypted ( proxy.password, configsync.password)
-- Change the SecureVault master key and save the configuration
Impact:
BIG-IP is in inoperative state , MCPD in a restart loop
Workaround:
If a system is affected by this issue, set the DB key back to its default value. Once the configuration is loaded, set the DB key back to the correct value:
- tmsh modify /sys db config.auditing.forward.sharedsecret value '<null>'
After changing the SecureValue master key but before encountering the issue, run the following command to update the value of the DB key on-disk:
setdb config.auditing.forward.sharedsecret "$(getdb config.auditing.forward.sharedsecret)"
Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1
2149253 : QUIC connection stalls with early data
Links to More Info: BT2149253
Component: Local Traffic Manager
Symptoms:
When QUIC client connect with early data, connection stalled.
Conditions:
Configure virtual server with quic + client-ssl with Data 0-RTT enabled (w/ anti-replay).
QUIC client connects with existing session and early data.
Impact:
Failed QUIC/HTTP3 connections.
Workaround:
Disable client-ssl Data 0-RTT.
Fix:
Release SSL egress data.
Fixed Versions:
21.1.0, 21.0.0.1
2149233 : TMM crashes when using SSL
Component: Local Traffic Manager
Symptoms:
Under certain SSL condition, TMM crashes.
Conditions:
When SSL is configured
Impact:
Traffic is disrupted.
Fix:
TMM working properly now.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2149197 : Rotated Public key used for signature verification of apmclients iso bundle in BIG-IP
Component: Access Policy Manager
Symptoms:
When liveinstall.checksig sys db variable is enabled on the BIG-IP, the automatic installation of apmclients iso image fails.
Conditions:
Starting from apmclients-7262.2025.1203.525-7005.0.iso the automatic installation will fail.
Impact:
Apmclients iso installation fails.
Workaround:
-- Disable ISO Signature Verification
-- Install the desired apmclients iso version
-- Re-enable ISO Signature Verification
Fix:
Apmclients iso installation will be successful.
Fixed Versions:
21.1.0
2144521 : WAF plugin gets incorrect response body when SSE profile is configured on virtual server
Links to More Info: BT2144521
Component: Local Traffic Manager
Symptoms:
When the SSE plugin is enabled, the WAF plugin receives a partial response body.
Conditions:
SSE Profile (Server Sent Events) and WAF plugin enabled on a Virtual Server.
Impact:
WAF plugin sees only part of the ingress stream.
Workaround:
Disable SSE profile on virtual server when WAF plugin is configured.
Fix:
The HUDFILTER order on server side was adjusted to ensure both WAF plugin and SSE HUDFILTER receive the complete response body.
Fixed Versions:
21.1.0, 21.0.0.1
2144513 : Cannot install any BIG-IP version with ISO signature verification enabled★
Links to More Info: BT2144513
Component: TMOS
Symptoms:
On affected versions of BIG-IP, if the BIG-IP software ISO file signature checking feature is enabled, attempting to install any BIG-IP version will fail.
Attempting to install the BIG-IP image using either tmsh or the GUI will result in the following error messages (as shown by the "tmsh show /sys software status" command, or hovering a mouse over the "Failed" Install Status message in the GUI):
failed (Signature verification failed - no sig file found)
Conditions:
This occurs on affected versions if the BIG-IP software ISO file signature checking feature is enabled, as described in the following article:
K15225: Enabling signature verification for BIG-IP and BIG-IQ ISO image files
https://my.f5.com/manage/s/article/K15225
Impact:
It is not possible to install any BIG-IP version with the BIG-IP software ISO file signature checking feature enabled.
Workaround:
To successfully install the desired BIG-IP version in such cases:
1. Disable ISO Signature Verification
2. Install the desired BIG-IP version
3. Re-enable ISO Signature Verification
Fix:
BIG-IP versions released on or after October 2025 can be successfully installed with the BIG-IP software ISO file signature checking feature enabled.
Fixed Versions:
21.1.0, 21.0.0.1
2144497 : Mellanox driver timeouts and packet drops on Azure instances with high NIC count
Links to More Info: BT2144497
Component: TMOS
Symptoms:
On Azure instances with high interface count (6 or more) Mellanox linux kernel driver mlx5_core may fail to initialize the interface or attach it very slow. Another symptom of this problem: packets drops because of timeouts in Mellanox device queue processing.
mlx_core will report multiple errors in the kernel logs (run "dmesg | grep mlx5_core" to display it).
Conditions:
- BIG-IP VE instance deployed in Azure with 6 or more interfaces
- Accelerated networking is enabled
Impact:
- Azure instance starting time may be significant
- SSH access may be unavailable
- Packets drops on dataplane Mellanox interfaces
Workaround:
None
Fix:
Device interrupts are assigned on correct vCPUs in Azure/HyperV environments to prevent Mellanox device timeouts.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2144445 : Insufficient sanitization in TMSH
Component: TMOS
Symptoms:
TMSH is not sanitizing input properly
Conditions:
NA
Impact:
Can cause unexpected behaviour in TMSH
Fix:
TMSH is now properly sanitizing the input.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2144389 : CVE-2025-40780 BIND vulnerability
Links to More Info: K000157948, BT2144389
2144353 : BIND upgrade to stable version 9.18.41
Links to More Info: BT2144353
Component: Global Traffic Manager (DNS)
Symptoms:
BIND upgrade to stable version 9.18.41.
Conditions:
Using local BIND.
Impact:
BIND upgrade to stable version 9.18.41.
Workaround:
None.
Fix:
BIND upgrade to stable version 9.18.41.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2144309 : TMM might experience a crash when using a fix for Bug783077
Links to More Info: BT2144309
Component: Local Traffic Manager
Symptoms:
TMM might experience a crash when using a fix for Bug783077.
Conditions:
- Running a fix Bug783077.
- Performing operations on IPv6 routes that use nexthop over link-local address.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fixed Versions:
21.1.0
2143305 : Tmm crash
Links to More Info: BT2143305
Component: Application Security Manager
Symptoms:
TMM may crash when a policy dynamically disables and re-enables L7 DoS through multiple rules.
Conditions:
-- A policy containing multiple rules that disable and then re-enable L7 DoS is attached to a virtual server.
-- An L7 DoS profile is attached to the same virtual server.
-- The policy rule that re-enables L7 DoS does not specify the from-profile attribute.
-- Traffic passes through tmm.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Modify the policy rules that enable L7 DoS to explicitly include the from-profile attribute referencing the attached DoS profile.
Fix:
Handle policy rules that enable L7 DoS without the from-profile attribute in cases where L7 DoS was previously disabled.
Fixed Versions:
21.1.0, 21.0.0.1
2143177 : Add Drop Action to LTM Policy
Component: Local Traffic Manager
Symptoms:
LTM Policy on TMOS currently has action reset to reset the traffic flow.
Conditions:
NA
Impact:
NA
Workaround:
NA
Fix:
LTM Policy on TMOS currently has action reset to reset the traffic flow. In this release, a new action called Drop is added.
Fixed Versions:
21.1.0
2143165 : Oauth tokens are not shown in UI
Links to More Info: BT2143165
Component: Access Policy Manager
Symptoms:
Oauth tokens are not shown in UI
Conditions:
Access >> Overview >> OAuth Reports >> Tokens
Impact:
Oauth tokens are not visible
Workaround:
Use tmsh to see the Oauth Tokens:
"tmsh list / apm oauth token-details db-instance oauthdb"
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2143101 : SNMP Malfunctioning for IPI BL: Incorrect Statistics Reported
Links to More Info: BT2143101
Component: Advanced Firewall Manager
Symptoms:
The statistics counters retrieved via SNMP and tmctl do not reflect any increments for the corresponding blacklist category, despite packets being dropped and logged as expected.
Conditions:
Blacklist categories populated dynamically via feed lists or automatic updates.
Impact:
Inaccurate stats due to missing statistics.
Workaround:
None.
Fix:
When an IP address is dynamically blacklisted by IP Intelligence (IPI), packets from that source are dropped and logged as expected. The statistics counters for the relevant blacklist category viewed via SNMP or tmctl are also incremented.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2141365 : Certificates fail to load when whitespace characters are present in multi-cert PEM file
Links to More Info: BT2141365
Component: Local Traffic Manager
Symptoms:
When BIG-IP attempts to load a cert file containing 4 certs and one hf the certificates has a CR/LF before the end delimiter, only the certificates prior to the CR/LF are loaded.
Conditions:
-- Certificate file containing more than one certificate
-- One of the certificates is separated by an extra linefeed
Impact:
The BIG-IP system fails to load the subsequent certs when a previous cert has an extra blank line before the end delimiter. This occurs with no errors.
Workaround:
None
Fixed Versions:
21.1.0
2141337 : Auto-upgrade of the BIG-IP APM Edge Client does not upgrade the MachineTunnel Service on Windows systems★
Links to More Info: BT2141337
Component: Access Policy Manager
Symptoms:
When a new version of the MachineTunnel Service is available, the updated BIG-IP APM Edge Client package must be installed.
Conditions:
A new version of the MachineTunnel Service is available for Windows systems.
Impact:
Run the updated BIG-IP APM Edge Client installer package to upgrade the MachineTunnel Service.
Workaround:
Manually install the newest version of the BIG-IP APM Edge Client.
Fix:
The MachineTunnel Service automatically upgrades via the BIG-IP APM Edge Client on Windows systems.
Fixed Versions:
21.1.0, 17.5.1.4
2141305 : SSH Proxy Profile Properties page does not render
Links to More Info: BT2141305
Component: TMOS
Symptoms:
The 'Properties' button of a ssh proxy security profile does not correctly render the profile's page
Conditions:
- AFM provisioned
- Security ›› Protocol Security : Security Profiles : SSH Proxy : SSH
- Right-click on 'Properties' and open in new tab.
Impact:
You are unable to view the SSH Proxy security profile properties.
Workaround:
None
Fix:
SSH Proxy Profile Properties Page Rendering issue is fixed
Fixed Versions:
21.1.0, 21.0.0.1
2141245 : Undisclosed traffic to TMM can lead to resource exhaustion
Component: Global Traffic Manager (DNS)
Symptoms:
Certain traffic sent to TMM is leading to resource exhaustion.
Conditions:
Undisclosed conditions
Impact:
TMM Resource exhaustion
Fix:
DNS LDNS API correction.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2141233 : Client authentication profile as "Request" in FIPS-CC mode causes connection termination without certificate★
Links to More Info: BT2141233
Component: Local Traffic Manager
Symptoms:
SSL handshakes timeout instead of finishing.
Conditions:
1. Clientssl profile configured with Client Authentication enabled with "Request" option
2. BIG-IP is in FIPS-CC mode
3. Client does not provide a certificate
or
1. Clientssl profile configured with Client Authentication enabled with "Ignore" option
2. BIG-IP is in FIPS-CC mode
3. Access Policy applied to the Virtual Server contains an OnDemand Cert Auth agent.
4. Client does not provide a certificate
Impact:
SSL handshakes do not finish but instead timeout.
Workaround:
Workaround 1:
Disable Client authentication.
Workaround 2:
Configure CRL on the Client SSL profile
Workaround 3:
Enable Client Certificate Constrained Delegation (c3d) feature on the SSL profiles(requires Server-SSL profile and this feature forges client cert to server upon cert request from app-server).
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4
2141205 : Tpm-status returns: "System Integrity: Invalid" on BIG-IP versions released since October 2025
Links to More Info: BT2141205
Component: TMOS
Symptoms:
The 'tmsh run sys integrity status-check -a -v' or 'tpm-status' commands incorrectly report system integrity status as 'Invalid' even when the system software has not been modified.
Detailed output of the "tpm-status -v 3 -q" command includes the following messages:
A SIRR database is invalid.
/shared/lib/sirr/v1.0/SIRR validity: 1
/usr/lib/sirr/SIRR validity: 0
Conditions:
This occurs if all of the following conditions are true:
-- You are using one of the following BIG-IP software versions:
-- v17.5.1.4 or v17.1.3.1, or later v17.x releases.
-- Engineering Hotfixes built on or after October 15, 2025, based on BIG-IP software v17.5.1.3, v17.1.3, v16.1.6.1, v15.1.10.8 or later version, which contains an updated 'sirr-tmos' package in the Engineering Hotfix ISO.
-- You have installed one of the above software releases on one of the following TPM-supported BIG-IP platforms:
-- iSeries appliances
-- VIPRION B44xx blades (B4450, B4460)
Impact:
The integrity of the system boot components validated by the Trusted Platform Module (TPM) may not be correctly reported. The system integrity status shows Invalid, when the actual status may be Valid.
Workaround:
None.
Fix:
Trusted Platform Module (TPM) status now shows the correct system integrity status for supported releases and platforms.
Fixed Versions:
21.1.0
2141125-1 : Multicast traffic is dropped with incorrect VLAN tagging
Links to More Info: BT2141125
Component: Local Traffic Manager
Symptoms:
F5OS hardware platforms utilizing multicast routing and PIM across multiple VLAN interfaces may forward incoming multicast traffic to multiple outgoing VLAN interfaces with incorrect VLAN tagging. This behavior can lead to the successive addition of VLAN headers, resulting in a cascading accumulation of VLAN tags.
Conditions:
F5OS platforms configured with
- Multicast routing enabled.
- Configured with multicast protocols - PIM, OSPF etc.
- 2 or more VLAN interfaces present for outgoing multicast traffic path .i.e. minimum of 3 or more VLAN interfaces configured with multicast routing, so that if one interface has incoming multicast traffic, it goes through atleast 2 or more other VLAN interfaces.
Impact:
Multicast traffic dropped on VLAN interfaces receiving more than 1 VLAN tagging in the packet.
Workaround:
None.
Fixed Versions:
21.1.0
2141109 : The URL categorisation daemon's DNS cache is never refreshed
Links to More Info: BT2141109
Component: Traffic Classification Engine
Symptoms:
When the URL categorisation daemon (wr_urldbd) starts or restarts, it queries the DNS resolver for the Brightcloud online service domains that are used for some of the real-time URL queries, and populates the DNS Cache with the results.
After populating the cache, it never refreshes or updates it.
When Brightcloud change the DNS records of their service domains, all the new SSL handshakes from the URL categorisation daemon, needed for the real-time URL categorisation queries, fail with these errors in wr_urldbd.out:
WR_URLDBD: Sep 30 12:01:08.836:Tid(41843):async_lookupCallback:702 Error processing URL:*.example.com and Status Code:S_ErrArg
BC_SDK: 2025-09-30 12:01:08 ERROR: SslIO::StartSSLHandshake::SSL_connect() failed::SSL error: 1
BC_SDK: 2025-09-30 12:01:08 ERROR: SSL error: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
BC_SDK: 2025-09-30 12:01:08 ERROR: SslIO::StartSSLHandshake::SSL_connect() failed::SSL error: 1
Conditions:
- URL categorisation license installed on the system, and URL categorisation configured and in use.
Impact:
Some time after the URL categorisation daemon starts or restarts, all URL categorisation real-time queries for URLs not already in the local database fail.
Workaround:
When the real-time queries start failing with the error described above, restart the wr_urldbd daemon with:
"bigstart restart wr_urlrdbd"
Fixed Versions:
21.1.0
2141061 : iControl REST API Endpoints enhancements
Component: Local Traffic Manager
Symptoms:
iControl REST API endpoints were not following best practices
Conditions:
NA
Impact:
Can lead to arbitrary behaviour
Fix:
iControl REST API endpoints are now following best practices
Fixed Versions:
21.1.0
2140949 : Need a clean up of dns-resolver f5-aws-dns
Links to More Info: BT2140949
Component: Application Security Manager
Symptoms:
Unused configuration is included in profile_base.conf
Conditions:
Configurations containing "dns-resolver f5-aws-dns" in profile_base.conf
Impact:
Some unused configuration is in profile_base.conf. It is otherwise benign.
Workaround:
None
Fixed Versions:
21.1.0
2140905 : System Integrity Test on VE is halting the whole system in FIPS mode
Links to More Info: BT2140905
Component: TMOS
Symptoms:
System Integrity Test on VE halts the whole system in FIPS mode
Conditions:
-- BIG-IP Virtual Edition
-- FIPS Mode enabled
-- Falcon sensor installed
Impact:
System integrity test fails and the system will not boot.
Workaround:
None
Fix:
System Integrity Test on VE will stop tmm in FIPS mode now and user can bigstart tmm start.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2140901 : Add new ssl-certificate subject and issuer DN conditions to LTM Policy.
Component: Local Traffic Manager
Symptoms:
LTM Policy on TMOS currently has condition ssl-certificate only support common-name selector.
In this release, added new selectors subject-dn and issuer-dn for ssl-certificate with "contains" condtion.
Conditions:
Configure LTM policy.
Impact:
N/A
Workaround:
Add new ssl-certificate subject and issuer DN conditions to LTM Policy.
Fix:
Added new ssl-certificate subject and issuer DN conditions to LTM Policy.
Fixed Versions:
21.1.0
2140621 : CVE-2025-8677: Resource exhaustion via malformed DNSKEY handling
Links to More Info: K000157317, BT2140621
2140213 : Xnet-netvsc driver crash
Links to More Info: BT2140213
Component: TMOS
Symptoms:
TMM crashes due to lack of memory to configure subchannels needed for queues in DPDK which ultimately results in a NULL pointer exception.
The lack of memory occurs when the product of (number of TMMS)*(number of NICs) becomes very large due to memory footprint each TMM needs to operate so many NICs.
In /var/log/tmm:
notice hn_nvs_alloc_subchans(): nvs subch alloc failed: 0x2
notice hn_dev_configure(): subchannel configuration failed
notice Port5 dev_configure = -5
Conditions:
1) xnet-netvsc driver (HyperV or Azure)
2) (number of TMMs)*(number of NICs) is big; confirmed with 8 TMMs and 4 NICs on Azure F8s v2 instance.
Impact:
TMM goes into restart loop and never becomes Active, disrupting traffic.
Workaround:
A) Reduce the number of NICs in the environment
B) Reduce the number of TMMs by running the following and then restarting with 'bigstart restart tmm'
tmsh modify sys db provision.tmmcount value <tmm_count>
Fix:
Added handling when DPDK subchannel configuration errors occur
Fixed Versions:
21.1.0, 17.5.1.4
2139965 : AFM DNS DOS logging protocol_dns_dos_nxdomain_field_attack_name()
Links to More Info: BT2139965
Component: Advanced Firewall Manager
Symptoms:
Tmm crashes are observed for specific configurations where log_data_autodos or related settings (log_data_dos_nxdomain) are used.
The crash occurs for every 1 to 2 hours after DNS NXDOMAIN learning begins.
Logs from the crash may indicate issues in protocol_dns_dos_nxdomain_field_attack_name() function or references to log_data_dos_nxdomain.
DNS NXDOMAIN learning fails entirely and does not function as expected, preventing proper logging or learning.
Conditions:
This can occur 1-2 hours after enabling log_data_autodos or log_data_dos_nxdomain
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Set the dos.dnsnxdomain.learnperiod parameter to a larger value that is more comfortable for the situation.
Fixed Versions:
21.1.0
2139921 : Invalid Length PCRE Expression Was Allowed Through REST API
Links to More Info: BT2139921
Component: Application Security Manager
Symptoms:
The regex validation string for parameters is intended to be limited to a maximum length of 254 characters, but this validation was not enforced correctly via the REST API.
Conditions:
A lengthy PRCE expression is set for a parameter using the REST API
Impact:
ASM goes into a restart loop.
Workaround:
None
Fix:
PCRE Expression with invalid length is no longer allowed through REST API
Fixed Versions:
21.1.0
2139901 : Server-ssl profile "do-not-remove-without-replacement" is recreated
Links to More Info: BT2139901
Component: Application Security Manager
Symptoms:
A required profile for a deprecated service is recreated on restart, but not saved to bigip.conf
Conditions:
The "do-not-remove-without-replacement" profile is deleted and the bewaf daemon is restarted
Impact:
The profile is recreated, but not saved to bigip.conf without another user action.
Workaround:
"tmsh save sys config" can be run to save the active config to bigip.conf
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2139637 : TMM crash because of invalid context
Links to More Info: BT2139637
Component: Local Traffic Manager
Symptoms:
Tmm crashes during QUIC packet loss handling due to invalid context.
Conditions:
LTM configured with UDP and QUIC.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fix:
Use the proper context in QUIC packet loss handling.
Fixed Versions:
21.1.0
2138077 : SAML redirect signature validation fails when RelayState is present with want-detached-signature=true in BIG-IP APM 17.1.x
Links to More Info: BT2138077
Component: Access Policy Manager
Symptoms:
SAML authentication fails with errors such as “Invalid signature” or “Signature verification failed”
Conditions:
SAML SP is configured with:
is-authn-request-signed = true
sso-binding = http-redirect
want-detached-signature = true
A RelayState parameter is included in the SAML AuthnRequest.
Occurs on BIG-IP APM versions 17.1.x and above.
Impact:
End users are unable to log in using SSO due to authentication errors
Workaround:
Remove the RelayState parameter from the SAML AuthnRequest configuration, if possible.
This restores successful signature validation.
Example: remove relay-state from the SP AAA SAML object configuration.
Alternatively, use HTTP-POST binding instead of HTTP-Redirect.
There is no configuration-based workaround if RelayState is required and Redirect binding must be used.
Fixed Versions:
21.1.0, 21.0.0.1
2137977 : Clicking on a policy in a virtual server's resource page navigates to the full policy list, instead of the specific policy★
Links to More Info: BT2137977
Component: TMOS
Symptoms:
The hyperlink for the policy on virtual server's resource page navigates to the incorrect location.
Conditions:
Virtual server with an ltm policy attached.
Impact:
The hyperlink navigates to the full policy list, so the specific policy would still need to be found in the full list to navigate to it.
Workaround:
None
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2137973 : Common Criteria requirements mandate strict values for notBefore and notAfter that current implementation does not satisfy
Links to More Info: BT2137973
Component: Local Traffic Manager
Symptoms:
Currently, the notBefore and notAfter fields of the temporarily-issued certificate equal those of the server certificate. It is possible that the notBefore field precedes the current time while the notAfter field may be later than the expiry date of the CA's signing certificate.
Common Criteria does not allow these. It requires that, for a temporarily-issued (i.e. forged) certificate:
1. The notBefore date is equal to or greater than the current time, and
2. The notAfter date is less than or equal to the expiry date of the CA's signing certificate, i.e. the forged certificate expires prior to the signing certificate.
Conditions:
1. The device is in CC/FIPS mode
2. The backend server certificate has a notBefore date that is before the current time
3. The backend server certificate expires after its CA signing certificate (i.e. after its issuer expires)
Impact:
The temporarily-issued certificate has validity dates that do not comply with Common Criteria requirements.
Workaround:
None
Fix:
The temporarily-issued certificates will have validity dates that conform to Common Criteria requirements.
Fixed Versions:
21.1.0, 17.5.1.4
2137861-1 : MCPD throws a validation error during upgrade to v17.1.3.x when TACACS servers are configured with hostname★
Links to More Info: BT2137861
Component: TMOS
Symptoms:
After upgrading the system and rebooting, config load fails with an mcpd validation error:
"IPv6 is not supported in 17.1.x and lower versions"
"Unexpected Error: Loading configuration process failed."
Conditions:
The TACACS server object is configured with a hostname. For example, the following TACACS+ configuration in the /config/bigip.conf
auth tacacs /Common/system-auth {
protocol ip
secret <omitted>
servers { bigip.example.com } <<====
service ppp
}
Impact:
Validation does not accept a hostname. Cannot add hostname as a server.
Workaround:
Use the IPV4 addresses of the TACACS server, instead of hostnames
Fixed Versions:
21.1.0, 17.1.3.1
2137805 : Jetty vulnerabilities CVE-2023-36478, CVE-2024-6763, CVE-2023-26049, CVE-2024-8184, and CVE-2023-41900
Links to More Info: K000157844
2135621 : Poor TCP performance on Hyper-V non-accelerated deployments with Cisco VIC interfaces
Links to More Info: BT2135621
Component: Local Traffic Manager
Symptoms:
TCP retransmits occur on Hyper-V deployments with Cisco VIC networks (SR-IOV disabled).
The problem is related to large segments processing (TSO packets)
Conditions:
- Hyper-V VM with Network adapter on top of Cisco VIC interface
- SR-IOV is not enabled
- Virtual server uses TCP profile
Impact:
Poor TCP performance for virtual servers with TCP profile
Workaround:
- Disable TSO feature:
tmsh modify sys db tm.tcpsegmentationoffload value disable
- Other workaround is to switch to sock driver:
https://my.f5.com/manage/s/article/K000153024
Fixed Versions:
21.1.0
2132213 : Hyper-V/Azure: Unable to pass traffic with tagged vlans when using the default dpdk driver.
Links to More Info: BT2132213
Component: TMOS
Symptoms:
On a BIG-IP VE deployed in a HyperV or Azure environment, traffic passing fails with tagged VLAN interfaces
Conditions:
-- BIG-IP VE is deployed in Azure or HyperV environment and has DPDK driver in use for the dataplane interfaces.
-- User can check the driver in use by running "tmctl -d blade tmm/xnet/device_probed" table that should show them "dpdk" in the "driver_selected" column for their dataplane interfaces.
-- User has tagged VLANs configured.
Impact:
BIG-IP is unable to pass any data-plane traffic.
Workaround:
-- Switch to the default "sock" driver by running:
tmsh modify sys db ve.ndal.driver.netvsc value sock
-- For BIG-IP versions where the above dbvar is not available, the user can directly modify the /config/tmm_init.tcl file and set "sock" as the default driver for netvsc devices by adding this command:
>> cat tmm_init.tcl
device driver vendor_dev f5f5:f550 sock
Fix:
Unable to pass traffic with vlan tagging when using the default dpdk driver in HyperV or Azure environments.
Fixed Versions:
21.1.0
2132209 : TMM crash while sending ACKs in invalid context
Links to More Info: BT2132209
Component: Local Traffic Manager
Symptoms:
Tmm crashes while QUIC is trying to send an ACK in invalid context.
Conditions:
LTM configured with UDP and QUIC.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fix:
QUIC ACKs are generated/sent for valid contexts.
Fixed Versions:
21.1.0
2132185 : Add Action SSL Proxy with Bypass Intercept options to LTM Policy
Component: Local Traffic Manager
Symptoms:
LTM Policy on TMOS currently has action ssl-intercept enable/disable for forward proxy only at SSL Client Serverhello Send event.
In this release, a new action 'ssl-proxy' with 'bypass' and 'intercept' for both Forward and Reverse Proxy at following events is added
Client Accepted
SSL Client Hello
SSL Client Serverhello Send
Enable/Disable ssl-intercept will be deprecated from TMUI
Conditions:
NA
Impact:
NA
Workaround:
A new action 'ssl-proxy' with 'bypass' and 'intercept' for both Forward and Reverse Proxy at following events is added
Client Accepted
SSL Client Hello
SSL Client Serverhello Send
Enable/Disable ssl-intercept will be deprecated from TMUI
Fix:
New action 'ssl-proxy' with 'bypass' and 'intercept' is added for both Forward and Reverse Proxy at events
Client Accepted
SSL Client Hello
SSL Client Serverhello Send
Enable/Disable ssl-intercept will be deprecated from TMUI
Fixed Versions:
21.1.0
2132153 : `tmsh show sys hardware` doesn't show F5OS version
Component: F5OS Messaging Agent
Symptoms:
When you run the command `tmsh show sys hardware`, it doesnot show F5OS version.
Conditions:
Run the command `tmsh show sys hardware`.
Impact:
Unable to check the F5OS version on the tenant side.
Workaround:
Run `vcmpshm_tool -s hal -d 0 | grep host_software_version`
Fix:
Fixed `tmsh show sys hardware` to correctly display the F5OS version.
Fixed Versions:
21.1.0
2131861 : Snapshot file count decreases over time.
Component: TMOS
Symptoms:
Stored snapshot files decrease even when no new files are created.
Conditions:
If a tmstat merge fails due to a generation change or another error, no new snapshot is created.
Impact:
Because the system increments the file count even when no snapshot is created, it deletes older files, causing the number of stored snapshots to drop with each failed merge.
Workaround:
N/A
Fix:
The fix ensures merge failures do not increment the file count or trigger cleanup.
Fixed Versions:
21.1.0
2131833 : F5OS/rSeries r2xxx/r4xxx BIG-IP Tenant management interface not reachable
Links to More Info: BT2131833
Component: TMOS
Symptoms:
On F5OS/rSeriers r2xxx/r4xxx , in rare conditions the management interface is not reachable due to a timing and ordering issue probing network interfaces
In the BIG-IP Tenant, the network interfaces eth0 or mgmt are missing
Conditions:
This condition is rare and when it does its usually seen on tenant first boot.
Impact:
Unable to reach BIG-IP Tenant management address.
Workaround:
Reboot tenant
Fix:
Upgrade to latest BIG-IP software which ensures management network interface driver is loaded first.
Fixed Versions:
21.1.0
2131597-4 : BGP graceful restart might not accept a new connection immediately after neighbor failover.
Links to More Info: BT2131597
Component: TMOS
Symptoms:
When a remote peer restarts and BGP graceful restart mechanism is advertised and received, BIG-IP might not immediately accept a new connection from a restarting peer.
Conditions:
- BIG-IP system is licensed for Routing Bundle.
- BGP graceful restart mechanism is advertised and received.
- Remote peer is still restarting.
Impact:
New connection might take longer to establish.
Workaround:
Make sure the BIG-IP local router-ID is lower than the re-connecting peer ID.
Fixed Versions:
21.1.0
2131225 : Unclear Actions Displayed with L7 Profiles in Rule Creation
Links to More Info: BT2131225
Component: TMOS
Symptoms:
When creating a simple L7 profile and adding rules with specific actions (e.g., "Enable" + select "decompression" at "client accepted"), the actions are displayed unclearly with placeholders such as {{vm.getCapitalizedLabel(vm.action.action)}} instead of the expected action names.
Conditions:
Occurs when creating an L7 profile, adding a rule with custom options (e.g., "Match all of the following conditions: Enable + select decompression at client accepted"), and saving the rule.
Impact:
This issue confuses administrators, as it displays unclear placeholders instead of specific actions, potentially leading to misconfigurations and delayed troubleshooting.
Workaround:
Monitor release notes and timelines for the fixed version. Plan updates as per the release schedule to resolve the issue effectively.
Fix:
The issue is resolved by updating the actionText.controller.js file. The placeholders displaying {{vm.getCapitalizedLabel(vm.action.action)}} were replaced with the actual action labels. The fix is available in the patched version. Follow-up with support for patch application.
Fixed Versions:
21.1.0, 21.0.0.1
2131085 : Running 'tmsh reboot slot all' on multi-slot tenant or vCMP guest causes it to get stuck in unhealthy state
Links to More Info: BT2131085
Component: Local Traffic Manager
Symptoms:
Running 'tmsh reboot slot all' on multi-slot tenant or vCMP guest or VIPRION causes BIG-IP to get stuck in unhealthy state.
MCPD is failing to load with the error '01070710:3: Could not find master-key object':
slot3/tenant1.example.com notice clusterd[7956]: 013a0024:5: Blade 3: Changing primary from 0 (none) to 2
slot3/tenant1.example.com err clusterd[7956]: 013a0018:3: Blade 3 turned RED: Quorum: stepping slow clock forward by 747.133704 ms, HA TABLE offline
slot3/tenant1.example.com notice clusterd[7956]: 013a0006:5: Blade status: 0 GREEN 1 YELLOW 1 Not Ready
slot1/tenant1.example.com notice mcpd[4785]: 01070419:5: Platform initialization phase triggered.
slot2/tenant1.example.com emerg load_config_files[9951]: "/usr/bin/tmsh -n -g -a load sys config partitions all base " - failed. -- 01070710:3: Could not find master-key object - sys/validation/MasterKey.cpp, line 3070
All slots will have an Availability of "offline" as reported in tmsh show sys cluster:
[root@rdt2:/S1-red-P::INOPERATIVE:Standalone] config # tmsh show sys cluster
-----------------------------------------
Sys::Cluster: default
-----------------------------------------
Address 10.0.0.2/16
Alt-Address ::
Availability available
State enabled
Reason Cluster Enabled
Primary Slot ID 1
Primary Selection Time 11/01/25 18:06:26
-----------------------------------------------------------------------------------------------------
| Sys::Cluster Members
| ID Address Alt-Address Availability State Licensed HA Clusterd Reason
-----------------------------------------------------------------------------------------------------
| 1 :: :: offline enabled true offline running Run, HA TABLE offline
| 2 :: :: offline enabled false offline running Run, HA TABLE offline
Conditions:
1. Multi-slot F5OS tenant or Multi-slot vCMP guest or multi-bladed VIPRION.
2. Rebooting all the slots of the guest or tenant (e.g. 'tmsh reboot slot all' or 'clsh reboot')
Impact:
All tenant or VCMP guest slots remain offline, and are inoperable from a traffic standpoint.
Multiple blades might hold the cluster mgmt addr.
Workaround:
For both tenants and guests, re-deploying them has a high probability of resolving the issue.
That is changing the tenant's or guest's state from "deployed" to "provisioned" or "configured", and then back to "deployed".
or
Restarting mcpd on the primary slot also has a high probability of resolving the issue.
Tmsh show sys cluster will report the "Primary Slot ID"
# tmsh show sys cluster
-----------------------------------------
Sys::Cluster: default
-----------------------------------------
Address address
Alt-Address ::
Availability available
State enabled
Reason Cluster Enabled
Primary Slot ID 1
Primary Selection Time 11/01/25 18:06:26
Both workarounds are highly likely to restore the tenant or guest to full functionality.
Note: the issue might return if all tenant or guest slots are rebooted.
Fixed Versions:
21.1.0, 17.5.1.4
2130913 : PUT request errors when trying to modify a firewall rule-list and firewall management-ip-rules
Links to More Info: BT2130913
Component: TMOS
Symptoms:
Attempting to update a firewall rule-list or firewall management-ip-rules with a PUT request won't work and an error will be returned.
Conditions:
Doing a PUT request to an existing firewall rule-list or to firewall management-ip-rules.
Impact:
A PUT request to a firewall rule-list and firewall management-ip-rules returns an error.
Workaround:
Using a PATCH request or a TMSH modify command to update the firewall rule-list or firewall management-ip-rules will work.
Fix:
A PUT request can be used to modify a firewall rule-list or firewall management-ip-rules.
Fixed Versions:
21.1.0
2130485-2 : Warning: the current license is not valid - Fault code: 51133
Links to More Info: BT2130485
Component: TMOS
Symptoms:
License activation may fail on specific platforms.
root@(localhost)(cfg-sync Standalone)(NO LICENSE)(/Common)(tmos)# install sys license registration-key D1234-12345-12345-12345-1234567
Warning: the current license is not valid
License server has returned an exception.
Fault code: 51133
Fault text: Error 51133, F5 registration key is not compatible with the detected platform - This platform, "", cannot be activated with this registration key "I123456-1234567".
Conditions:
- KVM on HP AMD server
- IBM Bare Metal
Impact:
Unable to license BIG-IP.
Workaround:
None
Fix:
License activation is successful.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2125953 : Insufficient access control to REST endpoint and TMSH for some CLI versions.
Component: TMOS
Symptoms:
Security best practices are not followed for some CLI versions.
Conditions:
Not specified.
Impact:
Unexpected behaviour
Fix:
Security best practices are being followed.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2106789 : BIGIP LTM Monitors Hardening
Component: Global Traffic Manager (DNS)
Symptoms:
BIG-IP LTM External Monitors are not following the best security practices
Conditions:
When external montiors is configured
Impact:
Unexpected behaviour
Fix:
Best security practices are now applied
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2099449 : Cannot configure websocket profile on a performance virtual server from the GUI
Links to More Info: BT2099449
Component: Local Traffic Manager
Symptoms:
If a performance (fastL4) virtual server is selected it's impossible to configure the client or server side WebSocket profile.
After selecting WebSocket profile and clicking update, the configuration is not applied and the profile field displays "None".
, this option is available for configuration in the GUI, but once it's pushed (i.e. "Update" button pressed), the config is not applied, and the websocket profile is removed from the select field.
Conditions:
Performance (fastL4) profile is selected instead of Standard type.
Impact:
Configuration of WebSocket profiles does not work via GUI.
Workaround:
WebSocket profiles can be configured via tmsh:
modify ltm virtual http-vs profiles add { websocket }
Fixed Versions:
21.1.0
2099441 : Garbled character in warning message when HA peer is added
Links to More Info: BT2099441
Component: TMOS
Symptoms:
Garbled character in warning message
Conditions:
When adding HA peer
Impact:
Unexpected behavior
Workaround:
None
Fixed Versions:
21.1.0, 21.0.0.1
2086097 : PEM iRules causing traffic disruption
Component: Policy Enforcement Manager
Symptoms:
In some scenario, there is improper termination of connection and it is leading to TMM core
Conditions:
PEM iRules configured.
Impact:
TMM core. Service disruption.
Fix:
Connection is properly terminating and TMM is not coring.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2083257 : 502 error from BIG-IP during large AFM rule deployment
Component: TMOS
Symptoms:
Pushing large AFM rule sets from BIG-IQ to BIG-IP greatly increases response processing time, exceeding the default Apache HTTPD timeout and causing a 502 error on BIG-IQ.
Conditions:
Occurs when,
- AFM is provisioned on the device.
- The device has a large AFM rule set.
- BIG-IQ encounters a 502 error when communicating with BIG-IP.
Impact:
BIG-IQ receives a 502 error from BIG-IP when deploying AFM rules.
Workaround:
1. Apply the required sys db parameters:
modify sys db provision.extramb value 8192
modify sys db icrd.timeout value 600
modify sys db restjavad.timeout value 600
modify sys db restnoded.timeout value 600
modify sys db provision.restjavad.extramb value 4096
modify sys db provision.tomcat.extramb value 1024
2. Update and verify HTTPD timeout:
grep -E '^Timeout[[:space:]]+[0-9]+' /etc/httpd/conf/httpd.conf
sed -i 's/^Timeout <timeoutValue>$/Timeout 900/' /etc/httpd/conf/httpd.conf
Example:
# grep -E '^Timeout[[:space:]]+[0-9]+' /etc/httpd/conf/httpd.conf Timeout
300
# sed -i 's/^Timeout 300$/Timeout 900/' /etc/httpd/conf/httpd.conf
# grep -E '^Timeout[[:space:]]+[0-9]+' /etc/httpd/conf/httpd.conf Timeout
900
3. Restart HTTPD
bigstart restart httpd
Fix:
Added support for configuring the HTTPD request timeout via tmsh:
tmsh modify sys httpd request-timeout 900
Fixed Versions:
21.1.0
2078297-2 : Unexpected PVA traffic spike
Component: TMOS
Symptoms:
In rare circumstances, traffic may spike on the graphs inside the tenant without corresponding graphs on the external interfaces.
Conditions:
F5OS tenant
ePVA traffic
Impact:
Loss of connectivity,
extremely high PVA traffic spike
tcpdump on the appliance ceases to function
Workaround:
Disabling PVA acceleration on affected virtual servers
Fix:
PVA traffic not spiking.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2078277 : BD crash with an inappropriate configuration for request_max_chunks_number
Links to More Info: BT2078277
Component: Application Security Manager
Symptoms:
BD crash
Conditions:
BD internal variable request_max_chunks_number has been configured with inappropriate value (above 200,000)
Impact:
ASM traffic disrupted while bd restarts.
Workaround:
Revert request_max_chunks_number to the default value, 1000
Fixed Versions:
21.1.0
2077525 : Incomplete or missing IP Intelligence databases result in connection reset, high TMM CPU usage and/or TMM crash
Links to More Info: BT2077525
Component: Advanced Firewall Manager
Symptoms:
Both of the following messages are frequently (several times per second) logged to /var/log/tmm*:
<13> Sep 24 09:55:01 bigip1 notice Failed to open /var/IpRep/F5IpRep.dat
<13> Sep 24 09:55:01 bigip1 notice Failed to open /var/IpRep/F5IpV6Rep.dat
Heavy log file writing can result in a possible tmm SIGABRT due to a heartbeat failure.
Conditions:
ip-intelligence is configured, and both the IPv4 and IPv6 intelligence databases are missing. IP intelligence is a optional subscription feature that can be configured in various BIG-IP modules, such as AFM, ASM, and APM, and irules.
Impact:
A frequent log message might slow TMM.
This might result in TMM missing a heartbeat, which will trigger a tmm SIGABRT and resulting core. Traffic disrupted while tmm restarts.
Workaround:
Unconfigure ip-intelligence and remove any configuration that refers to IP reputation, or ensure that the ip-intelligence databases are available.
Fixed Versions:
21.1.0, 21.0.0.1
2077465-1 : Missing audit logs for dropped IP option packets (LSR/SSR/RR) prior to attack detection
Links to More Info: BT2077465
Component: Advanced Firewall Manager
Symptoms:
-- Packets containing IP options (RR, LSR, SSR) are dropped when the IP Option Frames DoS vector threshold is set to 0.
-- No audit logs are generated for these dropped packets unless attack detection is triggered.
-- Very low packet counts (e.g., 1–2 packets) do not increment the attack counter and therefore do not produce logs.
Conditions:
-- DoS vectors such as “IP Option Frames” or “Bad TCP Flags Malformed” are configured with a rate limit of 0.
-- Packets containing:
IP Record Route (RR) / Loose Source Routing (LSR) / Strict Source Routing (SSR)
-- Packet rate is low (below the stats_1m aggregation threshold).
-- Attack detection is not triggered.
Impact:
-- Dropped packets with prohibited IP options are not logged.
Workaround:
-- No effective workaround currently available.
-- Increasing the traffic rate to trigger attack detection generates logs; however, this approach does not satisfy CC requirements regarding low-rate packet drops.
Fix:
Audit logging has been improved for DoS vectors configured with a zero rate limit. Packets containing prohibited IP options (RR, LSR, SSR) that are dropped due to policy enforcement are now logged regardless of whether traffic rates exceed the attack detection threshold. This enhancement provides visibility into low-rate packet drops without the need for attack detection to be triggered.
Fixed Versions:
21.1.0, 17.5.1.4
2077357 : Virtual-wire with proxy listener may generate packets with 00:00:00:00:00:00 source MAC.
Links to More Info: BT2077357
Component: Local Traffic Manager
Symptoms:
In a case where a proxy listener intercepts traffic going over a virtual-wire and there is no server-side traffic (TCP re-transmit timeout), a RST generated towards the server might have 00:00:00:00:00:00 source MAC.
Conditions:
Proxy listener intercepts traffic going over a virtual-wire.
There is no server-side traffic for the flow.
Impact:
RST might not be delivered to the server.
Workaround:
None
Fixed Versions:
21.1.0
2077329 : IBD profile is injecting the Javascript tag in non html pages
Links to More Info: BT2077329
Component: Bot Defense
Symptoms:
Setup IBD profile
Set up a backend server to serve js file with some HTML tags in string format
Example Javascript
function PrintPreview(htmlpage) {
var page = "<script>function Print(){window.document.getElementById(\"printtool\").setAttribute(\"style\",\"display:none\");window.print();window.document.getElementById(\"printtool\").setAttribute(\"style\",\"\");}; function Close(){close();}</script>";
htmlpage = "<html><head></header><body>" +htmlpage+ scp+ "</body></html>";
myWindow.document.write(htmlpage);
}
Able to see js tags injected with non html pages with content-type= application/javascript in response
Conditions:
Virtual server with the IBD profile and a Javascript file with some HTML tags in string format
Impact:
Javascript tag injection is happening for response pages with content-type= application/javascript instead of happening with html pages with content-type = html or xhtml.
Workaround:
None
Fix:
None
Fixed Versions:
21.1.0
2064333 : [AFM] pccd cores during the service restart
Links to More Info: BT2064333
Component: Advanced Firewall Manager
Symptoms:
Pccd core occurs while the service restarts. The core file may be generated when upgrading BIG-IP.
Conditions:
- AFM provisioned
- pccd is restarted
Impact:
Pccd core is generated during process restart or upgrade, but it does not appear to persist after the initial event.
Workaround:
None
Fixed Versions:
21.1.0
2063265 : Improvements in HTTP headers
Component: TMOS
Symptoms:
Certain flags were missing from HTTP headers.
Conditions:
NA
Impact:
Can lead to unexpected behaviour
Fix:
Headers now have proper flags.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2058541-3 : [BGP] BIG-IP does not follow updated section of rfc4724.html#section-4.2 when handling a new connection from peer.
Links to More Info: BT2058541
Component: TMOS
Symptoms:
BIG-IP does not follow the updated section (https://www.rfc-editor.org/rfc/rfc4724.html#section-4.2) when handling a new connection from a peer. Instead, section https://datatracker.ietf.org/doc/html/rfc4271#section-6.8 is followed.
This leads to a new connection from a peer being dropped when Graceful Restart happens.
Conditions:
BGP is configured with graceful restart.
Peer restarts.
Impact:
BIG-IP will drop a new connection request and try to open a new connection right away.
Workaround:
None
Fixed Versions:
21.1.0, 17.1.3.1
2053289-4 : Increased OAuth instances in TMM memory
Links to More Info: BT2053289
Component: Access Policy Manager
Symptoms:
In a successful OAuth attempt a single M_OAUTH instance leak is observed.
Conditions:
OAuth Agents are configured in a per-request policy.
Impact:
Increased TMM memory usage.
Workaround:
None
Fixed Versions:
21.1.0
2053165 : CVE-2025-47268 iputils: Signed Integer Overflow in Timestamp Multiplication in iputils ping
Links to More Info: K000158112, BT2053165
2050177-1 : LDAP cache optimisation, required as session establishment, takes more time
Links to More Info: BT2050177
Component: Access Policy Manager
Symptoms:
When LDAP is configured with a larger number of groups, delays in the session establishment rate may occur. This happens only during cache buildup, and later when the sessions are created concurrently.
Conditions:
LDAP server is configured with large number of groups and sessions are created concurrently.
Impact:
User may observe slow session establishment rate.
Workaround:
None
Fixed Versions:
21.1.0
2047429 : PostgreSQL should dump a corefile when not exiting
Links to More Info: BT2047429
Component: TMOS
Symptoms:
When PostgreSQL does not exit gracefully, it does not create a core file.
Conditions:
PostgreSQL crashes.
Impact:
Diagnostic data missing.
Workaround:
None
Fixed Versions:
21.1.0, 21.0.0.1
2047137 : TMM core may occur while using APM VDI with Blast UDP
Links to More Info: BT2047137
Component: Access Policy Manager
Symptoms:
User may fail to access the remote desktop using APM vmware VDI, if a TMM core occurs due to the unavailability of one of the internal database variable.
Conditions:
The user attempts to connect to the desktop or app using VMware Client or a browser via the Blast protocol over UDP, and the session variable is deleted due to a timeout.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fix:
When internal variable is not available, it should fallback to TCP without TMM core.
Fixed Versions:
21.1.0, 17.1.3.1
2046941 : Distributed Cloud-facing BIG-IP instance with bot-defense profile might block XC health monitor
Links to More Info: BT2046941
Component: Application Security Manager
Symptoms:
Bot-defense profile detects a Distributed Cloud health monitor as a bot, and might block it (depends on configuration).
Conditions:
-- Bot-defense profile is attached to a virtual server.
-- BIG-IP is configured in front of Distributed Cloud.
Impact:
Distributed Cloud health monitors are blocked, false-positive bots are detected and logs.
Workaround:
None
Fix:
Signature Category 'F5 Health Monitor' description added. New signature of category 'F5 Health Monitor' is included in latest Bot Signatures Live Update. While configuring BIG-IP device to work, user should make sure DNS resolvers are properly configured and reachable via data path
Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1
2046553 : Memory leak when modifying PEM policies with flow-info-filters
Links to More Info: BT2046553
Component: Policy Enforcement Manager
Symptoms:
Tmm memory slowly grows over time.
Conditions:
Modifying PEM policies with flow-info-filters
Impact:
Tmm can run out of memory
Workaround:
Restart tmm before memory is exhausted. Subscriber traffic will be impacted while tmm restarts.
Fix:
Tmm does no longer leak memory.
Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1
2038393-4 : Looped dtls virtual can cause crash due to NULL dereference
Links to More Info: BT2038393
Component: Local Traffic Manager
Symptoms:
Tmm crashes while passing dtls traffic.
Conditions:
An iRule uses the 'virtual' command to loop into a dtls virtual as a second virtual, and using serverside dtls on the first virtual.
Impact:
Tmm crashes
Workaround:
Do not use the virtual command or any other form to loop into dtls virtual.
Fix:
Fixed a tmm crash with a dtls virtual server.
Fixed Versions:
21.1.0, 17.5.1.4
2038277 : Double memory release in the enforcer
Links to More Info: BT2038277
Component: Application Security Manager
Symptoms:
Possible bd cores due to ignore positional parameter configurations
Conditions:
Positional parameters configured with ignore value flag enabled.
Impact:
Error in logs, and possible crash and core. Traffic disrupted while bd restarts.
Workaround:
None
Fix:
No core and no errors.
Fixed Versions:
21.1.0
2035641 : APMd resource exhaustion
Component: TMOS
Symptoms:
Under certain conditions, APMd is exhausting resources leading to core.
Conditions:
Access sessions create, and sessions are processed
Impact:
APMd core may cause temporary traffic disruption.
Fix:
APMd not coring.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2035177-4 : Use of OCSP responder with SSL C3D enabled in virtual server may leak SSL handshake instances
Links to More Info: BT2035177
Component: Local Traffic Manager
Symptoms:
SSL C3D with OCSP responder may cause SSL handshake instances to be leaked because of MPI dropping replies due to traffic bursts.
Conditions:
Traffic flows through a virtual server with C3D enabled, utilizing an OCSP responder to validate the status of the client's certificate.
Impact:
TMM ssl_hs_m memory usage grows over time, eventually causing memory pressure, and potentially a traffic disruption due to TMM restart.
Workaround:
None
Fix:
Added a timeout and considers session timeouts as an OCSP 'try-later' error response.
Fixed Versions:
21.1.0, 17.5.1.4
2034753-2 : Domain name validation does not align with the error message on GUI
Links to More Info: BT2034753
Component: Access Policy Manager
Symptoms:
Domain names which include hyphens are not accepted, an error message is shown on GUI.
Conditions:
Domain names with hyphens or forward slashes will cause this issue.
Impact:
BIG-IP administrator will not be able to update DNS Exclude/Include Fields in Network Access settings if they include hyphens/dashes.
Workaround:
None
Fix:
Update the mcp validation regex to allow hyphens and forward slashes.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2033781-5 : Memory allocation failed: can't allocate memory to extend db size
Links to More Info: BT2033781
Component: Local Traffic Manager
Symptoms:
When tmm cannot expand the eXtremeDB database, it logs an error in /var/log/tmm:
err tmm1[21087]: 01010004:3: Memory allocation failed: can't allocate memory to extend db size
Conditions:
-- BIG-IP in operation
-- A configuration change is made that causes tmm to allocate more memory to eXtremeDB. Examples include:
- Adding a clientssl or serverssl profile
- Modifying a datagroup
- A bot defense sync occurs
Impact:
Tmm does not crash but the eXtremeDB state is inconsistent with other tmms and could lead to unpredictable behavior such as virtual servers not working, iRules failing to work, bot defense failing to work
Workaround:
None
Fixed Versions:
21.1.0
2017137-1 : Pkcs11d Crash Risk Due to Unbounded Label/Password Length from MCPd
Links to More Info: BT2017137
Component: Local Traffic Manager
Symptoms:
Unexpected behaviour or even a crash of pkcs11d
Conditions:
Configure the label/password values more than or equal to 32 characters.
Impact:
Configuring the label or password exceeding the allowed length, it could lead to memory corruption, unexpected behavior, or even a crash of the pkcs11d daemon.
Workaround:
Configure the values with 31 or fewer characters.
Fix:
The daemon now gracefully rejects inputs that exceed the length limit, logs an appropriate error, and exits the operation safely.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.2, 17.1.3
2016465 : Policy auto merge does not work for Base64 Decoding
Links to More Info: BT2016465
Component: Application Security Manager
Symptoms:
If an entity (Parameters, Cookies, Headers) in two policies have differing values for how to handle Base64 values (enabled, disabled, required), policy diff does not merge the values correctly.
Conditions:
An entity (Parameters, Cookies, Headers) in two policies have differing values for how to handle Base64 values (enabled, disabled, required), policy diff does not merge the values correctly.
Impact:
Expected changes may not be made to the merged policy resulting in unexpected Base64 value handling.
Workaround:
The values can be changed manually through GUI or REST.
Fix:
Policy Diff/Merge functions correctly for differing Base64 Decoding values.
Fixed Versions:
21.1.0
2008409-1 : MAC masquerade does not work on an F5OS tenant if there are no floating self-ips configured on the VLAN
Links to More Info: BT2008409
Component: F5OS Messaging Agent
Symptoms:
Network traffic fails on a VLAN that is shared by multiple tenants.
Conditions:
-- F5OS tenants sharing a VLAN
-- MAC masquerade enabled on both tenants
-- No floating self-ips configured
Impact:
MAC masquerade may not work properly causing traffic failures such as packets not arriving on the tenant. Or excessive DLFs on the network.
Workaround:
Add floating self-ips to all traffic VLANs that are using MAC masquerade.
Fixed Versions:
21.1.0, 21.0.0.1
2007433 : CAPTCHA submit button text not configurable
Links to More Info: BT2007433
Component: Application Security Manager
Symptoms:
The CAPTCHA challenge displays a lowercase "submit" button, with no option to customize the label.
Conditions:
Bot Defense with Captcha mitigation is attached to a virtual server
OR
WAF policy with brute force using captcha mitigation is attached to a virtual server.
Impact:
Limited customization options may affect branding consistency or localization needs, especially for specific capitalization or language support requirements.
Workaround:
None
Fixed Versions:
21.1.0
1998985-3 : "Page Unresponsive" error message when editing Active Directory group resource with large AD group count
Links to More Info: BT1998985
Component: Access Policy Manager
Symptoms:
The Active Directory Group resource page becomes unresponsive
Conditions:
AD Group Resource is configured for an Active Directory server that has a large group count.
Impact:
Active Directory Group Resource agent cannot be edited
Workaround:
Delete the existing Active Directory Group Resource agent and recreate it by first adding the desired resources (e.g., VDI, RDP, Webtops, etc.) during the edit operation. After adding the resources, attach the Active Directory server as the final step.
Fixed Versions:
21.1.0, 17.5.1.4
1991297-2 : [APD][SAML-SSO]high memory due to SAML SSO leak
Links to More Info: BT1991297
Component: Access Policy Manager
Symptoms:
Tmm crashes due to out of memory while passing SAML-SSO traffic
Conditions:
SAML SSO configured with saml artifact sign.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fixed Versions:
21.1.0, 21.0.0.1
1989033 : IPsec IKEv2 tunnel may fail to initiate or respond due to ERR_PORT
Links to More Info: BT1989033
Component: TMOS
Symptoms:
In very rare circumstances the BIG-IP may fail to initiate or respond to an IKEv2 tunnel.
When debug2 is enabled, the following log messages in the tmm log indicates a potential match for this bug. ERR_PORT is a critical indicator of the failure condition.
<13> <date> <hostname> notice ike_connect/3154: @F: ike flow created 172.16.61.100:172.16.61.200 rd: 0 owner=0.2 me=0.2
<13> <date> <hostname> notice ike_connect/3218: @F: ISAKMP_CONN local=172.16.61.100:500 remote=172.16.61.200:500
<13> <date> <hostname> notice ike_proxy_connect/1510: @E: flow_connect() ERR ERR_PORT
<13> <date> <hostname> notice ike_connect/3241: @E: ERR ERR_PORT
<13> <date> <hostname> notice pfkey_isakmp_reconnect/5231: @E: can't create isakmp flow to 172.16.61.100:500 172.16.61.200:500 %0, err ERR_PORT.
<13> <date> <hostname> notice pfkey_isakmp_reconnect/5241: @E: ERR ERR_PORT
The ipsec.log will contain different messages.
ipsec.log - BIG-IP attempts to start the connection, the INTERNAL_ERR is a critical indicator:
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: rcf_remote_cite: (remote why='@B:deepcopy:MAKE' me=0x4000c6cbaa08#4035 pa=2643 name='/Common/<ike peer name>' ip='<remote IP>[500]')
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INTERNAL_ERR]: ikev2_allocate_sa: ERR Invalid BIG-IP flow context for <local IP>[500]-><remote IP>[500] peer='/Common/<ike peer name>'
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_allocate_sa: @A: Insert ike_sa 0x4000c7aa2c88, SPI 1c96e4465b82fc39 0000000000000000 in list (peer='/Common/<ike peer name>')
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_state_transition: [ikev2_dh_generate] @I:ike_sa 0x4000c7aa2c88 SPI=1c96e4465b82fc39 0000000000000000 state IDLING -> DH_REQ
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_state_transition: [ikev2_dh_generate_callback] @I:ike_sa 0x4000c7aa2c88 SPI=1c96e4465b82fc39 0000000000000000 state DH_REQ -> DH_DONE
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_next_request_id: @A: send message (id 0) sa=0x4000c7aa2c88 (loc=<local IP>[500] rem=<remote IP>[500])
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_state_transition: [ikev2_set_state] @I:ike_sa 0x4000c7aa2c88 SPI=1c96e4465b82fc39 0000000000000000 state DH_DONE -> INI_IKE_SA_INIT_SENT
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] (req at='@M:PUSH:ikev2_send_request' SPI='1c96e4465b82fc39 0000000000000000' gen=0x1 MID=0 pkt=0x4000c7ec9558)
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] (payloads dir=SEND at=ikev2_send_request payl=0x4000c442ca88 len=432 crc=0x47699687
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] @ . (v2_head i_spi=0x1c96e4465b82fc39 r_spi=0x0000000000000000 next=33:PAYLOAD_SA
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] @ . . . ver=0x20 exch=34:IKE_SA_INIT flags=0x8:I-Q id=0 len=432 crc=0x47699687)
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] @ . (hd type=33:PAYLOAD_SA next=34:PAYLOAD_KE byte=0 len=48 off=0x1c)
...
ipsec.log - BIG-IP retransmits a few more times:
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_retransmit: @M: retransmit 0x4000c7d77b78 pkt 0x4000c7ec9558 msg_id=0 req 0x4000c7d77b08 SPI 1c96e4465b82fc39 0000000000000000 count 0
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_retransmit: @M: retransmit 0x4000c7d77b78 pkt 0x4000c7ec9558 msg_id=0 req 0x4000c7d77b08 SPI 1c96e4465b82fc39 0000000000000000 count 1
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_retransmit: @M: retransmit 0x4000c7d77b78 pkt 0x4000c7ec9558 msg_id=0 req 0x4000c7d77b08 SPI 1c96e4465b82fc39 0000000000000000 count 2
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_retransmit: @M: retransmit 0x4000c7d77b78 pkt 0x4000c7ec9558 msg_id=0 req 0x4000c7d77b08 SPI 1c96e4465b82fc39 0000000000000000 count 3
ipsec.log - BIG-IP cancels the negotiation after a timeout:
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_negotiation_timeout_callback: ikev2_negotiation_timeout_callback1 ike_sa rmconf : 3335236104
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_negotiation_timeout_callback: ikev2_negotiation_timeout_callback2 rmconf ikev2 : 3343372872
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_negotiation_timeout_callback: ikev2_negotiation_timeout_callback3 ikev2 plog : 0
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_negotiation_timeout_callback: negotiation timeout: ike_sa (ick=0x1c96e4465b82fc39, rck=0x0000000000000000)
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [PROTO_ERR]: __ikev2_abort: ike_sa=0x4000c7aa2c88 ABORT, ERR errno='110', SPI 1c96e4465b82fc39 0000000000000000
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_state_transition: [ikev2_set_state] @I:ike_sa 0x4000c7aa2c88 SPI=1c96e4465b82fc39 0000000000000000 state INI_IKE_SA_INIT_SENT -> DYING
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] (req at='@M:POP:ikev2_cancel_retransmit_req' SPI='1c96e4465b82fc39 0000000000000000' gen=0x1 MID=0 pkt=0x4000c7ec9558)
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_state_transition: [ikev2_set_state] @I:ike_sa 0x4000c7aa2c88 SPI=1c96e4465b82fc39 0000000000000000 state DYING -> DEAD
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_ha_send_sa_delete: high availability (HA) SA is already deleted from Session DB
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: rcf_remote_cite: (remote why='@B:clean:FREE' me=0x4000c6cbaa08#4035 pa=2643 name='/Common/<ike peer name>' ip='<remote IP>[500]')
Conditions:
-- IPsec IKEv2
-- Tunnel may be newly configured
-- BIG-IP does not transmit or respond to any packets related to the configured tunnel.
Impact:
When this occurs, the tunnel will be down permanently.
Workaround:
If this is a High Availability (HA) peer and the config is sync'd with the Standby, failing over to the Standby may bring the tunnel up.
However, a second failover (fail back to the original high availability (HA) device) will lead to the tunnel down again. The original device once Active again, is still in the same failure mode.
One workaround is to failover, check the tunnel is up and then reboot or 'bigstart restart' the failing Standby device.
After that, the IKE SA should appear correctly mirrored on the Standby, use 'tmsh show net ipsec ike-sa' and check there is an SA with the peer's IP.
The second workaround is to delete all IPsec config objects, self IP and route-domain associated with the tunnel. In the case where the IPsec config, self IPs and routes exist entirely in route-domain 0 this is not a reasonable solution and rebooting is the most sensible recovery step.
Fixed Versions:
21.1.0
1988993-1 : CVE-2024-42516 Apache HTTP Server vulnerability
Links to More Info: K000153074, BT1988993
1987309 : Bigd may get stuck in legacy mode
Links to More Info: BT1987309
Component: Local Traffic Manager
Symptoms:
Https monitors may spuriously mark a pool member as down and it will fail to mark the pool member back up.
The monitor remains in legacy mode, and probes are sent using TLS 1.0.
Conditions:
-- Server supports version TLSv1.2 and above.
-- bigd is configured to monitor the server with SSL.
-- The monitor flips into legacy mode.
Impact:
Bigd is stuck in legacy mode.
Workaround:
Bigd can be brought out of legacy mode by detaching and re-attaching monitor to the pool.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1983349-2 : CVE-2023-2454, CVE-2023-39417, CVE-2023-39418, CVE-2023-5868, CVE-2023-5869, CVE-2023-5870 PostgreSQL vulnerabilities
Links to More Info: K000152931, BT1983349
1983209 : Zone does not sync correctly when record is modified
Links to More Info: BT1983209
Component: Global Traffic Manager (DNS)
Symptoms:
BIND zones do not synchronize properly across devices in a sync group when the synchronization involves a large configuration.
Conditions:
BIG-IP GTM sync setup with a large BIND configuration
Modification of resource records in BIND zones
Impact:
The zone synchronization issue causes BIG-IP to serve outdated or stale DNS data.
Fixed Versions:
21.1.0
1983145 : Memory Corruption due to xnet-DPDK★
Links to More Info: K000153024, BT1983145
Component: TMOS
Symptoms:
TMM crashes due to data corruption caused by xnet-DPDK. This can occur after upgrading from version 17.5.0 to version 17.5.1.
Conditions:
1) Using xnet-DPDK driver
2) DPDK v20.11 is being used (BIG-IP v17.5.x or higher)
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Two possible workarounds here:
1. Disable TSO globally:
tmsh modify sys db tm.tcpsegmentationoffload value disable
2. Switch to the sock driver:
https://my.f5.com/manage/s/article/K000153024
Fixed Versions:
21.1.0
1977057-4 : Memory leak when using an iRule to overwrite MR peer route
Links to More Info: BT1977057
Component: Service Provider
Symptoms:
Messagerouter memory consumption is excessive:
tmctl memory_usage_stat -w 300 | grep 'name\|messagerou'
name allocated max_allocated size slop cur_allocs tot_allocs fail_allocs type caches_used
dns_qname_cache 0 0 1280 255 0 0 0 std:
messagerouter 5384040 5924240 1 0 3253 122000 0 var:
Conditions:
'MR::message route' is used to overwrite peer route.
Impact:
Memory leak possibly leading to system overload/crash.
Workaround:
None
Fixed Versions:
21.1.0, 17.5.1.4
1975297 : TMM may fail to start up with max number of interfaces for Azure instances <= 16 vCPUs
Links to More Info: BT1975297
Component: TMOS
Symptoms:
There are "vmbus_open subchannel failed: -12" kernel errors for uio module, uio_hv_generic. These errors prevent the TMM module from finishing initialization.
Conditions:
-- Using VE Azure
-- Using Azure instances with <= 16 vCPUs
Impact:
Azure VM is unable to reach Active state.
Workaround:
Use an Azure instance with more RAM. For example, F8s_v2 has 16 GiB of RAM and has a total limit of 4 interfaces. Instance size, E8ds_v5, has 64 GiB of RAM and can reach Active state with 4 interfaces.
Fix:
N/A
Fixed Versions:
21.1.0
1974701 : PVA stats may be double incremented when pva mode is dedicated
Links to More Info: BT1974701
Component: TMOS
Symptoms:
Offloaded connections may be double counted for dedicated PVA flows.
Conditions:
PVA mode is set to dedicated in fastl4 profile.
Impact:
Incorrect stats.
Workaround:
None
Fix:
Offloaded dedicated PVA flows are counted once.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1972541 : Tmsh load sys config verify leaks compiled ltm (CPM) policies
Links to More Info: BT1972541
Component: Local Traffic Manager
Symptoms:
When LTM (CPM) policies are in use on virtual servers and 'tmsh load sys config verify' is used, memory in /dev/shm is leaked each time the verify command is used.
With multiple uses and many virtual servers with policies this could lead to the BIG-IP system having low memory and suffering from low memory symptoms (see impact).
df -h may show /dev/shm/ having abnormally high use.
cat /proc/meminfo may show abnormally high shmem, and low memory indicated by low MemAvailable. These statistics are also available in qkviews loaded on iHealth.
Conditions:
-- LTM (CPM) policy attached to one or more virtual servers
-- Use of 'tmsh load sys config verify'
Impact:
The amount of shared memory leaked at each use of 'tmsh load sys config verify' is typically:
Number of virtual servers with attached policies * 4KB.
Very large or complex policies may be a multiple of 4KB.
The number of compiled LTM policies in shared memory is:
ls -1 /dev/shm | grep loipc_vs_ | wc -l
There should be one for each virtual server with LTM policies.
Low memory symptoms can include:
- sluggishness to loss of contact when managed via GUI (web interface) or tmsh/bash over ssh
- poor process scheduling which may lead to daemons being aborted by software watchdog leading to production of core files.
- oom killer activity, where processes are terminated by kernel to free memory as an emergency measure
- loss of service
- reboot if symptoms develop fully into protracted thrashing
Workaround:
Reboot of the system will clear the leaked memory.
Fixed Versions:
21.1.0
1970969 : Stale Record Answers counter increments for SERVFAIL responses from DNS resolver cache
Links to More Info: BT1970969
Component: Global Traffic Manager (DNS)
Symptoms:
Stale Record Answers counter increments incorrectly when no stale record is served and a SERVFAIL is sent.
Conditions:
-- Configure DNS cache resolver with a forwarder.
-- Make sure forwarder does not respond to DNS queries.
-- Enable 'ltm dns cache global-settings serve-expired'
-- Send a few DNS requests to DNS cache for a record which is to be handled by not responding forwarder.
-- Observe 'Stale Record Answers' counter for DNS cache.
Impact:
Leads to incorrect Stale Record Answers stat, potentially misleading monitoring, troubleshooting, and operational decisions.
Workaround:
None
Fixed Versions:
21.1.0
1969889-2 : Expired certificates sent to clients by tmm due to network time synchronization
Links to More Info: BT1969889
Component: Local Traffic Manager
Symptoms:
Clients are receiving certificates that are expired or invalid, leading to SSL handshake failures accompanied by security warnings.
Conditions:
-- A virtual server configured with ClientSSL and ServerSSL profiles, both having SSL forward proxy enabled, experiences a change in system time (time advanced) due to a network glitch or issue.
Impact:
Clients receiving expired/invalid certificates causes traffic disruption.
Workaround:
From TMSH, Running the following command will delete the cached certificates associated with the specified virtual server and client SSL profile.
(tmos)# delete ltm clientssl-proxy cached-certs virtual <name> clientssl-profile <name>
Fix:
Before sending a certificate to the client, the certificate from the SSL cache is checked for expiration. If the cached certificate is found to be expired, it is removed from the cache, and a new forged certificate is generated and stored in the cache.
Fixed Versions:
21.1.0
1967485-1 : Old Logs in /var/log Not Deleted When Storage Exceeds Threshold
Component: TMOS
Symptoms:
Logs for various modules are stored in the /var/log directory, with older files compressed into tar files over time. When the storage in /var/log exceeds the warning threshold, a cleanup mechanism is triggered to delete tar files and free up space for incoming logs. However, the cleanup process deletes newer tar files first, leaving the oldest tar files untouched.
Conditions:
This issue occurs when BIG-IP accumulates logs to the point where the /var/log directory surpasses the storage threshold.
Impact:
When the storage threshold is exceeded, BIG-IP initiates cleanup of tar files. However, tar files containing the oldest module logs are not deleted.
Workaround:
Use the command below to delete the old tar files available in /var/log/ directory
rm <tarFileName>
Fix:
A fix has been implemented to ensure that when the /var/log directory exceeds its storage threshold, all tar files, including those containing the oldest logs, are deleted during the cleanup process.
Fixed Versions:
21.1.0
1967005 : TMM crash on R2x00/R4x00 platforms
Links to More Info: BT1967005
Component: Local Traffic Manager
Symptoms:
Tmm crashes repeatedly.
Conditions:
1. BIG-IP tenant running on R2x00/R4x00 platforms.
2. More than 510 multicast MAC addresses are configured on VF MAC filters.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
If a config backup file is being loaded, remove a few entries of IPv6 address (either VIPs or Selfips) to make sure the entries does not exceed 510.
If this occurs after configuring more than 510 multicast MAC addresses, remove the configuration related to the IPv6 addresses.
Fixed Versions:
21.1.0
1966965 : Client Download page update for linux client packages
Component: Access Policy Manager
Symptoms:
Client Download page missed download links for linux VPN client package (F5 VPN for Linux ( linux_f5vpn.aarch64.deb )).
Conditions:
Have APM Licensed
1. Go to Access -> Connectivity/VPN -> Connectivity -> Client Downloads
Impact:
Not able to download F5 VPN for Linux package.
Workaround:
1. Click on any VPN package from the download page (ex F5 VPN for Linux ( linux_f5vpn.x86_64.deb ))
2. Change the end of the url in the newly opened tab from linux_f5vpn.x86_64.deb to sam/webtop/public/download/linux_f5vpn.aarch64.deb
Fix:
Client Download page updated for linux client packages.
Fixed Versions:
21.1.0
1966941 : High CPU or increased translation errors following upgrade or restart when DAG distribution changes
Links to More Info: BT1966941
Component: TMOS
Symptoms:
Dagv2 tables are randomized and may change when a tmm is restarted. This can result in a change of traffic distribution, which in some cases may lead to traffic disruption.
The specific condition when this option was introduced is using a CGNAT pool that is not large enough.
Other ways of encountering include increased translation failed errors following an upgrade or restart or blade replacement.
Conditions:
Tenant tmm is restarted (or VELOS chassis rebooted)
Impact:
- dag distribution changes which may cause a traffic disruption.
Workaround:
You can restart tmm until the distribution is good, which can be checked using tools like cmp_dest.
Fix:
Added DB variables to control dagv2 behavior - sdag.runtime.hashtable and sdag.runtime.mirror.hashtable. The format is a list of hexadecimal entries separated by a colon, same as `tmctl -d blade tmm/sdaglib_hash_table`. Both variables must be set. A tmm restart is required after locking the new dag tables. The default value is "<null>".
Fixed Versions:
21.1.0, 17.5.1.4
1966669-3 : [PVA] Provide a DB variable disabling NAT46/64 snoop inserts.
Links to More Info: BT1966669
Component: TMOS
Symptoms:
Starting from version 16.X NAt64/46 traffic can be accelerated in PVA. Under some circumstances this is not desired. A DB variable is needed to disable NAt64/46 offload to hardware.
Conditions:
- Nat46/64 configured on virtual-servers eligible for hardware offload.
- Version 16.X or above.
Impact:
Hardware offload of Nat64/46 traffic is not desired in some cases.
Workaround:
None
Fixed Versions:
21.1.0, 17.5.1.4
1966633 : Non-eth0 management interface unbound after tmm restart on 17.5.0 in AWS★
Links to More Info: BT1966633
Component: TMOS
Symptoms:
Management connectivity is lost after licensing BIG-IP 17.5.0 on AWS. The parameter provision.managementeth was changed to non-eth0 interface during deployment with cloud-init. When the issue occurs, the mgmt bridge loses the associated interface ethX.
Conditions:
1. Deploy an instance on AWS.
2. Change provision.managementeth to non-eth0 device and reboot.
3. After boot up, any operation that restart tmm (i.e. licensing BIG-IP) will cause the issue.
Impact:
Management connectivity is lost to BIG-IP instance.
Workaround:
Reboot the device twice after licensing the device. One reboot will not resolve the issue.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4
1966405 : Changes to DNS cache resolver may cause service disruption on BIG-IP DNS v17.1.2.1★
Links to More Info: BT1966405
Component: Global Traffic Manager (DNS)
Symptoms:
All DNS PTR queries are forwarded to the configured forward zone. If any change is made to the local zones, such as adding a new local zone; the system begins responding to PTR queries with NXDOMAIN.
Conditions:
Occurs on BIG-IP DNS version 17.1.2 and above
Triggered when changes are made to local zones
Impact:
Queries respond with NXDOMAIN.
Workaround:
Restart tmm:
bigstart restart tmm
Fixed Versions:
21.1.0, 21.0.0.1
1959629 : CSR generation via the GUI removes Subject Alternative Name (SAN) string. Also, when SAN is configured with small prefix chars "dns:", no error is thrown.
Links to More Info: BT1959629
Component: Local Traffic Manager
Symptoms:
1) The GUI does not throw an error when subject alternative name is set with lower case prefix "dns:".
2) The GUI does not set SAN strings while generating CSR on GUI. (this does not occur on 17.1.2.2)
Conditions:
-- Use the GUI to create a CSR which is to be signed by other CA, setting "Subject Alternative Name (SAN)" strings with prefix "dns:" in lower case instead of "DNS:".
In this case, the CSR is generated but an error should occur.
-- Use the GUI to create a CSR with a SAN string containing the correct prefix with capitalized "DNS:".
In this case, CSR generation finishes with no error. However, looking at generated CSR, the SAN field is omitted.
Impact:
An invalid certificate is created.
Workaround:
Create the CSR via tmsh (tmsh create sys crypto csr) instead of the GUI
Fixed Versions:
21.1.0
1959549 : Upgrade to 17.5.0 or later overwrites #TMSH-VERSION in bigip_base.conf when source UCS is pre-17.5.0★
Links to More Info: BT1959549
Component: TMOS
Symptoms:
When upgrading from versions below 17.5.0 to 17.5.0 or later, the #TMSH-VERSION marker in bigip_base.conf is rewritten to the target system version instead of preserving the source UCS version. This prevents MCPD schema migration code from executing, potentially causing configuration mismatches and missing schema-based workarounds.
Conditions:
- roll-forward upgrade from v14.x/v15.x/v16.x/v17.1.x to v17.5.1 and later releases. upgrade from v17.5.x to v21.x and later versions is not affected.
Impact:
Overwriting TMSH-VERSION in bigip_base.conf file, uses the wrong schema when loading the configuration and miss applying MCP schema based workarounds.
Workaround:
None
Fixed Versions:
21.1.0, 17.5.1.4
1959361 : When running a tenant with more than 72 VCPUs / cores, adminstall crashes
Links to More Info: BT1959361
Component: Anomaly Detection Services
Symptoms:
When running a tenant with more than 72 VCPUs / cores, adminstall crashes.
Conditions:
When ASM provisioned and running a Tenant with more than 72 VCPUs / cores per blade.
Impact:
DOSL7 (BADOS) is not functioning. Core created.
Workaround:
None
Fix:
Now adminstall donot crash, when ASM provisioned and Tenant with more than 72 VCPUs / cores per blade.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1959181 : Proxy Select Agent does not persist clients to their selected upstream proxy
Component: SSL Orchestrator
Symptoms:
When per-request policy uses the Proxy Select Agent to route traffic to an upstream HTTP proxy pool, clients are not consistently sent to the same proxy on each new connection. A different proxy pool member may be selected each time even when a persistence profile is attached to the virtual server.
Conditions:
This issue occurs when all of the following are true:
-- LTM/APM virtual or SSLO topology uses a per-request policy with a Proxy Select Agent configured.
-- A persistence profile is attached to the virtual server.
Impact:
Each connection from the same client can be routed to a different upstream proxy.
Workaround:
None.
Fix:
The Proxy Select Agent now passes only the pool selection to the virtual server, which applies the configured persistence profile to select the correct member. This ensures clients are consistently routed to the same upstream proxy.
Fixed Versions:
21.1.0
1953369-4 : DB monitor queries repeatedly if recv string configured but response does not match
Links to More Info: BT1953369
Component: Local Traffic Manager
Symptoms:
A database monitor (mssql, mysql, oracle, postgresql) may send multiple queries to the database server in quick succession if the monitor is configured with a 'recv' string, but the response from the server does not contain the configured string.
Conditions:
-- A database monitor (mssql, mysql, oracle, postgresql) is configured with a 'recv' string.
-- The query to the database server completes successfully, but the response does not contain the configured 'recv' string.
Impact:
The database monitor correctly marks the configured pool member 'DOWN' as appropriate, but generates unnecessary queries to the database server.
Workaround:
None
Fixed Versions:
21.1.0, 17.5.1.4
1953357 : Persistence Profiles do not work on SSLO inspection service virtual servers
Component: SSL Orchestrator
Symptoms:
When a persistence profile (for example, source address affinity) is attached to an SSLO inspection service entry virtual server, traffic from the same client is not always sent to the same pool member or inspection device. Clients get distributed across different service pool members instead of sticking to one.
Conditions:
This issue occurs on F5OS based physical appliances (for example, VELOS or rSeries hardware). SSLO topology must have an inspection service pool with more than one member and a persistence profile attached to the inspection service entry virtual server.
Impact:
Client traffic is not consistently routed to the same inspection service.
Workaround:
None.
Fix:
This fix ensures that clients are consistently sent to the same inspection service pool member when a persistence profile is attached to the SSLO inspection service entry virtual server. This is supported for all services except ICAP.
Fixed Versions:
21.1.0
1953273 : Big3d high CPU with thousands of https monitors with SNI
Links to More Info: BT1953273
Component: Global Traffic Manager (DNS)
Symptoms:
Big3d high CPU utilization occurs
Conditions:
Large volume of https monitors and monitored resources with SNI configured.
Impact:
Big3d high CPU utilization
Workaround:
None
Fixed Versions:
21.1.0
1943269 : GTM Server can be deleted while referenced by GTM Pools
Links to More Info: BT1943269
Component: Global Traffic Manager (DNS)
Symptoms:
A GTM server object can be deleted even when it was referenced by GTM pools. Deleting the server will also remove it from the associated pool members without any warning.
Conditions:
Occurs when a GTM virtual server is referenced in one or more GTM pools.
Impact:
This may cause unexpected behavior or service disruption if the server is deleted while still in use.
Workaround:
None.
Fix:
A validation check has been added to prevent deletion of a GTM server that is referenced by GTM pools, and a warning is now displayed to the user. This behavior is controlled by the DB variable gtm.gtmserverdeletevalidation, which is disabled by default and must be enabled to enforce the deletion restriction.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1943217-3 : BGP - using 'no bgp default ipv4-unicast' might lead to a crash
Links to More Info: BT1943217
Component: TMOS
Symptoms:
Using 'no bgp default ipv4-unicast' might lead to a crash when saving a configuration.
Conditions:
'no bgp default ipv4-unicast' configured.
Impact:
Bgpd crash/core.
Workaround:
Do not use 'no bgp default ipv4-unicast' configuration statement.
Fixed Versions:
21.1.0, 17.5.1.3, 17.1.3.1
1938101 : Performance issue on specific parameters extractions
Links to More Info: BT1938101
Component: Application Security Manager
Symptoms:
Performance degradation on specific pages
Conditions:
When there are dynamic parameters extractions using HTML and also AJAX response page enabled.
Impact:
Slowdown of the extraction page load time
Workaround:
None
Fixed Versions:
21.1.0
1934373 : DoS attack is blocking while transparent
Links to More Info: BT1934373
Component: Application Security Manager
Symptoms:
A DoS attack is blocking while configured as transparent.
The blocking is only by resets
Conditions:
A transparent volumetric dosl7 and web acceleration profile are configured on the same virtual
Impact:
Blocking even though the configuration is transparent.
Workaround:
tmsh modify sys db dosl7d.static_uri_protection value disable
Fixed Versions:
21.1.0
1934073 : PEM policy rule incorrectly matching when using a flow condition
Links to More Info: BT1934073
Component: Policy Enforcement Manager
Symptoms:
When a PEM policy rule is configured to match the destination IP address and port, the message might match the source IP and port instead.
Conditions:
PEM policy rule is using flow conditions to match IP address and port
Impact:
An incorrect policy rule might be matched
Workaround:
None
Fix:
The PEM policy rule now correctly matches the source and destination IP addresses and ports when the flow condition is used.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.3, 17.1.3, 16.1.6.1
1933373 : Newly added Threat Campaigns are missing REST ID
Links to More Info: BT1933373
Component: Application Security Manager
Symptoms:
Newly created UTF-8 policies have an empty value for the REST ID (rest_uuid) in some or all Policy Threat Campaigns.
Conditions:
- Create a new UTF-8 policy using BIG-IP with no Threat Campaign license.
- License the Threat Campaign functionality.
- Create a second UTF-8 policy with the Threat Campaign enabled.
Impact:
Newly added Threat Campaigns are missing the REST ID.
Workaround:
- After license Threat Campaigns, the cached binary policy templates must be cleared to ensure newly created policies use updated templates reflecting the licensed Threat Campaign functionality.
Remove cached binary policy templates by running:
rm /var/ts/install/policy_templates/*.bin
- Threat Campaigns in new UTF-8 policy should have REST IDs.
Fix:
Fix newly created UTF-8 policies have value for REST ID (rest_uuid) in all Policy Threat Campaigns.
Fixed Versions:
21.1.0, 17.1.3.1
1933357 : DNS64 stats between cache resolver and TMM non-cache have inconsistent behavior.
Links to More Info: BT1933357
Component: Global Traffic Manager (DNS)
Symptoms:
DNS64 stats (tmstat table profile_dns_stat) in the TMM behave as follows:
dns64reqs - A queries to the server after the AAAA queries fail. Does not include the AAAA queries.
dns64fails - Failed AAAA queries to the server. Does not include the subsequent A queries.
DNS64 stats (tmstat table dns_cache_resolver_stat) in the cache behave as follows:
mesh.dns64reqs - Includes both A and AAAA queries to the server. Includes both successful and failed AAAA queries.
mesh.dns64nodata - Includes both A and AAAA query nodata responses (rcode=0 and no records).
mesh.dns64error - Includes both A and AAAA query error rcode responses.
mesh.dns64timeout - Includes both A and AAAA query timed-out responses.
Conditions:
-- A DNS resolver cache is enabled on a DNS profile.
-- The DNS profile has DNS64 configured.
Impact:
The current cache resolver stats makes it difficult to diagnose backend DNS64 performance.
Workaround:
None
Fix:
Mesh.dns64reqs behaves like the TMM's dns64reqs (counts only DNS64 A queries to the server.) Additionally, a new stat mesh.dns64fails sums all failures (mesh.dns64nodata, mesh.dns64error, mesh.dns64timeout) and, like the TMM, only counts DNS64 AAAA failures to the server.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1933105 : TMM does not fragment the output before encapsulating the payload
Links to More Info: BT1933105
Component: TMOS
Symptoms:
Tmm does not fragment the traffic before it goes to encapsulation
Conditions:
- IPSec
-- Tmm receives fragmented payload
Impact:
Large packets are not fragmented on egress.
Workaround:
None
Fixed Versions:
21.1.0
1930897 : Tmm core due to overflow of ifc ref counts with flow forwarding
Links to More Info: BT1930897
Component: Local Traffic Manager
Symptoms:
Tmm crashes when passing high amounts of traffic.
Conditions:
Flow forwarding rejected when accepting flows due to high volume of packets that exhausts connection limit and overflows the ifc ref count.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fix:
Release ifc ref counts for flow forwarding when flow_accept rejects a packet.
Fixed Versions:
21.1.0, 17.1.3
1927521 : DPDK has dependency on SSSE3
Links to More Info: BT1927521
Component: TMOS
Symptoms:
TMM goes into restart loop with following error in /var/log/tmm regarding SSSE3 not being available
notice ERROR: This system does not support "SSSE3".
notice Please check that RTE_MACHINE is set correctly.
notice EAL: FATAL: unsupported cpu type.
notice EAL: unsupported cpu type.
notice dpdk: Error: rte_eal_init() failed, err=-1
notice xnet_lib [pci:0000:02:00.0]: Error: Failed to initialize driver
notice xnet[02:00.0]: Error: Unable to attach to xnet dev
notice xnet(1.1)[02:00.0]: Error: Unable to initialize device
notice xnet(1.1)[02:00.0]: Waiting for tmm1 to reach state 4...
notice ndal Error: Restarting TMM
notice Initiating TMM shutdown.
notice tap(tap)[00:00.0]: Waiting for tmm1 to reach state 4...
notice ---------------------------------------------
Conditions:
1) xnet-DPDK is being used
2) BIG-IP running in an environment where SSSE3 is not available either because CPU is so old that it does not support SSSE3 or SSSE3 has been disabled in VM's config.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Modify guest VM's config on hypervisor and enable SSSE3 feature in CPU settings. Most CPUs should support SSSE3, but hypervisor may be masking off feature from virtual CPU for guest. For best performance in this and other areas such as crypto it may be best to not mask the real CPU feature set from the virtual CPU.
For Azure/Hyper-V see https://my.f5.com/manage/s/article/K000159028 and note link for processor compatibility mode.
Or:
Switch to 'sock' driver by adding the following line into /config/tmm_init.tcl, replacing <VENDOR_ID:DEVICE_ID> with the corresponding interfaces' Vendor and Device IDs shown via 'lspci -nn'.
For environments in HyperV or Azure, f5f5:f550 should be used for Vendor and Device.
[root@BIGIP:Active:Standalone] log # cat /config/tmm_init.tcl
device driver vendor_dev <VENDOR_ID:DEVICE_ID> sock
[root@BIGIP:Active:Standalone] log #
Fix:
Fallback from DPDK to sock driver if CPU feature 'SSSE3' is not exposed in virtual CPU.
Fixed Versions:
21.1.0
1925485-2 : CVE-2020-12655 kernel: sync of excessive duration via an XFS v5 image with crafted metadata
Component: TMOS
Symptoms:
An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767.
Conditions:
NA
Impact:
It can cause a kernel crash or hang, resulting in a denial of service.
Workaround:
NA
Fix:
Denial of Service issue in the kernel has been resolved.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1925369-2 : CVE-2018-10322 kernel: Invalid pointer dereference in xfs_ilock_attr_map_shared() when mounting crafted xfs image allowing denial of service
Component: TMOS
Symptoms:
The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_ilock_attr_map_shared invalid pointer dereference) via a crafted xfs image.
Conditions:
NA
Impact:
It can trigger a kernel panic, resulting in a denial of service.
Workaround:
NA
Fix:
The Denial of Service issue has been resolved in the kernel.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1925045-2 : CVE-2024-35849 - Linux Kernel Btrfs Information Leak Vulnerability
Component: TMOS
Symptoms:
In the Linux kernel, the following vulnerability has been resolved: btrfs: fix information leak in btrfs_ioctl_logical_to_ino() Syzbot reported the following information leak for in btrfs_ioctl_logical_to_ino(): BUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:114 [inline] BUG: KMSAN: kernel-infoleak in _copy_to_user+0xbc/0x110 lib/usercopy.c:40 instrument_copy_to_user include/linux/instrumented.h:114 [inline] _copy_to_user+0xbc/0x110 lib/usercopy.c:40 copy_to_user include/linux/uaccess.h:191 [inline] btrfs_ioctl_logical_to_ino+0x440/0x750 fs/btrfs/ioctl.c:3499 btrfs_ioctl+0x714/0x1260 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:904 [inline] __se_sys_ioctl+0x261/0x450 fs/ioctl.c:890 __x64_sys_ioctl+0x96/0xe0 fs/ioctl.c:890 x64_sys_call+0x1883/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:17 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f Uninit was created at: __kmalloc_large_node+0x231/0x370 mm/slub.c:3921 __do_kmalloc_node mm/slub.c:3954 [inline] __kmalloc_node+0xb07/0x1060 mm/slub.c:3973 kmalloc_node include/linux/slab.h:648 [inline] kvmalloc_node+0xc0/0x2d0 mm/util.c:634 kvmalloc include/linux/slab.h:766 [inline] init_data_container+0x49/0x1e0 fs/btrfs/backref.c:2779 btrfs_ioctl_logical_to_ino+0x17c/0x750 fs/btrfs/ioctl.c:3480 btrfs_ioctl+0x714/0x1260 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:904 [inline] __se_sys_ioctl+0x261/0x450 fs/ioctl.c:890 __x64_sys_ioctl+0x96/0xe0 fs/ioctl.c:890 x64_sys_call+0x1883/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:17 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f Bytes 40-65535 of 65536 are uninitialized Memory access of size 65536 starts at ffff888045a40000 This happens, because we're copying a 'struct btrfs_data_container' back to user-space. This btrfs_data_container is allocated in 'init_data_container()' via kvmalloc(), which does not zero-fill the memory. Fix this by using kvzalloc() which zeroes out the memory on allocation.
Conditions:
NA
Impact:
It can leak uninitialized kernel memory to user space, potentially exposing sensitive information.
Workaround:
NA
Fix:
The information leak issue has been resolved in the kernel.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1925029-2 : CVE-2023-1611 - Linux Kernel btrfs Use-After-Free Vulnerability Leading to System Crash and Information Leak
Component: TMOS
Symptoms:
A use-after-free flaw was found in btrfs_search_slot in fs/btrfs/ctree.c in btrfs in the Linux Kernel.This flaw allows an attacker to crash the system and possibly cause a kernel information leak
Conditions:
NA
Impact:
It can cause a kernel crash (denial of service) and may lead to a kernel information leak.
Fix:
The system crash and information leak issue has been resolved in the kernel.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1924693-2 : CVE-2020-26939 bouncycastle: Address OAEP decoding side-channel leaking RSA private exponent
Component: TMOS
Symptoms:
Attackers can obtain sensitive information about a private exponent because of Observable Differences in Behavior to Error Inputs. This occurs in org.bouncycastle.crypto.encodings.OAEPEncoding. Sending invalid ciphertext that decrypts to a short payload in the OAEP Decoder could result in the throwing of an early exception, potentially leaking some information about the private exponent of the RSA private key performing the encryption.
Conditions:
Bouncy Castle BC versions before 1.61 are vulnerable
Impact:
The vulnerability leaks side-channel information about the RSA private exponent
Workaround:
N/A
Fix:
bouncycastle has been upgraded to 1.61 to address this vulnerability.
Fixed Versions:
21.1.0
1923997-2 : CVE-2023-1668-openvswitch: ip proto 0 triggers incorrect handling
Component: TMOS
Symptoms:
A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow.
Conditions:
NA
Impact:
It can cause incorrect handling or misrouting of other IP packets, potentially leading to traffic disruption or denial of service.
Workaround:
NA
Fix:
The denial of service issue has been resolved in the package.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1923817-2 : CVE-2017-11499: Constant Hashtable Seeds vulnerability (NodeJS v6.9.1)
Component: Local Traffic Manager
Symptoms:
Node.js v4.0 through v4.8.3, all versions of v5.x, v6.0 through v6.11.0, v7.0 through v7.10.0, and v8.0 through v8.1.3 was susceptible to hash flooding remote DoS attacks as the HashTable seed was constant across a given released version of Node.js. This was a result of building with V8 snapshots enabled by default which caused the initially randomized seed to be overwritten on startup.
Conditions:
NA
Impact:
It can cause high CPU usage and event loop blocking, leading to a remote denial of service.
Workaround:
NA
Fix:
Hash flooding remote DoS issue has been resolved in the package.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1923793-2 : CVE-2019-5739: DoS with keep-alive HTTP connection
Component: Local Traffic Manager
Symptoms:
Keep-alive HTTP and HTTPS connections can remain open and inactive for up to 2 minutes in Node.js 6.16.0 and earlier. Node.js 8.0.0 introduced a dedicated server.keepAliveTimeout which defaults to 5 seconds. The behavior in Node.js 6.16.0 and earlier is a potential Denial of Service (DoS) attack vector. Node.js 6.17.0 introduces server.keepAliveTimeout and the 5-second default.
Conditions:
NA
Impact:
It can exhaust server connections and resources, leading to a denial of service.
Fix:
The Denial of Service issue has been resolved in the package.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1922661 : JSON profile settings not displayed in REST API after attaching schema files
Links to More Info: BT1922661
Component: Application Security Manager
Symptoms:
When a JSON content profile has validation files attached, the following settings are not visible through the REST API:
"sensitiveData"
"attackSignaturesCheck"
"metacharElementCheck"
Conditions:
JSON content profile has schema validation files attached.
Impact:
JSON profile settings not visible in REST API.
Workaround:
None
Fix:
The REST API now correctly returns the JSON profile settings when schema files are attached.
Fixed Versions:
21.1.0, 17.1.3.1
1920973 : Ordering nested JSON objects during full json policy export
Component: Application Security Manager
Symptoms:
The order of the nested entities in the exported Full Json policy is random.
Conditions:
Exporting an ASM security policy using the "Full" export method through JSON.
Impact:
Since the order of the sub-values keeps changing when re-importing, systems detect the entire policy file as modified, making it difficult to accurately compare and track actual configuration changes.
Workaround:
Exporting the policy using the template-based JSON export method will give ordered sub entities. Note that this export method does not give a full view of all of the policies.
Fix:
After the fix, the sub entities in the exported Json policy will be ordered.
Fixed Versions:
21.1.0
1920637 : Duplicate user-defined Signature Set based on Attack Type is created upon policy import during upgrade★
Links to More Info: BT1920637
Component: Application Security Manager
Symptoms:
After an upgrade or a re-import, duplicate signature sets denoted by a "_1" are created containing NULL values instead of empty strings.
Conditions:
A user-defined signature set has an empty string for the tagged signature filter.
Impact:
Additional "duplicate" sets are created every time a policy is re-imported. This does not affect any functionality, but does increase the total configuration size, and makes the configuration more difficult to manage.
Workaround:
You can repair the policy by navigating to “Security ›› Application Security : Policy Building : Learning and Blocking Settings”, clicking on “change”, and choosing the original created sets instead of the duplicated sets. Save, and then apply the policy. The duplicated sets can be deleted after that.
Fixed Versions:
21.1.0
1893905 : Python vulnerability CVE-2023-40217
Links to More Info: K000139685, BT1893905
1893369-2 : CVE-2021-33033 kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c
Component: TMOS
Symptoms:
The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.
Conditions:
NA
Impact:
It can either lead to a DOS or cause arbitrary write on the system.
Workaround:
NA
Fix:
The DOS and arbitrary write issue has been resolved in the kernel.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1889845 : Improvements in Radius Monitor
Component: Local Traffic Manager
Symptoms:
Certain headers were missing from radius monitor packet.
Conditions:
When radius monitors is configured
Impact:
Can lead to unexpected behaviour
Fix:
Missing headers are now included in the packets.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1849265-5 : A VCMP guest may not exit hardware syncookie mode
Links to More Info: BT1849265
Component: TMOS
Symptoms:
On a VCMP guest, if a virtual server enters hardware syncookie mode due to a syn flood, and the virtual server is passing a significant amount of valid traffic, it may not exit syncooke mode.
Conditions:
-- VCMP guest
-- Hardware syncookie mode
Impact:
Syncookies may continue to be issued even though the attack has stopped.
Workaround:
Remove traffic from the virtual server until syncookies deactivates.
This can be accomplished by using cli transaction to alter the first virtual server and create an identical new virtual server.
Example:
Assume my_vs1 is the existing virtual server listening on port 80
tmsh
create /cli transaction
delete ltm virtual my_vs1
create ltm virtual my_vs2 destination 10.10.10.16:80 pool pool1 profiles add { fastL4 http } source-address-translation { type automap }
submit /cli transaction
This will, delete the first virtual server but existing TCP connections will be maintained. And then the new virtual server will be created which will accept new transaction. Since syncookie are enabled per virtual server, this new virtual server will not be in hardware syncookie mode.
Fix:
Syncookie threshold calculation is now accurate.
Fixed Versions:
21.1.0, 17.5.1.4
1849029-4 : Debug TMM crashes in FIPS/CC mode
Links to More Info: BT1849029
Component: Local Traffic Manager
Symptoms:
A TMM in debug mode crash occurs in FIPS/CC mode when using ClientSSL or ServerSSL profile.
Conditions:
-- Debug tmm is running
-- FIPS/CC mode enabled
Impact:
Traffic disrupted while tmm restarts.
Workaround:
N/A
Fix:
Fix memory issue.
Fixed Versions:
21.1.0, 21.0.0.1, 17.1.3, 16.1.6.1
1826505 : Restjavad API usage statistics memory leak
Links to More Info: BT1826505
Component: TMOS
Symptoms:
A memory leak develops on the standby device but may persist on the active device.
Restjavad may fail and restart with a similar error to the following log snippet (in /var/log/restjavad.0.log if failure is recent):
'DieOnUncaughtErrorHandler Uncaught Error causing restjavad to exit.'
It may also trigger frequent CPU intensive garbage collection such as many invocations of 'Full GC'. These will not be able to clear the memory, and that may be observable in GC logs as only small drops in restjavad heap size when Full GC runs.
Restart of restjavad may not clear the issue fully or for long. Issue may persist after upgrade.
/var/log/restjavad-api-usage.json has a large file size. Typically it will be tens of Kilobytes before leak develops and eventually grow to Megabytes or tens of MB.
Conditions:
Restjavad that fails or exhibits issues will have had a long time as standby in a HA cluster, but may not be standby at time of failure.
Impact:
Restjavad exits and restarts, perhaps repeatedly.
High CPU use due to frequent intensive garbage collection may occur.
Workaround:
See K000153118: Procedure to clear restjavad API statistics memory leak, ID 1826505
https://my.f5.com/manage/s/article/K000153118
This procedure should have a low impact if your environment does not require constant availability of REST API. For systems that are more dependent on REST API availability such as SSL Orchestrator, you may want to restrict this to a maintenance window.
Fix:
Restjavad API usage statistics data is now reset after each periodic save and is no longer loaded from disk on startup. This prevents unbounded memory growth from accumulating transient API statistics entries over time.
Fixed Versions:
21.1.0
1826345 : Security improvements in ca-bundle.crt
Component: TMOS
Symptoms:
Security best practices were not being followed for CA bundles.
Conditions:
When SSL profile is configured.
Impact:
Can lead to unexpected behaviour
Workaround:
Manually updating the default CA bundle or using CA bundle Manager.
Fix:
Security best practices are now being followed.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1825357 : Possible tmm crash or traffic loss after making vlan interface changes with an empty trunk
Links to More Info: BT1825357
Component: Local Traffic Manager
Symptoms:
Tmm crashes and generates a core file.
or
Network traffic via a trunk does not work.
Conditions:
Platform i2600, i2800, i4600, i4800, r2800, r4800 or VADC
All trunk members are removed from a trunk attached to a vlan.
Then, the trunk is removed from one or more vlans.
Then, the trunk is deleted.
This could result in a tmm crash.
or
A trunk with no members is added to a vlan.
Then, one or more members are added to the trunk.
This will result in traffic on that vlan not being being sent over that trunk.
Impact:
Traffic disrupted while tmm restarts
or
Traffic is not sent out via the trunk
Workaround:
Do not remove and a trunk with no members from a vlan.
It will be necessary to restart tmm to correct this situation.
Do not add a trunk with no members to a vlan.
If a trunk with no members was added to the vlan, the issue can be corrected by removing the trunk from the vlan, ensuring that there are members in the trunk and adding it back to the vlan.
Fix:
FIX is not yet available.
Fixed Versions:
21.1.0, 17.5.1.4
1825057 : 'vs_name' field truncated at 64 characters with ASM's remote logging
Links to More Info: BT1825057
Component: Application Security Manager
Symptoms:
The virtual server name field (vs_name) is truncated at 64 bytes with ASM's remote logging handled by BD process.
The 'vs_name' field comprises of the partition name as well as virtual server name and the 64 character limit is inclusive of both these names.
Conditions:
ASM/Advanced WAF device running one of the versions listed under Known Affected Versions.
Impact:
Virtual server name gets truncated in remote logging events
Workaround:
None.
Fixed Versions:
21.1.0
1824985 : In rare cases the Nitrox hardware compression queue may stop servicing requests.
Links to More Info: BT1824985
Component: Local Traffic Manager
Symptoms:
In rare cases, the Nitrox hardware may stop servicing requests.
When this issue occurs the tmctl compress table shows a high number of cur_enqueued entries and the number of requests handled in software (zlib) will be growing.
Conditions:
-- Nitrox compression hardware.
-- HTTP compression in use.
Impact:
Some connections may fail, and higher than expected CPU usage will be observed since requests will be handled in software.
Workaround:
Remove traffic from the device, or disable compression until the queues are completely drained.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1820489 : Rule list order changes when modifying a rule using Filer Active Rules List
Links to More Info: BT1820489
Component: Advanced Firewall Manager
Symptoms:
Firewall Policy rule ID changes when Modifying a rule using "Filer Active Rules List" and commit the changes.
Conditions:
- AFM licensed and provisioned.
- Create a rule-list with 4-5 rules in it.
- Create a Policy and add rule-list under it.
- Now Filer any of 2 Active Rules from rule List and then the Rule ID order changes, Now do any modification on filtered rules and commit the changes.
- Now remove the filter and observe the Rule ID changes for all the rules once after commit the changes.
Impact:
May lead to a change in the rule order and priority.
Workaround:
Remove the filter before committing the changes.
Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1
1818949-1 : [APM] BIG-IP as OAuth AS sending invalid grant error when refresh token expired.
Links to More Info: BT1818949
Component: Access Policy Manager
Symptoms:
As per RFC states that, the provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client then should send a 400 Bad Request status code and a error json response
{"error": "invalid_grant", ...}
currently BIG-IP sending as {"error": "access_denied", ...}
with 400 status code.
Conditions:
OAuth configured.
using the refresh token to get the access token, when refresh token is expired. (ex: using postman)
Impact:
Returns Invalid error
Workaround:
None
Fix:
Corrected the logging as per Rfc.
Fixed Versions:
21.1.0, 21.0.0.1
1818137 : Tmm IPv4 fragmentation handling distribution
Links to More Info: BT1818137
Component: Local Traffic Manager
Symptoms:
BIG-IP VE handles fragmented IPv4 traffic on the first tmm thread/tmm0. With this change the ability to spread the fragmented IPv4 traffic is introduced.
Conditions:
Handling of fragmented IPv4 traffic.
Impact:
Handling of fragmented IPv4 traffics distribution.
Workaround:
None
Fix:
With this fix the Handling of fragmented IPv4 traffic can be distributed.
Fixed Versions:
21.1.0, 21.0.0.1
1814413 : Dynamic parameters are not extracted and cookies are not generated
Links to More Info: BT1814413
Component: Application Security Manager
Symptoms:
Dynamic parameters are not extracted and cookies are missed.
Conditions:
Create a parameter in extraction and in the Extracted Items configuration.
Impact:
Unable to extract dynamic parameters due to which false positives are generated.
Workaround:
Include the file type in the Extracted Items configuration.
Fixed Versions:
21.1.0
1813505-3 : Snmpd may seg fault on systems with large amounts of virtual memory
Links to More Info: BT1813505
Component: TMOS
Symptoms:
Snmpd cores
Conditions:
* systems with large amounts of virtual memory (e.g. 3.5 TB)
* attempt to access dot3StatsTable
Impact:
Snmp unavailable when snmpd restarts
Workaround:
Avoid using dot3StatsTable.
Fixed Versions:
21.1.0, 17.5.1.4
1788105 : TLS1.3 connections between BIG-IP and server hangs with an APM policy that is invoked after the server's SSL handshake finishes★
Links to More Info: BT1788105
Component: Local Traffic Manager
Symptoms:
A TLS1.3 connection between the BIG-IP system and the server hangs.
Other reported symptoms:
-- SSL decryption fails
-- SSL handshake failure
-- SSL Orchestrator explicit proxy stops responding
This can be encountered after an upgrade to an affected version.
Conditions:
A virtual server that uses
1. TLS1.3 in the serverSSL profile
2. An APM policy that uses events that trigger after the SSL handshake on the server has completed
In an SSL Orchestrator setting, inline HTTP and ICAP services make use of APM policies that use L7 protocol lookup. Server Certificate and L7 protocol lookup conditions also make use of events that trigger the APM policy after the SSL handshake has completed.
Impact:
The connection hangs and the client is unable to connect to the server.
Workaround:
Apply either of these workarounds
1. Disable TLS1.3 on the serverSSL profile
2. Avoid using events that trigger the policy after the SSL handshake on the server has completed (for example avoid Event Wait and L7 protocol Lookup)
Fix:
The TLS1.3 connection between the BIG-IP and server no longer hangs if the APM policy is invoked after the SSL handshake.
Fixed Versions:
21.1.0, 21.0.0.1, 17.1.3
1787701 : [APM]Customization in German contains French language
Links to More Info: BT1787701
Component: Access Policy Manager
Symptoms:
Observe "Change password" contains a French word "Modifier le mot de passe" in Logon Page agent.
Conditions:
Access policy with German language.
Impact:
It is confusing to see a different language in customization.
Workaround:
None
Fixed Versions:
21.1.0
1787645 : BD process fail to startup on specific XML configuration
Links to More Info: BT1787645
Component: Application Security Manager
Symptoms:
BD does not start up (restart loop).
Conditions:
An XML configuration with specific configuration in the profile.
Impact:
System does not start up.
Workaround:
Remove the specific configuration in the profile.
Fixed Versions:
21.1.0
1787457 : GRPC communication may fail when server responds without trailers and any payload
Component: Local Traffic Manager
Symptoms:
Virtual server has http2 profile and handles GRPC traffic. When the HTTP Trailer with GRPC code is omitted, i.e. servers sends a response with no payload, BIG-IP issues HEADERS frame followed by empty DATA frame with END_STREAM flag, breaking GRPC communication.
Conditions:
GRPC server send a response without Trailers and any payload, lacking any sizing for the payload in HTTP headers.
Impact:
GRPC client sends RST_STREAM, breaking GRPC communication with the server.
Workaround:
None
Fix:
BIG-IP recognizes HTTP/2 responses without any payload and forwards it to the client in HEADERS frame with END_STREAM flag.
Behavior Change:
When BIG-IP receives HTTP/2 response in HEADERS frame with END_STREAM flag and this frame has no sizing payload HTTP header(s) like Content-Length, it forwards HEADERS frame with END_STREAM flag to the client instead of previous behavior of sending HEADERS frame followed by empty DATA frame with END_STREAM flag.
Fixed Versions:
21.1.0
1785145-4 : TMM SIGSEGV core due to NULL check is not handled properly in PEM
Links to More Info: BT1785145
Component: Policy Enforcement Manager
Symptoms:
TMM crashes while passing PEM traffic
Conditions:
A PEM profile is enabled on a virtual server.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fix:
Core will not be seen after the changes.
Fixed Versions:
21.1.0, 17.5.1.3, 17.1.3
1783677-3 : HSB v3.11.8.0 bitstream release for VIPRION B4450N and B4460N blades
Links to More Info: BT1783677
Component: TMOS
Symptoms:
A new HSB bitfile is available for release to VIPRION B4450N and B4460N blades.
Conditions:
VIPRION B4450N and B4460N blades using the HSB FPGA bitfile.
Impact:
Enables use of HSB bitfile v3.11.8.0 on the VIPRION B4450N and B4460N blades.
Workaround:
None.
Fix:
Updated HSB FPGA bitfile to v3.11.8.0.
Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1
1778793 : Database health monitors may use the wrong connection when attempting to connect to database
Links to More Info: BT1778793
Component: Local Traffic Manager
Symptoms:
Database monitors fail periodically and mark a pool member down.
Periodically, the DB monitor will create user sessions on the DB server without closing them.
Conditions:
- Multiple database health monitor instances exist to probe a given node.
- The monitor instances share the same values for the following parameters:
- destination IP address
- destination port
- database name.
Impact:
Healthy pool members are not selected to receive traffic.
Workaround:
You can work around this issue by using a BIG-IP EAV external monitor to probe the health of your database. An example for MySQL is available on DevCentral at https://community.f5.com/kb/codeshare/mysql-monitor/273565.
Alternatively, you may also work around this issue by adding a unique connection property as a suffix to the database name. This ensures a unique JDBC connection string is constructed for each monitor in order to avoid this issue.
For example you can use the connection properties "ApplicationName=<monitor_name>" or "applicationName=<monitor_name>" in PostgreSQL or Microsoft SQL Server respectively to provide the name of the calling monitor to the database.
In Oracle a connection string similar to the following can be used:
database (DESCRIPTION=(ADDRESS=(PROTOCOL=tcp)(HOST=%node_ip%)(PORT=%node_port%))(CONNECT_DATA=(SERVICE_NAME=ORACLE1))(SERVER=dedicated)(customKey=1))
or
database "%node_ip%:%node_port%:ORCLDB1?customkey=1"
Note that the PostgreSQL monitor requires a "?" character as a separator between the database name and the connection property, while MS SQL Server requires a ";" as separator.
Example tmsh commands to disambiguate monitorA and monitorB which both probe database "samedb" on the same node:
- PostgreSQL monitors:
- tmsh modify ltm monitor postgresql monitorA database samedb?ApplicationName=monitorA
- tmsh modify ltm monitor postgresql monitorB database samedb?ApplicationName=monitorB
- MS SQL Server:
- tmsh modify ltm monitor mssql monitorA database '"samedb;applicationName=monitorA"'
- tmsh modify ltm monitor mssql monitorB database '"samedb;applicationName=monitorB"'
- Oracle Server:
- tmsh modify ltm monitor oracle myoracle database '%node_ip%:%node_port%:PTDB3CC1?customkey=1'
Note that the extra quoting in the example command for MS SQL Server is required to preserve the ";" separator in the database name.
Fixed Versions:
21.1.0
1772353 : Defaults for Associated Violations are re-added to a policy
Links to More Info: BT1772353
Component: Application Security Manager
Symptoms:
When Associated Violations is empty ("Selected" list is empty), and the policy is exported to XML or JSON format, and reimported, the default elements are re-added to the list.
Conditions:
Associated Violations is empty ("Selected" list is empty), and the policy is exported to XML or JSON format, and reimported
Impact:
The default Session Awareness Violations are set back to delay blocking unexpectedly.
Workaround:
Use binary format export and import.
Fixed Versions:
21.1.0
1772317-1 : [APM][SAML SP] sp fails authentication with error "SAML assertion is invalid, error: NameID is missing"
Links to More Info: BT1772317
Component: Access Policy Manager
Symptoms:
SAML authentication fails and following log is seen on BIG-IP as sp: "SAML Agent: /Common/web_auth_act_saml_auth_subsession_ag SAML assertion is invalid, error: NameID is missing, but idp-connector's identity location is set to subject"
Conditions:
-- SAML auth is configured as SP on BIG-IP as part of per-request policy
-- assertion has an encrypted subject "<saml2:Subject><saml2:EncryptedID><xenc:EncryptedData xmlns:xenc="http://www.w3.org/2001/04/xmlenc#"...."
Impact:
Authentication fails
Workaround:
Disable "encrypt-subject " in idp config
Fixed Versions:
21.1.0, 21.0.0.1
1758957 : If two tenants share the same VLAN, TMM may egress broadcast traffic even when VLANs are disabled in F5OS
Links to More Info: BT1758957
Component: F5OS Messaging Agent
Symptoms:
In certain scenarios, such as restoring a UCS on an F5OS tenant, if the VLANs in F5OS are disabled, the TMM may egress broadcast traffic such as gratuitous ARPs onto the disabled VLANs.
Conditions:
-- VLAN is currently assigned to any tenant.
-- An F5OS tenant where VLANs were assigned and then removed.
-- An F5OS tenant where TMM is not in forced-offline mode.
-- An action occurs on the tenant (such as restoring a UCS or restarting TMM, or loading the config) that results in gratuitous ARPs.
Impact:
This could cause IP address conflicts on the network or other issues related to unexpected broadcast traffic such as gratuitous ARPs on the network.
Workaround:
- In F5OS, remove the affected VLANs from the LAG or interface.
- In F5OS, ensure there is at least one VLAN still attached to the tenant. This could be a temporary VLAN.
- On the tenant, use forced offline to prevent traffic egress.
- If you are restoring a UCS from another BIG-IP such as for a platform migration, put the source BIG-IP into a forcedoffline state before taking the UCS.
- Delete the tenant, and recreate without any VLANs assigned.
- In F5OS, remove the VLAN from all tenants.
Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1
1756897 : [APM][PA]Failed to execute 'observe' on 'MutationObserver': parameter 1 is not of type 'Node'
Links to More Info: BT1756897
Component: Access Policy Manager
Symptoms:
Application fails to load with below console error in developer tools.
Uncaught TypeError: Failed to execute 'observe' on 'MutationObserver': parameter 1 is not of type 'Node'.
Conditions:
Portal Access configured.
Impact:
Unable to load application via portal access.
Workaround:
Customized cache-fm-Modern.js ifile workaround is available for this.
Fixed Versions:
21.1.0, 17.5.1.4
1752873-1 : [APM][SAML SP] Order of SAML attribute values saml.last.attr.name is reversed★
Links to More Info: BT1752873
Component: Access Policy Manager
Symptoms:
After upgrading, the order of SAML attribute values parsed from assertion are stored in reverse order.
Conditions:
-- BIG-IP as SAML SP,
-- Upgrade to 17.1.0
Impact:
The SAML assertion values are parsed in reverse order, which can cause iRules or policies to fail if they expect the values to arrive in a certain order.
Workaround:
None
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1701177 : HTTP request handling improvements
Component: TMOS
Symptoms:
Under certain request patterns, management HTTP responsiveness may degrade.
Conditions:
Specific request-handling configurations.
Impact:
Could lead to reduced availability.
Workaround:
NA
Fix:
Improved connection and request handling for better resilience.
Fixed Versions:
21.1.0
1696965 : When URL is created from session and login, the staging on the URL is disabled
Links to More Info: BT1696965
Component: Application Security Manager
Symptoms:
The staging is disabled on a new URL.
Conditions:
The URL was created from the session and login section in the UI.
Impact:
The URL generate violations that may be in alarm and blocking.
Workaround:
None
Fixed Versions:
21.1.0, 17.1.3, 16.1.6
1696641 : aced core running out of file descriptors
Links to More Info: BT1696641
Component: Access Policy Manager
Symptoms:
-- The aced process may exhaust available file descriptors over time when using SecurID authentication
-- Users are unable to authenticate using RSA SecurID
-- Complete APM service outage with "Too many open files" errors in /var/log/apm
-- aced process may core and restart
Conditions:
-- BIG-IP APM system configured with SecurID authentication
-- aced process runs for extended periods (typically weeks)
-- Authentication failures or connection issues between APM and SecurID server may accelerate the issue.
Impact:
-- Complete APM service outage.
-- All VPN clients unable to establish connections
-- SecurID authentication failures.
-- Service becomes unstable and stops processing authentication requests.
Workaround:
Restart the aced process: bigstart restart aced.
Perform system failover to restore service temporarily.
Fix:
The aced daemon now properly cleans up file descriptors (sockets) created during SecurID authentication requests, particularly during error scenarios such as authentication failures. This prevents file descriptor exhaustion that previously caused the aced process to crash and resulted in complete APM service outages.
Fixed Versions:
21.1.0, 17.5.1.4
1690005-1 : Unable to ping the floating self addresses from the Standby tenant
Links to More Info: BT1690005
Component: F5OS Messaging Agent
Symptoms:
Masquerade Mac is not removed when F5OS is rebooted.
It can be observed using the 'show fdb' command in confd
This can cause the standby tenant to be unable to ping the floating SelfIP address on the active device, but the active device can ping the standby device.
Conditions:
- An HA pair of tenants is used
- Tenants running on a VELOS chassis, or on r5000-series, r10000-series, or r12000-series appliances
- A traffic group uses a masquerade mac
- The Active tenant is rebooted
Impact:
Active and Standby act as if they are the owners of Floating MAC and IP.
Workaround:
The masquerade mac's fdb can be manually deleted using the F5OS CLI.
From the standby F5OS system CLI:
config
no fdb mac-table entries entry <mac masquerade address>
commit
Fix:
Masquerade Mac is now removed after F5OS is rebooted.
Fixed Versions:
21.1.0
1678597 : Rate-limit external iControl REST API calls on BIG-IP
Component: Device Management
Symptoms:
You are unable to rate-limit incoming iControl REST API calls.
Conditions:
-- The BIG-IP system is encountering a heavy load of incoming iControl REST API calls
-- You wish to rate limit or throttle the API calls in order to reduce the system resource requirements
Impact:
System instability due to heavy external API access.
Workaround:
None
Fixed Versions:
21.1.0
1678105 : F5OS tenant, TMM crashing after loading a UCS
Links to More Info: BT1678105
Component: TMOS
Symptoms:
If a UCS is loaded on a F5OS tenant and the name of the tenant from where the UCS was saved does not match the tenant name where it is restored.
Conditions:
- UCS restored on tenant with a different tenant name than were the UCS was created.
Impact:
The tenant will not become operational because TMM fails to start.
Workaround:
Refer to following steps for workaround:
1. Remove the file "tmm_velocity_init.tcl" in /config/.
2. Perform bigstart restart platform_agent.
3. Ensure a new "tmm_velocity_init.tcl" is created and TMM stops failing.
Fixed Versions:
21.1.0
1677429 : BFD: TMM might not agree on session ownership.
Links to More Info: BT1677429
Component: TMOS
Symptoms:
Bidirectional forwarding detection (BFD): TMM might not agree on session ownership.
Conditions:
- Multi-bladed chassis.
- A blade is added or removed in a cluster.
Impact:
BFD session ownership moves to a new TMM.
Workaround:
None
Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1
1671149 : Timestamp cookies may cause issue for PVA-accelerated connections
Links to More Info: BT1671149
Component: Advanced Firewall Manager
Symptoms:
Timestamp cookies may cause performance issues for PVA-accelerated connections on some older platforms and/or platforms without a performance license.
Conditions:
- PVA offload configured (any stage).
- DOS ACK (TS) vector has timestamp cookies option enabled.
- Platform supporting ePVA feature (Ref. https://my.f5.com/manage/s/article/K12837)
- Platform does not belong to the following subset:
B2250 (A112)
B4450N (A114)
B4460N (A121)
i10800 (C116)
i7800 (C118)
i5800 (C119)
i11800 (C123)
i11800-DS (C124)
i5820-DF (C125)
i7820-DF (C126)
i15800 (D116)
i15820-DF (D120)
VELOS BX110, BX520
r5800/5900, r10800/10900, r12800/12900 r-series platforms
Additionally, for platforms specified in the list above a license with support of turboflex 'Basic DoS vectors' capability is required. Note, this requires a 'Performance' license on some of platforms.
For more information about Turboflex please check article https://techdocs.f5.com/en-us/hw-platforms/f5-platform-turboflex-profiles/title-turboflex-overview.html
Impact:
Tmm resets the connection or causes slow performance.
Workaround:
Disable timestamp-cookie feature.
Fixed Versions:
21.1.0
1670465 : TMMs might not agree on session ownership when multiple cluster geometry changes occur.
Links to More Info: BT1670465
Component: TMOS
Symptoms:
TMMs might not agree on session ownership when multiple cluster geometry changes occur in a quick succession.
Conditions:
Cluster geometry changes occur in a quick succession, for example two blades come up one after another during a software upgrade.
Impact:
Session might be dropped few minutes/seconds after cluster geometry change happens
Workaround:
None
Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1
1642533 : ipv4 forwarding is enabled on F5OS tenants
Component: TMOS
Symptoms:
The ipv4 forwarding sysctl, net.ipv4.ip_forward, is enabled on F5OS tenants.
Conditions:
NA
Impact:
May lead to unintended results.
Workaround:
Disable the sysctl.
Fix:
ipv4 forwarding is no longer enabled on F5OS tenants
Fixed Versions:
21.1.0
1632385 : Non-ASCII UTF-8 characters are mangled in JSON policy export
Links to More Info: BT1632385
Component: Application Security Manager
Symptoms:
Non-ASCII UTF-8 characters in a JSON policy are mangled when exported in JSON policy.
Conditions:
Values contains Non-ASCII UTF-8 characters and the policy is exported and imported back
Impact:
After re-importing the exported policy, the values change
Workaround:
None
Fix:
After exporting the policy with the Non-ASCII UTF-8 characters, the imported policy has the same identical values as before.
Fixed Versions:
21.1.0
1628129 : SSL Orchestrator traffic summary log does not display url-category for HTTP request if a SWG as a service blocks the connection
Links to More Info: BT1628129
Component: SSL Orchestrator
Symptoms:
The traffic summary for an SSL Orchestrator explicit proxy topology in the apm logs when log levels are set to Information does not display the url-category for the connection. Instead just `url-category: NA` is displayed.
Conditions:
An explicit proxy topology is deployed that uses a Secure Web Gateway (SWG) as a service to process traffic and the SWG rejects an http connection coming through the proxy.
Impact:
The traffic summary log message is incomplete not displaying the url-category.
Workaround:
There is no workaround for the traffic summary log message. Instead the category would need to be logged in a different way such as
1. Use a logging macro in the Secure Web Gateway's Per-Request-Policy
Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3
1627093 : DNS's HTTP Monitor provides the ability to show Response Code in Logs
Component: Global Traffic Manager (DNS)
Symptoms:
DNS's HTTP Monitor provides the ability to show Response Code in Logs.
Conditions:
NA
Impact:
NA
Workaround:
None.
Fix:
Added response code status in DNS's HTTP monitor logs for all possible scenarios.
Fixed Versions:
21.1.0
1624701 : Security improvement in BIGIP GUI
Component: TMOS
Symptoms:
BIGIP GUI was not following best security practices.
Conditions:
NA
Impact:
Unexpected behaviour
Fix:
Security best practices are now being followed.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1623921-4 : IPencap monitor probes from bigd are prone to connection re-use.
Links to More Info: BT1623921
Component: Local Traffic Manager
Symptoms:
When using a DNS monitor with IP encapsulation, TMM handles probe encapsulation. Bigd reuses source ports after closing sockets quickly, but TMM applies a 30-second timeout, leading to connection re-use. This can result in probes being incorrectly encapsulated to the wrong pool member, causing inaccurate health monitoring
Conditions:
1. DNS monitor configured with 'transparent' destination and IP encapsulation enabled.
2. Large number of pool members (e.g., 60).
Impact:
Probes may be encapsulated to the wrong destination, leading to inaccurate health monitoring of pool members.
Workaround:
None
Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1
1623669 : False “Illegal dynamic parameter value” violations when extracting parameters from links (HREF)
Links to More Info: BT1623669
Component: Application Security Manager
Symptoms:
Requests may be blocked with the violation “Illegal dynamic parameter value” even though the parameter values were correctly extracted from application responses using “Search in Links” and should be treated as valid.
Conditions:
- A parameter is configured with Dynamic content value
- “Check – Search in Links” is enabled for the parameter
- The parameter value is extracted from response links (HREF)
- The extracted value is later used in a client request while the policy is enforced
Impact:
Legitimate application traffic may be blocked because values extracted from links are not recognized as valid dynamic parameter values.
Workaround:
None
Fix:
Values extracted from response links are properly learned and recognized, and requests using those values are no longer incorrectly blocked with “Illegal dynamic parameter value.”
Fixed Versions:
21.1.0, 17.1.3.1
1623601 : Invalid PCRE expressions are allowed
Links to More Info: BT1623601
Component: Application Security Manager
Symptoms:
Some invalid PCRE expressions pass config validation and are stored.
Conditions:
PCRE validation is used for parameters
Impact:
ASM goes into a restart loop.
Workaround:
None
Fixed Versions:
21.1.0
1623325 : VLAN groups or VLAN group members may be deleted on F5OS tenant
Links to More Info: BT1623325
Component: Local Traffic Manager
Symptoms:
If using VLAN groups on a tenant running on an rSeries appliance or VELOS chassis, the system may delete the VLAN group or VLAN group members unexpectedly.
This will happen when configuration changes to the tenant are made in F5OS or if the interface members of the VLAN change state (i.e. link down)
- If the VLAN groups are in a non-common partition, any members of the VLAN group will be removed, but the VLAN group will remain.
- If the VLAN groups are in common partition, but are not referenced by higher-level objects, the VLAN group will be removed.
- If the VLAN groups are in common partition and are referenced by higher-level objects, the system will not delete the VLAN group, but will log messages similar to the following:
err mcpd[9181]: 01070623:3: The vlangroup (/Common/otters-vlangroup) is referenced by one or more virtual servers.
err chmand[4691]: 012a0003:3: hal_mcp_process_error: result_code=0x1070623 for result_operation=eom result_type=eom
Conditions:
- BIG-IP tenant running on rSeries appliance or VELOS chassis
- VLAN group configured in tenant, and not using virtual wire
Impact:
Traffic disrupted due to removal of VLAN group objects or VLAN group members.
Workaround:
To avoid this problem, define an unused VLAN group in the common partition and assign it to the VLAN list for a virtual server.
tmsh create net vlan-group /Common/unused-vg
tmsh create ltm virtual /Common/unused-virtual vlans-enabled vlans add { unused-vg } description "Workaround for ID1623325"
tmsh save sys config
Note the use of "vlans-enabled" and adding the empty VLAN group to the virtual server's VLAN list. This means that the BIG-IP system will never actually process traffic via this virtual server, as it would only accept traffic to the virtual server that arrives over the VLAN group, but the VLAN group will never receive any actual traffic.
As a result of implementing this workaround, when the tenant processes any configuration updates from F5OS, the tenant will log error messages similar to the following:
err mcpd[10720]: 01070623:3: The vlangroup (/Common/unused-vg) is referenced by one or more virtual servers.
err chmand[6781]: 012a0003:3: hal_mcp_process_error: result_code=0x1070623 for result_operation=eom result_type=eom
Fix:
VLAN groups created by users on the tenant are now preserved during F5OS host events. Only system-managed virtual-wire VLAN groups are updated during these events.
Fixed Versions:
21.1.0
1621417 : WALinuxAgent Updated to Version 2.14.0.1
Component: TMOS
Symptoms:
Unexpected Behavior When Using Deprecated Waagent Configurations: Stricter Validation May Cause VM Extensions to Fail
Conditions:
Applicable to All Previous Versions of BIG-IP Azure Distributions
Impact:
The Azure Linux Agent (waLinuxAgent) has been upgraded from version 2.2.48.1 to 2.14.0.1, bringing enhanced security, stability, and compatibility with newer Azure features and Linux distributions. This major version update includes stricter extension handling.
Fix:
The bundled WALinuxAgent for Azure images has been updated to version 2.14.0.1.
Fixed Versions:
21.1.0
1602345-3 : Resource records are not always created when wideips are created in a bundle
Links to More Info: BT1602345
Component: Global Traffic Manager (DNS)
Symptoms:
Resource records are not created for some of the created WideIPs.
Conditions:
WideIPs are created in a bundle.
Impact:
Resource records are missing.
Workaround:
Wait for more than a minute before creating another wideip;
Or
When resource records are found missing, delete the related wideips and also delete related db zone file for that wideip, then recreate the wideip.
Fixed Versions:
21.1.0, 17.1.3.1
1600617-6 : Few virtio driver configurations may result in excessive memory usage
Links to More Info: BT1600617
Component: Local Traffic Manager
Symptoms:
Certain virtio driver configurations may result in excessive memory usage, which in some cases, leads to issues with forwarding traffic.
'tmctl page_stats' output can be examined on a newly launched system to verify if any of the TMMs except for TMM0 have their memory exhausted.
Conditions:
Virtio driver memory usage scales up with:
- Number of queues.
- Number of TMMs.
- Number of interfaces.
- Queue size.
Increasing these numbers might cause a problem trigger.
Impact:
Excessive memory usage, in some cases, leads to problems with traffic forwarding.
Workaround:
Scale down on the number of queues and their size. Reduce the number of interfaces.
Fixed Versions:
21.1.0
1589629 : An ICMPv6 Neighbor Solicitation sent to the last address on an IPv6 subnet uses the wrong Destination MAC address
Links to More Info: BT1589629
Component: Local Traffic Manager
Symptoms:
The destination MAC address of the ICMPv6 Neighbor Solicitation message is incorrect.
Conditions:
An IPv6 SelfIP address is used, and tmm attempts to resolve the address of (for example) an IPv6 pool memeber which is using the last IPv6 address in the available subnet range.
Impact:
Nodes on the network do not respond to ICMPv6 Neighbor Solicitation messages.
In large environments with many affected addresses, this could potentially contribute to a broadcast storm or degrade overall network performance.
Workaround:
None (other than avoiding the use of the last address in the IPv6 subnet range)
Fixed Versions:
21.1.0
1589269-5 : The maximum value of sys db provision.extramb was reduced from 8192 to 4096 MB★
Links to More Info: BT1589269
Component: SSL Orchestrator
Symptoms:
From version 16.1.0 the maximum value of sys db provision.extramb is 4096 MB, reduced from 8192 MB. It will be automatically set to 4096 during the upgrade if it has a higher setting.
Conditions:
Any BIG-IP device running software version 16.1.0 or higher.
Impact:
It is extremely rare to need values of provision.extramb above 4096 MB.
If the value of sys db provision.extramb is 4096 or less prior to upgrading, then there will be no impact post-upgrade. After the upgrade, it is not possible to increase the value above 4096.
If the value is greater than 4096, it will be reduced to 4096 when upgrading to version 16.1.0 or higher. This may leave devices with insufficient 4KB page memory (also known as host memory) which may lead to issues due to memory pressure, such as OOM killer killing processes, poor scheduling of processes leading to core dumps, and sluggish management access.
Workaround:
None
Fix:
The maximum value of sys db provision.extramb is now configurable to 8192(MB).
Behavior Change:
The maximum value of sys db provision.extramb was reduced from 8192 to 4096 MB from version 16.1.0
Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1
1583381 : "Insert Secure Attribute" must be enabled and "Insert SameSite Attribute" must be set to "Lax" for pure wildcard cookie in all templates by default
Links to More Info: BT1583381
Component: Application Security Manager
Symptoms:
The pure wildcard cookie configuration "Insert Secure Attribute" is disabled and "Insert SameSite Attribute" is not set to "Lax".
Conditions:
Creating the policy using the policy templates.
Impact:
The configuration is incorrect.
Workaround:
Configure it manually: Enable "Insert Secure Attribute" and set "Insert SameSite Attribute" to "Lax".
Fix:
Fixed the templates and now BIG-IP has the correct configuration for the pure wildcard cookie.
Fixed Versions:
21.1.0
1580369 : MCPD thrown exception when syncing from active device to standby device.
Links to More Info: BT1580369
Component: TMOS
Symptoms:
Config sync fails on the secondary blade and MCPD restarts.
In /var/log/ltm:
err mcpd[7906]: 0107134b:3: (rsync: link_stat "/config/filestore/.snapshots_d/custom_urldb_d/:Common:custom_feedlist_348871_3751" (in csync) failed: No such file or directory (2) ) errno(0) errstr().
err mcpd[7906]: 0107134b:3: (rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1518) [Receiver=3.0.9] ) errno(0) errstr().
err mcpd[7906]: 0107134b:3: (syncer /usr/bin/rsync failed! (5888) () Couldn't rsync files for mcpd. ) errno(0) errstr().
err mcpd[7906]: 0107134b:3: (rsync process failed.) errno(255) errstr().
err mcpd[7906]: 01070712:3: Caught configuration exception (0), Failed to sync files..
Conditions:
- A BIG-IP system with multiple blades and multiple slots configured for high availability
- Active device has to download the custom_urldb file from a server
- A config sync occurs
Impact:
Config sync to the secondary blade fails and MCPD throws an exception and restarts on the secondary. The cluster primary blade has the correct custom_urldb file. This will impact incremental syncing to other peers in the device group.
Workaround:
None
Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1
1574521 : Intermittent high packet latency on R4000 and R2000 tenants
Links to More Info: BT1574521
Component: Performance
Symptoms:
When compared to previous platforms, BIG-IP tenants on R4000 and R2000 platforms may demonstrate higher jitter and packet latency / rtt. This affects pings, tcp, udp, and any other protocols processed by the software data plane (tmm).
This is because the r4000 and r2000 appliances have a slightly different hardware architecture than other appliances.
CPUs on this platform are not dedicated to the tenant and these platforms also run a different class of Intel processing, and do not utilize hyperthreading like the higher end platforms do.
See:
https://clouddocs.f5.com/training/community/rseries-training/html/rseries_performance_and_sizing.html#r4000-vcpu-sizing
Conditions:
BIG-IP tenants on R4000 and R2000 platforms
Impact:
Intermittent high latency and jitter.
Workaround:
None
Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1
1562733 : Bd can crash using JSON schema
Component: Application Security Manager
Symptoms:
Bd crashes while passing traffic.
Conditions:
Using JSON schema
Impact:
Traffic disrupted while bd restarts.
Workaround:
Remove JSON schema from JSON content profile, and enforce JSON payload via "parse parameter" feature available in JSON content profile.
Fixed Versions:
21.1.0
1554961-3 : APM - Websso leeway time of 60 seconds
Links to More Info: BT1554961
Component: Access Policy Manager
Symptoms:
When JWT is cached, then the error "JWT Expired and cannot be used" is observed.
Conditions:
WebSSO is used with bearer option to generate JWT tokens.
Impact:
JWT fails in upper layer
Workaround:
None
Fix:
Increasing leeway time to 60 sec to accommodate jwt token to be used continuously.
Fixed Versions:
21.1.0, 17.5.1.4
1552341 : Excessive tmm memory during bot signature updates
Links to More Info: BT1552341
Component: Application Security Manager
Symptoms:
During bot signature updates, memory usage may become unusually high. In some cases, updates can fail and leave the system in an inconsistent state.
Conditions:
This issue may occur when multiple bot signature overrides are configured in Bot Defense profiles. Updates that involve multiple signature overrides are more likely to trigger higher memory usage.
Impact:
Bot signature updates may fail due to insufficient memory, which can temporarily prevent new signatures from being applied.
Workaround:
Increase available TMM memory by provisioning the LTM module.
Reduce the number of multiple overrides (either individual signature overrides or signature category overrides) in Bot Defense profiles, as multiple overrides significantly increase memory usage during updates.
Fix:
The fix will optimize the bot signature update mechanism to reduce memory consumption, improve failure handling.
Fixed Versions:
21.1.0, 21.0.0.1
1539997 : Secure HA connections cannot be established due to zombie HA flow
Links to More Info: BT1539997
Component: Local Traffic Manager
Symptoms:
Secure HA connections cannot be established due to zombie HA flow.
A timing issue could end up in a zombie flow, leading to subsequent legitimate connections becoming zombie flows instead of being established.
Conditions:
SSL connections and HA configuration
Impact:
No reproduction and only seen while testing in performance test lab
Workaround:
NONE
Fix:
NA
Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1
1505813 : CVE-2018-16487 lodash: Prototype pollution in utilities
Component: iApp Technology
Symptoms:
A prototype pollution vulnerability was found in lodash <4.17.11 where the functions merge, mergeWith, and defaultsDeep can be tricked into adding or modifying properties of Object.prototype.
Conditions:
NA
Impact:
An attacker can use Function inside of vulnerable versions of lodash to execute malicious code using the Traffic Management User Interface (TMUI) or iControl REST API .it can impact confidentiality,integrity and availability of application.
Workaround:
NA
Fix:
Updated lodash version to 4.17.21
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1505297 : CVE-2020-8203 nodejs-lodash: prototype pollution in zipObjectDeep function
Component: iApp Technology
Symptoms:
A flaw was found in nodejs-lodash in versions 4.17.15 and earlier. A prototype pollution attack is possible which can lead to arbitrary code execution. The primary threat from this vulnerability is to data integrity and system availability.
Conditions:
The vulnerability can be exploited when a vulnerable lodash version (≤ 4.17.15) processes attacker-controlled input using prototype-modifying functions (e.g., merge, defaultsDeep) with malicious keys like __proto__ or constructor.
Impact:
It can allow prototype pollution, leading to data integrity issues, application crashes (DoS), or potentially arbitrary code execution.
Workaround:
Upgrade lodash to a fixed version (≥ 4.17.16), avoid using prototype-modifying functions on untrusted input, and validate or sanitize user-controlled data.
Fix:
Update nodejs-lodash to version 4.17.16 or later
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1505257 : False positive with "illegal base64 value" for Authorization header
Links to More Info: BT1505257
Component: Application Security Manager
Symptoms:
False positive "illegal base64 value" is detected
Conditions:
The given base64 encoded value is legal base64 but the decoded auth-param is unparsable. Such request triggers "HTTP Protocol Compliance" violation when configured to do so and it is indeed triggering, but such request should not trigger "illegal base64 value".
Impact:
A false positive is detected.
Workaround:
None
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1498949 : CVE-2023-2283 libssh: authorization bypass in pki_verify_data_signature
Links to More Info: K000138682, BT1498949
1497633 : TMC incorrectly set /32 mask for virtual-address 0.0.0.0/0 when attached to a VS
Links to More Info: BT1497633
Component: Local Traffic Manager
Symptoms:
When a 0.0.0.0/0 virtual-address created by a wildcard virtual server and a Traffic-Matching-Criteria (TMC) is attached to it, the mask for the 0.0.0.0 virtual address will be incorrectly modified.
Conditions:
Create a wildcard Virtual server with virtual address 0.0.0.0/0.
Attach a Traffic-Matching-Criteria with destination and source addresses as 0.0.0.0/0.
Impact:
The virtual server's address is advertised with an incorrect mask of /32, making the redistributed route via ZebOS ineffective.
Fixed Versions:
21.1.0
1497061 : Added support for VLANs above 512 with xnet-IAVF driver
Links to More Info: BT1497061
Component: TMOS
Symptoms:
TMM crashes when there are more than 512 VLANs
Conditions:
-- BIG-IP uses xnet-IAVF driver
-- Create more than 512 VLANs
Impact:
Traffic disrupted while tmm restarts.
You cannot create an environment to handle >512 VLANs
Workaround:
Reduce the number of VLANs to 512 or below 512.
Fix:
Reduce the number of VLANs to 512 or below 512.
Fixed Versions:
21.1.0, 17.1.3
1489817 : Fix crash due to number of VLANs
Links to More Info: BT1489817
Component: TMOS
Symptoms:
TMM crashes.
Conditions:
- xnet-iavf driver
- Number of VLANs for a given interface >=128
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Reduce the number of VLANs to <128
Fix:
Refactored driver to support large number of VLANs
Fixed Versions:
21.1.0, 17.1.3
1481889-6 : High CPU utilization or crash when CACHE_REQUEST iRule parks.
Links to More Info: BT1481889
Component: Local Traffic Manager
Symptoms:
When CACHE_REQUEST iRule stops, the Ramcache filter stays in CACHE_INIT state when it restarts. This causes the request to be processed twice, which causes high CPU usage or a crash when an incorrect address is encountered.
Conditions:
- HTTP Virtual server
- CACHE_REQUEST iRule with ms delay
- Multiple attempts to request a compressed doc
Impact:
- High CPU on boxes with 4G of valid memory after the key is hashed - on smaller boxes, will crash when an invalid address is encountered.
Workaround:
- Removal of CACHE_REQUEST iRule if avoidable
Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1
1474877-6 : Unable to download large files through VIP due RST Compression error.
Links to More Info: BT1474877
Component: Local Traffic Manager
Symptoms:
- Download of files exceeding maximum tmm.deflate.memory.threshold fails at client.
- Client receives RSTs (Compression error)
Conditions:
- Virtual server with HTML profile or REWRITE profile.
- Size of decompressed http response from server exceeds max tmm.deflate.memory.threshold value i.e. 4718592 bytes.
Impact:
- Client may lose connection to the server.
Workaround:
- Based on URI matches in the HTTP request, decide which responses should NOT be rewritten (e.g. big downloads) and disable REWRITE profile for the selected responses.
- For example, URI starting with "/headsupp/api/data/compare/measures" :
when HTTP_REQUEST {
if { [HTTP::uri] starts_with "/headsupp/api/data/compare/measures" } {
set no_rewrite 1
}
}
when HTTP_RESPONSE {
if { $no_rewrite == 1 } {
REWRITE::disable
}
}
Fix:
- Raised the max tmm.deflate.memory.threshold to approx. 9MB,
- Changes introduced to allow disabling this threshold altogether if so desired, by changing default value for the same threshold to '0'.
- NOTE: Disabling this threshold altogether can lead to exposure to zip bomb attacks.
Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1
1473913 : Proxy Connections drop due to wrong counting
Links to More Info: BT1473913
Component: Local Traffic Manager
Symptoms:
Proxy Connections are dropped. The reset cause in a package capture indicates "F5RST: Not connected"
Conditions:
Can happen during a DOS attack with standard mitigation mode enabled.
Impact:
Random connections are dropped
Workaround:
Use conservative mitigation mode.
Fix:
No random connection drops
Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3, 16.1.6
1473189 : Offending IP is not logged when rate limiting is triggered
Links to More Info: BT1473189
Component: Global Traffic Manager (DNS)
Symptoms:
The log only contains the rate limit message without the offending IP address.
Conditions:
The number of requests exceeds the server's configured maximum rate limit.
Impact:
You are unable to determine which IP address exceeded the threshold.
Workaround:
None
Fix:
The system now logs the offending IP address when the rate limit is triggered.
Fixed Versions:
21.1.0, 21.0.0.1
1463089-3 : TMM crash because of corrupted MQTT queue
Links to More Info: BT1463089
Component: Local Traffic Manager
Symptoms:
Tmm crashes while terminating an MQTT flow. Core file analysis indicates MQTT queue corruption.
Conditions:
LTM configured with TCP and MQTT.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fix:
The queue used to handle specific data is removed and replaced with new handling.
Fixed Versions:
21.1.0
1455741 : Httpd consumes excessive amount of CPU in FIPS mode
Links to More Info: BT1455741
Component: TMOS
Symptoms:
The management plane's httpd process consumes excessive CPU when the system is running in FIPS mode.
Conditions:
FIPS license is installed.
Impact:
Performance impact on management plane.
Workaround:
None
Fix:
Set the correct RNG in FIPS mode.
Fixed Versions:
21.1.0
1450481 : TMSH hardening
Component: TMOS
Symptoms:
TMSH is not following security best practices.
Conditions:
NA
Impact:
Unexpected behaviour
Workaround:
NA
Fix:
TMSH is now following security best practices.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1440409 : TMM might crash or leak memory with certain logging configurations
Links to More Info: BT1440409
Component: Local Traffic Manager
Symptoms:
TMM might crash or leak memory with certain logging configurations.
Conditions:
Virtual-to-virtual chaining is used for handling syslog messages.
Impact:
Memory leak or Crash.
Workaround:
None
Fix:
None
Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1
1429861 : CVE-2019-5737: HTTP or HTTPS Denial of Service in keep-alive mode (NodeJS v6)
Component: Local Traffic Manager
Symptoms:
It was found that the original fix for Slowloris, CVE-2018-12122, was insufficient. It is possible to bypass the server's headersTimeout by sending two specially crafted HTTP requests in the same connection. An attacker could use this flaw to bypass Slowloris protection, resulting in a denial of service.
Conditions:
The server runs a vulnerable Node.js HTTP implementation and accepts persistent connections where an attacker can send two specially crafted HTTP requests on the same connection to bypass headersTimeout.
Impact:
An attacker can bypass Slowloris protections and cause a denial of service by exhausting server connections.
Workaround:
Upgrade to a Node.js version that includes the corrected Slowloris fix and enforce strict request timeouts and connection limits.
Fix:
Upgrade to a Node.js version with the updated Slowloris fix and enforce strict request timeout and connection limits.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1403869-6 : CONNFLOW_FLAG_DOUBLE_LB flows might route traffic to a stale next hop
Links to More Info: BT1403869
Component: TMOS
Symptoms:
Pool members configured with IP encapsulation or any type of flow using CONNFLOW_FLAG_DOUBLE_LB flag might take some time to refresh its nexthops.
Conditions:
BIG-IP receives an ECMP route towards a server over two different BGP peers and the server is a pool member with IPIP encapsulation enabled. One of the BGP peers goes down and the route gets removed immediately, but BIG-IP is still forwarding traffic to this peer for the next few seconds, even though tmm.inline_route_update is enabled.
Impact:
The connection is using the old, invalid next hop for a few seconds.
Workaround:
None
Fix:
None
Fixed Versions:
21.1.0, 17.5.1.4
1401569 : Engineering Hotfix readme file refers to non-applicable "full_box_reboot" command★
Component: TMOS
Symptoms:
The readme file automatically produced for BIG-IP Engineering Hotfixes contains the following instructions:
This hotfix may not be operational without a FULL
system restart. To accomplish this, use the command:
/usr/bin/full_box_reboot
However, the full_box_reboot command is not part of the documented or recommended workflows for current BIG-IP versions.
Conditions:
These instructions are contained in the .readme file that may accompany a BIG-IP Engineering Hotfix provided by F5 to resolve critical issues, under the terms and conditions of the F5 critical issue hotfix policy as described at:
https://my.f5.com/manage/s/article/K4918
Impact:
The instructions in the Engineering Hotfix readme file may be confusing due to inconsistency with documented workflows for installing BIG-IP Engineering Hotfixes.
Workaround:
After the software installs and boots to the volume with installed software no further reboot is required.
Fix:
None
Fixed Versions:
21.1.0
1380009 : TLS 1.3 server-side resumption resulting in TMM crash due to NULL session
Links to More Info: BT1380009
Component: Local Traffic Manager
Symptoms:
TMM core is observed when TLS 1.3 server-side resumes.
Conditions:
- TLS 1.3 handshake
Impact:
TMM cores, traffic is disrupted.
Workaround:
None
Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1
1379649 : GTM iRule not verifying WideIP type while getting pool from TCL command
Links to More Info: BT1379649
Component: Global Traffic Manager (DNS)
Symptoms:
When the pool name is same for different pool types, the GTM iRule cannot segregate the pool types thus giving a wrong DNS response.
Conditions:
-- Both A/AAAA same name WideIP and pools.
-- GTM iRule with pool command pointing to common pool name in different WideIP types.
Impact:
Traffic impact as a non-existent pool member address in DNS response.
Workaround:
None
Fixed Versions:
21.1.0, 21.0.0.1, 17.1.3.1
1377737-2 : SSL Orchestrator does not pass traffic when MAC masquerading is configured on R4k or R2k systems
Links to More Info: BT1377737
Component: TMOS
Symptoms:
In BIG-IP tenants launched on R4x00/R2x00 systems, configuring a MAC Masquerade address on the SSL Orchestrator (SSL Orchestrator) egress port prevents traffic from passing.
Conditions:
-- R4x00 or R2x00 systems
-- BIG-IP Tenant
-- High availability (HA) configured in BIG-IP
-- MAC Masquerade address configured on SSL Orchestrator egress port
Impact:
Egress traffic on the SSL Orchestrator port will be dropped in the physical NIC card. Hence SSL Orchestrator egress traffic on the port wouldn't be received on L2 device.
Workaround:
None
Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3
1352213-6 : Handshake fails with FFDHE key share extension
Links to More Info: BT1352213
Component: Local Traffic Manager
Symptoms:
SSL handshake fails to complete and various errors show in the LTM logs
01010025:2: Device error: crypto codec Couldn't create an OpenSSL EC group object OpenSSL error:00000000:lib(0):func(0):reason(0)
01010282:3: Crypto codec error: sw_crypto-1 Couldn't initialize the elliptic curve parameters.
01010025:2: Device error: crypto codec No codec available to initialize request context.
Conditions:
An SSL profile uses TLS1.3, and a TLS Client Hello attempts to use FFDHE as part of the key share extension.
Impact:
SSL handshake fails and results in connection failure.
Workaround:
Set the SSL profile to disallow using FFDHE groups.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3
1341517 : With longer vlan names qkview generates invalid proc_module.xml file and ihealth parsing fails.
Links to More Info: BT1341517
Component: TMOS
Symptoms:
With longer vlan names, invalid proc_module.xml file are generated by qkview and iHealth parsing fails intermittently.
Conditions:
VLAN names longer than 13 characters are used.
Impact:
iHealth may fail to process the qkview file.
Workaround:
Use shorter VLAN names.
Fixed Versions:
21.1.0, 21.0.0.1
1341093 : MCPD returns configuration error when attaching a client SSL profile containing TLS 1.3 to a virtual server with HTTP/2 profile
Links to More Info: BT1341093
Component: Local Traffic Manager
Symptoms:
A configuration error is seen on BIG-IP as below:
01070734:3: Configuration error: In Virtual Server (/Common/vsname) an http2 profile with enforce-tls-requirements enabled is incompatible with client ssl profile '/Common/PORTAL-3119-cssl-tls13'; cipher ECDHE-RSA-AES128-GCM-SHA256 must be available
Conditions:
- Virtual Server with cipher rule that uses tlsv1_3 ciphers only
- Cipher group
- Client-SSL profile and HTTP/2 profile with enforce-tls-requirements enabled
Impact:
HTTP/2 and Client-SSL Profiles with TLS 1.3 is not supported.
Workaround:
None
Fixed Versions:
21.1.0
1327649-1 : Invalid certificate order within cert-chain associated to JWK configuration
Links to More Info: BT1327649
Component: TMOS
Symptoms:
An error occurs while validating the certificate and certificate chain in JSON web key configuration:
General error: 01071ca4:3: Invalid certificate order within cert-chain (/Common/mycert.crt) associated to JWK config (/Common/myjwk). in statement [SET TRANSACTION END]
Conditions:
Issue occurs when the certificate chain contains three or more certificates.
The proper order in issuing:
endpointchild
|
endpoint
|
intermediate
|
ca
Impact:
You are unable to create a policy with key configuration for OAuth when the certificate chain contains more than two certificates.
Workaround:
Note that there is no impact when the certificate chain order is valid and contains only two certificates in the chain.
Fixed Versions:
21.1.0
1325737 : Standby tenant cannot access floating traffic group when MAC masquerade is enabled
Links to More Info: BT1325737
Component: TMOS
Symptoms:
A standby BIG-IP tenant running on an r2000 or r4000 appliance cannot access addresses in the floating traffic group if MAC masquerade is enabled. For instance, the standby tenant will not be able to ping the floating self IP address.
External devices can access the floating self IP address without issue.
If the tenants swap HA roles (the active device becomes standby, and the standby device becomes active), the problem follows the standby device -- the newly-standby system is not able to ping the floating self IP address.
Conditions:
-- F5 r2000 or BIG-IP r4000 system
-- BIG-IP tenant with MAC masquerade configured for floating traffic group
Impact:
Standby tenant unable to access resources in the floating traffic group when MAC masquerade is configured.
Workaround:
None
Fix:
A configuration option to disable MAC filter installation has been added.
To disable MAC filters:
echo -e "drvcfg iavf uc_mac_filter 0\ndrvcfg iavf mc_mac_filter 0" >> /config/xnet_init.tcl
bigstart restart tmm
Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3
1325649-5 : POST request with "Expect: 100-Continue" and HTTP::collect + HTTP::release is not being passed to pool member
Links to More Info: BT1325649
Component: Local Traffic Manager
Symptoms:
After upgrading from a BIG-IP version prior to v16.1.0 to BIG-IP v16.1.0 or later, one specific virtual-server is not working as expected and unable to forward the POST request towards the pool member.
Conditions:
1) Upgrade to v16.1.0 or later
2) Send a POST request from client with "Expect: 100-Continue".
3) Attach an irule using http::collect plus http::release to the Virtual Server.
Impact:
Cannot send POST requests from client to server
Workaround:
If ASM is provisioned, a transparent ASM policy can be a workaround.
1. Create a transparent ASM policy
At GUI Security >> Application Security: Security Policies
Click Create
Fill in following
Policy name: <unique policy Name>
Policy Type: Security(Default)
Policy Template: Fundamental (Default)
Leaning and Blocking
Enforcement Mode: Transparent
Save
Click the policy name created above, and modify following
Policy Building Learning Mode: Disabled
Save and Apply Policy
2. Enable Application Security Policy with the ASM Policy created above at the LTM Virtul Server Security configuration.
Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3
1325633 : Limit the value of MAX_DP_TARGET_COUNT in processQueryTargets.
Links to More Info: BT1325633
Component: Global Traffic Manager (DNS)
Symptoms:
The limit check for dp_target_count existed only in query_for_targets(), allowing the counter to increment unchecked in a loop (processQueryTargets() -> iter_server_selection() -> infra cache lookups), which could lead to a crash.
Conditions:
NA
Impact:
Unexpected traffic volume triggered the crash.
Workaround:
NA
Fix:
Added an early validation at the start of processQueryTargets() to check if dp_target_count > MAX_DP_TARGET_COUNT and immediately return SERVFAIL, preventing the runaway loop and crash.
Fixed Versions:
21.1.0
1324085 : Multiple OpenSSL Vulnerabilities
Links to More Info: K000137969
1322413 : After config sync, FQDN node status changes to Unknown/Unchecked on peer device
Links to More Info: BT1322413
Component: TMOS
Symptoms:
If changes are made to the FQDN node configuration, which has a node monitor configured, and the configuration is synced to a device group, ephemeral nodes generated from the FQDN node may show Availability as “unknown” and Monitor Status as “unchecked”.
Conditions:
This may occur on versions of BIG-IP with fixes for ID724824 and ID1006157, under the following conditions:
- BIG-IP systems are configured in a device group
- The device group is configured for Manual Sync (Full or Incremental)
- One or more FQDN nodes are configured with a node monitor (which could be the Default Node Monitor)
- A change is made to the configuration of the FQDN node
- A Full configuration sync is performed (by a Manual sync with the device group configured for a Full sync, as an automatic fallback/recovery action from a failed Incremental sync, or by using the “force-full-load-push” keyword):
tmsh run cm config-sync to-group example-group force-full-load-push
Impact:
The affected nodes will be displayed with an Availability as “unknown” and Monitor Status as “unchecked”.
Workaround:
To resolve this condition, remove and add the node monitor:
- Remove the node monitor from the FQDN node configuration (or from default-node-monitor):
tmsh mod ltm node example monitor none
(tmsh mod ltm default-node-monitor rule none)
- Sync this change to the device group (Incremental sync)
- Add the node monitor again to the FQDN node configuration (or to default-node-monitor):
tmsh mod ltm node example monitor my_node_monitor
(tmsh mod ltm default-node-monitor rule my_node_monitor)
- Sync this change to the device group (Incremental sync)
Fixed Versions:
21.1.0
1290937-3 : 'contentWindow' of a dynamically genereated iframe becomes null
Component: Access Policy Manager
Symptoms:
A web application using iframes may not work/render as expected using Portal Access.
Conditions:
A web application attempts to configure 'contentWindow' for an iframe while the Portal Access feature is in use.
Impact:
Web Application through Portal Access may fails to work/render as expected
Workaround:
Workaround: Using a customized irule/ifile to return un-patched 'contentWindow' from cache-fm*.js file. ifile has modern cache-fm file.
when CLIENT_ACCEPTED {
ACCESS::restrict_irule_events disable
}
when HTTP_REQUEST {
if {
[HTTP::path] ends_with "/cache-fm-Modern.js"
} {
HTTP::respond 200 content [ifile get cachefmUploadIssueWorkaround]
}
}
Fixed Versions:
21.1.0
1282769 : Localdb user can change the password of other user
Component: Access Policy Manager
Symptoms:
The user was able to change the password for another user in the logon page, when local DB authentication was used.
Conditions:
-- At least one user in the local DB instance is forced to change the password
-- the virtual server is tied in with the trusted CA certificates (that is, it would not happen if the virtual server for the SSL-VPN is associated with self-signed certificates).
Impact:
User authentication based on local DB will be impacted.
Workaround:
None
Fixed Versions:
21.1.0
1281493 : Tmsh and gui errors when checking tmm memory
Links to More Info: BT1281493
Component: Local Traffic Manager
Symptoms:
Checking statistics in the GUI (Statistics ›› Module Statistics : Memory ) may result in "As error has occurred while trying to process your request."
Checking memory via tmsh may show invalid values for tmm's memory usage:
# tmsh show sys memory | grep nan
TMM Memory Used -nan -nan -nan
Conditions:
When the files in /var/tmstat/blade/ exceed 4GB. This could be to a large number of tmms or due to an extremely large config.
Impact:
Tmm memory stats may be zero, or may be half the size they should be.
Workaround:
Check tmm's memory using tmctl instead:
tmctl tmm_stat -s cpu,memory_total,memory_used
Or reduce the size of the config and restart tmm.
Fixed Versions:
21.1.0
1271453 : DNS requests with NSEC or NSEC3 RR type Responding with no NSEC3 and no authority section from BIG-IP authoritative server.
Links to More Info: BT1271453
Component: Global Traffic Manager (DNS)
Symptoms:
DNS requests with NSEC or NSEC3 RR type Responding with no NSEC/NSEC3 and no authority section from BIG-IP authoritative server.
Conditions:
-- Create a Zone in BIND.
-- Create DNSSEC zone on BIG-IP.
-- Send dig -t nsec3 ZONENAME @BIG_IP_listener +dnssec
-- Observe the lack of AUTHORITY SECTION, NSEC3 and RRSIG records in the reply
Impact:
DNSSEC Validation failure at resolver.
Workaround:
None
Fix:
None
Fixed Versions:
21.1.0
1271341 : Unable to use DTLS without TMM crashing
Component: Local Traffic Manager
Symptoms:
The TMM crashes when DTLS is used.
Conditions:
- Using DTLS.
Impact:
TMM core is observed, traffic is disrupted while TMM restarts.
Workaround:
Disable 'allow-dynamic-record-sizing' in the client-ssl profile.
Following is an example:
ltm profile client-ssl /Common/otters-ssl {
allow-dynamic-record-sizing disabled
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1268373 : MRF flow tear down can fill up the hudq causing leaks
Links to More Info: BT1268373
Component: Service Provider
Symptoms:
TMM Memory leaks are observed when MRF flows were torn down at once and the hud queue was full.
Conditions:
When the message queue becomes full.
Impact:
TMM memory leak
Workaround:
None
Fixed Versions:
21.1.0, 17.5.1.4
1256757 : Suspect keymgmtd memory leak while using dynamic CRL.
Links to More Info: BT1256757
Component: TMOS
Symptoms:
keymagmtd's memory size steadily increases. Specifically, in the emdeviced memory size.
Conditions:
CRL validation is enabled
Impact:
keymgmtd might crash due to out of memory conditions.
Workaround:
Need to reboot the machine to reset the memory usage.
Fixed Versions:
21.1.0
1231889 : Mismatched VLAN names (or VLANs in non-Common partitions) do not work properly BIG-IP tenants running on r2000 / r4000-series appliances
Links to More Info: BT1231889
Component: TMOS
Symptoms:
When a VLAN configured in the tenant does not have the same name as the VLAN on in F5OS or the VLAN in the tenant is created in a partition other than "Common", VLANs may not pass traffic properly without manual configuration.
If any such VLANs exist, newly-configured VLANs may also exhibit this issue, even if the VLAN is in Common and has a name that matches the name in F5OS.
The system will have log messages similar to the following; these errors will still occur even once the workaround has been applied.
Feb 15 15:39:49 r4000-1.example.com err mcpd[19522]: 01070094:3: Referenced vlan (/Common/external) is hidden, does not exist, or is already on another instance.
Feb 15 15:39:49 r4000-1.example.com err chmand[19520]: 012a0003:3: hal_mcp_process_error: result_code=0x1070094 for result_operation=eom result_type=eom
Tenants running on an r2000 or r4000-series appliance need to know the VLAN<>interface associations, but the system is not able to populate this information when the VLAN is not in the Common partition. VLANs may not have any 'interfaces' referenced, or will have 'interfaces' that are not in-sync with the configuration on the F5OS host. For example:
R2000# show running-config interfaces interface LAG; show running-config vlans vlan 47
interfaces interface LAG
config type ieee8023adLag
config description ""
aggregation config lag-type LACP
aggregation config distribution-hash src-dst-ipport
aggregation switched-vlan config trunk-vlans [ 42 47 ]
!
vlans vlan 47
config vlan-id 47
config name vlan_47
!
R2000#
[root@tenant:Active:Standalone] config # tmsh list net vlan /ottersPart/vlan_47
net vlan /ottersPart/vlan_47 {
dag-adjustment none
if-index 240 # <-- interfaces is not listed
partition ottersPart
[...]
tag 47
}
[root@tenant:Active:Standalone] config #
[root@tenant:Active:Standalone] config # tmsh list net vlan /ottersPart/vlan_47
net vlan /ottersPart/vlan_47 {
dag-adjustment none
if-index 240
partition ottersPart
interfaces { # <-- configuration with a workaround in place
LAG {
tagged
}
}
[...]
tag 47
}
Conditions:
- BIG-IP tenant running on r2000 and r4000-series platforms
- VLANs moved to partitions other than "Common", or renamed so that the name does not match between hypervisor and tenant.
Impact:
Partitions other than the Common partition cannot have VLANs. VLANs created in other partitions will not be operational in the data path.
If such VLANs exist in the tenant, newly added VLANs will also exhibit this issue.
Workaround:
In the BIG-IP tenant, modify all VLAN objects to have 'interfaces' that align with the configuration on the host.
For example, for the VLAN 47 described above, the VLAN should be listed as being 'tagged' on the 'LAG' trunk:
tmsh modify net vlan /ottersPart/vlan_47 interfaces replace-all-with { LAG { tagged } }
tmsh save sys config
Fixed Versions:
21.1.0
1189909 : Active SSL Connections Curve is always kept at Zero on Performance Graph
Links to More Info: BT1189909
Component: Local Traffic Manager
Symptoms:
In the BIG-IP GUI, if a user navigates to Statistics :: Performance Reports : Performance Reports, then clicks "View Detailed Graph", next to "Active Connections" is a graph named Active SSL Connections.
Even though many client SSL connections were received by SSL virtual servers, the SSL Client curve in the graph always shows 0.
The same behavior is seen via CLI with the 'tmsh show sys performance all-stats historical detail' output where the output displays all zeroes within Active SSL Connections for SSL Client.
Conditions:
SSL connections exist from a client over a period of time.
Impact:
You are unable to determine how many active SSL/TLS connections are present.
Workaround:
Use the alternate method mentioned in article K76898322 to see the Active client-side SSL connections.
Fixed Versions:
21.1.0
1183529-1 : OCSP request burst when cert-ldap authentication is enabled
Links to More Info: BT1183529
Component: TMOS
Symptoms:
Issue observed : When Remote client cert-ldap authentication is enabled in Big-IP and ocsp-responder is configured.
Cause: webUI update default value is 5 seconds - updates every 5 seconds triggering SSL handshake which results in OCSP request bursts on the OCSP responder which may be lead to responder becoming irresponsive . Each request triggers two OCSP responder messages, leading to unnecessary traffic and causing performance issues in customer environments.
Conditions:
When Remote client cert-ldap authentication is enabled in Big-IP and ocsp-responder is configured.
WebUI makes an OCSP check for every HTTP request. This generates a lot of OCSP requests and If the OCSP server doesn't respond consistently, then the system is immediately redirected to the login page to re-authenticate.
Impact:
The OCSP (Online Certificate Status Protocol) Responder may experience service degradation or complete failure when subjected to excessive request volumes within compressed time intervals, particularly in environments where multiple systems share a single OCSP endpoint.
Workaround:
1. In /etc/httpd/conf.d/ssl.conf ,replace the below lines
SSLVerifyClient none
<LocationMatch "^[/][^/]+[/]">
SSLVerifyClient require
</LocationMatch>
with
SSLVerifyClient require
2. restart the httpd service - bigstart restart httpd
Note:The workaround does not survive a device reboot, an upgrade, or modification of any of the authentication and/or HTTPD configurations.
Fix:
1. Configure the bigip for Remote client cert-ldap authentication
2. Login via UI to the bigip
3. On the OCSP responder , look for OCSP requests from Big-IP - there should be requests only during authentication and every SSLOCSPResponderTimeout interval
Fixed Versions:
21.1.0
1181933 : Portal Access support for ES8/9/10/11
Component: Access Policy Manager
Symptoms:
Applications may not function at the client side when accessed via portal access
Conditions:
-- APM proxying a web application
-- Web-application uses ES8/9/10/11 javascript
Impact:
Web application mis-function
Workaround:
None
Fixed Versions:
21.1.0
1178225-5 : Scalability issues with F5-VE deployments
Component: TMOS
Symptoms:
Two TMM threads can end up running on the same physical core on hypervisors where any 2 consecutive virtual cores are hyperthreaded siblings running on the same physical core.
Seen on any platform which assigns virtual CPUs in the order given in the example below, where numerically adjacent logical CPU numbers represent cores on the same physical CPU:
cpu0 - assigned to physical core 0
cpu1 - assigned to physical core 0
cpu2 - assigned to physical core 1
cpu3 - assigned to physical core 1
cpu4 - assigned to physical core 2
cpu5 - assigned to physical core 2
etc.
BIG-IP expects the order of the logical CPUs to iterate through the physical cores, so that hyperthreaded siblings are never numberically adjacent, for example:
cpu0 - assigned to physical core 0
cpu1 - assigned to physical core 1
cpu2 - assigned to physical core 2
cpu3 - assigned to physical core 3
cpu4 - assigned to physical core 0
cpu5 - assigned to physical core 1
cpu6 - assigned to physical core 2
cpu7 - assigned to physical core 3
The order that logical CPUs are assigned to the virtual machine can be determined with the 'lscpu --extended' command.
Conditions:
Virtual Edition (VE) BIG-IP as it does not support split planes
Impact:
Scalability issues with F5-VE deployments which run on infrastructures/hypervisors which provide virtual CPU resources in the order given above.
Workaround:
None
An EHF is available that adds a db variable that alter the the order that tmm allocates CPU cores to threads.
Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1
1166929 : [AdminUI][Rewrite Profile][PA] Add "*://*" to to rewrite list if an RCL has been entered
Links to More Info: BT1166929
Component: Access Policy Manager
Symptoms:
"Rewrite-List" field is empty Rewrite profile configuration
Conditions:
Portal Access configuaration
Impact:
Rewrite may not work as expected
Workaround:
Add "*://*" manually for Rewrite-List
Fixed Versions:
21.1.0
1161169 : TLS X25519 hardware offload support
Component: Local Traffic Manager
Symptoms:
TLS ECDH group X25519 operations are not offloaded to hardware.
Conditions:
N/A
Impact:
TLS CPS performance may not be optimal on certain platforms.
Workaround:
N/A
Fix:
Added hardware offload support.
Fixed Versions:
21.1.0
1148185 : getdb insufficient sanitisation
Links to More Info: K05403841
Component: TMOS
Symptoms:
https://support.f5.com/csp/article/K05403841
Conditions:
https://support.f5.com/csp/article/K05403841
Impact:
https://support.f5.com/csp/article/K05403841
Fix:
https://support.f5.com/csp/article/K05403841
Fixed Versions:
21.1.0, 21.0.0.1
1137269-7 : MCPD fails to reply if a request is proxied to another daemon and the connection to that daemon closes
Links to More Info: BT1137269
Component: TMOS
Symptoms:
MCPD does not reply to the request if the publisher's connection closes or fails. In this case, when bcm56xxd
is restarted, the perceivable signs of failure are:
- The snmpwalk failing with a timeout and
- The "MCPD query response exceeding" log messages.
Conditions:
1) Configure SNMP on the BIG-IP to run snmpwalk locally on the BIG-IP.
2) From the first session on the BIG-IP, run a snmpwalk in the while loop.
while true;do date; snmpwalk -v2c -c public 127.0.0.1 sysDot1dbaseStat;sleep 2;done
Sample output:
Sat Aug 21 00:57:23 PDT 2021
F5-BIGIP-SYSTEM-MIB::sysDot1dbaseStatResetStats.0 = INTEGER: 0
F5-BIGIP-SYSTEM-MIB::sysDot1dbaseStatMacAddr.0 = STRING: 0:23:e9:e3:8b:41
F5-BIGIP-SYSTEM-MIB::sysDot1dbaseStatNumPorts.0 = INTEGER: 12
F5-BIGIP-SYSTEM-MIB::sysDot1dbaseStatType.0 = INTEGER: transparentonly(2)
3) From a second session on the BIG-IP restart bcm56xxd
bigstart restart bcm56xxd
4) The snmpwalk will continually report the following:
Timeout: No Response from 127.0.0.1
And snmpd will continually log "MCPD query response exceeding" every 30 seconds in /var/log/ltm.
Impact:
SNMP stopped responding to queries after upgrade.
Workaround:
Restart SNMP.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1125381-4 : Extraneous warnings recorded in when using only intermediate certificates
Links to More Info: BT1125381
Component: Local Traffic Manager
Symptoms:
When client authentication is enabled on the client SSL profile but the trusted-ca file includes only an intermediate certificate and no CA root cert to build the whole cert chain, although the TLS connection is made, as expected, there is an error message reported following.
Jun 21 20:43:01 bigip warning tmm6[18125]: 01260006:4: Peer cert verify error: unable to get issuer certificate (depth 1; cert /CN=subca)
Jun 21 20:43:01 bigip warning tmm6[18125]: 01260005:4: Unable to get certificate for peer cert issuer /CN=rootca
Conditions:
Trusted-ca includes only inter-cert and no root CA-cert
is configured.
Impact:
Although the TLS handshake succeeds without any issue and the connection is processed, as expected, a confusing warning is reported.
Workaround:
Because the connection is made, you can safely ignore this message.
Note: This issue does not occur if the root CA cert is also configured in the CA-cert bundle.
Fixed Versions:
21.1.0
1106489 : GRO/LRO is disabled in environments using the TMM raw socket "sock" driver.
Links to More Info: BT1106489
Component: TMOS
Symptoms:
GRO/LRO packets are not received: "tmctl -d blade tmm/ndal_rx_stats" shows "0" in "lro". The linux host has GRO disabled: "ethtool -k eth1 | grep generic-receive-offload" shows "off".
Conditions:
-- BIG-IP is deployed in a Hyper-V environment.
-- Any environment such that "tmctl -d blade tmm/device_probed" displays "sock" in "driver_in_use".
Impact:
Performance is degraded.
Workaround:
Manually enable GRO on the device: ethtool -K eth1 gro on
Check that it's enabled with: ethtool -k eth1 | grep generic-receive-offload
Fix:
When sending large payload, "tmctl -d blade tmm/ndal_rx_stats" shows "1" in "lro". "tmctl -d blade tmm/ndal_dev_status" shows "y:y" (available:enabled) in "lro". The linux host indicates the device has GRO enabled: "ethtool -k eth1 | grep generic-receive-offload" shows "on".
Fixed Versions:
21.1.0, 17.1.3, 16.1.4, 15.1.10
1103833 : Tmm core with SIGSEGV in gtmpoolmbr_UpdateStringProc
Links to More Info: BT1103833
Component: Global Traffic Manager (DNS)
Symptoms:
Tmm cored with SIGSEGV.
Conditions:
-- iRule pool command with member which is determined at run-time
-- A pool member is used for the iRule
-- The previous pool member is deleted and then re-created using the same name
-- That pool member is picked again for the next iRule event.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Use a string command to category the pool member variable like this:
pool dnspool member [string trim $pool_member]
Fixed Versions:
21.1.0
1100421 : HTTP/2 full-proxy virtual server uses wrong source MAC address and incorrect SNAT address selection
Links to More Info: BT1100421
Component: Local Traffic Manager
Symptoms:
When using an HTTP/2 full-proxy virtual server (with httprouter profile), server-side connections may exhibit the following issues:
- Egress packets use the system base MAC address instead of the configured masquerade MAC address.
- SNAT automap selects a non-floating self-IP instead of the expected floating self-IP.
- SNAT pool member selection does not prefer members matching the traffic-group of the virtual server.
This can cause MAC address flapping alerts on upstream network equipment and may disrupt traffic during HA failover events.
Conditions:
- Virtual server configured with the httprouter profile (HTTP/2 full-proxy).
- Masquerade MAC address configured on a traffic-group, and/or SNAT automap or SNAT pool in use with floating self-IPs.
Impact:
Server-side traffic uses incorrect source MAC address and may select non-floating SNAT addresses. Upstream network devices (such as switches or SDN controllers) may detect duplicate MAC/IP entries, causing traffic disruption. During HA failover, connections may not behave as expected because the correct traffic-group was not used.
Workaround:
None. Use a standard virtual server configuration without the httprouter profile as an alternative if HTTP/2 full-proxy is not required.
Fix:
HTTP/2 full-proxy virtual servers now correctly use the traffic-group associated with the client-side connection for server-side connections, ensuring the correct masquerade MAC address and SNAT address selection.
Fixed Versions:
21.1.0
1083405-9 : "Error connecting to named socket" from zrd
Links to More Info: BT1083405
Component: Global Traffic Manager (DNS)
Symptoms:
After an mcpd restart, zrd may not be able to re-establish a connection to named. This shows up in the /var/log/gtm file or in the GUI with a message similar to the following:
err zrd[27809]: 01150306:3: Error connecting to named socket 'Connection refused'.
(or)
err zrd[16198]: 01150306:3: Error connecting to named socket 'Connection timed out'.
Conditions:
After an mcpd restart
Impact:
Looking up or modifying zone records may fail.
Workaround:
Restart zrd and named
tmsh restart sys service zrd named
Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1
1074285-6 : Apmd crashes while handling JWT tokens.
Links to More Info: BT1074285
Component: Access Policy Manager
Symptoms:
An apmd crash might occur while handling JWT tokens.
Conditions:
The payload has invalid JSON during authentication.
Impact:
BIG-IP authorization disrupted while apmd restarts.
Workaround:
None
Fix:
We now validate the received payload format before parsing.
Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1
1071021-6 : Some URLs such as *cdn.onenote.net configured in the Office 365 dynamic address space are not processed by APM
Links to More Info: BT1071021
Component: Access Policy Manager
Symptoms:
Dynamic address space parser not accepting few patterns(*cdn.example.net) which are added at the DNS address space field.
Conditions:
When the user configures Office 365 Dynamic Address Space with URLs formats like:
*-admin.sharepoint.com
*cdn.onenote.net
*-files.sharepoint.com
*-myfiles.sharepoint.com
Impact:
Due to the above pattern DNS relay proxy is not compatible with them.
Workaround:
None
Fix:
Dynamic address space parser should accept a few patterns(*cdn.example.net) which are added to the DNS address space field.
Fixed Versions:
21.1.0, 17.1.3.1
1069381 : iControl REST rate limiting and connection handling improvements
Links to More Info: K15101402
1065385 : BIG-IP: NPM vulnerabilities
Component: TMOS
Symptoms:
npm CLI versions prior to 6.13.3/6.13.4 allow malicious packages to write, modify, or overwrite arbitrary files and binaries via the bin field during installation, bypassing --ignore-scripts, potentially leading to system compromise.
Conditions:
A user installs a malicious npm package using a vulnerable npm CLI version (< 6.13.4), where the package abuses the bin field to write or overwrite files outside the intended node_modules directory.
Impact:
It can allow arbitrary file write or overwrite, potentially leading to system compromise, privilege escalation, or denial of service.
Workaround:
Upgrade to npm CLI 6.13.4 or later and avoid installing untrusted or malicious npm packages.
Fix:
issue has been fixed with required patch/upgrade
Fixed Versions:
21.1.0, 17.1.3.1
1057557 : Exported policy has greater-than sign '>' not escaped to '>' with response_html_code tag.
Links to More Info: BT1057557
Component: Application Security Manager
Symptoms:
The greater-than sign '>' is not escaped/converted to '>' with response_html_code tag.
Having an un-escaped greater-than sign can cause issues when re-importing the policy, if the greater-than sign appears in a specific sequence, ']]>'. In other words, if the greater-than sign does not appear in the specific sequence, you can successfully re-import the policy without problem.
The specific sequence can be possible with a custom response page configuration. If you modify the custom response page in the way it has a sequence of characters ']]>', as the greater-than sign is not converted due this issue, the exported policy has the sequence of characters ']]>'. The expected characters are ']]>'
The characters ']]>' in XML is CDATA End delimiter and not allowed. The exported policy causes parser error and can not be re-imported.
Conditions:
This issue occurs if you modify the default custom response page where this specific character sequence is observed ']]>'.
Impact:
The exported policy cannot be re-imported.
Workaround:
This workaround forces the greater-than sign to be escaped to '>' so that that policy can be re-imported without problem.
- make /usr writable
# mount -o remount,rw /usr
- backup
# cp /usr/local/share/perl5/F5/ExportPolicy/XML.pm /usr/local/share/perl5/F5/ExportPolicy/XML.pm.orig
- see this line exists
# grep "gt;" /usr/local/share/perl5/F5/ExportPolicy/XML.pm
$xml =~ s/>/>/g;
- delete the line and verify
# sed -i '/$xml =~ s\/>.*/d' /usr/local/share/perl5/F5/ExportPolicy/XML.pm
- should not see the line
# grep "gt;" /usr/local/share/perl5/F5/ExportPolicy/XML.pm
- move /usr read-only
mount -o remount,ro /usr
- make the change in effect
# pkill -f asm_config_server
Fixed Versions:
21.1.0
1057305 : On deployments that use DPDK, "-c" may be logged as the TMM process/thread name.
Links to More Info: BT1057305
Component: Local Traffic Manager
Symptoms:
"-c" may be logged as the process/thread name on deployments that use DPDK:
notice -c[17847]: 01010044:5: Gx feature is not licensed
notice -c[17847]: 01010044:5: LTM Transparent feature is licensed
notice -c[17847]: 01010044:5: NAT feature is licensed
Conditions:
- BIG-IP Virtual Edition using XNET with DPDK. This can be AWS, Mellanox, or Cisco eNIC.
Impact:
Confusing logging.
Workaround:
N/A
Fix:
N/A
Fixed Versions:
21.1.0
1053561 : TLS 1.3 Handshake fails when 0RTT enabled on the client-side SSL and iRule is specified
Links to More Info: BT1053561
Component: Local Traffic Manager
Symptoms:
On small virtual machines (e.g. 2 cores, 4GB RAM) when OpenSSL-1.1.1 client connects to a BIG-IP device running TLS 1.3, and containing an iRule, the handshake fails.
Conditions:
1. Small virtual machine (e.g. one with 2 cores and 4GB RAM).
2. TLS 1.3 is enabled on the BIG-IP device.
3. An iRule is specified for client-side SSL.
Impact:
The handshake is terminated.
Workaround:
Disable TLS 1.3 on the BIG-IP device only if an alternative protocol is available.
Fix:
The issue is fixed and will be backported to maintenance releases.
Fixed Versions:
21.1.0
1052477-2 : CVE-2020-10751 kernel: SELinux netlink permission check bypass
Component: TMOS
Symptoms:
A flaw was found in the Linux kernel SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.
Conditions:
NA
Impact:
A local attacker could bypass SELinux restrictions, potentially leading to unauthorized access, privilege escalation, or, in some scenarios, a system crash (denial of service).
Workaround:
NA
Fix:
Applied patch to fix the CVE
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1044053 : The db variable pccd.maxblobsize can only be set to a minimum of 512
Component: Advanced Firewall Manager
Symptoms:
Packet Correlation Classification daemon uses blobs and the db variable pccd.maxblobsize configurable range is from 512 to 32720 with a default value of 4090.
On some system not requiring large blob, a minimum of 32 KB is more appropriate.
Conditions:
Not able to lower the range below 512.
Impact:
Memory usage increased.
Workaround:
N/A
Fix:
This release provides an enhancement to configure the range to lower to 32.
Fixed Versions:
21.1.0
1036221 : "Illegal parameter value length" is reported with parsing product length.
Links to More Info: BT1036221
Component: Application Security Manager
Symptoms:
"Illegal parameter value length" violation is reported with wrong parameter length.
Conditions:
A JSON parameter is encoded.
Impact:
The decoded value length of the parameter in the JSON payload will be reported instead of its original length.
Workaround:
None
Fix:
The original parameters value length is reported with "Illegal parameter value length" violation.
Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4
1033537 : Cookie persistence handling with duplicate cookie names
Component: Local Traffic Manager
Symptoms:
When duplicate cookie names are present, only one may be evaluated.
Conditions:
NA
Impact:
Persistence selection may not behave as expected.
Workaround:
Consider alternative persistence methods if duplicate cookies are expected.
Fix:
Updated persistence cookie handling to better support duplicate cookie instances.
Behavior Change:
When sys DB variable tmm.http.cookie.decrypt.policy has value of "reject", it removes persistence cookie from the request if BIGIP failed to decrypt them and the cookie encryption policy in cookie persistence profile is set to "required".
If response has more than one instance of persistence cookie and the cookie encryption policy in cookie persistence profile is set to "required", then BIGIP encrypts all the instances.
If request has more than one instance of persistence cookie, BIGIP would try to decrypt all instances, and validate identity of their values. If the values were not identical, BIGIP would act per tmm.http.cookie.decrypt.policy value, removing all the instances on "reject" option, clearing values in "erase" option, and leave the values, possibly decrypted, when the policy is set to option "passthrough".
Fixed Versions:
21.1.0
1016273 : Standby TMM can core or cause incorrect mirroring during upgrade when session mirroring is enabled★
Links to More Info: BT1016273
Component: TMOS
Symptoms:
TMM crash occurs on the standby device which is on a lower version
Conditions:
1) Active and Standby are on different versions during upgrade
2) Session mirroring enabled
Impact:
Continuous TMM crash on standby.
Workaround:
Disable session mirroring during the upgrade process. This can be done by disabling sys db statemirror.mirrorsessions.
Fixed Versions:
21.1.0
1004953-9 : HTTP does not fall back to HTTP/1.1★
Links to More Info: BT1004953
Component: Local Traffic Manager
Symptoms:
After upgrading, the BIG-IP system's HTTP profile no longer falls back to HTTP/1.1 if a client sends a corrupted URI.
Conditions:
-- Client sends a corrupted URI (for example a URI containing a space).
Impact:
The BIG-IP system treats the URI as an HTTP/0.9 request (as per RFC) and forwards only the first request line. In previous releases, the BIG-IP system treated the URI as a HTTP/1.1 request.
Workaround:
None.
Fix:
Added db variable tmm.http.rfc.allowinsecureverfallback to allow insecure fallback to HTTP/1.1. Default is 'disable'.
Fixed Versions:
21.1.0, 17.5.1.4
1001429 : HTTP header Sanitization
Component: Device Management
Symptoms:
Some HTTP headers were improperly sanitised.
Conditions:
NA
Impact:
It could lead to unexpected behaviour
Fix:
Headers are now properly sanitised.
Fixed Versions:
21.1.0, 21.0.0.1
Known Issues in BIG-IP v21.1.x
TMOS Issues
| ID Number | Severity | Links to More Info | Description |
| 826313 | 3-Major | BT826313 | Error: Media type is incompatible with other trunk members★ |
| 741621-7 | 3-Major | BT741621 | CLI preference 'suppress-warnings' setting may show incorrectly |
| 675742-2 | 3-Major | BT675742 | Hardware-to-VE-platform-migrate of a UCS may fail with an error on db variable license.maxcores |
| 2291313 | 3-Major | BT2291313 | Azure/Hyper-V BIG-IP VE uses only a fraction of available memory |
| 2261337-1 | 3-Major | BT2261337 | TMUI displays Local Traffic menu on rSeries Best Bundle tenant without LTM provisioned |
| 2258825-1 | 3-Major | The lind process may continuously restart when mcpd is down | |
| 2258305-1 | 3-Major | TMSH sys/software syntax updated with experimental "dry-run" option | |
| 2149325-1 | 3-Major | BT2149325 | Db var not set when running tmsh load sys ucs ucs-file platform-migrate★ |
| 1707921-3 | 3-Major | BT1707921 | Tenant upgrade fails with disk full error on BIG-IP 17.x created with T2 image★ |
| 1603869 | 3-Major | BT1603869 | Wrong Fallback to local for TACACS authentication with empty password when source fallback is set to true |
| 1596313-4 | 3-Major | BT1596313 | F5OS LAG fails MCPD validation, tenant trunk has no interfaces. |
| 1296925-4 | 3-Major | BT1296925 | Unable to create two boot locations using the 'ALL' F5OS tenant image at default storage size |
| 1120345 | 3-Major | BT1120345 | Running tmsh load sys config verify can trigger high availability (HA) failover |
| 1050457-3 | 3-Major | BT1050457 | The "Permitted Versions" field of "tmsh show sys license" only shows on first boot |
| 1043141-5 | 3-Major | K36822000, BT1043141 | Misleading error 'Symmetric Unit Key decrypt failure - decrypt failure' when loading UCS from another BIG-IP |
| 2277421 | 4-Minor | BT2277421 | TCP profile Help tab displays incorrect default values for Memory Management fields |
| 2262641-4 | 4-Minor | BT2262641 | [BGP] Peering deadlock when modifying supported capabilities |
| 2259397-3 | 4-Minor | BT2259397 | [BGP] In route map the change in as-path does not automatically trigger soft outbound update |
| 2251549 | 4-Minor | BT2251549 | Uneditable fields for Guest, Auditor, and Operator roles may appear to be editable in the GUI |
| 1575805-1 | 4-Minor | bcm56xxd Process Killed by SOD After Failing to Send a Heartbeat During Firewall Rule Statistics Query |
Local Traffic Manager Issues
| ID Number | Severity | Links to More Info | Description |
| 2208821 | 2-Critical | BT2208821 | VIPRION cluster becomes INOPERATIVE and fails to load configuration after software upgrade★ |
| 683706-10 | 3-Major | BT683706 | Monitor status may show 'checking' after a pool member has been manually forced down |
| 2291393-1 | 3-Major | BT2291393 | Splitsession Traffic Fails |
| 2291301 | 3-Major | BT2291301 | Data-Group Lookup with 128-Character Key Length Will Not Match |
| 2288173-4 | 3-Major | BT2288173 | Some TMMs not ready and failed to bring up full cluster due to failed cmp dag transition |
| 2287865-1 | 3-Major | BT2287865 | Dynamic CRL always fails connections that use self-signed certificates |
| 2269969-4 | 3-Major | BT2269969 | Using TCP congestion BBR might lead to TMM core |
| 2264037-1 | 3-Major | BT2264037 | TMM may generate a core file after an SSL cipher group is deleted |
| 2261529 | 3-Major | BT2261529 | HTTP2 RST_STREAM flood detection should be more sensitive |
| 2244389 | 3-Major | BT2244389 | Small TLS record sizes reduce connection throughtput. |
| 2183917-4 | 3-Major | BT2183917 | BIG-IP might fail to update received TCP window when tm.tcpstopblindinjection is enabled |
| 1928169 | 3-Major | BT1928169 | HTTP2 RST_STREAM NO_ERROR received by BIG-IP not interpreted correctly |
| 1758193-1 | 3-Major | BT1758193 | Trunk with LACP and virtual-wire flaps after an upgrade.★ |
| 1354205 | 3-Major | BT1354205 | LTM policy with overlapping range in the TCP address match may fail |
| 1251969 | 3-Major | BT1251969 | The ratio algorithm between pool members for load-balancing does not work |
| 1196505 | 3-Major | BT1196505 | BIG-IP might RST HTTP2 connection with [F5RST:mrhttp_proxy bad transition] when ASM is in use. |
| 1148053 | 3-Major | BT1148053 | When client SSL profile has "cache-size 0" or "authenticate always", BIG-IP is unable to decrypt client-side traffic when using tcpdump with "--f5 ssl" method |
| 1128033 | 3-Major | BT1128033 | Neuron client constantly logs errors when TCAM database is full |
| 1014633 | 3-Major | BT1014633 | Transparent / gateway monitors may fail if there is no route to a node |
| 932553 | 4-Minor | BT932553 | An HTTP request is not served when a remote logging server is down |
| 1350909 | 4-Minor | BT1350909 | Statsd error condition is not logged |
Global Traffic Manager (DNS) Issues
| ID Number | Severity | Links to More Info | Description |
| 2228869-5 | 2-Critical | BT2228869 | Continuous tmm cores in domain_table_search with null dereferencing |
| 2224853-1 | 2-Critical | BT2224853 | BIG-IP DNS may not respond to RRSIG type queries correctly with DNSSEC zones |
| 2277817 | 3-Major | BT2277817 | DNS64 may fall back to QTYPE=A if there is a delay in response for QTYPE=AAAA and "DNS IPv6 to IPv4" is set to 'secondary' |
| 2264845-4 | 3-Major | BT2264845 | TMM may crash when enabling DNS Express |
| 2263101 | 3-Major | TMSH rrset commands do not list DNS cache serve-expired records | |
| 2261137-5 | 3-Major | BT2261137 | TMM may crash if DNS cache resolver concurrency settings are changed during live traffic |
| 2258701 | 3-Major | RPZ performance may have dropped in v21.1.0 | |
| 2187141-4 | 3-Major | BT2187141 | DNS generic server stuck offline after monitor removal |
| 2137661-3 | 3-Major | BT2137661 | GTM link object is deleted automatically after being added |
| 2289937-1 | 4-Minor | BT2289937 | ldns.gz file remains empty despite Active Path and Persistence Records |
| 2130329-4 | 4-Minor | BT2130329 | [GTM] Deletion of topology records makes MCPD memory ramp up |
Application Security Manager Issues
| ID Number | Severity | Links to More Info | Description |
| 1824745-4 | 2-Critical | BT1824745 | Bd crash and generate core |
| 1755113-7 | 2-Critical | BT1755113 | BD crash with specific JSON schema |
| 531848-3 | 3-Major | BT531848 | Call to Apply Policy can be lost and never retried in an autosync device group |
| 2289885-1 | 3-Major | BT2289885 | Malformed protobuf file synced from secondary blades cause asmlogs coredump |
| 2285073-2 | 3-Major | BT2285073 | AbandonedTaskSweep Removes Tasks Prematurely |
| 2053893-5 | 3-Major | BT2053893 | Incompletely-synced ASM configuration can be synced back to the original device or group |
| 1586877-4 | 3-Major | BT1586877 | Behavior difference in auto-full sync virtual server and manual-incremental config sync |
Access Policy Manager Issues
| ID Number | Severity | Links to More Info | Description |
| 2198721-4 | 3-Major | BT2198721 | SAML apmd memory leak |
| 2163589 | 3-Major | BT2163589 | Access VPN traffic may be incorrectly routed to LTM IPsec wildcard forwarding virtual server |
Service Provider Issues
| ID Number | Severity | Links to More Info | Description |
| 2230889 | 3-Major | BT2230889 | SIP parser mishandles RFC 3261 folded headers, causing 200 OK forwarding failure with iRule routing |
| 2077553 | 3-Major | BT2077553 | SIP message in quote containing special character after two backslashes will be generate a SIP error message |
| 2153897 | 4-Minor | BT2153897 | BIG-IP closes the transport connection immediately after sending a DPA to a peer |
Advanced Firewall Manager Issues
| ID Number | Severity | Links to More Info | Description |
| 1818861-5 | 3-Major | BT1818861 | Timestamp cookies are not compatible with fastl4 mirroring. |
| 2227661 | 4-Minor | BT2227661 | Sys variable db tm.fw.defaultaction is honor when AFM is not provisioned |
Policy Enforcement Manager Issues
| ID Number | Severity | Links to More Info | Description |
| 2291257 | 4-Minor | BT2291257 | Adding a Subscriber IP addresses with route-domain notation in the Subscriber Management 'Log Session Activity' box fails with ;Invalid IP Address' |
Protocol Inspection Issues
| ID Number | Severity | Links to More Info | Description |
| 1786457 | 3-Major | BT1786457 | Protocol Inspection auto update with latest is not working |
In-tmm monitors Issues
| ID Number | Severity | Links to More Info | Description |
| 1002345-8 | 3-Major | BT1002345 | Transparent monitor does not work after upgrade★ |
Known Issue details for BIG-IP v21.1.x
932553 : An HTTP request is not served when a remote logging server is down
Links to More Info: BT932553
Component: Local Traffic Manager
Symptoms:
BIG-IP systems provide an option to sanitize HTTP traffic via the http_security profile. When the profile is configured to alarm on a violation, it is possible that a connection to the violating client is reset if a remote logging server is marked down.
Conditions:
-- A BIG-IP system has an HTTP profile and and an http_security profile with the alarm option set.
-- A remote logging server is configured via a BIG-IP pool.
-- The pool has a monitor that marks all the pool members down.
-- A request with an HTTP violation is processed and triggers an alarm configured in the http_security profile.
Impact:
-- A TCP connection to a client is reset by the BIG-IP system.
-- The web page may not render, or may not render as expected.
-- Data are not delivered to a server with a POST request.
Workaround:
None.
826313 : Error: Media type is incompatible with other trunk members★
Links to More Info: BT826313
Component: TMOS
Symptoms:
Loading system configuration is failing after upgrade with an error message
01070619:3: Interface 5.0 media type is incompatible with other trunk members
Conditions:
-- Trunk interface created in BIG-IP version 12.3.4.
-- Trunk interfaces have different speeds (e.g. 100Mb interfaces and 1Gb interfaces)
-- Load the configuration after upgrading from v12.1.3.4 to v12.1.3.5.
Impact:
The system configuration is failing to load.
Workaround:
If you encounter this error, manually fix all trunks to only use interfaces of the same speed, and then load the configuration.
741621-7 : CLI preference 'suppress-warnings' setting may show incorrectly
Links to More Info: BT741621
Component: TMOS
Symptoms:
At times when the 'suppress-warnings' setting is at its default value ('none'), it may be listed like this instead:
suppress-warnings { }
After loading the configuration, the 'suppress-warnings' setting may return to the default value, in which case it is no longer visible when listing out the CLI preferences (without specifying 'all-properties').
Conditions:
-- Using the default value for 'suppress-warnings' in the CLI preferences.
-- Listing out the CLI preferences.
Impact:
Possibly confusing listing for this value. The 'suppress-warnings' setting auto-populates with an incorrect default of empty { } (instead of 'none') on config load, causing it to be displayed when listing CLI preference in tmsh.
Workaround:
None
683706-10 : Monitor status may show 'checking' after a pool member has been manually forced down
Links to More Info: BT683706
Component: Local Traffic Manager
Symptoms:
Following certain sequences of actions, a pool member that is forced offline (e.g., '{session user-disabled state user-down}'), may have an associated monitor status (status of the associated monitor instance) that is shown as 'checking'.
Conditions:
This result may occur as the result of one of the following sequences of actions:
1. A pool member is created with an associated monitor, and that pool member is simultaneously forced offline.
Example:
tmsh create ltm pool test1 members add { 10.1.108.2:80 { session user-disabled state user-down } } monitor http
2. A pool member is disabled or forced offline, the configuration is saved, and the BIG-IP system is restarted (for example, by 'bigstart restart' or 'reboot' commands).
Example:
tmsh modify ltm pool test1 members modify 10.1.108.2:80 { session user-disabled state user-down } }
tmsh save sys config
bigstart restart
Impact:
The pool member remains offline as directed, but the associated monitor status (monitor instance status) indicates 'checking', which does not appear to match the pool member status.
If the pool member is subsequently re-enabled, the associated monitor status (status of the associated monitor instance) will be updated to show the result of current monitor pings.
Workaround:
The 'checking' status of the monitor instance may be unexpected, in this context, but:
- The monitor status (monitor instance status) does not affect the status of a disabled pool member.
- This monitor status indicates that no monitor pings have been performed to update the initial state of the monitored object from 'checking' to a result determined by a monitor ping. The BIG-IP monitoring subsystem does not ping disabled pool members to update this status.
675742-2 : Hardware-to-VE-platform-migrate of a UCS may fail with an error on db variable license.maxcores
Links to More Info: BT675742
Component: TMOS
Symptoms:
Using the platform-migrate option to load a UCS from a different platform may show this error from loaddb:
01080023:3: Error return while getting reply from mcpd: 0x107178a, 0107178a:3: Modifying license.maxcores to a value other than 8 is not allowed.
The UCS loads successfully, other than the DB variable, but this error message is printed and the DB variables are not loaded.
Conditions:
-- Migrating a UCS from physical platform hardware to a Virtual Edition (VE) configuration.
-- License has an attribute limiting the maximum number of cores, and the incoming UCS has a value of the DB variable 'license.maxcores' that contradicts this.
Impact:
The DB variable file fails to load, generating the error message, but that does not stop the loading of the regular configuration files in BIG-IP*.conf.
Workaround:
The 'license.maxcores' value is ignored on hardware devices, so set it to 8 before saving the UCS.
531848-3 : Call to Apply Policy can be lost and never retried in an autosync device group
Links to More Info: BT531848
Component: Application Security Manager
Symptoms:
ASM Changes in an auto-sync device group are sent over a direct channel to a device's peers. In rare conditions it is possible that messages are lost over this channel.
Configuration changes have fallbacks to ensure the missing change will be noticed, but there is no such fallback currently for Apply Policy calls.
Therefore, if an Apply Policy call goes missing in an autosync group, it will never retry.
Conditions:
ASM sync is configured on an autosync device group.
Impact:
Enforcement changes will not take effect on the peer devices until the next Apply Policy action.
Workaround:
Make a spurious change to the policy and set it active again.
2291393-1 : Splitsession Traffic Fails
Links to More Info: BT2291393
Component: Local Traffic Manager
Symptoms:
Traffic does not flow through the split-session BigIPs, with the split-session server profile resetting the connection.
If the sys db variable tm.rstcause.log is enabled, the BigIP with the splitsession server profile will have "Failed to find sync data" as the cause logged in /var/log/ltm
Conditions:
Two BigIPs are configured where one has a virtual using a splitsession client profile and the other has a virtual that uses the peer splitsession server profile.
Impact:
Connections fail for the virtual until the proxy flow between the two BigIPs dies and is reestablished.
Workaround:
It is possible to workaround this by disabling SSL for the split-session proxy.
For the BigIP with the splitsession client profile, disabling Mode on the splitsession-default-serverssl profile, and for the BigIP with the splitsession server profiledisabling Mode on the splitsession-default-clientssl profile.
Note, this would mean the flow metadata would no longer be encrypted between the BigIPs.
2291313 : Azure/Hyper-V BIG-IP VE uses only a fraction of available memory
Links to More Info: BT2291313
Component: TMOS
Symptoms:
On Azure and Hyper-V deployments, BIG-IP VE allocates memory, but TMM only uses a small portion of it. In larger instances, a significant amount of memory remains unused.
Conditions:
BIG-IP VE is deployed on Microsoft Azure or Hyper-V with multiple data interfaces.
Impact:
Reduced memory available for traffic processing. Larger instance sizes do not provide a proportional memory benefit to TMM.
Workaround:
None
2291301 : Data-Group Lookup with 128-Character Key Length Will Not Match
Links to More Info: BT2291301
Component: Local Traffic Manager
Symptoms:
Some entries in a data-group of type string are never matched in an irule with class lookup or class match equals.
Conditions:
Keys in the data group of type string with a length of precisely 128 characters are not found. Keys with a length different than 128 have no issues.
Impact:
Missing match when it should be matched.
Workaround:
If somehow possible, avoid using a key of length 128 characters, or use class match begins_with or ends_with
2291257 : Adding a Subscriber IP addresses with route-domain notation in the Subscriber Management 'Log Session Activity' box fails with ;Invalid IP Address'
Links to More Info: BT2291257
Component: Policy Enforcement Manager
Symptoms:
Adding an IP with route-domain notation (like 10.0.0.2%2) via the GUI (under 'Subscriber Management ›› Subscribers: Activity Log: Configuration -> Log Session Activity') results in an error: "Invalid IP Address".
Conditions:
-- PEM licensed and provisioned
-- Adding an IP with route-domain notation (like 10.0.0.2%2) via the GUI (under 'Subscriber Management ›› Subscribers: Activity Log: Configuration -> Log Session Activity')
Impact:
An error is returned by the GUI: "Invalid IP Address".
Workaround:
Use tmsh to add the subscriber IP with route domain notation to the subscriber-activity-log settings:
# tmsh modify pem global-settings subscriber-activity-log subscriber-ip-addresses add { 10.0.0.2%2 }
2289937-1 : ldns.gz file remains empty despite Active Path and Persistence Records
Links to More Info: BT2289937
Component: Global Traffic Manager (DNS)
Symptoms:
The file /config/gtm/ldns.gz remains at 20 bytes (gzip header only) and contains no path or persistence records, even though GTM path and persistence entries are visible in memory via tmsh commands (show gtm path, show gtm persist).
Conditions:
The issue occurs when BIG-IP DNS is configured with GTM path and persistence record collection, and DNS queries are actively processed. Despite path and persistence records being visible in memory through tmsh commands, the scheduled dump process does not save these records to the /config/gtm/ldns.gz file.
Impact:
When the gtmd process is restarted, it is not to restore the previously known path and persistence records from ldns.gz and must relearn them through new DNS requests sent to members of the DNS sync group.
Workaround:
None
2289885-1 : Malformed protobuf file synced from secondary blades cause asmlogs coredump
Links to More Info: BT2289885
Component: Application Security Manager
Symptoms:
asmlogd spontaneously coredump on the tenant (SIGSEGV)
asmlogd log shows "Secondary file /var/asmdata1/cluster/request_log/transfer/request_log__20260331_230212__slot_2 does not match integrity check", right before the crash.
Conditions:
ASM provisioned
multi-blade platform with at least 2 blades
Impact:
asmlogd spontaneously crashed on the primary blade and then restarted automatically in about 30seconds
Workaround:
none
2288173-4 : Some TMMs not ready and failed to bring up full cluster due to failed cmp dag transition
Links to More Info: BT2288173
Component: Local Traffic Manager
Symptoms:
On VELOS chassis platforms, when you reboot or restart the tenant, the cluster fails to come up fully with some TMMs indicating tmm-not-ready state, and performance is degraded as it fails to bring up the full cluster.
Conditions:
VELOS chassis platforms, with scenarios leading to reboot or restart of the tenant, possibly triggered by
- some software upgrade
- some power reset or
- configuration change causes occasional problems in tmm cluster bring-up and reduces the capacity handled by the tenant.
When the problem happens, it is observed that
- tmctl tmm/cmp shows queue_drops
- tmctl tmm/mpi_mem shows tx-full
Due to a lot of internal background traffic in the cluster
and tmctl tmm/ready_for_world_stat indicates "not read" state for "dag_transition".
Impact:
Performance degraded due to reduced cluster size.
Workaround:
No Workaround
As it is an intermittent problem, reboot/restart the problematic blade may help to recover.
2287865-1 : Dynamic CRL always fails connections that use self-signed certificates
Links to More Info: BT2287865
Component: Local Traffic Manager
Symptoms:
Connections fail with alert(46) unknown certificate error
The following is logged in /var/log/ltm
"unable to build certificate trust chain for profile"
Conditions:
Serverssl profile that uses Dynamic CRL, and the backend servers are configured with self-signed certificates.
Impact:
Dynamic CRLs cannot be used if backend servers are configured with self-signed certificates.
Workaround:
Add any self-signed certificates to the trusted CA of the ssl profile.
2285073-2 : AbandonedTaskSweep Removes Tasks Prematurely
Links to More Info: BT2285073
Component: Application Security Manager
Symptoms:
When an asynchronous worker reaches a lifecycle limit for memory or calls handled, it hands its remaining task queue off to another worker.
Some timing conditions exist where the AbandonedTaskSweep periodic job will remove an unfinished task (such as a BulkTask) before the new worker updates the status to finished.
Conditions:
Normal operations.
Impact:
When the update to the task fails, the impact is cosmetic, as the task was already successfully completed.
The result of the task will not be retrievable.
Workaround:
None
2277817 : DNS64 may fall back to QTYPE=A if there is a delay in response for QTYPE=AAAA and "DNS IPv6 to IPv4" is set to 'secondary'
Links to More Info: BT2277817
Component: Global Traffic Manager (DNS)
Symptoms:
DNS64 may fall back to QTYPE=A if there is a delay in response for QTYPE=AAAA and "DNS IPv6 to IPv4" is set to 'secondary'.
Conditions:
DNS profile with DNS64 "DNS IPv6 to IPv4" is set to 'secondary'.
There is a delay in the response for QTYPE=AAAA
Impact:
DNS64 could fall back to QTYPE=A
Workaround:
NA
2277421 : TCP profile Help tab displays incorrect default values for Memory Management fields
Links to More Info: BT2277421
Component: TMOS
Symptoms:
The Help tab for TCP profiles shows incorrect default values for Proxy Buffer High (131072) and Proxy Buffer Low (98304) in the Memory Management section.
Conditions:
Viewing the Help tab for any built-in TCP profile in the GUI or tmsh help for TCP profile proxy-buffer-high/proxy-buffer-low.
Impact:
Help text displays incorrect default values, which may cause confusion when configuring TCP profiles. No functional impact - actual profile behavior is correct.
Workaround:
Refer to the actual profile values shown in the configuration instead of the Help tab text.
2269969-4 : Using TCP congestion BBR might lead to TMM core
Links to More Info: BT2269969
Component: Local Traffic Manager
Symptoms:
Using TCP congestion BBR might lead to TMM core
Conditions:
TCP congestion BBR is in use.
Impact:
TMM crash/core.
Workaround:
N/A
2264845-4 : TMM may crash when enabling DNS Express
Links to More Info: BT2264845
Component: Global Traffic Manager (DNS)
Symptoms:
TMM may crash when enabling DNS Express.
Conditions:
Occurs when enabling DNS express feature with traffic actively hitting the modified virtual-server.
Impact:
TMM core crashes.
Workaround:
N/A
2264037-1 : TMM may generate a core file after an SSL cipher group is deleted
Links to More Info: BT2264037
Component: Local Traffic Manager
Symptoms:
TMM crashes and generates a core file
Conditions:
- An SSL cipher group previously referenced by an SSL profile is removed from the configuration.
- Connections established while the profile referenced that cipher group remain active.
- At least one of those connections initiates a TLS renegotiation.
Impact:
Traffic interruption while TMM generates a core file and restarts.
Workaround:
Do not remove a cipher group if any active connections may still reference an older SSL profile that used it.
2263101 : TMSH rrset commands do not list DNS cache serve-expired records
Component: Global Traffic Manager (DNS)
Symptoms:
With serve-expired enabled on a DNS cache resolver, records at TTL=0 no longer appear in the rrset cache via tmsh show and cannot be deleted via tmsh delete, yet they may still be served to clients as stale responses.
Conditions:
Serve-expired is enabled for a DNS cache resolver
Impact:
Records could still be served to clients as stale responses via the serve-expired mechanism.
Workaround:
N/A
2262641-4 : [BGP] Peering deadlock when modifying supported capabilities
Links to More Info: BT2262641
Component: TMOS
Symptoms:
When modifying capabilities BGP peering might enter a deadlock with local peer ignoring incoming and not creating outbound connections.
Conditions:
Modifying BGP capabilities when local peer tries to connect.
Impact:
BGP peering enters a deadlock.
Workaround:
Remove peer (neighbor) configuration and reapply it.
2261529 : HTTP2 RST_STREAM flood detection should be more sensitive
Links to More Info: BT2261529
Component: Local Traffic Manager
Symptoms:
If an HTTP2 RST flood comes at an interval of 5 msec or more, TMM will not flag this as an attack.
Conditions:
These floods are not detected.
Impact:
Although not as impactful as an attack with less than 1 msec between RST_STREAMs, it could impact performance.
Workaround:
None
2261337-1 : TMUI displays Local Traffic menu on rSeries Best Bundle tenant without LTM provisioned
Links to More Info: BT2261337
Component: TMOS
Symptoms:
In rSeries BIG-IP tenants with a Best Bundle license, TMUI shows the Local Traffic menu even when LTM is not provisioned (GTM dedicated, LTM none), which does not occur on DNS-only tenants with the same provisioning.
Conditions:
This issue occurs when,
- Platform is rSeries (eg: R5900, R10900)
- Deployment is a BIG-IP tenant
- License is Best Bundle
- GTM is set to dedicated and LTM is set to none
Impact:
This reveals LTM configuration options (virtual servers, pools, nodes, etc.) on a DNS‑dedicated tenant, increasing the risk of accidental object creation.
Workaround:
None
2261137-5 : TMM may crash if DNS cache resolver concurrency settings are changed during live traffic
Links to More Info: BT2261137
Component: Global Traffic Manager (DNS)
Symptoms:
TMM crashes with a SIGSEGV and then restarts.
Conditions:
- The DNS cache resolver is configured and processing queries.
- A DNS cache-resolver object is changed, specifically a setting that alters max-concurrent-queries or max-concurrent-tcp.
- Live DNS traffic is in progress when the change is applied.
Impact:
Traffic is disrupted during a TMM restart, and the redundant unit fails over.
2259397-3 : [BGP] In route map the change in as-path does not automatically trigger soft outbound update
Links to More Info: BT2259397
Component: TMOS
Symptoms:
When updating route-map as-path a new path is not advertised automatically and manual update is needed.
Conditions:
Updating route-map as-path for the route-map attached to a BGP peer.
Impact:
Manual soft update is needed.
2258825-1 : The lind process may continuously restart when mcpd is down
Component: TMOS
Symptoms:
The lind process may continuously restart when connection to mcpd cannot be established.
2026 Mar 27 01:01:46 test.openstack.internal logger[28808]: Re-starting lind
Broadcast message from systemd-journald@test.openstack.internal (Fri 2026-03-27 01:01:47 PDT):
logger[28864]: Re-starting lind
2026 Mar 27 01:01:47 test.openstack.internal logger[28864]: Re-starting lind
[root@test:INOPERATIVE:Standalone] config #
Broadcast message from systemd-journald@test.openstack.internal (Fri 2026-03-27 01:01:48 PDT):
logger[28994]: Re-starting lind
2026 Mar 27 01:01:48 test.openstack.internal logger[28994]: Re-starting lind
Conditions:
Mcpd process is not in the running state.
[root@test:INOPERATIVE:Standalone] config # bigstart status mcpd
mcpd down 7 minutes, normally up
Impact:
Lind daemon continuously restarts, interfering operations in the terminal window.
Workaround:
Stop lind by running the command: bigstart stop lind.
2258701 : RPZ performance may have dropped in v21.1.0
Component: Global Traffic Manager (DNS)
Symptoms:
RPZ performance may have dropped due to additional processing introduced with the addition of three triggers, five actions, and multi-feed support.
Conditions:
RPZ configured and operational
Impact:
Some performance drop for the RPZ feature.
Actions are being taken to regain the performance drop over the next releases.
Workaround:
NA
2258305-1 : TMSH sys/software syntax updated with experimental "dry-run" option
Component: TMOS
Symptoms:
You may see the new "dry-run" option introduced for BIG-IP images verification listed as the Module, not as the Option.
Conditions:
Run one of the TMSH show, list, delete commands for sys software component.
# list sys software
Options:
all-properties current-module non-default-properties one-line recursive |
Modules:
dry-run
Components:
hotfix image signature update update-status volume
Impact:
Any automation based on the current software "dry-run" syntax may break in the future.
Workaround:
None
2251549 : Uneditable fields for Guest, Auditor, and Operator roles may appear to be editable in the GUI
Links to More Info: BT2251549
Component: TMOS
Symptoms:
Protocol profile GUI fields for a virtual server appear to be editable for a Guest, Operator, or Auditor role although they are actually not accessible for these roles
Conditions:
1. A virtual server is present
2. This virtual server has selected at least one Client SSL Profile
3. On the virtual server's properties page, a guest/auditor/operator user clicks on the name of a profile in the Selected column of Client SSL Profile field
Impact:
GUI fields appear to be editable as if the user had admin access.
The save/update of any edits does not occur; the fields only appear to be editable in the GUI
Workaround:
None
2244389 : Small TLS record sizes reduce connection throughtput.
Links to More Info: BT2244389
Component: Local Traffic Manager
Symptoms:
Low TLS connection throughput with small record sizes compared to a larger record size.
Conditions:
A virtual server configured with clientssl or serverssl profile, and ingress TLS records are of a smaller size.
Impact:
Reduced TLS throughput.
2230889 : SIP parser mishandles RFC 3261 folded headers, causing 200 OK forwarding failure with iRule routing
Links to More Info: BT2230889
Component: Service Provider
Symptoms:
With a SIP profile and iRule routing by string match, a valid 200 OK with a folded (multi-line) Accept header is not forwarded, but it forwards correctly if the Accept header is on a single line.
Conditions:
Virtual Server: UDP port 5060 (SIP)
Profiles: SIP profile, UDP profile (default settings)
Pool: At least one pool member
iRule: Attached to the virtual server
Send a SIP 200 OK response to the BIG-IP with a folded Accept header.
Impact:
When a SIP profile is applied and Content-Length is present, SIP messages with folded (multi-line) headers are silently dropped, causing call setup failures, missed responses, or other signaling disruptions.
Workaround:
Use the flattened Accept Header in payload:
Accept: application/sdp, application/isup, multipart/mixed, application/dtmf
2228869-5 : Continuous tmm cores in domain_table_search with null dereferencing
Links to More Info: BT2228869
Component: Global Traffic Manager (DNS)
Symptoms:
Tmm cores
Conditions:
Corrupt zone express database
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
2227661 : Sys variable db tm.fw.defaultaction is honor when AFM is not provisioned
Links to More Info: BT2227661
Component: Advanced Firewall Manager
Symptoms:
Connections are dropped due to sys db variable tm.fw.defaultaction is set to drop when AFM is not provisioned.
Conditions:
-- LTM+ASM provisioned, AFM not provisioned
-- set "db tm.fw.defaultaction" to drop
-- send test traffic through a virutal server on the BIG-IP system
Impact:
Connections are dropped due to sys db variable tm.fw.defaultaction is set to drop when AFM is not provisioned.
Workaround:
Reset tm.fw.defaultaction to default value(accept):
tmsh modify sys db tm.fw.defaultaction value default
2224853-1 : BIG-IP DNS may not respond to RRSIG type queries correctly with DNSSEC zones
Links to More Info: BT2224853
Component: Global Traffic Manager (DNS)
Symptoms:
BIG-IP DNS may not return RRSIG records when queried directly via RRSIG type queries on DNSSEC-enabled zones.
Conditions:
A DNSSEC zone is created on BIG-IP-DNS and a DNS query with type RRSIG is sent.
Impact:
BIG-IP-DNS may not respond to RRSIG type queries correctly.
The response may differ for under apex records. If they exist, the response is NODATA; if they do not exist, the response is NXDOMAIN.
BIG-IP should respond as this is a valid request with RRSIG for all types.
Workaround:
NA
2208821 : VIPRION cluster becomes INOPERATIVE and fails to load configuration after software upgrade★
Links to More Info: BT2208821
Component: Local Traffic Manager
Symptoms:
After upgrading BIG-IP software on a VIPRION system, the device may fail to load the configuration and enter an INOPERATIVE state. The system remains stuck during the configuration load phase, preventing normal operation.
Conditions:
1. VIPRION platform with clustered configuration.
2. Performing a BIG-IP software upgrade.
3. System attempts to load post-upgrade configuration during boot or blade role transition
Impact:
The VIPRION cluster becomes INOPERATIVE and is unable to load the configuration. Traffic is impacted as the system cannot process or pass traffic until the issue is resolved.
Workaround:
Restarting the system with a different blade set as primary, or reverting to the previously working software version, allows the configuration to load successfully. In some cases, re-attempting the upgrade after correcting the blade role transition also resolves the issue.
2198721-4 : SAML apmd memory leak
Links to More Info: BT2198721
Component: Access Policy Manager
Symptoms:
Apmd process will leak memory when configured with SAML authentication.
Conditions:
APM configured with SAML
Any BIG-IP version >= 17.1.0
Impact:
BIG-IP can run out of memory and some services killed to release memory.
Workaround:
None
2187141-4 : DNS generic server stuck offline after monitor removal
Links to More Info: BT2187141
Component: Global Traffic Manager (DNS)
Symptoms:
Removing the monitor from the virtual server can leave the DNS generic server stuck in “Offline (Enabled) – No enabled virtual server available.”
Conditions:
Removes a monitor from the Virtual Server and uses a Generic Server type.
Impact:
The generic server shows the same status as the Virtual Server.
Workaround:
NA
2183917-4 : BIG-IP might fail to update received TCP window when tm.tcpstopblindinjection is enabled
Links to More Info: BT2183917
Component: Local Traffic Manager
Symptoms:
BIG-IP might fail to update received TCP window when tm.tcpstopblindinjection db variable is enabled (CVE-2025-58424).
Conditions:
The tm.tcpstopblindinjection db variable is enabled (CVE-2025-58424 ).
This does not always occur.
Impact:
TCP transfer might stall.
Workaround:
None
2163589 : Access VPN traffic may be incorrectly routed to LTM IPsec wildcard forwarding virtual server
Links to More Info: BT2163589
Component: Access Policy Manager
Symptoms:
When both LTM IPSEC and Access VPN solutions are configured on the same device, traffic intended for the Access Virtual Server is incorrectly routed to the LTM IPSEC forwarding virtual server .
As a result, Access VPN traffic fails to be processed by the intended Access Virtual Server.
Conditions:
-- The configuration includes both LTM IPSEC and Access VPN on the same system.
-- LTM IPSEC uses a wildcard IP‑forwarding virtual server.
-- Access VPN is configured, which internally relies on an HTTP Access virtual server + internal Access forwarding VS.
-- VPN traffic is initiated for Access VPN.
Under these conditions, Access VPN traffic is consistently routed to LTM’s wildcard forward virtual server instead of the Access virtual server.
Impact:
-- Access VPN functionality does not work as expected.
-- Internal Access virtual server never receives Access VPN traffic.
-- Both Tunnel solutions cannot function simultaneously on the same VLAN.
-- Deployments requiring coexistence of LTM IPSEC + Access VPN are blocked unless the workaround is applied.
Workaround:
Use separate VLANs for LTM IPSEC and Access VPN.
When LTM IPSEC and Access VPN are placed on different VLANs, traffic flows independently and correctly to their respective virtual servers without conflict.
There is no full fix or configuration‑based resolution without using separate VLANs.
2153897 : BIG-IP closes the transport connection immediately after sending a DPA to a peer
Links to More Info: BT2153897
Component: Service Provider
Symptoms:
With Diameter MRF setup, when the BIG-IP receives a diameter DPR message (Disconnect-Peer-Request), it sends a DPA to the peer (Disconnect-Peer-Answer) and then immediately closes the transport connection.
According to RFC6733, ("Diameter Base Protocol") the transport connection should be closed by the remote peer instead.
Conditions:
- BIG-IP configured with a MRF Diameter setup
- BIG-IP receives a Diameter DPR message
Impact:
The BIG-IP system closes the transport connection instead of waiting for the remote peer to close it.
Workaround:
None
2149325-1 : Db var not set when running tmsh load sys ucs ucs-file platform-migrate★
Links to More Info: BT2149325
Component: TMOS
Symptoms:
Some of the Db var part of a UCS file do not get change after loading
tmsh load sys ucs ucs-file platform-migrate
Conditions:
An error was encountered while loading and attempting to configure based on the UCS file which terminates the loading.
For example, one such error could be:
Error return while getting reply from mcpd: 0x1070734, 01070734:3: Configuration error: vmw-compat: vlan may only have one interface
Impact:
UCS was loaded however, custom value of db key, such as tm.minipfragsize, are not set to the content of the UCS.
Workaround:
A workaround is possible but depends on the type of errors received. It would require modifying the content of the UCS file to avoid the error before loading it again.
2137661-3 : GTM link object is deleted automatically after being added
Links to More Info: BT2137661
Component: Global Traffic Manager (DNS)
Symptoms:
GTM link is deleted.
Conditions:
Link auto discovery is enabled on GTM server object.
Impact:
GTM link is falsely deleted by the system.
Workaround:
Disable link auto discovery on GTM server object.
2130329-4 : [GTM] Deletion of topology records makes MCPD memory ramp up
Links to More Info: BT2130329
Component: Global Traffic Manager (DNS)
Symptoms:
The MCPD memory ramp-up might result in being killed by sod or out of memory.
Conditions:
Delete thousands of GTM topology records in a short period of time, and the full GTM sync is triggered.
Impact:
The MCDP memory is stuck or being killed by sod.
Workaround:
Do not delete a large number of GTM topology records in a short period of time.
2077553 : SIP message in quote containing special character after two backslashes will be generate a SIP error message
Links to More Info: BT2077553
Component: Service Provider
Symptoms:
Tmm resets connections with "SIP parser error (Illegal value)"
Conditions:
In the SIP message sent by the client, there is a string in quotes that contains two backslashes followed by a UTF8 character.
Impact:
Rejection of valid SIP message
Workaround:
Encode all characters with %
as in
%D0%A4%5C%5C%D0%A9%20
instead of
"Ф\\Щ "
2053893-5 : Incompletely-synced ASM configuration can be synced back to the original device or group
Links to More Info: BT2053893
Component: Application Security Manager
Symptoms:
The incomplete ASM configuration on the new device may be synced to the device group, overwriting the original and complete ASM configuration when an ASM configuration is in the process of being synced from an existing device or group to a new device joined to the group, and there is a request to sync the new device to the group.
Conditions:
This may occur when,
-- Multiple device groups are configured, including:
-- a (non-ASM) Sync Failover device group
-- an ASM Sync-Only device group
-- Both device groups are configured for Manual Full Sync.
-- The ASM configuration is large enough to require several minutes to apply the complete configuration.
-- A new device has joined the cluster and device groups, which has no existing ASM configuration (or, a much smaller subset of the cluster's existing ASM configuration.
-- The configuration is synced from an existing device to the non-ASM device group (and thus to the new device).
-- After the ASM configuration is synced from an existing device to the ASM device group (and thus to the new device).
-- After the ASM configuration is synced from the new device to the ASM device group (and thus to the existing devices).
Impact:
Depending on the size of the ASM configuration, system performance and network throughput, the ASM configuration may take a long time to sync to the new device, and may appear to be only partially synced in the meantime.
Depending on timing and other non-deterministic conditions, this partially-synced ASM configuration may be synced back to the device group.
When this occurs, the existing ASM configuration may be overwritten by the partial ASM configuration on the new device, resulting in a loss of ASM functionality.
Workaround:
To avoid this issue when multiple device groups are configured, which include both an ASM and non ASM device group, and both groups are configured for Manual Full Sync:
-- Sync the ASM device group first.
-- Wait to confirm that the full ASM configuration has been synced to the new device before initiating any further sync operations.
-- Be careful not to inadvertently select the new device (with incomplete ASM configuration) as the device to sync to the device group.
1928169 : HTTP2 RST_STREAM NO_ERROR received by BIG-IP not interpreted correctly
Links to More Info: BT1928169
Component: Local Traffic Manager
Symptoms:
Communication disrupted to the client when server sends a RST_STREAM NO ERROR
Conditions:
if the server has already sent a response (e.g., headers and body) and does not need additional data from the client (e.g., request body for POST or PUT requests), it might send a RST_STREAM with NO_ERROR to stop the stream and signal that no further data is required.
Impact:
Communication disrupted.
Workaround:
None
1824745-4 : Bd crash and generate core
Links to More Info: BT1824745
Component: Application Security Manager
Symptoms:
Bd crashes
Conditions:
Unknown
Impact:
Traffic disrupted while bd restarts.
Workaround:
None
1818861-5 : Timestamp cookies are not compatible with fastl4 mirroring.
Links to More Info: BT1818861
Component: Advanced Firewall Manager
Symptoms:
DOS tcp-ack-ts vector with tscookies option enabled is not compatible with fastl4 (L4) mirroring.
Conditions:
- DOS tcp-ack-ts vector with tscookies option enabled
- Mirroring configured on fastL4 TCP virtual.
- FastL4 profile with timestamp 'preserve' option configured.
Impact:
Existing connections hang due to tsval not being transformed properly on a newly active device.
Workaround:
Set fastl4 timestamp option to strip/rewrite.
1786457 : Protocol Inspection auto update with latest is not working
Links to More Info: BT1786457
Component: Protocol Inspection
Symptoms:
The latest Protocol Inspection IM package is not updating automatically. var/log/pi_hitless_upgrade contains errors and reports
ERROR Error: Exception caught in script. Check logs (/var/log/pi_hitless_upgrade) for details
Conditions:
The IPS is licensed and provisioned.
Impact:
The latest Protocol Inspection IM package is not updated.
Workaround:
Download IM package and install it manually. or click on "Security ›› Protocol Security : Inspection Updates --> Download Package --> From f5.com" and deploy the package manually.
1758193-1 : Trunk with LACP and virtual-wire flaps after an upgrade.★
Links to More Info: BT1758193
Component: Local Traffic Manager
Symptoms:
After performing an upgrade from a version lower than 16.0 to a version higher or equal to 16.0, BIG-IP will fail to establish LACP trunk when interfaces are configured in virtual-wire mode.
Version 16.0 introduced transparent LACP bridging of LACP allowing LAG to be established across BIG-IP. This feature is enabled by default in versions > 16.0.
Conditions:
- Trunk configured with LACP.
- Virtual-wire configured across the trunk.
- Upgrading from version lower than 16.0 to a version higher or equal to 16.0.
Impact:
Fail to establish LACP trunk.
Workaround:
Setting l2.virtualwire.multicast.bridging to disabled allows BIG-IP to establish LACP directly with other devices without bridging maintaining the behavior from versions < 16.
1755113-7 : BD crash with specific JSON schema
Links to More Info: BT1755113
Component: Application Security Manager
Symptoms:
BD crash
Conditions:
Using specific JSON schema in the JSON content profile applied on the ASM policy
Impact:
ASM traffic disrupted while bd restarts.
Workaround:
None
1707921-3 : Tenant upgrade fails with disk full error on BIG-IP 17.x created with T2 image★
Links to More Info: BT1707921
Component: TMOS
Symptoms:
Upgrade failed with "disk full" error in 17.1.x version.
-----------------------------------------------------------------------------------------------------------
Sys::Software Status
Volume Product Version Build Active Status Allowed Version
-----------------------------------------------------------------------------------------------------------
HD1.1 BIG-IP 17.1.1.4 0.0.9 yes complete yes
HD1.2 BIG-IP 17.1.1.3 0.0.5 no failed (Disk full (volume group). See SOL#10636)
Conditions:
- Deployed BIG-IP tenant with v17.x.x T2 image
- Trying to create an additional boot location
Impact:
Creation of additional boot location fails with "disk full" error.
Workaround:
Expand the tenant's virtual disk (storage-size) from F5OS to accommodate an additional boot location in the tenant.
Values of 46G/47G have worked well in lab testing.
1603869 : Wrong Fallback to local for TACACS authentication with empty password when source fallback is set to true
Links to More Info: BT1603869
Component: TMOS
Symptoms:
When remote auth configured with fallback is set to true and if try to login to the BIG-IP with local user credentials by providing empty password first then authentication mechanism fall back to local and then if provided with correct local user password the access is granted which causes security issues.
Conditions:
-- configure auth source fallback true.
-- Configure the remote auth mechanism in this case, TACACS.
-- Configure a local user that is not present in the TACACS server.
auth source {
fallback true
type tacacs
}
Impact:
Unauthorized access is given to the BIG-IP with a local user, even though the authentication mechanism is configured as remote.
Workaround:
Configure the auth source fallback as false.
auth source {
fallback false
type tacacs
}
1596313-4 : F5OS LAG fails MCPD validation, tenant trunk has no interfaces.
Links to More Info: BT1596313
Component: TMOS
Symptoms:
After creating an HA group with a trunk in an LTM tenant, the first reboot triggers an error: "Invalid attempt to register an n-stage validator; the stage must be greater than the current stage and within 1–101 (current stage: 7, registered: 5). Unexpected."
Conditions:
Occurs when,
- BIG-IP tenant running on F5OS
- High availability system
- HA group with a trunk
- The tenant is rebooted for the first time
Impact:
No impact on TMM VLAN traffic
Workaround:
Rerun the tmsh create sys ha-group command.
1586877-4 : Behavior difference in auto-full sync virtual server and manual-incremental config sync
Links to More Info: BT1586877
Component: Application Security Manager
Symptoms:
An ASM policy is assigned to a virtual server with the same name in a Sync-Only device group in Auto-Sync mode.
Conditions:
Devices with same virtual server name in a Sync-Only device group.
Impact:
The ASM policy is synced, which is unexpected behavior.
Workaround:
None
1575805-1 : bcm56xxd Process Killed by SOD After Failing to Send a Heartbeat During Firewall Rule Statistics Query
Component: TMOS
Symptoms:
When firewall rule statistics are requested using query_stats { fw_rule_stat { } }, the system may experience delays and bcm56xxd process is killed by sod, eventually impacting the traffic.
Conditions:
This issue may occur if a user/daemon sends a query_stats { l2_forward_stat {} } query where the mcp message header has validation_only set to 1
Impact:
Impact to Application traffic.
Workaround:
Limit validation‑only firewall rule statistics queries on systems with large or complex firewall rule configurations
1354205 : LTM policy with overlapping range in the TCP address match may fail
Links to More Info: BT1354205
Component: Local Traffic Manager
Symptoms:
An LTM policy using a rule that attempts to match based on a list of IP addresses may fail if more than one IP address range overlaps.
Conditions:
LTM policy rule with a 'tcp match address' statement that matches against more than one IP address range.
For example, if both 10.48.128.0/18 and 10.48.192.0/20 are used, then although 10.48.141.201 might match the /18 range, it will not match the /20 and therefore the match will fail.
Impact:
The action configured with the match will exclude IP address that do not match the more specific address range.
Workaround:
Avoid overlapping IP address range.
1350909 : Statsd error condition is not logged
Links to More Info: BT1350909
Component: Local Traffic Manager
Symptoms:
There is one statistics file per TMM and when large number of TMMs are in use, these statistics files have to be merged to view total memory usage of TMMs. These statistics files merge may fail if the total memory required is greater than 4 GB. There will not be any logs printed to inform the memory exhaustion condition.
Conditions:
When the files in /var/tmstat/blade/ exceed 4 GB, this could be to a large number of TMMs or due to an extremely large configuration.
Impact:
Incorrect TMM memory statistics and failure to log this message in debug logs.
Workaround:
Restart TMM.
1296925-4 : Unable to create two boot locations using the 'ALL' F5OS tenant image at default storage size
Links to More Info: BT1296925
Component: TMOS
Symptoms:
Configuration fails to load in second boot location created in F5OS tenant deployed with "ALL" image:
01071008:3: Provisioning failed with error 1 - 'Disk limit exceeded. 16188 MB are required to provision these modules, but only 16028 MB are available.'
Conditions:
-- Tenant deployed using the "ALL" image, with default "storage size"
-- Multiple modules provisioned (e.g. AFM+APM+ASM+LTM), or AFM provisioned
-- Create a second boot location
Impact:
This issue causes a configuration load failure in the second boot location.
Workaround:
Set the tenant(s) in question to configured state, increase the "storage size", then deploy the tenant once more.
1251969 : The ratio algorithm between pool members for load-balancing does not work
Links to More Info: BT1251969
Component: Local Traffic Manager
Symptoms:
In some cases, a pool using ratio-member load balancing directs all traffic to a single member, even when all members have identical ratios.
Conditions:
When a pool member exceeds its connection limit, round-robin selection is skipped, and TMM continues sending new connections to that same member.
For example, assume 10.107.94.197 had reached its limit of 5 connections, and suddenly, 2 connections are terminated.
tm pool Pool_01 {
load-balancing-mode ratio-member
members {
10.107.94.196:http {
address 10.107.94.196
session monitor-enabled
state up
}
10.107.94.197:http {
address 10.107.94.197
connection-limit 5
session monitor-enabled
state up
}
}
monitor http
}
When two new connections arrive, both go to the same pool member instead of round robin, despite equal ratios.
Impact:
Not working as expected.
Workaround:
N/A
1196505 : BIG-IP might RST HTTP2 connection with [F5RST:mrhttp_proxy bad transition] when ASM is in use.
Links to More Info: BT1196505
Component: Local Traffic Manager
Symptoms:
BIG-IP might RST HTTP2 connection with [F5RST:mrhttp_proxy bad transition] when ASM is in use.
Conditions:
- HTTP2
- ASM provisioned and passing traffic
Impact:
Unexpected connection reset.
Workaround:
None
1148053 : When client SSL profile has "cache-size 0" or "authenticate always", BIG-IP is unable to decrypt client-side traffic when using tcpdump with "--f5 ssl" method
Links to More Info: BT1148053
Component: Local Traffic Manager
Symptoms:
When client SSL profile has "cache-size 0" and/or "authenticate always", the SSL functionality fails to include SSL secrets in the F5 Ethernet Trailers (f5ethtrailer), thus not being able to decrypt client-side traffic.
Conditions:
- Client SSL profile has "cache-size 0"
- Client SSL profile has "authenticate always"
Impact:
The "cache-size 0" and the "authenticate always" options indicate that BIG-IP does not memorize any session, TMM disables session reuse. No renegotiation is provided even it is enabled.
No "session ID" should be present during the SSL/TLS handshake.
Workaround:
- For "cache-size 0" scenario, use client SSL profile default cache size
- For "authenticate always" scenario, use default value of "authenticate once"
- if changing config is not desired, iRule decryption method (K12783074) should work normally
1128033 : Neuron client constantly logs errors when TCAM database is full
Links to More Info: BT1128033
Component: Local Traffic Manager
Symptoms:
A database held in hardware (TCAM), shared between tenants, has a limit that is exceeded by software in tenants that adds and manages entries in the database.
Symptomatic logs on tenant:
in /var/log/ltm, repeating logs are recorded, following is an example:
err tmm[635]: 01010331:3: Neuron client neuron_client_pva_hwl failed with rule request submit(client connection is busy (has outstanding requests))
in /var/log/tmm, cycles of following group of logs are recorded:
notice neuron_client_negotiate: Neuron client connection established
notice [DDOS Neuron]Neuron daemon started
notice hudproxy_neuron_client_closed_cb: Neuron client connection terminated
notice [DDOS Neuron]Neuron daemon stopped
For F5OS host, in partition /var/F5/partitionX/log/velos.log repeating logs are recorded, following is an example:
tcam-manager[41]: priority="Err" version=1.0 msgid=0x6b01000000000007 msg="ERROR" MSG="TCAM processing Error(-5) executing:TCAM_INSERT for ruleno:0x20000000937"
In the log message, the msgid and ruleno can vary, but the Error(-5) is an indication of this issue.
Conditions:
The BIG-IP system with a rSeries r5xxx, r10xxx, r12xxx or has VELOS blades such as BX110.
The rSeries 2xxx, 4xxx and iSeries platforms are not affected.
Large configurations, on the order of high hundreds of virtual servers, are more likely to encounter issue.
Impact:
The neuron client software will restart and log repeatedly.
Inefficient use of TCAM database.
Workaround:
None
1120345 : Running tmsh load sys config verify can trigger high availability (HA) failover
Links to More Info: BT1120345
Component: TMOS
Symptoms:
When running tmsh 'tmsh load sys config verify' on a config that contains both a high availability (HA) group and a traffic group referencing that high availability (HA) group, this will trigger a high availability (HA) fault and failover.
Conditions:
- Running 2 BIG-IP systems in a high availability (HA) pair
- Run tmsh 'load sys config verify' on a config with the following conditions:
- Config to be verified contains a high availability (HA) group
- Config to be verified also contains a traffic group referencing the high availability (HA) group
Impact:
HA fault and failover. The high availability (HA) pair will enter a degraded state.
Workaround:
No workaround currently known, but the failover fault can be cleared by running tmsh 'load sys config' on the system that had 'load sys config verify' run on it.
1050457-3 : The "Permitted Versions" field of "tmsh show sys license" only shows on first boot
Links to More Info: BT1050457
Component: TMOS
Symptoms:
As of BIG-IP Virtual Edition version 15.0.0, running "tmsh show sys license" should show the Permitted Versions. After the system is rebooted, this information is no longer displayed by TMSH.
Conditions:
-- Running the 'tmsh show sys license' command after a reboot
Impact:
Unable to see the permitted versions for the license.
Workaround:
The list of permitted versions can be seen in the /config/bigip.license file, by looking for Exclusive_version:
config # grep Exclusive_version /config/bigip.license
Exclusive_version : 11.6.*
Exclusive_version : 12.*.*
Exclusive_version : 13.*.*
Exclusive_version : 14.*.*
Exclusive_version : 15.*.*
Exclusive_version : 16.*.*
Exclusive_version : 5.*.*
Exclusive_version : 6.*.*
Exclusive_version : 7.*.*
1043141-5 : Misleading error 'Symmetric Unit Key decrypt failure - decrypt failure' when loading UCS from another BIG-IP
Links to More Info: K36822000, BT1043141
Component: TMOS
Symptoms:
Loading a UCS file from another BIG-IP results in an error message similar to:
"/usr/bin/tmsh -n -g -a load sys config partitions all platform-migrate" - failed. -- 010713d0:3: Symmetric Unit Key decrypt failure - decrypt failure
The error message is misleading as the issue is unrelated to master key decryption.
Conditions:
-- Loading a UCS archive from a different BIG-IP.
-- The UCS archive does not contain a ".unitkey" file.
-- The target system does have the correct master key value configured.
-- There is some other MCPD validation issue in the configuration.
Impact:
Platform migration fails with a misleading error message.
Workaround:
Once the issue has happened, you can either:
- Examine the LTM log file for other error messages from MCPD and then correct the configuration issue(s).
OR:
- Re-start MCPD.
For more information, refer K36822000.
1014633 : Transparent / gateway monitors may fail if there is no route to a node
Links to More Info: BT1014633
Component: Local Traffic Manager
Symptoms:
Transparent or gateway UDP monitors may fail.
Conditions:
-- Transparent or gateway monitor configured.
-- Route does not exist to destination.
Impact:
The UDP monitor fails and the node / pool member is marked unavailable.
Workaround:
Add a route to the destination.
1002345-8 : Transparent monitor does not work after upgrade★
Links to More Info: BT1002345
Component: In-tmm monitors
Symptoms:
Pool state changes from up to down following an upgrade.
Conditions:
A transparent monitor is configured to use the loopback address.
You are using BIG-IP Virtual Edition with a TAP interface handling linux host traffic.
Impact:
The pool is marked down.
Workaround:
None
★ This issue may cause the configuration to fail to load or may significantly impact system performance after upgrade
For additional support resources and technical documentation, see:
- The F5 Technical Support website: http://www.f5.com/support/
- The MyF5 website: https://my.f5.com/manage/s/
- The F5 DevCentral website: http://community.f5.com/