Supplemental Document : BIG-IP 21.1.0 Fixes and Known Issues

Applies To:

  • BIG-IP APM

    21.1.0

  • F5 SSL Orchestrator

    21.1.0

  • BIG-IP Analytics

    21.1.0

  • BIG-IP Link Controller

    21.1.0

  • BIG-IP LTM

    21.1.0

  • BIG-IP PEM

    21.1.0

  • BIG-IP AFM

    21.1.0

  • BIG-IP FPS

    21.1.0

  • BIG-IP DNS

    21.1.0

  • BIG-IP ASM

    21.1.0

BIG-IP Release Information

Version: 21.1.0
Build: 38.0

Note: This content is current as of the software release date
Updates to bug information occur periodically. For the most up-to-date bug data, see Bug Tracker.

The blue background highlights fixes

Known Issues in BIG-IP v21.1.x

Vulnerability Fixes

ID Number CVE Links to More Info Description Fixed Versions
2196137 CVE-2026-2507 K000160003, BT2196137 Issue observed only in BIG-IP 17.5.1.4: traffic processed by AFM or DDoS Hybrid Defender may cause TMM to restart21.1.0, 17.5.1.5
2144389 CVE-2025-40780 K000157948, BT2144389 CVE-2025-40780 BIND vulnerability21.1.0, 17.5.1.4, 17.1.3.1
2140621 CVE-2025-8677 K000157317, BT2140621 CVE-2025-8677: Resource exhaustion via malformed DNSKEY handling21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
928901 CVE-2020-11022 K02453220 jQuery vulnerability CVE-2020-1102221.1.0
1988993-1 CVE-2024-42516 K000153074, BT1988993 CVE-2024-42516 Apache HTTP Server vulnerability21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1983349-2 CVE-2023-2454, CVE-2023-39417, CVE-2023-39418, CVE-2023-5868, CVE-2023-5869, CVE-2023-5870 K000152931, BT1983349 CVE-2023-2454, CVE-2023-39417, CVE-2023-39418, CVE-2023-5868, CVE-2023-5869, CVE-2023-5870 PostgreSQL vulnerabilities21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1893473 CVE-2021-40438 K01552024, BT1893473 Apache vulnerability CVE-2021-4043821.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1505309 CVE-2021-23337 K12492858, BT1505309 CVE-2021-23337 nodejs-lodash: command injection via template21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1498949 CVE-2023-2283 K000138682, BT1498949 CVE-2023-2283 libssh: authorization bypass in pki_verify_data_signature21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1083937 CVE-2002-20001, CVE-2022-40735 K83120834, BT1083937 CVE-2002-20001, CVE-2022-40735 DH Key Agreement vulnerability - OpenSSH Server21.1.0, 21.0.0.1
1069381 CVE-2022-1468 K15101402 iControl REST rate limiting and connection handling improvements21.1.0
929709 CVE-2020-11023 K66544153 jQuery vulnerability CVE-2020-1102321.1.0
912797 CVE-2020-11868 K44305703, BT912797 NTP Vulnerability: CVE-2020-1186821.1.0, 21.0.0.1, 17.5.1.3, 17.1.3
714238 CVE-2018-1301 K78131906, BT714238 CVE-2018-1301: Apache Vulnerability21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
551462-8 CVE-2014-9730 K17447 CVE-2014-9730 - Linux Kernel UDF Filesystem Denial of Service Vulnerability21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2053165 CVE-2025-47268 K000158112, BT2053165 CVE-2025-47268 iputils: Signed Integer Overflow in Timestamp Multiplication in iputils ping21.1.0, 17.5.1.4
1893905 CVE-2023-40217 K000139685, BT1893905 Python vulnerability CVE-2023-4021721.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1324085 CVE-2023-3446,CVE-2023-3817 K000137969 Multiple OpenSSL Vulnerabilities21.1.0
1086325 CVE-2016-4658 K49419538, BT1086325 CVE-2016-4658 libxml2 vulnerability21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
745334-10 CVE-2016-7099 K24444803 CVE-2016-7099 NodeJS Vulnerability21.1.0, 21.0.0.1
2187529-2 CVE-2025-12818 K000160291, BT2187529 CVE-2025-12818: postgresql: libpq undersizes allocations, via integer wraparound21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2137805 CVE-2023-36478, CVE-2024-6763, CVE-2024-8184, CVE-2023-26049 K000157844 Jetty vulnerabilities CVE-2023-36478, CVE-2024-6763, CVE-2023-26049, CVE-2024-8184, and CVE-2023-4190021.1.0

Functional Change Fixes

ID Number Severity Links to More Info Description Fixed Versions
2152397 1-Blocking BIG-IP support for f5optics packages built after October 202521.1.0
578989-16 3-Major Maximum request body size is limited to 25 MB21.1.0, 17.5.1.4
2201813 3-Major BT2201813 BIG-IP enforces maximum concurrent streams limit immediately over HTTP/2 connection21.1.0
1589269-5 3-Major BT1589269 The maximum value of sys db provision.extramb was reduced from 8192 to 4096 MB21.1.0, 17.5.1.4, 17.1.3.1
1033537 3-Major Cookie persistence handling with duplicate cookie names21.1.0
1787457 4-Minor GRPC communication may fail when server responds without trailers and any payload21.1.0

TMOS Fixes

ID Number Severity Links to More Info Description Fixed Versions
658943 1-Blocking BT658943 Errors when platform migration process is loading UCS using trunks on vCMP guest/F5OS Tenants21.1.0, 21.0.0.1, 14.1.4.1
2179729 1-Blocking BT2179729 MCPD memory leaks during repetitive configuration create/modify/delete cycles combined with ongoing config-sync activity.21.1.0, 21.0.0.1
2144513 1-Blocking BT2144513 Cannot install any BIG-IP version with ISO signature verification enabled21.1.0, 21.0.0.1
2144497 1-Blocking BT2144497 Mellanox driver timeouts and packet drops on Azure instances with high NIC count21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2141205 1-Blocking BT2141205 Tpm-status returns: "System Integrity: Invalid" on BIG-IP versions released since October 202521.1.0
2130485-2 1-Blocking BT2130485 Warning: the current license is not valid - Fault code: 5113321.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
935633 2-Critical BT935633 VCMP guests or F5OS tenants may experience constant clusterd restart after host upgrade21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
901989 2-Critical BT901989 Corruption detected in /var/log/btmp21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2264133 2-Critical TMSH improvements21.1.0
2263721 2-Critical BT2263721 TMM crashes on Azure VE when virtual function is removed during runtime21.1.0
2259157-1 2-Critical Parsing failure may interpret data as a Memcached command21.1.0
2258981-1 2-Critical Remove Unnecessary internal User account from Non-Supported BIG-IP Platforms21.1.0
2257689 2-Critical Improvement in system account21.1.0
2257421 2-Critical TMSH enhancements21.1.0
2252233 2-Critical MCPD Crashes When Worker Connection Destructor Accesses Main-Thread Data Structures21.1.0
2241493 2-Critical User facing login issues with newly created password-based Azure VMs21.1.0
2229613 2-Critical BT2229613 F5OS Tenant Inoperative Due to Incorrect Permissions on /etc/nsswitch.conf File21.1.0
2229273 2-Critical BT2229273 LDAP authentication fails when multiple LDAP servers are configured21.1.0
2229021 2-Critical iControl REST issue21.1.0
2225017 2-Critical Config Sync not working in an HA setup21.1.0
2224937 2-Critical HA Devices staying out of sync21.1.0
2221585 2-Critical BT2221585 When tenant renews DHCP lease on eth2, the interface IP address on mgmt also gets modified21.1.0
2221493 2-Critical SCP Improvement21.1.0
2221445 2-Critical Improving scripts of Failover21.1.0
2221413 2-Critical SCP Improvement21.1.0
2219173 2-Critical TMSH improvements21.1.0
2217713 2-Critical TMSH improvements21.1.0
2217545 2-Critical Unable to License BIG-IP Booted on KVM UEFI Machine21.1.0
2217485 2-Critical TMSH Improvements21.1.0
2202097 2-Critical Apply limitations on certain object creation21.1.0
2201965 2-Critical TMSH improvement21.1.0
2201789 2-Critical TMSH improvements21.1.0
2201769 2-Critical TMSH improvements21.1.0
2201745 2-Critical TMSH improvements21.1.0
2201725 2-Critical TMSH improvements21.1.0
2201697 2-Critical TMSH improvements21.1.0
2200561 2-Critical Repeated MCPD service crashes21.1.0
2200437 2-Critical SNMP Improvement21.1.0
2200421 2-Critical SNMP Improvement21.1.0
2200209 2-Critical Support NVMe-based disk (newer generation instance families)21.1.0
2197173 2-Critical Insufficient sanitization in SNMP configuration21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2196761-3 2-Critical TMM core found while doing DAG and SP DAG related tests21.1.0
2187365-1 2-Critical BT2187365 BIG-IP v21.0.0 VE or F5OS tenant remains INOPERATIVE after cold boot21.1.0, 21.0.0.1
2185485 2-Critical BT2185485 The value of /proc/sys/vm/min_free_kbytes might be too big on Hyper-V and Azure VEs with multiple cores and multiple NICs21.1.0
2163585 2-Critical BT2163585 Migration fails "Spanning Tree Protocol (STP) is not supported on this platform"21.1.0, 21.0.0.1
2162849-3 2-Critical BT2162849 Removing the active controller does not trigger an immediate tenant failover21.1.0, 21.0.0.1, 17.5.1.4
2154057 2-Critical BT2154057 MCPD validations not throwing error when snmpv3 password contains more than 77 characters21.1.0
2153489 2-Critical BT2153489 MCPD crash in FolderMgr::validate_deleted_folder_queue due to race condition clearing folder_delete_queue mid-iteration (v21)21.1.0, 21.0.0.1
2153425-1 2-Critical BT2153425 MCPD worker core21.1.0, 21.0.0.1
2130913 2-Critical BT2130913 PUT request errors when trying to modify a firewall rule-list and firewall management-ip-rules21.1.0
2125953 2-Critical Insufficient access control to REST endpoint and TMSH for some CLI versions.21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1983145 2-Critical K000153024, BT1983145 Memory Corruption due to xnet-DPDK21.1.0
1959549 2-Critical BT1959549 Upgrade to 17.5.0 or later overwrites #TMSH-VERSION in bigip_base.conf when source UCS is pre-17.5.021.1.0, 17.5.1.4
1943217-3 2-Critical BT1943217 BGP - using 'no bgp default ipv4-unicast' might lead to a crash21.1.0, 17.5.1.3, 17.1.3.1
1826345 2-Critical Security improvements in ca-bundle.crt21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1783677-3 2-Critical BT1783677 HSB v3.11.8.0 bitstream release for VIPRION B4450N and B4460N blades21.1.0, 17.5.1.4, 17.1.3.1
1678105 2-Critical BT1678105 F5OS tenant, TMM crashing after loading a UCS21.1.0
1327649-1 2-Critical BT1327649 Invalid certificate order within cert-chain associated to JWK configuration21.1.0
977953 3-Major BT977953 Show running config interface CLI could not fetch the interface info and crashes the imi21.1.0
904401 3-Major BT904401 Guestagentd or devmgmtd core21.1.0
842525 3-Major BT842525 TMSH - Modifying sys httpd ssl-verify-client attribute to 'optional-no-ca' results in error21.1.0
791365-9 3-Major BT791365 Bad encryption password error on UCS save21.1.0
783077-6 3-Major BT783077 IPv6 host defined via static route unreachable after BIG-IP reboot21.1.0, 17.5.1.4
760451-2 3-Major Enabling user to configure nonce disabled/enabled from Mgmt GUI login as well as CLI21.1.0
658850 3-Major BT658850 Loading UCS with the platform-migrate parameter could unexpectedly set or unset management DHCP21.1.0
584607 3-Major Harden authentication infrastructure21.1.0
566995-8 3-Major BT566995 bgpd might crash in rare circumstances.21.1.0, 17.5.1.4, 17.1.3.1
528314 3-Major K16816, BT528314 Generating new default certificate and key pairs for BIG-IP ssl profiles via CLI will not be reflected in GUI or in tmsh21.1.0, 17.5.1.4
2262265 3-Major Backup UCS enhancements21.1.0
2262249 3-Major iControl REST hardening21.1.0
2227441 3-Major TMSH hardening21.1.0
2225201 3-Major iControl REST hardening21.1.0
2224681 3-Major iControl REST improvement21.1.0
2224673 3-Major iControl REST improvement21.1.0
2221689-1 3-Major TMSH hardening21.1.0
2221517 3-Major BIG-IP SCP hardening21.1.0
2221169-4 3-Major iControl REST Hardening21.1.0
2221161-1 3-Major TMSH hardening21.1.0
2220369 3-Major BIG-IP GUI/API Improvements21.1.0
2219889 3-Major BT2219889 Specific iRule with undefined var in remote syslog via HSL leads to crash21.1.0
2219745 3-Major iControl REST hardening21.1.0
2218261 3-Major iControl REST Improvements21.1.0
2218109 3-Major Unable to delete LTM Policy Strategy with Address Selector via UI. VE goes offline and displays an error after manual deletion of the MCPD shared database file during operations such as reboot.21.1.0
2217053 3-Major HTML5 Citrix Client Bundle Upload Fails with Unpack Error Due to Invalid Entry Filename21.1.0
2216645 3-Major UCS Backup Improvements21.1.0
2208913-3 3-Major iControl SOAP hardening21.1.0
2202281 3-Major Primary Admin DB Change to Non-Existing User Results in Admin User Lockout21.1.0
2202005-1 3-Major BT2202005 IPsec can send packets across tunnels on standby node.21.1.0
2201877 3-Major BT2201877 SCTP multihoming fails with ICMP unreachable for alternate paths.21.1.0
2201377 3-Major iControl REST improvements21.1.0
2199289 3-Major Updating systemauth.primaryadminuser from system-defined admin user (admin) to a user-defined admin user using iControl REST returns 500 error21.1.0
2198701 3-Major TMSH/MCP validation of management route dependencies21.1.0
2198661 3-Major BT2198661 Resource administrator not working as expected21.1.0
2197289 3-Major BT2197289 Enabling SSH access via the GUI blocks MCPD for 90 seconds21.1.0
2186009 3-Major BT2186009 Increased TX IQ size for netvsc21.1.0
2184897-3 3-Major BT2184897 Tenant disk size modification is ineffective for var/log folder21.1.0, 21.0.0.1, 17.5.1.3, 17.1.3.1
2183241 3-Major BT2183241 Trunk egress traffic is not balanced on some platforms.21.1.0
2182357 3-Major Inconsistent Default Source Address Selection for Virtual Server Between POST and PUT Requests21.1.0
2182061 3-Major BT2182061 Management routes not installed on reboots when interface route is recursively required.21.1.0
2162801-1 3-Major BT2162801 MCP hung during shutdown when any exception/ abnormal restart while booting up21.1.0, 21.0.0.1
2161077-1 3-Major BT2161077 Bot profile properties page does not load when there are large number of SSL certs (> 1000)21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2152877 3-Major BT2152877 Exclude /opt/CrowdStrike directory from Integrity Test21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2152601-1 3-Major BT2152601 Repeated restarts of the MCPD service result in a continuous restart loop accompanied by error messages: An unexpected failure has occurred, MCO_ERR_EV_SYN - Synchronous events21.1.0, 21.0.0.1
2152301-1 3-Major BT2152301 After upgrading from version 17.1.2 to 17.5.1.3, the guest-role user is unable to run the command show running-config in TMSH.21.1.0, 17.5.1.4
2152137 3-Major New DB variable ve.ndal.driver.netvsc to provide driver selection for Azure/HyperV deployments21.1.0
2150525 3-Major Improvements in iControl SOAP21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2150489 3-Major BT2150489 Most DB keys encrypted by SecureVault master key are not persisted to BigDB.dat when the system master key is changed.21.1.0, 17.5.1.4, 17.1.3.1
2144445 3-Major Insufficient sanitization in TMSH21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2140905 3-Major BT2140905 System Integrity Test on VE is halting the whole system in FIPS mode21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2140213 3-Major BT2140213 Xnet-netvsc driver crash21.1.0, 17.5.1.4
2137977 3-Major BT2137977 Clicking on a policy in a virtual server's resource page navigates to the full policy list, instead of the specific policy21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2137861-1 3-Major BT2137861 MCPD throws a validation error during upgrade to v17.1.3.x when TACACS servers are configured with hostname21.1.0, 17.1.3.1
2132213 3-Major BT2132213 Hyper-V/Azure: Unable to pass traffic with tagged vlans when using the default dpdk driver.21.1.0
2131861 3-Major Snapshot file count decreases over time.21.1.0
2131833 3-Major BT2131833 F5OS/rSeries r2xxx/r4xxx BIG-IP Tenant management interface not reachable21.1.0
2083257 3-Major 502 error from BIG-IP during large AFM rule deployment21.1.0
2078297-2 3-Major Unexpected PVA traffic spike21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2063265 3-Major Improvements in HTTP headers21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2058541-3 3-Major BT2058541 [BGP] BIG-IP does not follow updated section of rfc4724.html#section-4.2 when handling a new connection from peer.21.1.0, 17.1.3.1
2047429 3-Major BT2047429 PostgreSQL should dump a corefile when not exiting21.1.0, 21.0.0.1
1989033 3-Major BT1989033 IPsec IKEv2 tunnel may fail to initiate or respond due to ERR_PORT21.1.0
1975297 3-Major BT1975297 TMM may fail to start up with max number of interfaces for Azure instances <= 16 vCPUs21.1.0
1974701 3-Major BT1974701 PVA stats may be double incremented when pva mode is dedicated21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1967485-1 3-Major Old Logs in /var/log Not Deleted When Storage Exceeds Threshold21.1.0
1966941 3-Major BT1966941 High CPU or increased translation errors following upgrade or restart when DAG distribution changes21.1.0, 17.5.1.4
1966633 3-Major BT1966633 Non-eth0 management interface unbound after tmm restart on 17.5.0 in AWS21.1.0, 21.0.0.1, 17.5.1.4
1933105 3-Major BT1933105 TMM does not fragment the output before encapsulating the payload21.1.0
1927521 3-Major BT1927521 DPDK has dependency on SSSE321.1.0
1925485-2 3-Major CVE-2020-12655 kernel: sync of excessive duration via an XFS v5 image with crafted metadata21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1925369-2 3-Major CVE-2018-10322 kernel: Invalid pointer dereference in xfs_ilock_attr_map_shared() when mounting crafted xfs image allowing denial of service21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1925045-2 3-Major CVE-2024-35849 - Linux Kernel Btrfs Information Leak Vulnerability21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1925029-2 3-Major CVE-2023-1611 - Linux Kernel btrfs Use-After-Free Vulnerability Leading to System Crash and Information Leak21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1923997-2 3-Major CVE-2023-1668-openvswitch: ip proto 0 triggers incorrect handling21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1893369-2 3-Major CVE-2021-33033 kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1849265-5 3-Major BT1849265 A VCMP guest may not exit hardware syncookie mode21.1.0, 17.5.1.4
1826505 3-Major BT1826505 Restjavad API usage statistics memory leak21.1.0
1813505-3 3-Major BT1813505 Snmpd may seg fault on systems with large amounts of virtual memory21.1.0, 17.5.1.4
1677429 3-Major BT1677429 BFD: TMM might not agree on session ownership.21.1.0, 17.5.1.4, 17.1.3.1
1670465 3-Major BT1670465 TMMs might not agree on session ownership when multiple cluster geometry changes occur.21.1.0, 17.5.1.4, 17.1.3.1
1642533 3-Major ipv4 forwarding is enabled on F5OS tenants21.1.0
1621417 3-Major WALinuxAgent Updated to Version 2.14.0.121.1.0
1580369 3-Major BT1580369 MCPD thrown exception when syncing from active device to standby device.21.1.0, 17.5.1.4, 17.1.3.1
1497061 3-Major BT1497061 Added support for VLANs above 512 with xnet-IAVF driver21.1.0, 17.1.3
1489817 3-Major BT1489817 Fix crash due to number of VLANs21.1.0, 17.1.3
1455741 3-Major BT1455741 Httpd consumes excessive amount of CPU in FIPS mode21.1.0
1450481 3-Major TMSH hardening21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1403869-6 3-Major BT1403869 CONNFLOW_FLAG_DOUBLE_LB flows might route traffic to a stale next hop21.1.0, 17.5.1.4
1401569 3-Major Engineering Hotfix readme file refers to non-applicable "full_box_reboot" command21.1.0
1377737-2 3-Major BT1377737 SSL Orchestrator does not pass traffic when MAC masquerading is configured on R4k or R2k systems21.1.0, 17.5.1.4, 17.1.3
1322413 3-Major BT1322413 After config sync, FQDN node status changes to Unknown/Unchecked on peer device21.1.0
1256757 3-Major BT1256757 Suspect keymgmtd memory leak while using dynamic CRL.21.1.0
1231889 3-Major BT1231889 Mismatched VLAN names (or VLANs in non-Common partitions) do not work properly BIG-IP tenants running on r2000 / r4000-series appliances21.1.0
1183529-1 3-Major BT1183529 OCSP request burst when cert-ldap authentication is enabled21.1.0
1148185 3-Major K05403841 getdb insufficient sanitisation21.1.0, 21.0.0.1
1137269-7 3-Major BT1137269 MCPD fails to reply if a request is proxied to another daemon and the connection to that daemon closes21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1106489 3-Major BT1106489 GRO/LRO is disabled in environments using the TMM raw socket "sock" driver.21.1.0, 17.1.3, 16.1.4, 15.1.10
1016273 3-Major BT1016273 Standby TMM can core or cause incorrect mirroring during upgrade when session mirroring is enabled21.1.0
857973 4-Minor BT857973 GUI sets FQDN Pool Member "Auto Populate" value Enabled by default21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
761853 4-Minor BT761853 Send HOST header in OCSP responder request21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
659579-9 4-Minor BT659579 Timestamps in icrd, restjavad, and restnoded logs are not synchronized with the system time21.1.0, 17.5.1.4
2223665 4-Minor BT2223665 When sdag.shuffle.table is non-zero on a clustered tenant, tmm may not go ready-for-world21.1.0
2186153 4-Minor CVE-2025-8194 cpython: Cpython infinite loop when parsing a tarfile21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2171845 4-Minor BT2171845 Manual Sync in Sync-Failover device group may result in differences in attached Logging Profiles on virtual server21.1.0
2163321 4-Minor BT2163321 Broken Address List hyperlink in the destination field of Virtual Server list21.1.0, 17.5.1.4
2151505 4-Minor BT2151505 Cmp_dest_velos is automatically installed on system startup.21.1.0
2151173 4-Minor BT2151173 Starting this release, file uploads that include the percent sign (%) in the filename will be rejected by server-side validation.21.1.0
2141305 4-Minor BT2141305 SSH Proxy Profile Properties page does not render21.1.0, 21.0.0.1
2131597-4 4-Minor BT2131597 BGP graceful restart might not accept a new connection immediately after neighbor failover.21.1.0
2131225 4-Minor BT2131225 Unclear Actions Displayed with L7 Profiles in Rule Creation21.1.0, 21.0.0.1
2099441 4-Minor BT2099441 Garbled character in warning message when HA peer is added21.1.0, 21.0.0.1
2035641 4-Minor APMd resource exhaustion21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1966669-3 4-Minor BT1966669 [PVA] Provide a DB variable disabling NAT46/64 snoop inserts.21.1.0, 17.5.1.4
1924693-2 4-Minor CVE-2020-26939 bouncycastle: Address OAEP decoding side-channel leaking RSA private exponent21.1.0
1701177 4-Minor HTTP request handling improvements21.1.0
1624701 4-Minor Security improvement in BIGIP GUI21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1341517 4-Minor BT1341517 With longer vlan names qkview generates invalid proc_module.xml file and ihealth parsing fails.21.1.0, 21.0.0.1
1325737 4-Minor BT1325737 Standby tenant cannot access floating traffic group when MAC masquerade is enabled21.1.0, 17.5.1.4, 17.1.3
1178225-5 4-Minor Scalability issues with F5-VE deployments21.1.0, 17.5.1.4, 17.1.3.1
1065385 4-Minor BIG-IP: NPM vulnerabilities21.1.0, 17.1.3.1
1052477-2 4-Minor CVE-2020-10751 kernel: SELinux netlink permission check bypass21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1

Local Traffic Manager Fixes

ID Number Severity Links to More Info Description Fixed Versions
2162705 1-Blocking BT2162705 Tmm restarting on multi-NUMA AWS instances with ENA interfaces21.1.0, 21.0.0.1, 17.5.1.4
2141125-1 1-Blocking BT2141125 Multicast traffic is dropped with incorrect VLAN tagging21.1.0
1967005 1-Blocking BT1967005 TMM crash on R2x00/R4x00 platforms21.1.0
886045 2-Critical BT886045 Multi-NIC instances fail to come up when trying to use memory-mapped virtio device21.1.0
2284709 2-Critical BT2284709 TMM might restart with certain network traffic21.1.0
2259109 2-Critical External users can run the track command21.1.0
2246933 2-Critical BT2246933 Memory leak in QUIC under rare sequence of packets/events21.1.0
2229881 2-Critical BT2229881 Multi-slot tenant may become inoperative after tenant upgrade followed by tmsh reboot slot all21.1.0
2229857 2-Critical BT2229857 Full load from text files fails with "01020036:3: The requested device (/Common/<device-name>) was not found" if deprecatedApiAllowed is false21.1.0
2222041-4 2-Critical HTTP cookie handling resource usage21.1.0
2221001 2-Critical TMM might restart with certain network traffic21.1.0
2219381 2-Critical TMSH improvement21.1.0
2199565 2-Critical BT2199565 TMSH and TMUI accessiblity issue during monitors at scale21.1.0
2152785 2-Critical TMM may crash under certain conditions.21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2144521 2-Critical BT2144521 WAF plugin gets incorrect response body when SSE profile is configured on virtual server21.1.0, 21.0.0.1
2131085 2-Critical BT2131085 Running 'tmsh reboot slot all' on multi-slot tenant or vCMP guest causes it to get stuck in unhealthy state21.1.0, 17.5.1.4
2038393-4 2-Critical BT2038393 Looped dtls virtual can cause crash due to NULL dereference21.1.0, 17.5.1.4
2017137-1 2-Critical BT2017137 Pkcs11d Crash Risk Due to Unbounded Label/Password Length from MCPd21.1.0, 21.0.0.1, 17.5.1.2, 17.1.3
1923793-2 2-Critical CVE-2019-5739: DoS with keep-alive HTTP connection21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1825357 2-Critical BT1825357 Possible tmm crash or traffic loss after making vlan interface changes with an empty trunk21.1.0, 17.5.1.4
1623325 2-Critical BT1623325 VLAN groups or VLAN group members may be deleted on F5OS tenant21.1.0
1539997 2-Critical BT1539997 Secure HA connections cannot be established due to zombie HA flow21.1.0, 17.5.1.4, 17.1.3.1
1481889-6 2-Critical BT1481889 High CPU utilization or crash when CACHE_REQUEST iRule parks.21.1.0, 17.5.1.4, 17.1.3.1
1053561 2-Critical BT1053561 TLS 1.3 Handshake fails when 0RTT enabled on the client-side SSL and iRule is specified21.1.0
950665 3-Major BT950665 Pool and pool members created for dynamic ECMP routes are not freed21.1.0
901569 3-Major BT901569 Loopback traffic might get dropped when VLAN filter is enabled for a virtual server.21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
881041 3-Major BIG-IP system may forward IP broadcast packets back to the incoming VLAN interface via a forwarding virtual server.21.1.0
2262981 3-Major BT2262981 TMM may corrupt stack during class lookup21.1.0
2259173-1 3-Major Sanitize key in memcache library21.1.0
2251517 3-Major BT2251517 Stream profile is not supported on HTTP/2 Full proxy (HTTP MRF Router enabled)21.1.0
2244413 3-Major BT2244413 Client Certificates are cached even when Retain Certificate is disabled on a Clientssl profile21.1.0
2244393 3-Major BT2244393 TLS 1.3 sessions are unnecessarily cached21.1.0
2230709 3-Major BT2230709 iRule class match fails after modifying IP data group entries with route-domains21.1.0
2230597 3-Major BT2230597 Under syncookie mode, temporary listeners may fail to complete connections21.1.0
2227513 3-Major BT2227513 Tmm crash in Google Cloud during a live migration21.1.0
2224537 3-Major BT2224537 Tmm crash in Google Cloud during a live migration21.1.0
2221017-4 3-Major BT2221017 The BIG-IP virtio driver may core during startup21.1.0
2220389 3-Major BT2220389 Enabling tm.ipv4dagfrag results in tmm not ready for world on a cluster with more than 4 blades21.1.0
2219929 3-Major BT2219929 Tmm running in Hyper-V environments might not receive multicast traffic21.1.0
2217093 3-Major BT2217093 L2 traffic to masquarade MAC on Standby might be flooded when multiple interfaces are used21.1.0
2211133 3-Major BT2211133 ICMP error length does not follow RFC 812 guidance21.1.0
2209157 3-Major BT2209157 FastL4 late binding does not proxy MSS when establishing server-side connection.21.1.0
2199469 3-Major BT2199469 Serverssl-use-sni not working in HTTP2 to HTTP gateway setups.21.1.0
2197305 3-Major BT2197305 BIG-IP generates invalid SSL key share21.1.0
2195321 3-Major Validations for certificate's notBefore and notAfter to comply with CC/FIPS/STIP Certifications21.1.0
2186933 3-Major ILX Plugin may not work after use of npm install command on workspace.21.1.0
2185833 3-Major VLAN Modification and Transition Between Q-in-Q and Non-Q-in-Q Configurations failed21.1.0
2185829 3-Major VLAN Modification and Transition Between Q-in-Q and Non-Q-in-Q Configurations failed21.1.0
2183353 3-Major BT2183353 TMM Intel E810 VF driver updates the link state with 1 second delay21.1.0, 17.5.1.4, 17.1.3.1
2182045 3-Major BT2182045 The iavf driver might drop some IPv6 packets that contain destination option or routing type 2 headers21.1.0, 17.1.3.1
2161073 3-Major Certificate Bundle Improvement21.1.0
2154001 3-Major BT2154001 Virtual server statistics dashboard "Requests" column does not increment when http2 MRF option is in use21.1.0
2151885 3-Major BT2151885 When using service-down-action reset/drop on a pool attached to a DHCP virtual TMM might experience a crash.21.1.0
2149253 3-Major BT2149253 QUIC connection stalls with early data21.1.0, 21.0.0.1
2149233 3-Major TMM crashes when using SSL21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2144309 3-Major BT2144309 TMM might experience a crash when using a fix for Bug78307721.1.0
2143177 3-Major Add Drop Action to LTM Policy21.1.0
2141365 3-Major BT2141365 Certificates fail to load when whitespace characters are present in multi-cert PEM file21.1.0
2141233 3-Major BT2141233 Client authentication profile as "Request" in FIPS-CC mode causes connection termination without certificate21.1.0, 21.0.0.1, 17.5.1.4
2141061 3-Major iControl REST API Endpoints enhancements21.1.0
2140901 3-Major Add new ssl-certificate subject and issuer DN conditions to LTM Policy.21.1.0
2139637 3-Major BT2139637 TMM crash because of invalid context21.1.0
2137973 3-Major BT2137973 Common Criteria requirements mandate strict values for notBefore and notAfter that current implementation does not satisfy21.1.0, 17.5.1.4
2135621 3-Major BT2135621 Poor TCP performance on Hyper-V non-accelerated deployments with Cisco VIC interfaces21.1.0
2132209 3-Major BT2132209 TMM crash while sending ACKs in invalid context21.1.0
2132185 3-Major Add Action SSL Proxy with Bypass Intercept options to LTM Policy21.1.0
2035177-4 3-Major BT2035177 Use of OCSP responder with SSL C3D enabled in virtual server may leak SSL handshake instances21.1.0, 17.5.1.4
2033781-5 3-Major BT2033781 Memory allocation failed: can't allocate memory to extend db size21.1.0
1987309 3-Major BT1987309 Bigd may get stuck in legacy mode21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1972541 3-Major BT1972541 Tmsh load sys config verify leaks compiled ltm (CPM) policies21.1.0
1969889-2 3-Major BT1969889 Expired certificates sent to clients by tmm due to network time synchronization21.1.0
1959629 3-Major BT1959629 CSR generation via the GUI removes Subject Alternative Name (SAN) string. Also, when SAN is configured with small prefix chars "dns:", no error is thrown.21.1.0
1930897 3-Major BT1930897 Tmm core due to overflow of ifc ref counts with flow forwarding21.1.0, 17.1.3
1923817-2 3-Major CVE-2017-11499: Constant Hashtable Seeds vulnerability (NodeJS v6.9.1)21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1889845 3-Major Improvements in Radius Monitor21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1849029-4 3-Major BT1849029 Debug TMM crashes in FIPS/CC mode21.1.0, 21.0.0.1, 17.1.3, 16.1.6.1
1824985 3-Major BT1824985 In rare cases the Nitrox hardware compression queue may stop servicing requests.21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1818137 3-Major BT1818137 Tmm IPv4 fragmentation handling distribution21.1.0, 21.0.0.1
1788105 3-Major BT1788105 TLS1.3 connections between BIG-IP and server hangs with an APM policy that is invoked after the server's SSL handshake finishes21.1.0, 21.0.0.1, 17.1.3
1778793 3-Major BT1778793 Database health monitors may use the wrong connection when attempting to connect to database21.1.0
1623921-4 3-Major BT1623921 IPencap monitor probes from bigd are prone to connection re-use.21.1.0, 17.5.1.4, 17.1.3.1
1600617-6 3-Major BT1600617 Few virtio driver configurations may result in excessive memory usage21.1.0
1589629 3-Major BT1589629 An ICMPv6 Neighbor Solicitation sent to the last address on an IPv6 subnet uses the wrong Destination MAC address21.1.0
1497633 3-Major BT1497633 TMC incorrectly set /32 mask for virtual-address 0.0.0.0/0 when attached to a VS21.1.0
1474877-6 3-Major BT1474877 Unable to download large files through VIP due RST Compression error.21.1.0, 17.5.1.4, 17.1.3.1
1473913 3-Major BT1473913 Proxy Connections drop due to wrong counting21.1.0, 17.5.1.4, 17.1.3, 16.1.6
1463089-3 3-Major BT1463089 TMM crash because of corrupted MQTT queue21.1.0
1440409 3-Major BT1440409 TMM might crash or leak memory with certain logging configurations21.1.0, 17.5.1.4, 17.1.3.1
1380009 3-Major BT1380009 TLS 1.3 server-side resumption resulting in TMM crash due to NULL session21.1.0, 17.5.1.4, 17.1.3.1
1352213-6 3-Major BT1352213 Handshake fails with FFDHE key share extension21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3
1325649-5 3-Major BT1325649 POST request with "Expect: 100-Continue" and HTTP::collect + HTTP::release is not being passed to pool member21.1.0, 17.5.1.4, 17.1.3
1281493 3-Major BT1281493 Tmsh and gui errors when checking tmm memory21.1.0
1271341 3-Major Unable to use DTLS without TMM crashing21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1189909 3-Major BT1189909 Active SSL Connections Curve is always kept at Zero on Performance Graph21.1.0
1161169 3-Major TLS X25519 hardware offload support21.1.0
1125381-4 3-Major BT1125381 Extraneous warnings recorded in when using only intermediate certificates21.1.0
1100421 3-Major BT1100421 HTTP/2 full-proxy virtual server uses wrong source MAC address and incorrect SNAT address selection21.1.0
1057305 3-Major BT1057305 On deployments that use DPDK, "-c" may be logged as the TMM process/thread name.21.1.0
2266005 4-Minor BT2266005 HTTP/3 blocks an unknown HTTP method21.1.0
2258705 4-Minor BT2258705 A policy with overlapping range in different rules may never match21.1.0
2227209 4-Minor BT2227209 Current session increases21.1.0
2099449 4-Minor BT2099449 Cannot configure websocket profile on a performance virtual server from the GUI21.1.0
2077357 4-Minor BT2077357 Virtual-wire with proxy listener may generate packets with 00:00:00:00:00:00 source MAC.21.1.0
1953369-4 4-Minor BT1953369 DB monitor queries repeatedly if recv string configured but response does not match21.1.0, 17.5.1.4
1429861 4-Minor CVE-2019-5737: HTTP or HTTPS Denial of Service in keep-alive mode (NodeJS v6)21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1341093 4-Minor BT1341093 MCPD returns configuration error when attaching a client SSL profile containing TLS 1.3 to a virtual server with HTTP/2 profile21.1.0
1004953-9 4-Minor BT1004953 HTTP does not fall back to HTTP/1.121.1.0, 17.5.1.4

Performance Fixes

ID Number Severity Links to More Info Description Fixed Versions
1574521 5-Cosmetic BT1574521 Intermittent high packet latency on R4000 and R2000 tenants21.1.0, 17.5.1.4, 17.1.3.1

Global Traffic Manager (DNS) Fixes

ID Number Severity Links to More Info Description Fixed Versions
931149 2-Critical BT931149 Some RESOLV::lookup queries, including PTR lookups for RFC1918 addresses, return empty strings21.1.0, 21.0.0.1
887681 2-Critical BT887681 Tmm SIGSEGV in rrset_array_lock,services/cache/rrset.c21.1.0, 21.0.0.1
2238473 2-Critical BT2238473 MCP DNS rule validation for DNS type64 or type65 results in SIGSEGV21.1.0
2221177 2-Critical K000159906, BT2221177 Big3d cannot validate certificates after they are renewed21.1.0
2197377 2-Critical TMM crashes under specific traffic.21.1.0, 21.0.0.1
1103833 2-Critical BT1103833 Tmm core with SIGSEGV in gtmpoolmbr_UpdateStringProc21.1.0
1083405-9 2-Critical BT1083405 "Error connecting to named socket" from zrd21.1.0, 17.5.1.4, 17.1.3.1
2258929 3-Major Deleting/Adding virtual server on the LTM device object can change other disabled virtual server status on the LTM device object.21.1.0
2219053 3-Major CVE-2025-13878: Malformed BRID/HHIT records can cause named to terminate unexpectedly21.1.0
2217445 3-Major GTM Virtual Server can be deleted while referenced by GTM Pools21.1.0
2200389 3-Major BT2200389 CDS and CDNSKEY not included in DNSX zone transfer data21.1.0
2200217 3-Major BT2200217 DNSSEC validation failures due to missing DS records in zone transfers21.1.0
2199701-3 3-Major BT2199701 big3d was stuck in high CPU after network disruption21.1.0
2172069 3-Major BT2172069 GTM topology regions updates do not take effect within tmm21.1.0, 17.5.1.4, 17.1.3.1
2172041 3-Major BT2172041 Zone transfer fails for dnsx when the zone file contains TLSA records21.1.0
2162573 3-Major Per Cache setting to turn off QNAME minimization21.1.0
2153893 3-Major BT2153893 With DNS64 configured, resolution aborts early on the first error response without trying other name servers.21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2144353 3-Major BT2144353 BIND upgrade to stable version 9.18.4121.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2141245 3-Major Undisclosed traffic to TMM can lead to resource exhaustion21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2106789 3-Major BIGIP LTM Monitors Hardening21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1983209 3-Major BT1983209 Zone does not sync correctly when record is modified21.1.0
1970969 3-Major BT1970969 Stale Record Answers counter increments for SERVFAIL responses from DNS resolver cache21.1.0
1966405 3-Major BT1966405 Changes to DNS cache resolver may cause service disruption on BIG-IP DNS v17.1.2.121.1.0, 21.0.0.1
1953273 3-Major BT1953273 Big3d high CPU with thousands of https monitors with SNI21.1.0
1943269 3-Major BT1943269 GTM Server can be deleted while referenced by GTM Pools21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1933357 3-Major BT1933357 DNS64 stats between cache resolver and TMM non-cache have inconsistent behavior.21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1627093 3-Major DNS's HTTP Monitor provides the ability to show Response Code in Logs21.1.0
1602345-3 3-Major BT1602345 Resource records are not always created when wideips are created in a bundle21.1.0, 17.1.3.1
1473189 3-Major BT1473189 Offending IP is not logged when rate limiting is triggered21.1.0, 21.0.0.1
1379649 3-Major BT1379649 GTM iRule not verifying WideIP type while getting pool from TCL command21.1.0, 21.0.0.1, 17.1.3.1
1325633 3-Major BT1325633 Limit the value of MAX_DP_TARGET_COUNT in processQueryTargets.21.1.0
1271453 3-Major BT1271453 DNS requests with NSEC or NSEC3 RR type Responding with no NSEC3 and no authority section from BIG-IP authoritative server.21.1.0
2186625 4-Minor BT2186625 Zone transfer from dns express with dnssec enabled includes extra RRSIG21.1.0

Application Security Manager Fixes

ID Number Severity Links to More Info Description Fixed Versions
2173429 2-Critical Digest and NTLM Authorizations Not Functioning21.1.0
2139921 2-Critical BT2139921 Invalid Length PCRE Expression Was Allowed Through REST API21.1.0
1934373 2-Critical BT1934373 DoS attack is blocking while transparent21.1.0
1787645 2-Critical BT1787645 BD process fail to startup on specific XML configuration21.1.0
1623601 2-Critical BT1623601 Invalid PCRE expressions are allowed21.1.0
919917 3-Major BT919917 File permission errors during bot-signature installation21.1.0
911661 3-Major BT911661 Remote event logs may truncate at 5k when maximum entry length is configured to 64k21.1.0
2260293 3-Major LiveUpdate status stuck on Pending after successful installation21.1.0
2256725 3-Major Unable to trigger "Disallowed file upload content detected" violation in some cases21.1.0
2251649 3-Major `sig_cve` and `staged_sig_cves` Fields Appear as N/A in Data Sent to Remote Syslog21.1.0
2225313 3-Major ASM CAPTCHA refresh and audio icons are missing after policy import21.1.0
2221781 3-Major BT2221781 The DOS process utilizes CPU resources during configuration updates that are unrelated to its operation.21.1.0
2219081 3-Major BT2219081 Live Update configuration sync failure in HA setup21.1.0
2213605 3-Major BT2213605 "Live Update" ASU File Listed as Not Installed After Successful Scheduled Installation21.1.0
2208709 3-Major BT2208709 Failure to match specific WAF signatures21.1.0
2200537 3-Major BT2200537 Audio captcha script error21.1.0
2187385 3-Major BT2187385 Brute force set to CAPTCHA also raises a violation and blocks traffic21.1.0
2185109 3-Major High memory usage in REST query for ASM policies and virtualServers with huge L7 policy21.1.0
2162189 3-Major BT2162189 "Live Update" reinstalls the genesis ASU file, while the latest ASU file is installed manually21.1.0, 17.5.1.4, 17.1.3.1
2152689 3-Major BT2152689 ASM GUI "Failed to load requests" pop-up21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2152445 3-Major BT2152445 "Live Update" API is unresponsive after upgrade and recover only after tomcat restart21.1.0, 17.5.1.4, 17.1.3.1
2143305 3-Major BT2143305 Tmm crash21.1.0, 21.0.0.1
2038277 3-Major BT2038277 Double memory release in the enforcer21.1.0
2016465 3-Major BT2016465 Policy auto merge does not work for Base64 Decoding21.1.0
1938101 3-Major BT1938101 Performance issue on specific parameters extractions21.1.0
1933373 3-Major BT1933373 Newly added Threat Campaigns are missing REST ID21.1.0, 17.1.3.1
1922661 3-Major BT1922661 JSON profile settings not displayed in REST API after attaching schema files21.1.0, 17.1.3.1
1920973 3-Major Ordering nested JSON objects during full json policy export21.1.0
1920637 3-Major BT1920637 Duplicate user-defined Signature Set based on Attack Type is created upon policy import during upgrade21.1.0
1825057 3-Major BT1825057 'vs_name' field truncated at 64 characters with ASM's remote logging21.1.0
1814413 3-Major BT1814413 Dynamic parameters are not extracted and cookies are not generated21.1.0
1772353 3-Major BT1772353 Defaults for Associated Violations are re-added to a policy21.1.0
1696965 3-Major BT1696965 When URL is created from session and login, the staging on the URL is disabled21.1.0, 17.1.3, 16.1.6
1632385 3-Major BT1632385 Non-ASCII UTF-8 characters are mangled in JSON policy export21.1.0
1623669 3-Major BT1623669 False “Illegal dynamic parameter value” violations when extracting parameters from links (HREF)21.1.0, 17.1.3.1
1583381 3-Major BT1583381 "Insert Secure Attribute" must be enabled and "Insert SameSite Attribute" must be set to "Lax" for pure wildcard cookie in all templates by default21.1.0
1562733 3-Major Bd can crash using JSON schema21.1.0
1552341 3-Major BT1552341 Excessive tmm memory during bot signature updates21.1.0, 21.0.0.1
1057557 3-Major BT1057557 Exported policy has greater-than sign '>' not escaped to '&gt;' with response_html_code tag.21.1.0
2230277 4-Minor Help Content Missing on Live Update Page in Certain Scenarios21.1.0
2228753 4-Minor BT2228753 Violation_details may contain unexpected line break21.1.0
2201693 4-Minor Empty Detected Value Length for Parameters with Empty Values21.1.0
2199485 4-Minor BT2199485 Export and re-import of a security policy in XML format fails due to invalid 'openapi-array' user_input_format value21.1.0
2162589 4-Minor BD crash with a specific configuration21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2140949 4-Minor BT2140949 Need a clean up of dns-resolver f5-aws-dns21.1.0
2139901 4-Minor BT2139901 Server-ssl profile "do-not-remove-without-replacement" is recreated21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2078277 4-Minor BT2078277 BD crash with an inappropriate configuration for request_max_chunks_number21.1.0
2046941 4-Minor BT2046941 Distributed Cloud-facing BIG-IP instance with bot-defense profile might block XC health monitor21.1.0, 17.5.1.4, 17.1.3.1
2007433 4-Minor BT2007433 CAPTCHA submit button text not configurable21.1.0
1505257 4-Minor BT1505257 False positive with "illegal base64 value" for Authorization header21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1036221 4-Minor BT1036221 "Illegal parameter value length" is reported with parsing product length.21.1.0, 21.0.0.1, 17.5.1.4

Application Visibility and Reporting Fixes

ID Number Severity Links to More Info Description Fixed Versions
2183705 3-Major K000156643, BT2183705 Improper access control on SMTP21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1

Access Policy Manager Fixes

ID Number Severity Links to More Info Description Fixed Versions
2149197 1-Blocking Rotated Public key used for signature verification of apmclients iso bundle in BIG-IP21.1.0
2259165-1 2-Critical Input Validation on APM Logon Page21.1.0
2259065 2-Critical Access framework hardening21.1.0
2259061 2-Critical Access framework hardening21.1.0
2257673 2-Critical RSA SecurID improvements21.1.0
2257669-3 2-Critical APM my.policy improvement21.1.0
2230009-1 2-Critical BT2230009 Access Policy memory is not cleared between access policy executions21.1.0
2219209 2-Critical BT2219209 Resetting profile statistics may lead to memory corruption21.1.0
2211137 2-Critical BT2211137 EPSEC upgrade fails when default package is pre-uploaded21.1.0
2162861 2-Critical BT2162861 'Connectors' creation screen does not appear21.1.0
2152269 2-Critical BT2152269 Low reputation URIs are found in the URL DB binary21.1.0, 21.0.0.1, 21.0.0, 17.5.1.4, 17.1.3.1
2138077 2-Critical BT2138077 SAML redirect signature validation fails when RelayState is present with want-detached-signature=true in BIG-IP APM 17.1.x21.1.0, 21.0.0.1
1991297-2 2-Critical BT1991297 [APD][SAML-SSO]high memory due to SAML SSO leak21.1.0, 21.0.0.1
1282769 2-Critical Localdb user can change the password of other user21.1.0
781761 3-Major BIG-IP allows enabling deprecated Network Access compression, causing intermittent tunnel traffic drops with Edge Client21.1.0
2258853 3-Major BT2258853 [APM][SAML] SP automation fails to update, when bound to an IdP with a SAML Resource21.1.0
2241445 3-Major Portal Access: JavaScript XHR requests fail with about:// origin in about:blank frames due to incorrect F5_Deflate_origin() rewriting21.1.0
2241393 3-Major BT2241393 MutationObserver may not work in some cases21.1.0
2229773 3-Major F5_document can be null resulting in GetCookie/SetCookie failures21.1.0
2225513 3-Major BT2225513 Some named properties in document are not accessible in Portal Access21.1.0
2219801 3-Major BT2219801 Visual Policy Editor AD group search is limited to current page21.1.0
2218181-2 3-Major JSESSIONID missing from APM NTLM SSO responses after successful login21.1.0
2185281 3-Major BT2185281 Per-request policy variable assignment of perflow.category_lookup.result.primarycategory may lead to crash21.1.0
2183233 3-Major BT2183233 TMM crash due to extra trailing CR/LF in iSession reconnects21.1.0
2162941-2 3-Major BT2162941 Support MDM with GCC High / DoD Environments21.1.0
2152545-1 3-Major BT2152545 [APM][SAML] High TMM memory sso_saml leak21.1.0
2143165 3-Major BT2143165 Oauth tokens are not shown in UI21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2141337 3-Major BT2141337 Auto-upgrade of the BIG-IP APM Edge Client does not upgrade the MachineTunnel Service on Windows systems21.1.0, 17.5.1.4
2053289-4 3-Major BT2053289 Increased OAuth instances in TMM memory21.1.0
2050177-1 3-Major BT2050177 LDAP cache optimisation, required as session establishment, takes more time21.1.0
2047137 3-Major BT2047137 TMM core may occur while using APM VDI with Blast UDP21.1.0, 17.1.3.1
2034753-2 3-Major BT2034753 Domain name validation does not align with the error message on GUI21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1998985-3 3-Major BT1998985 "Page Unresponsive" error message when editing Active Directory group resource with large AD group count21.1.0, 17.5.1.4
1966965 3-Major Client Download page update for linux client packages21.1.0
1818949-1 3-Major BT1818949 [APM] BIG-IP as OAuth AS sending invalid grant error when refresh token expired.21.1.0, 21.0.0.1
1772317-1 3-Major BT1772317 [APM][SAML SP] sp fails authentication with error "SAML assertion is invalid, error: NameID is missing"21.1.0, 21.0.0.1
1756897 3-Major BT1756897 [APM][PA]Failed to execute 'observe' on 'MutationObserver': parameter 1 is not of type 'Node'21.1.0, 17.5.1.4
1752873-1 3-Major BT1752873 [APM][SAML SP] Order of SAML attribute values saml.last.attr.name is reversed21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1554961-3 3-Major BT1554961 APM - Websso leeway time of 60 seconds21.1.0, 17.5.1.4
1290937-3 3-Major 'contentWindow' of a dynamically genereated iframe becomes null21.1.0
1166929 3-Major BT1166929 [AdminUI][Rewrite Profile][PA] Add "*://*" to to rewrite list if an RCL has been entered21.1.0
1074285-6 3-Major BT1074285 Apmd crashes while handling JWT tokens.21.1.0, 17.5.1.4, 17.1.3.1
1071021-6 3-Major BT1071021 Some URLs such as *cdn.onenote.net configured in the Office 365 dynamic address space are not processed by APM21.1.0, 17.1.3.1
937665 4-Minor BT937665 Relaystate in SLO request results in two Relaystates in SLO Response21.1.0, 17.5.1.4
2200653 4-Minor BT2200653 [LocalUserDB Auth]: UID parameter ignored during user deletion – deletes all users instead of specified user21.1.0
1787701 4-Minor BT1787701 [APM]Customization in German contains French language21.1.0
1696641 4-Minor BT1696641 aced core running out of file descriptors21.1.0, 17.5.1.4
1181933 4-Minor Portal Access support for ES8/9/10/1121.1.0

Service Provider Fixes

ID Number Severity Links to More Info Description Fixed Versions
2252481 2-Critical Undisclosed network traffic can cause a TMM crash21.1.0
1268373 2-Critical BT1268373 MRF flow tear down can fill up the hudq causing leaks21.1.0, 17.5.1.4
1977057-4 3-Major BT1977057 Memory leak when using an iRule to overwrite MR peer route21.1.0, 17.5.1.4

Advanced Firewall Manager Fixes

ID Number Severity Links to More Info Description Fixed Versions
2262353 1-Blocking Pccd may crash when deleting a Zone with VLAN association21.1.0
2257857 2-Critical Config Reload Fails When Rolling Back F5OS Platform Software from 2.0.0+ to Versions Below 2.0.021.1.0
2229569 2-Critical BT2229569 Evict FSD Received While SPVADWL Is Uninitialized21.1.0
2162937-1 2-Critical BT2162937 TMM crash when AFM is enabled21.1.0, 21.0.0.1
2162905 2-Critical BT2162905 AFM GUI does not display Port List members in Properties panel21.1.0, 21.0.0.1, 17.5.1.4
2150669 2-Critical BT2150669 TCP Packet loss after upgrade with AFM provisisoned21.1.0
2139965 2-Critical BT2139965 AFM DNS DOS logging protocol_dns_dos_nxdomain_field_attack_name()21.1.0
1671149 2-Critical BT1671149 Timestamp cookies may cause issue for PVA-accelerated connections21.1.0
2291353-2 3-Major BT2291353 PCCD enters a loop while compiling NAT rules21.1.0
2251813 3-Major BT2251813 BIG-IP AFM: mcpd may crash when modifying address lists with cyclic nested references21.1.0
2222185 3-Major BT2222185 Even if it's possible to configure multiple stanzas under the auth-info section of a security ssh profile, the SSH proxy will always choose the first one that has a private key21.1.0
2218157 3-Major BT2218157 IP Intelligence database load log displayed periodically21.1.0
2208701 3-Major BT2208701 Tmm crash when the spvawl_timer_sweep callback_timer is being processed21.1.0
2163777-1 3-Major BT2163777 Tmm core on fw_nat_classify() while nat rule configuration is being changed21.1.0
2143101 3-Major BT2143101 SNMP Malfunctioning for IPI BL: Incorrect Statistics Reported21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2077525 3-Major BT2077525 Incomplete or missing IP Intelligence databases result in connection reset, high TMM CPU usage and/or TMM crash21.1.0, 21.0.0.1
2077465-1 3-Major BT2077465 Missing audit logs for dropped IP option packets (LSR/SSR/RR) prior to attack detection21.1.0, 17.5.1.4
2064333 3-Major BT2064333 [AFM] pccd cores during the service restart21.1.0
1820489 3-Major BT1820489 Rule list order changes when modifying a rule using Filer Active Rules List21.1.0, 17.5.1.4, 17.1.3.1
760355-1 4-Minor BT760355 Firewall rule to block ICMP/DHCP from 'required' to 'default'21.1.0, 17.1.2, 16.1.4, 15.1.9, 15.0.1.1, 14.1.2.1
1044053 4-Minor The db variable pccd.maxblobsize can only be set to a minimum of 51221.1.0

Policy Enforcement Manager Fixes

ID Number Severity Links to More Info Description Fixed Versions
2262537 2-Critical BT2262537 pem_sessiondump crashes when listing subscriber sessions with custom attributes21.1.0
2230405 3-Major PEM memory handling update21.1.0
2200009 3-Major BT2200009 PEM HA failover may cause traffic drops for new connections21.1.0
2198757 3-Major BT2198757 PEM: use-after-free of mw_msg in session_del_msg_entries hash21.1.0
2086097 3-Major PEM iRules causing traffic disruption21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2046553 3-Major BT2046553 Memory leak when modifying PEM policies with flow-info-filters21.1.0, 17.5.1.4, 17.1.3.1
1934073 3-Major BT1934073 PEM policy rule incorrectly matching when using a flow condition21.1.0, 21.0.0.1, 17.5.1.3, 17.1.3, 16.1.6.1
1785145-4 3-Major BT1785145 TMM SIGSEGV core due to NULL check is not handled properly in PEM21.1.0, 17.5.1.3, 17.1.3
2195709 4-Minor BT2195709 TCP fingerprint tethering detection does not work when a subscriber's traffic comes from a tethering Mac OS system.21.1.0

Carrier-Grade NAT Fixes

ID Number Severity Links to More Info Description Fixed Versions
518333 3-Major BT518333 New LSN Stat,Total End Points (IPv4/IPv6), deprecates the stat Total End Points21.1.0

Anomaly Detection Services Fixes

ID Number Severity Links to More Info Description Fixed Versions
1959361 2-Critical BT1959361 When running a tenant with more than 72 VCPUs / cores, adminstall crashes21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
2263657 3-Major BT2263657 Crash in Bados Signature Management operations results in a memory leak21.1.0
2258257 3-Major BT2258257 Zombie connections after switching dos profile may cause tmm crash.21.1.0
2230841 3-Major Admd Crash During Restart Under Heavy Load21.1.0
2186897 3-Major BT2186897 TMM core SIGSEVG upon replacing L7 DOS policy21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1

Traffic Classification Engine Fixes

ID Number Severity Links to More Info Description Fixed Versions
2141109 1-Blocking BT2141109 The URL categorisation daemon's DNS cache is never refreshed21.1.0

Device Management Fixes

ID Number Severity Links to More Info Description Fixed Versions
718796 2-Critical K22162765, BT718796 iControl REST token issue after upgrade21.1.0
996129 3-Major BT996129 The /var partition is full as cleanup of files on secondary is not executing21.1.0
563144 3-Major Changing the system's admin user causes many errors in the REST framework.21.1.0
2187185 3-Major BT2187185 BIG-IP v21.0 REST framework incorrectly processes Content-Range in HTTP GET requests21.1.0
2186697 3-Major BIG-IP REST Improvements21.1.0
1678597 3-Major Rate-limit external iControl REST API calls on BIG-IP21.1.0
1001429 4-Minor HTTP header Sanitization21.1.0, 21.0.0.1

iApp Technology Fixes

ID Number Severity Links to More Info Description Fixed Versions
2227725 3-Major iApp Template Improvements21.1.0
2154005 4-Minor BT2154005 Importing iApp RPM may not provide a message about already installed, upgrading, or downgrading.21.1.0
2151785 4-Minor BT2151785 Importing iApp RPM may provide an incorrect downgrading warning message21.1.0
1505813 4-Minor CVE-2018-16487 lodash: Prototype pollution in utilities21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1
1505297 4-Minor CVE-2020-8203 nodejs-lodash: prototype pollution in zipObjectDeep function21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1

Protocol Inspection Fixes

ID Number Severity Links to More Info Description Fixed Versions
760740-8 3-Major BT760740 Mysql error is displayed when saving UCS configuration on BIG-IP system when MySQL is not running21.1.0
2228789 3-Major BT2228789 IPS ID10008 triggered by large ADDITIONAL SECTION in DNS response21.1.0

SSL Orchestrator Fixes

ID Number Severity Links to More Info Description Fixed Versions
1959181 3-Major Proxy Select Agent does not persist clients to their selected upstream proxy21.1.0
1953357 3-Major Persistence Profiles do not work on SSLO inspection service virtual servers21.1.0
1628129 4-Minor BT1628129 SSL Orchestrator traffic summary log does not display url-category for HTTP request if a SWG as a service blocks the connection21.1.0, 17.5.1.4, 17.1.3

Bot Defense Fixes

ID Number Severity Links to More Info Description Fixed Versions
2163545 3-Major Bot Defense profile does not support js tag injection for compressed html pages.21.1.0
2077329 4-Minor BT2077329 IBD profile is injecting the Javascript tag in non html pages21.1.0

F5OS Messaging Agent Fixes

ID Number Severity Links to More Info Description Fixed Versions
2240945 1-Blocking platform_agent crash when deleting a virtual_server.21.1.0
1758957 2-Critical BT1758957 If two tenants share the same VLAN, TMM may egress broadcast traffic even when VLANs are disabled in F5OS21.1.0, 17.5.1.4, 17.1.3.1
2263257 3-Major VLAN Recreation Fails for MAC Masquerade Created by Floating Virtual Address21.1.0
2132153 3-Major `tmsh show sys hardware` doesn't show F5OS version21.1.0
1690005-1 3-Major BT1690005 Unable to ping the floating self addresses from the Standby tenant21.1.0
2008409-1 4-Minor BT2008409 MAC masquerade does not work on an F5OS tenant if there are no floating self-ips configured on the VLAN21.1.0, 21.0.0.1

Leak Signal Fixes

ID Number Severity Links to More Info Description Fixed Versions
2217721 5-Cosmetic Delete checkbox in dcp policy for adding endpoint is not seen for endpoint >37 char and string is out of text box21.1.0

Cumulative fix details for BIG-IP v21.1.0 that are included in this release

996129 : The /var partition is full as cleanup of files on secondary is not executing

Links to More Info: BT996129

Component: Device Management

Symptoms:
The system does not boot because the /var partition is full.

You see a large number of "storageXXXX.zip" files in /var/config/rest/

Conditions:
This may be observed on multi-blade vCMP guests and hosts, as well as on multi-blade tenants.

Impact:
The partition housing /var/config/ may become 100% full, impacting future disk IO operation and it may cause unexpected traffic disruption.

Workaround:
Important: This workaround is temporary, and may need to be periodically performed either manually or from a script.

Impact of Workaround: While these steps are performed, the BIG-IP REST API will be temporarily inaccessible, and higher disk IO may be seen.

Run the following commands, in sequence:

bigstart stop restjavad
rm -rf /var/config/rest/storage*.zip
rm -rf /var/config/rest/*.tmp
bigstart start restjavad

Manual application of these workaround steps clears the 100% utilized space condition and allows the partition to resume normal operation.

Fix:
N/A.

Fixed Versions:
21.1.0


977953 : Show running config interface CLI could not fetch the interface info and crashes the imi

Links to More Info: BT977953

Component: TMOS

Symptoms:
The confd command 'show running-config' does not display interface information if nsm and bgpd are the only processes running.

If you run 'show running-config interface', imi crashes.

Conditions:
1. nsm and bgpd are the daemons running.
2. Run the "show running-config" command

Impact:
Imish cannot retrieve interface information from the show running-config command.

Workaround:
* Enable OSPF. For example,

  # tmsh modify /net route-domain 0 routing-protocol add { BGP OSPFv3 }

  # ps -ef | egrep -i ospf
  root 11954 4654 0 11:25 ? S 0:00 ospf6d%0

Fixed Versions:
21.1.0


950665 : Pool and pool members created for dynamic ECMP routes are not freed

Links to More Info: BT950665

Component: Local Traffic Manager

Symptoms:
-- Dynamic ECMP routes.
-- High usage of TMM memory may be reported.
-- The ltm log may record the following errors:
err merged[9436]: 011b0900:3: TMSTAT error tmstat_remerge: Cannot allocate memory.

Conditions:
Dynamic routing is used and routes with more then one nexthop are repeatedly added and removed by the router(s)

Impact:
- tmm memory leak
- tmstat segments for tmm could grow very large.

Workaround:
Use a default gateway pool instead of dynamic routing for routes with more then one nexthop - https://support.f5.com/csp/article/K15582

Fixed Versions:
21.1.0


937665 : Relaystate in SLO request results in two Relaystates in SLO Response

Links to More Info: BT937665

Component: Access Policy Manager

Symptoms:
When BIG-IP APM acts as the SAML IdP and receives a redirect binding single logout (SLO) request that contains a relaystate, the BIG-IP APM generates an SLO response that contains two relaystates.

Conditions:
-- BIG-IP APM configured as IdP
-- Redirect binding SLO request contains a relaystate

Impact:
SLO processing on SP may not work.

Workaround:
None.

Fixed Versions:
21.1.0, 17.5.1.4


935633 : VCMP guests or F5OS tenants may experience constant clusterd restart after host upgrade

Links to More Info: BT935633

Component: TMOS

Symptoms:
Sometimes, when vCMP guests or F5OS tenants are started after the host has been upgraded, the guests or tenants may enter an unhealthy state due to clusterd constantly restarting.

Conditions:
-- vCMP guest or F5OS tenant has Mirroring IP configured.
-- vCMP guest or F5OS tenant is powered on after vCMP host upgrade.
-- vCMP guest or F5OS tenant is powered on and receives a new license file from the host during startup.

Impact:
-- This issue might prevent the guest or tenant from servicing traffic if the system fails to load the config and clusterd keeps restarting.
-- During startup of the guest or tenant, the following message is logged to /var/log/ltm:

 err mcpd[6519]: 0107146f:3: Self-device state mirroring address cannot reference the non-existent Self IP ([IP address]); Create it in the /Common folder first.

-- /var/log/ltm shows clusterd constantly restarting.
-- One or more slots are in INOPERATIVE state, while the host shows slots as RUN/Healthy.

Workaround:
-- To avoid the issue before it occurs:
1. Prior to shutting down vCMP guests or F5OS tenants before host upgrade, ensure guests or tenants have free space in the /var partition.
2. Ensure any license updates (e.g., reactivation) are applied before shutting down the vCMP guest or F5OS tenant.
3. Issue 'tmsh save sys config' on the vCMP guest or F5OS tenant.
4. Issue 'ls /var/db/mcp*' and confirm the presence of mcpdb.bin and mcpdb.info in the /var/db directory.
5. Proceed with vCMP guest or F5OS tenant shutdown and host upgrade as per standard F5 recommended process.


-- To mitigate after the issue has been experienced on a vCMP guest or F5OS tenant:
1. Set the vCMP guest or F5OS tenant to the Configured state and wait for it to complete transition to Configured.
2. Set vCMP guest or F5OS tenant to Deployed state.
3. Review startup logs and confirm 'Self-device state mirroring address cannot reference the non-existent Self IP' message is no longer present.
4. Review /var/log/ltm and confirm clusterd is no longer restarting.
5. If issue persists, delete and recreate the vCMP guest or F5OS tenant.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


931149 : Some RESOLV::lookup queries, including PTR lookups for RFC1918 addresses, return empty strings

Links to More Info: BT931149

Component: Global Traffic Manager (DNS)

Symptoms:
RESOLV::lookup returns an empty string.

Conditions:
The name being looked up falls into one of these categories:

-- Forward DNS lookups in these zones:
    - localhost
    - onion
    - test
    - invalid

-- Reverse DNS lookups for:
    - 127.0.0.0/8
    - ::1
    - 10.0.0.0/8
    - 172.16.0.0/12
    - 192.168.0.0/16
    - 0.0.0.0/8
    - 169.254.0.0/16
    - 192.0.2.0/24
    - 198.51.100.0/24
    - 203.0.113.0/24
    - 255.255.255.255/32
    - 100.64.0.0/10
    - fd00::/8
    - fe80::/10
    - 2001:db8::/32
    - ::/64

Impact:
RESOLV::lookup fails.

Workaround:
Use a DNS Resolver ('net dns') and RESOLVER::name_lookup / DNSMSG:: instead of RESOLV::lookup:

1. Configure a local 'net dns' resolver, replacing '192.88.99.1' with the IP address of your DNS resolver:

    tmsh create net dns-resolver resolver-for-irules answer-default-zones no forward-zones add { . { nameservers add { 192.0.2.1:53 } } }

2. Use an iRule procedure similar to this to perform PTR lookups for IPv4 addresses:

proc resolv_ptr_v4 { addr_v4 } {
    # Convert $addr_v4 into its constituent bytes
    set ret [scan $addr_v4 {%d.%d.%d.%d} a b c d]
    if { $ret != 4 } {
        return
    }

    # Perform a PTR lookup on the IP address $addr_v4, and return the first answer
    set ret [RESOLVER::name_lookup "/Common/resolver-for-irules" "$d.$c.$b.$a.in-addr.arpa" PTR]
    set ret [lindex [DNSMSG::section $ret answer] 0]
    if { $ret eq "" } {
        # log local0.warn "DNS PTR lookup for $addr_v4 failed."
        return
    }

    # Last element in '1.1.1.10.in-addr.arpa. 600 IN PTR otters.example.com'
    return [lindex $ret end]
}

-- In an iRule, instead of:
    RESOLV::lookup @192.0.2.1 $ipv4_addr
Use:
    call resolv_ptr_v4 $ipv4_addr

Fixed Versions:
21.1.0, 21.0.0.1


929709 : jQuery vulnerability CVE-2020-11023

Links to More Info: K66544153


928901 : jQuery vulnerability CVE-2020-11022

Links to More Info: K02453220


919917 : File permission errors during bot-signature installation

Links to More Info: BT919917

Component: Application Security Manager

Symptoms:
When you install Bot-Sig IM file through LU, /var/log/ltm shows file permission errors.

Cannot open lock file (/var/run/config_lock), permission denied.

Cannot open command history file (/root/.tmsh-history-root), Permission denied : framework/CmdHistoryFile.cpp, line 92.

Conditions:
Installing bot-signature.

Impact:
If the BIG-IP device is rebooted, or the mcpd process is restarted, following an automatic bot-signature installation, without the config first being saved, the bot-signature installation will be reverted.

Workaround:
Save the BIG-IP configuration manually after the automatic bot-signature update has completed.

Fixed Versions:
21.1.0


912797 : NTP Vulnerability: CVE-2020-11868

Links to More Info: K44305703, BT912797


911661 : Remote event logs may truncate at 5k when maximum entry length is configured to 64k

Links to More Info: BT911661

Component: Application Security Manager

Symptoms:
Remote event logs are truncated at 5k instead of the configured 64k maximum entry length

Conditions:
Remote logging is configured with maximum entry length set to 64k

Impact:
Remote event logs are truncated at 5k, resulting in incomplete log entries

Workaround:
As a temporary workaround, change the maximum entry length to 2k or 10k, save the configuration, then change it back to 64k. Follow the same steps if the issue occurs again.

Fixed Versions:
21.1.0


904401 : Guestagentd or devmgmtd core

Links to More Info: BT904401

Component: TMOS

Symptoms:
Guestagentd or devmgmtd crashes on a vCMP guest.

Conditions:
This can occur during normal operation in a vCMP environment.

Impact:
Guestagentd crashes on the vCMP guest, and the vCMP host does not have accurate guest information, such as version, provisioning, high availability (HA) status, and tmm status.
Or if it is Devmgmtd that crashed on vCMP guest, the device management daemon will not establishes and maintains device trust group functionality.

Workaround:
None.

Fixed Versions:
21.1.0


901989 : Corruption detected in /var/log/btmp

Links to More Info: BT901989

Component: TMOS

Symptoms:
The boot_marker is written to /var/log/btmp, but /var/log/btmp is a binary file.

A message similar to:

warning <process>[10901]: pam_lastlog(<process>:session): corruption detected in /var/log/btmp

... may be logged to /var/log/secure.

Conditions:
This issue is triggered following a reboot of the BIG-IP system. Subsequently, you may observe the log message appearing in relation to various administrative activities, such as logging in through the console or restarting the tomcat service.

Impact:
Since this file is unknowingly corrupt after each boot, any potential investigation needing this data may be compromised.

Workaround:
Option 1; After bootup you can truncate the file.
$ truncate --size 0 /var/log/btmp
This will remove any instances of failed logins from the file.

--or--

Option 2; this will stop boot_markers from logging to /var/log/btmp:
CAVEATS:
- If the system has FIPS enabled, do not use this workaround! Modifying this file will cause FIPS validation to fail the next time it runs, and the system will halt on next boot.
- This workaround will not persist on software upgrades.
- Familiarity with vi is required to perform this.

Backup:
cp /etc/sysconfig/sysinit/01bootlogmarker.sysinit /var/tmp/01bootlogmarker.sysinit.bak

Open in vi:
vi /etc/sysconfig/sysinit/01bootlogmarker.sysinit

Change the following line to include "btmp":
old: excludeFiles=( "lastlog" "wtmp" "tmm*tech.out" "*.json" )
new: excludeFiles=( "lastlog" "wtmp" "btmp" "tmm*tech.out" "*.json" )

Force save and quit with (required since file is RO):
:wq!

Truncate the "/var/log/btmp" file:
truncate --size 0 /var/log/btmp

Reboot

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


901569 : Loopback traffic might get dropped when VLAN filter is enabled for a virtual server.

Links to More Info: BT901569

Component: Local Traffic Manager

Symptoms:
Loopback traffic (local traffic) destined to a virtual server might get dropped when the incoming packet matches a terminating connection flow.

Conditions:
-- VLAN filter is enabled on the virtual server created for loopback traffic processing.
-- An incoming packet matches a terminating connection flow (i.e., the connection flow terminates because of timeout, being dropped by iRule, etc.).

Impact:
Traffic that is matched against a terminating connection flow of a virtual is not processed by the virtual server.

Workaround:
Because this filter is ignored for loopback traffic, removing the 'Enabled On VLAN' filter at the virtual server mitigates the issue.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


887681 : Tmm SIGSEGV in rrset_array_lock,services/cache/rrset.c

Links to More Info: BT887681

Component: Global Traffic Manager (DNS)

Symptoms:
TMM Cored with SIGSEGV.

Conditions:
N/A.

Impact:
Traffic disrupted while tmm restarts.

Fixed Versions:
21.1.0, 21.0.0.1


886045 : Multi-NIC instances fail to come up when trying to use memory-mapped virtio device

Links to More Info: BT886045

Component: Local Traffic Manager

Symptoms:
Multi-NIC instances fail to come up while using memory-mapped virtio device.

Running the command 'lspci -s <pci-id> -vv' results in the 'region' field reporting 'Memory at xxxxx'.

Conditions:
TMM crashes as soon as the BIG-IP system tries to come up.

Impact:
The BIG-IP system fails to attach to the underlying virtio devices.

Workaround:
Switch to the sock driver by overriding tmm_init.tcl.

For instructions on how to enable the sock driver, see the workaround in K74921042: BIG-IP VE may fail to process traffic after upgrading the VMware ESXi 6.7 host to Update 2 (or later), available at https://support.f5.com/csp/article/K74921042.

Fixed Versions:
21.1.0


881041 : BIG-IP system may forward IP broadcast packets back to the incoming VLAN interface via a forwarding virtual server.

Component: Local Traffic Manager

Symptoms:
Some received packets are retransmitted back on the incoming VLAN interface.

Conditions:
The symptom is found with the following conditions:
1. A forwarding virtual server is configured.
2. A packet is received whose destination MAC address is its unicast VLAN MAC address and the destination IP address is the broadcast address of that subnet.

Impact:
Broadcast packets are forwarded back to the incoming VLAN interface might result in loops if there are multiple gateways on the network.

Workaround:
Apply an iRule to network-forwarding virtual servers that drops packets destined to the broadcast IP address of local vlans. For example:

ltm data-group internal /Common/local_broadcast_ips {
   records {
       10.1.1.255/32 { }
       10.1.2.255/32 { }
   }
   type ip
}

ltm rule do_not_fwd_to_bcast_addrs {
priority 5
when CLIENT_ACCEPTED {
       if { [class match [IP::local_addr] equals local_broadcast_ips ] } {
           drop
       }
   }
}

Fix:
Should not see packets retransmitted on the incoming vlan interface with forwarding virtual server is configured.

Fixed Versions:
21.1.0


857973 : GUI sets FQDN Pool Member "Auto Populate" value Enabled by default

Links to More Info: BT857973

Component: TMOS

Symptoms:
In the GUI, the "autopopulate" value is Enabled by default when creating an FQDN template Pool Member, but Disabled by default when creating an FQDN template Node.

Conditions:
This is observed when using FQDN names to configure Pool Members and/or Nodes in the GUI.

Impact:
Differing default "autopopulate" values displayed in the GUI are confusing.
The "autopopulate" value for an FQDN Pool Member cannot be set to "enabled" if the "autopopulate" value of the corresponding FQDN Node is set to the default value of "disabled".
Attempting to do so via tmsh will generate an error similar to:
01070734:3: Configuration error: Cannot enable pool member to autopopulate: node (<fqdn node name>) has autopopulate set to disabled

Workaround:
Be careful to select the appropriate option for the "Auto Populate" parameter when configuring FQDN Pool Members using the GUI.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


842525 : TMSH - Modifying sys httpd ssl-verify-client attribute to 'optional-no-ca' results in error

Links to More Info: BT842525

Component: TMOS

Symptoms:
Error is seen when configuring the ssl-verify-client to optional-no-ca via tmsh

tmsh modify sys httpd ssl-verify-client optional-no-ca
01070920:3: Application error for confpp: AH00526: Syntax error on line 166 of /etc/httpd/conf.d/ssl.conf:
SSLVerifyClient: Invalid argument 'optional-no-ca'

Conditions:
Seen when configuring ssl-verify-client to optional-no-ca in httpd profile

Impact:
Unable to configure ssl-verify-client to optional-no-ca - impacts authentication

Workaround:
None

Fix:
You can now successfully execute
tmsh modify sys httpd ssl-verify-client optional-no-ca

Fixed Versions:
21.1.0


791365-9 : Bad encryption password error on UCS save

Links to More Info: BT791365

Component: TMOS

Symptoms:
When a user with the admin role attempts to save a UCS with a passphrase, the following error is encountered:

[resource-admin@inetgtm1dev:Active:Standalone] ucs # tmsh save sys ucs /var/local/ucs/test-ucs passphrase password
Saving active configuration...
Error: Bad encryption password. <=========
Operation aborted.
/var/tmp/configsync.spec: Error creating package

WARNING:There are error(s) during saving.
        Not everything was saved.
        Be very careful when using this saved file!

Error creating package
Error during config save.
Unexpected Error: UCS saving process failed.

Conditions:
1) Log into the BIG-IP system as a user with admin role that has Advanced Shell access.
2) Attempt to create a UCS with a passphrase.

Impact:
Unable to save UCS with a passphrase.

Workaround:
This affects users logged in with the Admin role; you will be able to create a UCS with a passphrase while logged in firstly as root user and then use 'resource-admin' user to save a ucs with passphrase.

Fixed Versions:
21.1.0


783077-6 : IPv6 host defined via static route unreachable after BIG-IP reboot

Links to More Info: BT783077

Component: TMOS

Symptoms:
Static route unreachable after BIG-IP system reboot.

Conditions:
-- Add a static route.
-- Issue a ping (works fine).
-- Reboot the BIG-IP system.
-- Issue a ping (cannot pint the route).

Impact:
Static route exists in both kernel and LTM routing table but unable to ping the route after rebooting the BIG-IP system.

Workaround:
Workaround-1:
Delete the IPv6 route entry and recreate the route by issuing the following commands in sequence:

tmsh delete net route IPv6
tmsh create net route IPv6 network 2a05:d01c:959:8408::b/128 gw fe80::250:56ff:fe86:2065 interface internal

Workaround-2:

net route /Common/IPv6 {
    gw fe80::456:54ff:fea1:ee02 <-- Change this address to unicast address from 2a05:d01c:959:8409::/64 network
    interface /Common/Internal
    mtu 1500
    network 2a05:d01c:959:8408::b/128
}

Fixed Versions:
21.1.0, 17.5.1.4


781761 : BIG-IP allows enabling deprecated Network Access compression, causing intermittent tunnel traffic drops with Edge Client

Component: Access Policy Manager

Symptoms:
Intermittent tunnel traffic drops when Network Access compression is enabled.

Tunnel stability is restored when Compression is disabled.

No client-side errors clearly indicating unsupported configuration.

Conditions:
-- BIG-IP APM with Network Access resource configured
-- Compression enabled on Network Access resource
-- Edge Client version 7.2.6 or later
-- VPN tunnel established
-- Intermittent traffic flow over the tunnel

Impact:
-- Intermittent VPN tunnel instability
-- Hard-to-diagnose issues, potentially leading to unknowingly enabling unsupported configurations

Workaround:
Disable compression in the BIG-IP Network Access config and connectivity profile config.

Fix:
Compression settings is now removed in Network access page in Admin webUI.

Fixed Versions:
21.1.0


761853 : Send HOST header in OCSP responder request

Links to More Info: BT761853

Component: TMOS

Symptoms:
As per the Digicert documentation, the OCSP/CRL connections require either HTTP1.1 or HTTP1.0 with host header. (Digicert).
LTM uses HTTP1.1 without the host header in OCSP responder request

Conditions:
OCSP and CRL Authentication uses HTTP1.0 for OCSP responder requests

Impact:
OCSP in the current BIG-IP relies on OpenSSL for its operations and current version of OpenSSL that is available in BIG-IP is 1.0.2za
OpenSSL 1.0.2 is only capable of generating HTTP/1.0 requests for OCSP and CRL fetches; it does not support HTTP/1.1.
This limitation prevents clients from communicating with OCSP/CRL endpoints that require HTTP/1.1, resulting in failures for revocation checks in environments where modern protocols are mandated.

Workaround:
Add either of these iRules to the Virtual Server

Modify HTTP 1.0 to HTTP1.1

when HTTP_REQUEST {
    HTTP::version "1.1"
}

Add Host header
 
when HTTP_REQUEST {
    HTTP::host "[HTTP::host]”
}

Fix:
Support for HTTP1.1 is added. The OCSP requests for auth should now use HTTP1.1 version

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


760740-8 : Mysql error is displayed when saving UCS configuration on BIG-IP system when MySQL is not running

Links to More Info: BT760740

Component: Protocol Inspection

Symptoms:
When saving the configuration to a UCS file, the process tries save the IPS learning information stored in the MySQL database.

MySQL runs only when particular modules are provisioned. If MySQL was previously running as a result of different provisioning, but is not currently running, saving the configuration to a UCS file succeeds, but the system reports a spurious message during the operation:

Can't connect to local MySQL server through socket '/var/lib/mysql/mysql.sock.

Conditions:
-- Saving the configuration to a UCS file.
-- BIG-IP system provisioning only includes modules that do not require MySQL. These modules may include:
   + LTM
   + FPS
   + GTM (DNS)
   + LC
   + SWG
   + iLX
   + SSLo

-- BIG-IP system was previously provisioned with a module that starts MySQL, which results in the creation of the file /var/db/mysqlpw. These modules may include:
   + APM
   + ASM
   + AVR
   + PEM
   + AFM
   + vCMP

Impact:
The error message is cosmetic and has no impact on the UCS save process.

Workaround:
None.

Fixed Versions:
21.1.0


760451-2 : Enabling user to configure nonce disabled/enabled from Mgmt GUI login as well as CLI

Component: TMOS

Symptoms:
When Remote client cert-ldap authentication is enabled in BIG-IP and ocsp-responder is configured. By default nonce was always added in ocsp request

Conditions:
-- Remote client cert-ldap authentication is enabled in BIG-IP and ocsp-responder is configured.

Impact:
A new configurable parameter "ssl-ocsp-use-request-nonce" is introduced in httpd, to configure whether to send the nonce in ocsp request. Default value is On

Workaround:
None

Fix:
1.Configure BIG-IP for Remote-cert-ldap authentication
2.Set httpd ssl-ocsp-use-request-nonce on in httpd profile
3.Capture the ocsp packet
4.When httpd ssl-ocsp-use-request-nonce is on, ocsp request should contain OCSP nonce in the extensions

Fixed Versions:
21.1.0


760355-1 : Firewall rule to block ICMP/DHCP from 'required' to 'default'

Links to More Info: BT760355

Component: Advanced Firewall Manager

Symptoms:
If a firewall is configured on the management port with an ICMP rule, after upgrading to v14.1.x or later, the ICMP rule does not work.

Conditions:
- Firewall is configured on the management port.
- Firewall is configured with an ICMP rule to block.
- Firewall is configured with an ICMP rule to allow.

Impact:
ICMP packets cannot be blocked with a firewall rule to drop on the management port. ICMP packets are allowed from the management port and will not increase the counter even if explicitly allowed by a rule.

Workaround:
Run the following commands after upgrading to v14.1.x or later from earlier versions.

# /sbin/iptables -N id760355
# /sbin/iptables -I INPUT 1 -j id760355
# /sbin/iptables -A id760355 -i mgmt -p icmp --icmp-type 8 -s 172.28.4.32 -j DROP

Fix:
ICMP firewall rule has been moved from the f5-required to f5-default.

Fixed Versions:
21.1.0, 17.1.2, 16.1.4, 15.1.9, 15.0.1.1, 14.1.2.1


745334-10 : CVE-2016-7099 NodeJS Vulnerability

Links to More Info: K24444803


718796 : iControl REST token issue after upgrade

Links to More Info: K22162765, BT718796

Component: Device Management

Symptoms:
When upgrading to version 13.1.0.x or later, users who previously had permissions to make calls to iControl REST lose the ability to make those calls.

Conditions:
You will notice this issue when you use iControl REST and are upgrading to version 13.1.0.x or later.

You can also detect if the user is impacted by this issue with the following steps

    1. Run below API to for impacted user account XYZ.

         # curl -ik -u username:XYZ -XPOST https://localhost/mgmt/shared/authn/login --data-binary '{"username":"XYZ", "password":"XYZpass", "loginProviderName":"tmos"}' -H "Content-Type: application/json"

    2. Find user XYZ's 'link' path under 'token' in previous output

       There are two formats possible for 'link'
       a. Path will have a UUID
          For example "token"->"link"->"https://localhost/mgmt/cm/system/authn/providers/tmos/1f44a60e-11a7-3c51-a49f-82983026b41b/users/<UUID>"

       b. Path will have a username (not UUID)
          For example "token"->"link"->"https://localhost/mgmt/shared/authz/users/<username>"

    3. Run below API to get list of user roles.

         # restcurl -u "admin:<admin-user-pass>" /shared/authz/roles | tee /var/tmp/rest_shared_authz_roles.json

    4. Check user XYZ's link path from step 2 in above output.

       Check under the "userReferences" section for group "iControl_REST_API_User" . You will see the link path in one of the two formats listed in 2a/2b. If you do not see the user link path then you are impacted by this bug

Impact:
A previously privileged user can no longer query iControl REST. In addition, some remotely authenticated users may lose access to the Network Map and Analytics view after the upgrade.

Workaround:
You can repair the current users permissions with the following process:

   1) Delete the state maintained by IControlRoleMigrationWorker and let it rerun by restarting restjavad process:
      # restcurl -X DELETE "shared/storage?key=shared/authz/icontrol-role-migrator"
     
   2) Restart services
      # bigstart restart restjavad *or* tmsh restart /sys service restjavad

   3) Now, the permissions should start in a healthy state. Re-try making an iControl REST call with an affected user.

   4) If this still does not resolve the issue you could update shared/authz/roles/iControl_REST_API_User userReference list to add all affected users' accounts using PUT. Here you may need to use the UUID path as described under 'Conditions'

      # restcurl shared/authz/roles/iControl_REST_API_User > role.json
      # vim role.json
          a. add { "link": "https://localhost/mgmt/shared/authz/users/[your-user-name]" } object to userReferences list
          OR
          b. add { "link": "https://localhost/mgmt/cm/system/authn/providers/tmos/1f44a60e-11a7-3c51-a49f-82983026b41b/users/<UUID>" } object to userReferences list
      # curl -u admin:admin -X PUT -d@role.json http://localhost/mgmt/shared/authz/roles/iControl_REST_API_User

Fix:
When upgrading to version 13.1.0.x or later, users who previously had permissions to make calls to iControl REST retain the ability to make those calls.

Fixed Versions:
21.1.0


714238 : CVE-2018-1301: Apache Vulnerability

Links to More Info: K78131906, BT714238


659579-9 : Timestamps in icrd, restjavad, and restnoded logs are not synchronized with the system time

Links to More Info: BT659579

Component: TMOS

Symptoms:
Logs on icrd, restnoded, and restjavad are in the UTC time zone and are not aligned to the system time, which makes it difficult to determine the time during troubleshooting operations.

Conditions:
Checking the icrd, restnoded, and restjavad logs timestamps.

Impact:
Difficult to troubleshoot as the logs are not aligned with system time.

Workaround:
None

Fixed Versions:
21.1.0, 17.5.1.4


658943 : Errors when platform migration process is loading UCS using trunks on vCMP guest/F5OS Tenants

Links to More Info: BT658943

Component: TMOS

Symptoms:
During the platform migration from a physical BIG-IP system to a BIG-IP vCMP guest/F5OS Tenant, the load fails with one of the following messages:

01070687:3: Link Aggregation Control Protocol (LACP) is not supported on this platform. Unexpected Error: Loading configuration process failed.

01070338:3: Cannot create trunk [name of trunk], maximum limit reached Unexpected Error: Loading configuration process failed.

Conditions:
-- The source device is a physical BIG-IP device with one or more trunks with or without LACP in its configuration.
-- The destination device is a vCMP guest/F5OS Tenant.

Impact:
The platform migration fails and the configuration does not load.

Workaround:
You can use one of the following workarounds:

-- Remove all trunks from the source configuration prior to generation of the UCS.

-- Before loading the UCS archive onto the target BIG-IP, edit the archive and remove the trunk configuration from ./config/bigip_base.conf, and then repack the UCS.

-- After the UCS load fails, edit the configuration manually on the destination to remove trunk references, and then reload the configuration.

-- K50152613

Fixed Versions:
21.1.0, 21.0.0.1, 14.1.4.1


658850 : Loading UCS with the platform-migrate parameter could unexpectedly set or unset management DHCP

Links to More Info: BT658850

Component: TMOS

Symptoms:
When you load a UCS file using the platform-migrate parameter, the mgmt-dhcp value (enabled, disabled, or unset) will overwrite the value on the destination. Depending on the effect, this could change the destination's management IP and default management route.

If the UCS does not have mgmt-dhcp explicitly written out, note that its value is treated as the default for the local system, which varies by the type of system. On Virtual Edition (VE) platforms, the default is to enable DHCP. On all other platforms, the default is to disable DHCP.

Conditions:
This occurs when loading a UCS using the platform-migrate parameter:
tmsh load sys ucs <ucs_file_from_another_system> platform-migrate

Impact:
Changing the mgmt-dhcp value on the destination can result in management changing from statically configured to DHCP or DHCP to statically configured. This can result in loss of management access to the device, requiring in-band or console access.

Workaround:
There are a few ways to avoid this issue:

1. Specify the "keep-current-management-ip" parameter to the "load sys ucs" command, for instance:

tmsh load sys ucs <ucs_file_from_another_system> platform-migrate keep-current-management-ip

Note: The "keep-current-management-ip" parameter is undocumented and will not appear in context help or tab completion.

2. If you want to reset the target device to use a static IP, run the following commands after loading the UCS with the platform-migrate command:

tmsh modify sys global-settings mgmt-dhcp disabled
tmsh create sys management-ip <ip>/<mask>
tmsh delete sys management-route default
tmsh create sys management-route default gateway <ip>

Fixed Versions:
21.1.0


584607 : Harden authentication infrastructure

Component: TMOS

Symptoms:
The authentication infrastructure for administrative interfaces does not implement all current recommended security practices.

Impact:
The authentication infrastructure for administrative interfaces does not implement all current recommended security practices.

Fix:
Implement all current recommended security practices in the administrative interfaces authentication infrastructure.

Fixed Versions:
21.1.0


578989-16 : Maximum request body size is limited to 25 MB

Component: Access Policy Manager

Symptoms:
When a POST request with body size exceeds 25 MB is sent to APM virtual server, the request fails.

Conditions:
POST request body size exceeded 25 MB.

Impact:
The POST request fails. The maximum request body size is limited to 25 MB

Workaround:
There is no workaround at this time.

Behavior Change:
Request body size is increased.

Fixed Versions:
21.1.0, 17.5.1.4


566995-8 : bgpd might crash in rare circumstances.

Links to More Info: BT566995

Component: TMOS

Symptoms:
Under unspecified conditions and in rare cases, bgpd might crash. Although bgpd restarts right away, routing table might be impacted.

Conditions:
The conditions under which this occurs are not known.

Impact:
This might impact routing table and reachability.

Workaround:
None known.

Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1


563144 : Changing the system's admin user causes many errors in the REST framework.

Component: Device Management

Symptoms:
The iControl REST log at /var/log/icrd will have entries similar to the following:

 notice icrd_child[32206]: 01420003:5: Cannot load user credentials for user "admin" Current session has been terminated.

Conditions:
Change the default admin user, for example, by following the steps in the Article K15632: Disabling the admin and root accounts using the BIG-IP Configuration utility or the Traffic Management Shell: https://support.f5.com/csp/article/K15632.

Impact:
Many REST APIs do not function, and functionality that depends on REST fails.

Workaround:
There is no workaround. You must use the default admin in order for iControl REST calls to work.

Fix:
You can now use iControl REST with alternate local admin usernames.

Note: Depending on the software version you use, you might experience bug 754547, which requires a requires a manual restart of restjavad following a change to systemauth.primaryadminuser:
tmsh restart sys service restjavad

Fixed Versions:
21.1.0


551462-8 : CVE-2014-9730 - Linux Kernel UDF Filesystem Denial of Service Vulnerability

Links to More Info: K17447


528314 : Generating new default certificate and key pairs for BIG-IP ssl profiles via CLI will not be reflected in GUI or in tmsh

Links to More Info: K16816, BT528314

Component: TMOS

Symptoms:
Using the CLI to generate new default certificate and key pairs for BIG-IP ssl profiles are not reflected in the GUI or tmsh.

Conditions:
Using OpenSSL commands to generate a new default certificate and key pair, as described in SOL13579: Generating new default certificate and key pairs for BIG-IP ssl profiles, available here: https://support.f5.com/kb/en-us/solutions/public/13000/500/sol13579.html.

Impact:
After the renewal, tmsh list sys file ssl-cert default.crt command or the general properties in the GUI SSL Cert List shows the old one. This is a cosmetic issue only. The system uses the new default.

Workaround:
Perform a force reload of mcpd by running the following commands: -- touch /service/mcpd/forceload. -- tmsh restart sys service mcpd.

Fix:
After renewing certificates with OpenSSL, you can now use the simpler command "tmsh install sys crypto cert default.crt from-local-file /config/ssl/ssl.crt/default.crt" and the new certificate is immediately reflected in tmsh list and the GUI. Alternatively, "tmsh load sys config" also now properly recognizes the renewed certificate. No manual mcpd restart is required with either method.

Fixed Versions:
21.1.0, 17.5.1.4


518333 : New LSN Stat,Total End Points (IPv4/IPv6), deprecates the stat Total End Points

Links to More Info: BT518333

Component: Carrier-Grade NAT

Symptoms:
The stat Total End Points displays an incorrect value when an IPv6 address with a small prefix is configured in LSN Pool.

Conditions:
Any IPv6 address with a small prefix is configured as pool member for an LSN pool.

Impact:
The statistic shows incorrect values when an IPv6 address with small prefix is configured in LSN pools.

Workaround:
None.

Fix:
This release introduces a new stat, Total Endpoints (IPv4/IPv6), which displays the correct statistic values. Refer to the new statistic, Total End Points (IPv4/IPv6) for correct information when IPv6 addresses are added in LSN Pool.

Fixed Versions:
21.1.0


2291353-2 : PCCD enters a loop while compiling NAT rules

Links to More Info: BT2291353

Component: Advanced Firewall Manager

Symptoms:
When this issue arises, the PCCD CPU usage increases to 100% and stays at that level until the PCCD daemon is restarted.

Conditions:
The issue arises when NAT configurations are deleted and reapplied in a specific order. However, not all delete and reapply operations cause the problem.

Impact:
Once PCCD enters this state, it is unable to process or compile any new configurations until the daemon is restarted.

Workaround:
Restart the PCCD daemon to recover from the issue.

Fix:
Implemented logic to ignore stale data from previous operations during NAT rule compilation, allowing the current compilation process to continue without entering a loop.

Fixed Versions:
21.1.0


2284709 : TMM might restart with certain network traffic

Links to More Info: BT2284709

Component: Local Traffic Manager

Symptoms:
TMM is not handling specific HTTP/3 traffic as expected.

Conditions:
A Virtual Server with an HTTP/3 profile.

Impact:
Traffic is disrupted while TMM restarts.

Workaround:
None.

Fix:
TMM is handling specific HTTP/3 traffic as expected.

Fixed Versions:
21.1.0


2266005 : HTTP/3 blocks an unknown HTTP method

Links to More Info: BT2266005

Component: Local Traffic Manager

Symptoms:
An HTTP/3 virtual server does not transfer a client's request to the backend pool member if the HTTP profile's "Unknown Method" is set to Allow and the HTTP method is unknown.

Conditions:
-- A HTTP/3 profile (and also an HTTP profile) is attached to the virtual server.
-- HTTP profile with "Unknown Method : Allow".
-- Client request is HTTP/3. The HTTP/3 request method is an unknown HTTP method.

Impact:
HTTP/3 virtual server traffic is disrupted.

Workaround:
None.

Fix:
HTTP/3 allows unknown HTTP methods when the HTTP configuration is set to Allow unknown methods.

Fixed Versions:
21.1.0


2264133 : TMSH improvements

Component: TMOS

Symptoms:
TMSH is not following best practices

Conditions:
NA

Impact:
Unexpected behavior

Fix:
Implemented best practices in TMSH

Fixed Versions:
21.1.0


2263721 : TMM crashes on Azure VE when virtual function is removed during runtime

Links to More Info: BT2263721

Component: TMOS

Symptoms:
TMM crashes unexpectedly on BIG-IP VE running on Microsoft Azure when an accelerated networking virtual function (VF) is removed at runtime.

Conditions:
- BIG-IP VE deployed on Microsoft Azure with Accelerated Networking enabled.
- Azure platform performs host maintenance, live migration, or other operation that removes and restores accelerated networking virtual functions.

Impact:
Traffic disruption. TMM crashes and must be restarted. If running in an HA pair, failover occurs.

Workaround:
There is no workaround. Deploy BIG-IP VE in an HA (Active/Standby) configuration to minimize traffic disruption during a crash.

Fix:
TMM no longer crashes when accelerated networking virtual functions are removed and restored on Azure VE during platform maintenance events.

Fixed Versions:
21.1.0


2263657 : Crash in Bados Signature Management operations results in a memory leak

Links to More Info: BT2263657

Component: Anomaly Detection Services

Symptoms:
The ADMD does not manage response control messages related to the creation or modification of signatures.

Conditions:
When using heavy configuration file with bados signatures, where signatures are saved or modified.

Impact:
Either MCPD or ADMD may encounter a crash.

Workaround:
NA

Fix:
Bados handles potential memory leak.

Fixed Versions:
21.1.0


2263257 : VLAN Recreation Fails for MAC Masquerade Created by Floating Virtual Address

Component: F5OS Messaging Agent

Symptoms:
VLAN recreation does not work for a MAC masquerade created by a floating virtual address.

Conditions:
The fix for ID2008409 is in effect.
A VLAN is recreated.

Impact:
It is not possible to recreate a VLAN.

Workaround:
bigstart restart platform_agent

Fix:
Fixed the VLAN recreation for a MAC masquerade created by a floating virtual address.

Fixed Versions:
21.1.0


2262981 : TMM may corrupt stack during class lookup

Links to More Info: BT2262981

Component: Local Traffic Manager

Symptoms:
TMM core
Log may contain
can'tt read "domain": no such variable while executing "class match -value percentage contains ${path}/${domain}-cluster

Conditions:
The iRule uses a class match (class match -value percentage contains ${path}/${domain}-cluster) and fails if the path/domain doesn’t exist or the class name exceeds 265 characters.

Impact:
Tmm does not operate during reboot

Workaround:
Update the iRule to avoid using a class or path longer than 265 characters, or ensure the class exists.

Fix:
N/A

Fixed Versions:
21.1.0


2262537 : pem_sessiondump crashes when listing subscriber sessions with custom attributes

Links to More Info: BT2262537

Component: Policy Enforcement Manager

Symptoms:
On BIG-IP, running pem_sessiondump --list when PEM subscriber sessions have custom attributes may crash with a segmentation fault and generate a core in /var/core.

Conditions:
This happens when PEM is provisioned with RADIUS subscriber sessions that have custom attributes and a transient memcached connection interruption occurs while pem_sessiondump is iterating sessions.

Impact:
The pem_sessiondump diagnostic utility crashes. No impact to data-plane traffic or TMM. Administrators are unable to use pem_sessiondump to list subscriber sessions until the utility is re-run.

Workaround:
Re-run pem_sessiondump --list. The crash occurs only when a transient memcached connection interruption coincides with the session iteration. Retrying typically succeeds.

Fixed Versions:
21.1.0


2262353 : Pccd may crash when deleting a Zone with VLAN association

Component: Advanced Firewall Manager

Symptoms:
The pccd process may crash when AFM Zone/ACL configuration is removed.

Conditions:
- Security Zone is configured with one or more Vlans.
- Occurs when a Zone that references one or more VLANs is deleted and MCPD batches zone_vlan remove and zone remove messages in the same transaction.

Impact:
Pccd daemon crash

Workaround:
By avoiding deleting Zone+VLAN bindings in the same change set. Deleting separately will not cause crash

Fix:
When MCP processing removes the zone-VLAN association, the zone cleanup path no longer attempts to remove it a second time (prevents an assertion in pc_cfg_set_remove, resolving crash issue).

Fixed Versions:
21.1.0


2262265 : Backup UCS enhancements

Component: TMOS

Symptoms:
Backup UCS is not working as expected

Impact:
Can lead to unexpected behaviour

Workaround:
NA

Fix:
Backup UCS is now working as expected.

Fixed Versions:
21.1.0


2262249 : iControl REST hardening

Component: TMOS

Symptoms:
iControl REST not following best practices

Impact:
Can lead to unexpected behaviour

Fix:
iControl REST now following best practices

Fixed Versions:
21.1.0


2260293 : LiveUpdate status stuck on Pending after successful installation

Component: Application Security Manager

Symptoms:
The update installs successfully as scheduled, but its status remains "Pending."

Conditions:
Race condition occurs during automatic installation

Impact:
The incorrect status is fixed at the next scheduled time.

Fixed Versions:
21.1.0


2259173-1 : Sanitize key in memcache library

Component: Local Traffic Manager

Symptoms:
Users may be able to store invalid keys in Memcached using client request

Conditions:
Invalid key value pair is passed in client request

Impact:
Fetching values for that key may fail and my provide unexpected values

Workaround:
-NA-

Fix:
Memcached should not allow invalid keys to be set

Fixed Versions:
21.1.0


2259165-1 : Input Validation on APM Logon Page

Component: Access Policy Manager

Symptoms:
The logon page in the per-session policy currently lacks user input validation for invalid characters.

Conditions:
The logon page is configured within the APM per session policy

Impact:
The logon page does not validate user input and directly stores the provided value as a session variable.

Workaround:
None

Fix:
The logon page has been updated to include the following input validations:

-- Fields of type TEXT now restrict the use of specific characters: single-quote (ASCII value 0x27), double-quote (ASCII value 0x22), pipe (ASCII value 0x7C), greater-than (ASCII value 0x3E), and less-than (ASCII value 0x3C).

-- For TEXT fields with the parameter name "username," the input is limited to a maximum length of 256 characters.

Fixed Versions:
21.1.0


2259157-1 : Parsing failure may interpret data as a Memcached command

Component: TMOS

Symptoms:
Some data-body commands (add, set, replace, incr, decr) failed to close connections properly on error, causing request data to be misinterpreted as commands.

Conditions:
There is a parsing failure in commands that require data in the request body.

Impact:
Connection remains open even in the event of command failures, which can result in data being accepted as a command.

Workaround:
N/A

Fixed Versions:
21.1.0


2259109 : External users can run the track command

Component: Local Traffic Manager

Symptoms:
The memcached proxy track command has been removed from the codebase to maintain optimal performance.

Conditions:
When users use the track command to monitor session events.

Impact:
End user can run the track command.

Workaround:
N/A

Fixed Versions:
21.1.0


2259065 : Access framework hardening

Component: Access Policy Manager

Symptoms:
Access framework not working as expected

Conditions:
NA

Impact:
It may lead to unexpected behavior

Fix:
Access framework now working as expected

Fixed Versions:
21.1.0


2259061 : Access framework hardening

Component: Access Policy Manager

Symptoms:
Access framework not working as expected

Conditions:
NA

Impact:
It may lead to unexpected behavior

Fix:
Access framework now working as expected

Fixed Versions:
21.1.0


2258981-1 : Remove Unnecessary internal User account from Non-Supported BIG-IP Platforms

Component: TMOS

Symptoms:
Occurs when an unnecessary internal user account is present on BIG-IP platforms that do not support LCD hardware.

Conditions:
NA

Impact:
No Functional Impact

Workaround:
NA

Fix:
This fix ensures the removal of unnecessary internal user account from BIG-IP platforms that do not support LCD hardware

Fixed Versions:
21.1.0


2258929 : Deleting/Adding virtual server on the LTM device object can change other disabled virtual server status on the LTM device object.

Component: Global Traffic Manager (DNS)

Symptoms:
After adding/deleting unrelated virtual server on the LTM device object, disabled virtual server on the same LTM device object change its status from "available/disabled" (black circle icon on GUI) to "offline/disabled" (black rhombus icon on GUI). "no reply from big3d: timed out" error is thrown, despite there is no problem in iquery communication between DNS system and LTM system.

bigipdns.local alert gtmd[21078]: 011ae0f2:1: Monitor instance /Common/bigip 10.1.1.192:80 UP --> DOWN from /Common/bigipdns (no reply from big3d: timed out)
bigipdns.local alert gtmd[21078]: 011a6006:1: SNMP_TRAP: virtual server vs2 (ip:port=10.1.1.192:80) (Server /Common/bigipltm) state change green --> red ( Monitor /Common/bigip : no reply from big3d: timed out: disabled directly)

Conditions:
All of the following conditions need to be met.

-- DNS system manages remote LTM device and its virtual servers.
-- DNS system retrieves LTM virtual server monitor status from big3d running on remote LTM device via iquery.
-- There are disabled virtual servers on LTM device object.
-- "Monitor Disabled Object" parameter under "DNS >> Settings : GSLB : General" is unchecked (default).
-- Changes to virtual server (i.e., adding / deleting) on LTM device object is performed on DNS system.

Additionally, the issue can be triggered by either of the following sequences:

Disabling and then re-enabling a GTM Link, after which some or all associated virtual servers remain down until big3d is restarted.
Re-establishing iQuery and then re-enabling the "link"; in some environments, all VSes may remain disabled after this sequence.

Impact:
Disabled virtual server status change from "available/disabled" (black circle icon on GUI) to "offline/disabled" (black rhombus icon on GUI).

Once this problem occurs on disabled virtual servers, even after re-enabling those affected virtual servers on LTM device, the affected virtual servers stayed at "offline/enabled" (red rhombus icon on GUI) status.

Workaround:
To rescue already affected virtual servers, on the DNS system, temporarily assign any monitor object to the affected virtual servers and revert it back to none.

# tmsh modify gtm server bigipltm virtual-servers modify { vs1 { monitor gateway_icmp } vs2 { monitor gateway_icmp } }
# tmsh modify gtm server bigipltm virtual-servers modify { vs1 { monitor none } vs2 { monitor none } }
# tmsh save /sys config gtm-only

Or alternatively, restarting gtmd on DNS system can also rescue affected virtual servers.

# tmsh restart sys service gtmd

To prevent issues from recurring in the future, you can change "gtm global-settings general monitor-disabled-objects" parameter to "yes".

# tmsh modify /gtm global-settings general monitor-disabled-objects yes
# tmsh save /sys config gtm-only

Fix:
The issue is fixed.

Fixed Versions:
21.1.0


2258853 : [APM][SAML] SP automation fails to update, when bound to an IdP with a SAML Resource

Links to More Info: BT2258853

Component: Access Policy Manager

Symptoms:
SAML SP connector automation fails whenever the metadata changes, i.e., a change in certificate.
In IDP initiated SAML, SAML service is configured in SAML resource which prevents the certificate update in the filestore.

Conditions:
SAML connector automation to create SP connectors.

Impact:
Unable to create SP connectors through connector automation.

Fixed Versions:
21.1.0


2258705 : A policy with overlapping range in different rules may never match

Links to More Info: BT2258705

Component: Local Traffic Manager

Symptoms:
An LTM policy with multiple rules may fail to match correctly if a rule matches an IP address range from the first rule but not the associated URL. Even if the same IP address fits the criteria for the second rule, it will not match the second rule.

Conditions:
An LTM policy rule with a 'tcp match address' statement that matches against an address range in the first rule will prevent any further rule to be check for if the IP address match

For example, if rule 1 contains
values { 10.16.0.0/12 } and URL foo.com
while rule 2 contains
values { 10.31.236.18 10.255.255.1 } with URL example.com
Then if the source IP address is 10.31.236.18 with example.com, it will be rejected ecause 10.31.236.18 would match the range 10.16.0.0/12 in rule 1 but not foo.com

Impact:
The policy rule fails to match even when it meets the specified criteria.

Workaround:
Avoid overlapping IP range in different rules

Fix:
This issue is fixed.

Fixed Versions:
21.1.0


2258257 : Zombie connections after switching dos profile may cause tmm crash.

Links to More Info: BT2258257

Component: Anomaly Detection Services

Symptoms:
Tmm can crash in rare cases

Conditions:
When switching a dos profile (with bados enabled), while connections are still active for aa long time after the switch, tmm crash might occur.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None

Fixed Versions:
21.1.0


2257857 : Config Reload Fails When Rolling Back F5OS Platform Software from 2.0.0+ to Versions Below 2.0.0

Component: Advanced Firewall Manager

Symptoms:
Reloading config from a higher version of F5OS 2.0.0 fails when software is rolled back to a lower version, like 1.8.3.

Reports an error indicating qinq is not supported, like below

01071bd8:3: The tag-mode for requested member 1.1 has to be 'none' on platforms that do not support QinQ.
Unexpected Error: Loading configuration process failed.

Conditions:
Tenant version is 21.1.0 or above, and
F5OS platform software running F5OS 2.0.0 or above is rolled back to a version below 2.0.0.

This is seen with only r2k and r4k platforms.

Impact:
Config reload fails and need to fix the config manually to set

net vlan <vlan-name>{
    dag-adjustment none
    fwd-mode l3
    if-index 224
    interfaces {
        x.y{
            tag-mode service
            tagged
        }
    }
    tag <value>
}

tag-mode from "service" to "none".

Workaround:
Change the VLAN configuration to set "tag-mode service" to " tag-mode none".

Use the BIG-IP software that fixes this problem.

Fix:
When QinQ is not supported, force the tag-mode to none.

Fixed Versions:
21.1.0


2257689 : Improvement in system account

Component: TMOS

Symptoms:
System account was not working as expected.

Conditions:
Use the system account.

Impact:
Can lead to unexpected behaviour.

Fix:
The system account is now working as expected.

Fixed Versions:
21.1.0


2257673 : RSA SecurID improvements

Component: Access Policy Manager

Symptoms:
The RSA SecurID agent is not working as expected

Conditions:
An access policy uses the RSA SecurID agent.

Impact:
Can lead to unexpected behaviour

Fix:
The RSA SecurID agent now working as expected

Fixed Versions:
21.1.0


2257669-3 : APM my.policy improvement

Component: Access Policy Manager

Symptoms:
my.policy is not working as expected

Conditions:
NA

Impact:
Can lead to unexpected behaviour

Fix:
my.policy is now working as expected

Fixed Versions:
21.1.0


2257421 : TMSH enhancements

Component: TMOS

Symptoms:
TMSH not working as expected

Conditions:
NA

Impact:
Unexpected behavior.

Workaround:
N/A

Fix:
TMSH is now working as expected

Fixed Versions:
21.1.0


2256725 : Unable to trigger "Disallowed file upload content detected" violation in some cases

Component: Application Security Manager

Symptoms:
The "Disallowed file upload content detected" violation is not triggered in some cases.

Conditions:
Under a specific traffic scenario, the violation is not triggered.

Impact:
Traffic with violation passes through.

Workaround:
N/A

Fix:
The violation is now detected correctly.

Fixed Versions:
21.1.0


2252481 : Undisclosed network traffic can cause a TMM crash

Component: Service Provider

Symptoms:
Undisclosed network traffic can cause a TMM crash.

Conditions:
NA

Impact:
TMM crashing and restarting.

Fix:
TMM now working as expected

Fixed Versions:
21.1.0


2252233 : MCPD Crashes When Worker Connection Destructor Accesses Main-Thread Data Structures

Component: TMOS

Symptoms:
mcpd_worker core generated with the following backtrace
[ 00 ] libc-2.17.so raise ( raise.c:56 )
[ 01 ] libc-2.17.so abort ( abort.c:90 )
[ 02 ] libc-2.17.so __assert_fail_base ( assert.c:92 )
[ 03 ] libc-2.17.so __assert_fail ( assert.c:101 )
[ 04 ] libmcpdcommon.so MCPConnection::sendMessage() ( MCPConnection.cpp:1267 )
[ 05 ] libmcpdcommon.so MCPConnection::send(_mcpmsg_t*) ( MCPConnection.cpp:1540 )
[ 06 ] libmcpdcommon.so request_group::reply(bool, _mcpmsg_t*, bool) ( request_group.cpp:2496 )
[ 07 ] libmcpdcommon.so request_group::delete_connection(MCPConnection*, bool&) ( request_group.cpp:2637 )
[ 08 ] libmcpdcommon.so MCPProcessor::delete_connection(MCPConnection*) ( MCPProcessor.cpp:2808 )
[ 09 ] libmcpdcommon.so MCPConnection::~MCPConnection() ( MCPConnection.cpp:543 )
[ 10 ] libmcpdcommon.so MCPConnection::~MCPConnection() ( MCPConnection.cpp:555 )
[ 11 ] libmcpdcommon.so operator() ( functional:2471 )
[ 12 ] libmcpdcommon.so EpollManager::run() ( epoll.cpp:274 )
[ 13 ] libmcpdcommon.so MCP_worker_service::worker_run() ( MCPWorkerService.cpp:242 )
[ 14 ] libmcpdcommon.so MCP_worker_service::thread_entry(void*) ( MCPWorkerService.cpp:80 )
[ 15 ] libpthread-2.17.so start_thread ( pthread_create.c:308 )

Conditions:
When a workers connection socket errors or closes

Impact:
Mcpd will be restarted, along with other control plane daemons that depend on it.

Workaround:
None

Fix:
MCPd will not be restarted if the MCPd worker thread connection socket error or is closed.

Fixed Versions:
21.1.0


2251813 : BIG-IP AFM: mcpd may crash when modifying address lists with cyclic nested references

Links to More Info: BT2251813

Component: Advanced Firewall Manager

Symptoms:
Modifying an address list (such as adding or deleting an entry) can cause mcpd to crash with a segmentation fault (SIGSEGV).

Conditions:
Address lists are configured with nested references.

Impact:
Mcpd process crashes. Traffic disrupted while mcpd restarts.

Workaround:
Review and correct address list configurations to ensure no cycles exist

Fixed Versions:
21.1.0


2251649 : `sig_cve` and `staged_sig_cves` Fields Appear as N/A in Data Sent to Remote Syslog

Component: Application Security Manager

Symptoms:
While transmitting data to the remote syslog in BIG-IP, the sig_cve and staged_sig_cves fields may be displayed as "N/A"

Conditions:
The issue was introduced by the changes made in fix 911661. Therefore, it may surface only if a hotfix or version is installed that includes 911661 without the resolution for this problem

Impact:
The remote event log might incorrectly display "N/A" for the sig_cve and staged_sig_cves fields.

Workaround:
None

Fix:
sig_cve and staged_sig_cves fields are properly included in the remote logs.

Fixed Versions:
21.1.0


2251517 : Stream profile is not supported on HTTP/2 Full proxy (HTTP MRF Router enabled)

Links to More Info: BT2251517

Component: Local Traffic Manager

Symptoms:
Trying to add a stream profile to a virtual server gets rejected

tmsh modify ltm virtual vs_http2_stream profiles add { stream_simonSIMON }
01070734:3: Configuration error: Profile(s) found on /Common/vs_http2_stream that are not allowed: Only (TCP Profile, UDP Profile, QUIC Profile, ClientSSL Profile, ServerSSL Profile, HTTP Profile, HTTP2 Profile, HTTP3 Profile, HTTP Compression Profile, Application Visibility and Reporting Profile, DNS Profile, DOH Proxy Profile, profile statistics, Protection Profile, Bot Defense Profile, Bot Defense ASM Profile, Web Security Profile, HTTP Router Profile, Web Accelerator Profile, Request Logging Profile, TDR Profile, ATI Profile, BD Profile, CSD Profile, AP and AI Profile)

Conditions:
The virtual server contains a profile with http/http2 and httprouter
        /Common/http { }
        /Common/http2 { }
        /Common/httprouter { }

Same issue if an http2/httprouter profile is attempted to be added to virtual server with a stream profile in it

Impact:
Not able to add a stream profile

Workaround:
None

Fix:
Now able to add stream profile to a virtual server with http2 and httprouter

Fixed Versions:
21.1.0


2246933 : Memory leak in QUIC under rare sequence of packets/events

Links to More Info: BT2246933

Component: Local Traffic Manager

Symptoms:
QUIC experiences a slow/small memory leak.

Conditions:
On a system with heavy load on crypto operations, QUIC will leak some data on specific rare sequence of packets/events which can exhaust the memory slowly and eventually could lead to a crash due to OOM.

Impact:
TMM crashes due to OOM.

Workaround:
N/A

Fix:
QUIC handles rare sequence of packets/events without a leak.

Fixed Versions:
21.1.0


2244413 : Client Certificates are cached even when Retain Certificate is disabled on a Clientssl profile

Links to More Info: BT2244413

Component: Local Traffic Manager

Symptoms:
Client certificates are cached which can drive up memory usage.

Conditions:
TLS 1.2 sessions that are resumed with session tickets where the client also presents a certificate to the BIG-IP.

Impact:
Memory usage may increase due to caching certificates

Workaround:
None

Fixed Versions:
21.1.0


2244393 : TLS 1.3 sessions are unnecessarily cached

Links to More Info: BT2244393

Component: Local Traffic Manager

Symptoms:
More sessions than necessary are getting cached which can cause an increase in memory usage.

Conditions:
TLS 1.3 is enabled and used.

Impact:
Memory usage increases.

Workaround:
Disable the Retain Certificate setting in the SSL profile (https://my.f5.com/manage/s/article/K19802202).

Fixed Versions:
21.1.0


2241493 : User facing login issues with newly created password-based Azure VMs

Component: TMOS

Symptoms:
User is facing login issues with newly created password-based Azure VMs

Conditions:
Applicable to all Azure VM types

Impact:
User facing login issues with newly created password-based Azure VMs

Workaround:
User can create ssh-based Azure VMs

Fix:
Fixed the issues in the bundled WALinuxAgent.

Fixed Versions:
21.1.0


2241445 : Portal Access: JavaScript XHR requests fail with about:// origin in about:blank frames due to incorrect F5_Deflate_origin() rewriting

Component: Access Policy Manager

Symptoms:
-- Applications accessed through Portal Access may fail to load or operate correctly when JavaScript code constructs XHR request URLs using document.location.origin and document.location.pathname.

-- In affected scenarios, the browser console shows CORS errors referencing an about://blank/... URL.

-- The application may partially load, but API calls (such as XSRF token refresh) fail, resulting in incomplete or broken functionality.

-- This issue is observed after application upgrades that introduce new XSRF endpoint logic or modern JavaScript patterns.

Conditions:
-- Portal Access is enabled and actively rewriting JavaScript in the application.

-- The application builds API request URLs at runtime using document.location.origin and/or document.location.pathname.

-- The affected JavaScript executes in a browser context where the frame’s location is about:blank (for example, in dynamically created iframes, popups, or after single-page application (SPA) navigation).

-- The issue is most frequently observed in browsers (such as Edge and Chrome), but may also occur in other browsers.

Impact:
-- Application API calls (such as XSRF token refresh) fail after the first request.

-- Users experience application load failures, incomplete page rendering, or the inability to perform actions that require API calls.

-- Browser console displays CORS errors referencing about://blank/... URLs.

-- The application is unusable through Portal Access until a workaround or fix is applied.

Workaround:
when REWRITE_REQUEST_DONE
{
    if {[HTTP::path] contains ".cache.js"} {
        REWRITE::post_process 1
        set rewrite_hist_str 1
    }
}
 
when REWRITE_RESPONSE_DONE
{
    if {[info exists rewrite_hist_str]}
    {
        unset rewrite_hist_str
 
        set rewrite_str {c.open('POST', /*F5_*/ F5_g_document /*_5F#document#*/ .location.origin+ /*F5_*/ F5_g_document /*_5F#document#*/ .location.pathname+b+'/PortalWebapp/xsrf/getNewXsrfToken',false)}
 
        set rewrite_str_len [string length $rewrite_str]
 
        set strt [string first $rewrite_str [REWRITE::payload]]
        if {$strt > 0} {
 
            log local0. "REPLACING PAYLOAD"
 
            REWRITE::payload replace $strt $rewrite_str_len {c.open('POST', /*F5_*/ F5_g_top.document /*_5F#document#*/ .location.origin+ /*F5_*/ F5_g_top.document /*_5F#document#*/ .location.pathname+b+'/PortalWebapp/xsrf/getNewXsrfToken',false) }
        }
    }
}

Fix:
Actual Origin is returned when JavaScript runs inside a frame with about:blank context

Fixed Versions:
21.1.0


2241393 : MutationObserver may not work in some cases

Links to More Info: BT2241393

Component: Access Policy Manager

Symptoms:
MutationObserver may not work in some cases

Conditions:
MutationObservers used in application run through portal access

Impact:
Funtionality that depends on mutationObservers wont work (i.e. Promises).

Workaround:
None

Fixed Versions:
21.1.0


2240945 : platform_agent crash when deleting a virtual_server.

Component: F5OS Messaging Agent

Symptoms:
platform_agent may crash when deleting a virtual server.

Conditions:
- The system has the fix for ID2008409;
- A Mac masquerade is configured on a traffic group;
- A tunnel terminating at a BIG-IP or a vlan-group is used;
- A virtual server is deleted.

Impact:
platform_agent will restart, dumping a core.
This should have no impact on passing traffic.

Workaround:
NA

Fix:
platform_agent no longer crashes when deleting a virtual_server.

Fixed Versions:
21.1.0


2238473 : MCP DNS rule validation for DNS type64 or type65 results in SIGSEGV

Links to More Info: BT2238473

Component: Global Traffic Manager (DNS)

Symptoms:
MCPD is crashing when an iRule is attached to a wideip of type64 or type65.

Conditions:
Configure a wideip of type64 or type65, attach an iRule, and then MCPD crashes.

Impact:
MCPD crashes

Fix:
Added the iRule dependency validation check.

Fixed Versions:
21.1.0


2230841 : Admd Crash During Restart Under Heavy Load

Component: Anomaly Detection Services

Symptoms:
Admd crash during the restart process.

Conditions:
Under heavy system load, if the admd anomaly process hangs, the system triggers an admd restart. However, the shutdown sequence does not release objects in the correct order, potentially causing a crash. Introducing a proper shutdown sequence resolves this issue.

Impact:
Core is created, though there is no functionality problem, as the admd was on its way to restart itself

Workaround:
None

Fix:
BADOS restarts performing a silent shutdown.

Fixed Versions:
21.1.0


2230709 : iRule class match fails after modifying IP data group entries with route-domains

Links to More Info: BT2230709

Component: Local Traffic Manager

Symptoms:
After adding and then removing an IP data group entry that includes a route-domain (for example, 10.0.0.0%10/8), iRule class match commands against the data group stop matching entries that were previously working. All traffic may be treated as if it does not match the data group.

Conditions:
- An IP data group is in use by an iRule with a class match command.
- An entry with a route-domain qualifier (for example, %10) is added to the data group and then removed.

Impact:
iRule class match lookups against the affected data group return no match, causing traffic to be classified incorrectly. For example, traffic that should match an internal users data group may be treated as external.

Workaround:
Restart TMM (bigstart restart tmm — causes a traffic disruption), reboot the BIG-IP system, or create a new data group with the same entries and update the iRule to reference the new data group.

Fix:
TMM now correctly preserves the route-domain when processing IP data group entries. Entries with the same IP address but different route-domains coexist correctly without corrupting the data group. Existing data groups and iRule class match behavior are unaffected.

Fixed Versions:
21.1.0


2230597 : Under syncookie mode, temporary listeners may fail to complete connections

Links to More Info: BT2230597

Component: Local Traffic Manager

Symptoms:
Temporary listeners might not complete a connection under a syncookie mode.

Conditions:
Occurs when,
- Temporary listener is used for handling traffic (for example FTP).
- Device under syncookie mode.

Impact:
BIG-IP may fail to establish a proxied TCP connection if it doesn’t complete the TCP three-way handshake with the pool member.

Workaround:
1. Disable syncookies.

2. Disable inheritance when possible. For example, FTP ephemeral listeners inherit syncookie behavior from the FTP virtual server; disabling inherit-parent-profile prevents the ephemeral listener from inheriting syncookies.

Fix:
N/A

Fixed Versions:
21.1.0


2230405 : PEM memory handling update

Component: Policy Enforcement Manager

Symptoms:
Increased memory usage over time.

Conditions:
PEM enabled.

Impact:
Could lead to unexpected behavior over time.

Workaround:
NA

Fix:
Updated handling

Fixed Versions:
21.1.0


2230277 : Help Content Missing on Live Update Page in Certain Scenarios

Component: Application Security Manager

Symptoms:
When clicking the Live Update tab from another screen under Software Management (for example, the Update Check screen), the content in the Help tab is not displayed.
Instead, the following message appears:

"No help is available for this topic."

Conditions:
-- In the GUI, go to System ›› Software Management: Live Update.
-- Open the Help tab.

Result: Help content is available.

-- Click Update Check while the Help view remains open.
-- Click back on Live Update.
-- Open the Help tab again.

Result: The following message is displayed:
"No help is available for this topic."

Impact:
The user cannot see the help content.

Workaround:
Navigate to the Live Update page from another screen that is not under the Software Management tab.
For example:

Security ›› Application Security: Security Policies: Policies List

Fix:
The Live Update help content is displayed correctly.

Fixed Versions:
21.1.0


2230009-1 : Access Policy memory is not cleared between access policy executions

Links to More Info: BT2230009

Component: Access Policy Manager

Symptoms:
APD has a Tcl interpreter that can process commands provided inside an Access policy, for variable assignment or other purposes.

The Tcl environment provided does not reliably clear Tcl variables assigned in prior executions, so care must be taken to initialize the potentially dirty variables if they are used.

Conditions:
User uses some Tcl variables that can potentially be not initialized. For example, a variable assign:
session.test = regexp {(.+)@example.com} "[mcget {session.logon.last.username}]" foo captured; return $captured

Note that here, the regex may match or not match depending on the user input. If it does not match, the variable "captured" *may* contain the results from a different user who logged in previously.

Impact:
Unexpected results from Access Policy execution.

Workaround:
To work around the problem, any variable that was used must be checked. For example, instead of the regex statement above, this could be used:

if { [regexp {(.+)example.com} "[mcget {session.logon.last.username}]" foo captured] == 1 } { return $captured; } else { return "nomatch"; }

This way, if the regex does NOT match, then the result will be "nomatch" instead of potentially containing results from a previous session.

Fix:
APMD variable assign agent regex expression execution isolated from other sessions using namespace

Fixed Versions:
21.1.0


2229881 : Multi-slot tenant may become inoperative after tenant upgrade followed by tmsh reboot slot all

Links to More Info: BT2229881

Component: Local Traffic Manager

Symptoms:
After upgrading the tenant, if the command tmsh reboot slot all is executed on a multi-slot tenant, the tenant may fail to come back to an operational state and remain stuck in an inoperative state.

Load sys configuration process fails with the error: Could not find master-key object

slot2/tenant1 err tmsh[10271]: 01420006:3: Loading configuration process failed.
slot2/tenant1 emerg load_config_files[10255]: "/usr/bin/tmsh -n -g -a load sys config partitions all base " - failed. -- 01070710:3: Could not find master-key object - sys/validation/MasterKey.cpp, line 3070

All slots will have an Availability of "offline" as reported in tmsh show sys cluster:
root@tenant1:/S2-red-P::INOPERATIVE:Standalone] config # tmsh show sys cluster

-----------------------------------------
Sys::Cluster: default
-----------------------------------------
Address 10.144.192.210/22
Alt-Address ::
Availability available
State enabled
Reason Cluster Enabled
Primary Slot ID 2
Primary Selection Time 02/26/26 15:23:52

  ---------------------------------------------------------------------------------------------------------
  | Sys::Cluster Members
  | ID Address Alt-Address Availability State Licensed HA Clusterd Reason
  ---------------------------------------------------------------------------------------------------------
  | 1 :: :: offline enabled false offline running Run, HA TABLE offline
  | 2 :: :: offline enabled true offline running Run, HA TABLE offline
  | 3 :: :: offline enabled false offline running Run, HA TABLE offline


Mcpd state will be base-config-load-failed
[root@tenant1:/S2-red-P::INOPERATIVE:Standalone] config # tmsh show sys mcp-state

-------------------------------------------------------
Sys::mcpd State:
-------------------------------------------------------
Running Phase platform
Last Configuration Load Status base-config-load-failed
End Platform ID Received true
Cluster Quorum Reached true

Conditions:
1. A tenant upgrade is performed on a multi-slot F5OS tenant.

2. All slots of the tenant are rebooted using tmsh reboot slot all or clsh reboot.

Impact:
All slots remain offline and are inoperable from a traffic processing standpoint. Additionally, loading the system configuration fails

Workaround:
To bring the system back to a working state:
reboot the current primary slot to change the primary slot, and then restart mcpd on the new primary slot using command: bigstart restart mcpd

tmsh show sys cluster will report the "Primary Slot ID"

# tmsh show sys cluster
-----------------------------------------
Sys::Cluster: default
-----------------------------------------
Address 10.144.192.210/22
Alt-Address ::
Availability available
State enabled
Reason Cluster Enabled
Primary Slot ID 2
Primary Selection Time 02/26/26 15:23:52

Fixed Versions:
21.1.0


2229857 : Full load from text files fails with "01020036:3: The requested device (/Common/<device-name>) was not found" if deprecatedApiAllowed is false

Links to More Info: BT2229857

Component: Local Traffic Manager

Symptoms:
- After a reboot, upgrade, or otherwise forcing MCPD to load its configuration from the text config files (refer to K13030: Forcing the mcpd process to reload the BIG-IP configuration), MCPD remains inoperative and fails to load the configuration.

- The configuration fails to load with the following error:
  01020036:3: The requested device (/Common/<device-name>) was not found.

Conditions:
- deprecatedApiAllowed is set to false in /config/api_settings/availability.conf. The default is "true".

Impact:
The system remains inoperative and the configuration will not load.

Workaround:
Do not set deprecatedApiAllowed to false.

If the configuration currently will not load, log into the system as root and do the following:

1. Edit /config/api_settings/availability.conf and set "deprecatedApiAllowed" to "true". This can be done by running:

sed -i -e 's,deprecatedApiAllowed":false,deprecatedApiAllowed":true,' /config/api_settings/availability.conf

2. Load the configuration:

tmsh load sys config

Fixed Versions:
21.1.0


2229773 : F5_document can be null resulting in GetCookie/SetCookie failures

Component: Access Policy Manager

Symptoms:
In some apps, like PeopleSoft with cookie operations, the GetCookie/SetCookie functions fail due to F5_document being null.

Conditions:
Have the PeopleSoft application run through portal access.

Impact:
GetCookie/ SetCookie functions are failing, resulting in the application not working properly.

Workaround:
None.

Fix:
Updated logic in GetCookie/SetCookie functionality to mitigate issues when F5_document is null.

Fixed Versions:
21.1.0


2229613 : F5OS Tenant Inoperative Due to Incorrect Permissions on /etc/nsswitch.conf File

Links to More Info: BT2229613

Component: TMOS

Symptoms:
Platform_agent cannot connect to api-svc-gateway, resulting in the tenant being inoperative.

Repeated entries are found at /var/log/ltm log file:

Feb 23 16:14:53 localhost.localdomain warning platform_agent[5887]: 01e10005:4: Unable to subscribe for stats.

Conditions:
A manually modified UCS archive that is loaded on the BIG-IP tenant has incorrect permissions/ownership of the ./etc/nsswitch.conf file.

Once UCS is loaded, the system file: /etc/nsswitch.conf does not contain the proper permissions/ownership, e.g.

[root@hostname:INOPERATIVE:] config # ls -lZ /etc/nsswitch.conf
-rw-------. tester abc system_u:object_r:etc_t:s0 /etc/nsswitch.conf

Impact:
The tenant is inoperative.

Workaround:
After loading the UCS, run the commands that update file ownership and permissions and restart platform_agent:

chown root:root /etc/nsswitch.conf
chmod 644 /etc/nsswitch.conf
bigstart restart platform_agent

Fix:
Update /etc/nsswitch.conf file permissions to 644 and ownership to root:root.

Fixed Versions:
21.1.0


2229569 : Evict FSD Received While SPVADWL Is Uninitialized

Links to More Info: BT2229569

Component: Advanced Firewall Manager

Symptoms:
The issue occurs when spvadwl, a hash data structure, is uninitialized, and an EVICT FSD request is received from the SEP driver.

Conditions:
The system expects the spvadwl hash to be initialized before handling an EVICT FSD request. If this assumption is incorrect, operations dependent on the hash fail due to its uninitialized state.

Impact:
tmm cores

Workaround:
N/A

Fix:
A NULL check has been added to the `spvadwl_search` function to confirm the spvadwl hash is properly initialized before processing. If the hash is uninitialized, the system will ignore the 'EVICT FSD' request, ensuring proper operation and preventing errors.

Fixed Versions:
21.1.0


2229273 : LDAP authentication fails when multiple LDAP servers are configured

Links to More Info: BT2229273

Component: TMOS

Symptoms:
When 2 or more ldap servers are configured for ldap authentication, auth fails due to timer expired (PAM timeout).

Conditions:
-- Multiple ldap servers are configured for Remote-LDAP authentication
-- The bind-timeout and search-timeout values are set to 30 seconds (this is the default)

Impact:
LDAP authentication fails due to PAM timeout- even when one of the servers responds with success.

Workaround:
Set the bind-timeout and search-timeout to lower values i.e 5 seconds

Fix:
1. Configure BIG-IP for remote-LDAP authentication
2. Configure multiple LDAP servers (first few servers should be unreachable/not responding)
3. Test authentication from browser using remote user
4. Auth should be successful

Fixed Versions:
21.1.0


2229021 : iControl REST issue

Component: TMOS

Symptoms:
Under undisclosed conditions iControl REST is not following best practices.

Conditions:
Undisclosed conditions

Impact:
Unexpected impact

Fix:
iControl REST now working as expected.

Fixed Versions:
21.1.0


2228789 : IPS ID10008 triggered by large ADDITIONAL SECTION in DNS response

Links to More Info: BT2228789

Component: Protocol Inspection

Symptoms:
IPS violation ID10008 drops DNS-over-TCP responses larger of 6948 bytes

Conditions:
DNS responses with large ADDITIONAL sections (multiple NS records + DNSSEC keys) exceeding MAX_DNSSEC_SIZE byte IPS parsing limit

Impact:
DNS traffic blocked

Workaround:
Modify ID10008 action from "drop" to required in IPS profile

Fixed Versions:
21.1.0


2228753 : Violation_details may contain unexpected line break

Links to More Info: BT2228753

Component: Application Security Manager

Symptoms:
Violation_details field may contain an unexpected line break, such as 0x0d or 0x0a.

Conditions:
- Using remote logging
- Sending violation_details
- Using "Maximum Request Size" with a specified length, not Any

Impact:
Remote logging server may be confused by the line break.

Workaround:
Do not send violation_details or use "Maximum Request Size: Any".

Fixed Versions:
21.1.0


2227725 : iApp Template Improvements

Component: iApp Technology

Symptoms:
iApp template were not processing as expected

Conditions:
NA

Impact:
May lead to unexpected behaviour

Workaround:
N/A

Fix:
iApp is now processing templates as expected

Fixed Versions:
21.1.0


2227513 : Tmm crash in Google Cloud during a live migration

Links to More Info: BT2227513

Component: Local Traffic Manager

Symptoms:
When running in Google Cloud and a live migration occurs tmm may crash.

Conditions:
- BIG-IP is running in Google Cloud
- tmm is utilizing the virtio driver
- A live migration is occurring

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Disable live migration in GCP.
or
Use the sock driver.

Fixed Versions:
21.1.0


2227441 : TMSH hardening

Component: TMOS

Symptoms:
TMSH not working as expected

Conditions:
NA

Impact:
Can lead to unexpected behaviour

Fix:
TMSH is now working as expected

Fixed Versions:
21.1.0


2227209 : Current session increases

Links to More Info: BT2227209

Component: Local Traffic Manager

Symptoms:
The stats of current session -
tmsh show ltm pool http_pool
increase beyond the current connections.

---------------------------------------------------------------------------------------
Ltm::Pool: http_pool
---------------------------------------------------------------------------------------
Status
  Availability : available
  State : enabled
  Reason :
  Monitor : none
  Minimum Active Members : 0
  Priority Groups : 0/0/0 (highest/current/lowest)
  Current Active Members : 0
  Available Members : 1
  Total Members : 1
  Total Requests : 285
  Current Sessions : 9 <<<<<< even though no current connections exist
                                                         
Traffic ServerSide
  Bits In 963.8K
  Bits Out 25.6M
  Packets In 1.7K
  Packets Out 1.7K
  Current Connections 0
  Maximum Connections 18
  Total Connections 285

Conditions:
If a TCP connection is aborted, the statistics may not decrease when the connection closes.

Impact:
Wrong information displayed.

Workaround:
N/A

Fix:
The statistic is now accurate

Fixed Versions:
21.1.0


2225513 : Some named properties in document are not accessible in Portal Access

Links to More Info: BT2225513

Component: Access Policy Manager

Symptoms:
Some named properties in an HTML document are not accessible when hosted in Portal Access

Conditions:
HTML document contains named properties

Impact:
Functionality broken

Workaround:
None

Fixed Versions:
21.1.0


2225313 : ASM CAPTCHA refresh and audio icons are missing after policy import

Component: Application Security Manager

Symptoms:
ASM CAPTCHA refresh, and audio icons may be missing when a policy is imported and applied directly.

Conditions:
A policy is imported and applied directly.

Impact:
ASM CAPTCHA refresh and audio icons may be missing.

Workaround:
Make a spurious change to any Blocking Response Page and apply policy.

Fix:
ASM CAPTCHA refresh and audio icons are populated correctly.

Fixed Versions:
21.1.0


2225201 : iControl REST hardening

Component: TMOS

Symptoms:
iControl REST not working as expected

Conditions:
NA

Impact:
Unexpected behaviour

Fix:
iControl REST now working as expected

Fixed Versions:
21.1.0


2225017 : Config Sync not working in an HA setup

Component: TMOS

Symptoms:
Config Sync not working in an HA setup

Conditions:
User has an HA setup.

Impact:
Config Sync not working

Fix:
Resolved the connection issue required for the config sync to work.

Fixed Versions:
21.1.0


2224937 : HA Devices staying out of sync

Component: TMOS

Symptoms:
On first attempt after creation of device group, devices are not getting into the "In Sync" state.

Conditions:
Reproducible on the instances with HA setup

Impact:
Devices stay out of sync for a longer duration blocks config sync and failover

Workaround:
Multiple attempts and after few minutes, devices get into the sync

Fix:
Added relevant TCP headers and updated the package handling.

Fixed Versions:
21.1.0


2224681 : iControl REST improvement

Component: TMOS

Symptoms:
iControl REST is not working as expected

Conditions:
NA

Impact:
Can lead to unexpected behaviour

Fix:
iControl REST is working as expected

Fixed Versions:
21.1.0


2224673 : iControl REST improvement

Component: TMOS

Symptoms:
iControl REST is not working as expected

Conditions:
NA

Impact:
Can lead to unexpected behaviour

Fix:
iControl REST is working as expected

Fixed Versions:
21.1.0


2224537 : Tmm crash in Google Cloud during a live migration

Links to More Info: BT2224537

Component: Local Traffic Manager

Symptoms:
When running in Google Cloud and a live migration occurs tmm may crash.

Conditions:
- BIG-IP is running in Google Cloud
- tmm is utilizing the virtio driver
- A live migration is occurring

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Disable live migration in GCP.
or
Use the sock driver.

Fixed Versions:
21.1.0


2223665 : When sdag.shuffle.table is non-zero on a clustered tenant, tmm may not go ready-for-world

Links to More Info: BT2223665

Component: TMOS

Symptoms:
A tenant may not pass traffic after a reboot or a re-deploy if the sdag.shuffle.table db var is set to a non-default value.

The following command
tmctl -d blade tmm/ready_for_world_stat

the value is "not_ready = dag_transition"

Conditions:
Cluster platform.
sdag.shuffle.table is changed from the default (0).

Impact:
Tmm may not go ready-for-world.

Workaround:
Set sdag.shuffle.table back to zero and restart tmm.

Fix:
Changing sdag.shuffle.table no longer causes tmm to be not ready for world after a restart.

Fixed Versions:
21.1.0


2222185 : Even if it's possible to configure multiple stanzas under the auth-info section of a security ssh profile, the SSH proxy will always choose the first one that has a private key

Links to More Info: BT2222185

Component: Advanced Firewall Manager

Symptoms:
In a security ssh profile, it's possible to configure multiple stanzas under the 'auth-info' section.

For example, using this configuration:

security ssh profile f5-test-ssh-proxy {
    ...
    auth-info {
        ed25519 {
            proxy-server-auth {
                private-key ...
                public-key ...
            }
            proxy-client-auth {
                private-key ...
                public-key ...
            }
            real-server-auth {
                public-key ...
            }
        }
        rsa {
            proxy-server-auth {
                private-key ...
                public-key ...
            }
            proxy-client-auth {
                private-key ...
                public-key ...
            }
            real-server-auth {
                public-key ...
            }
        }
    }
    description none
    lang-env-tolerance common
    timeout 0
}

Conditions:
- AFM module licensed and provisioned.

- security ssh profile configured with multiple stanzas under the auth-info section.

Impact:
On the client-side session establishment (external client to AFM), the SSH proxy will always choose the first section that has an entry with a proxy-server-auth private-key.

Workaround:
Configure only one stanza under the auth-info section of a security ssh profile.

Fix:
Updated SSH proxy host-key selection logic in security SSH profiles to process all configured auth-info stanzas, loads valid proxy-server keys for supported algorithms (RSA, DSA, ECDSA, ED25519), and enforce one key per algorithm type while skipping invalid or duplicate entries.

Fixed Versions:
21.1.0


2222041-4 : HTTP cookie handling resource usage

Component: Local Traffic Manager

Symptoms:
Cookie handling may not follow best practices under certain configurations.

Conditions:
NA

Impact:
Could lead to unexpected behavior.

Workaround:
NA

Fix:
Updated handling to work as expected.

Fixed Versions:
21.1.0


2221781 : The DOS process utilizes CPU resources during configuration updates that are unrelated to its operation.

Links to More Info: BT2221781

Component: Application Security Manager

Symptoms:
The dosl7d process consumes high CPU resources during config updates that are unrelated to its operation.

Conditions:
- ASM provisioned
- Configuration update
- Verify CPU consumption of dosl7d

Impact:
The dosl7d process unnecessarily consumes CPU resources.

Workaround:
None.

Fix:
Fixed dosl7d to avoid internal locking during unrelated config updates.

Fixed Versions:
21.1.0


2221689-1 : TMSH hardening

Component: TMOS

Symptoms:
TMSH is not working as expected

Conditions:
NA

Impact:
Can lead to unexpected behaviour

Fix:
TMSH now working as expected.

Fixed Versions:
21.1.0


2221585 : When tenant renews DHCP lease on eth2, the interface IP address on mgmt also gets modified

Links to More Info: BT2221585

Component: TMOS

Symptoms:
When eth2 DHCP lease renews on rSeries tenant, management interface IP is incorrectly changed to eth2 IP (100.69.1.1/24) causing loss of remote management access.

This can occur when eth2 renews the lease after 999 days or when executing manual command to renew eth2's DHCP lease (dhclient -r).

Logs similar to the following can be seen from the tenant's /var/log/boot.log:

    info dhcp_config[20430]: management_ip = 100.69.1.1
    info dhcp_config[20430]: F5::COAPI::TransactionalSave Succeeded.
    info dhcp_config[20430]: domain_search = <default.svc.cluster.local. svc.cluster.local. cluster.local. chassis.local.>
    info dhcp_config[20430]: domain_name = <default.svc.cluster.local>
    info dhcp_config[20430]: In update_ltcfg_field().
    info dhcp_config[20430]: LTCFG Field => ('dns', 'search', 'dns')
    info dhcp_config[20430]: New value => 'default.svc.cluster.local.,svc.cluster.local.,cluster.local.,chassis.local.'
    info dhcp_config[20430]: Existing value => 'localhost'
    info dhcp_config[20430]: dns_servers = <10.10.1.10>
    info dhcp_config[20430]: In update_ltcfg_field().
    info dhcp_config[20430]: LTCFG Field => ('dns', 'nameservers', 'dns')
    info dhcp_config[20430]: New value => '10.10.1.10'
    info dhcp_config[20430]: Existing value => '10.10.1.241,10.10.1.242,10.10.1.243'
    info dhcp_config[20430]: In update_ltcfg_config_source() for 'dns'.
    info dhcp_config[20430]: New 'config_source' value => '0'
    info dhcp_config[20430]: Existing value => '0'
    info dhcp_config[20430]: No change in 'config_source' for 'dns'. Skip update.
    info dhcp_config[20430]: In update_ltcfg_field().
    info dhcp_config[20430]: LTCFG Field => ('dns', 'description', 'dns')
    info dhcp_config[20430]: New value => 'configured-by-dhcp'
    info dhcp_config[20430]: Existing value => ''
    info dhcp_config[20430]: F5::COAPI::TransactionalSave Succeeded.
    info dhcp_config[20430]: hostname = 'bigip1.default.svc.cluster.local'
    info dhcp_config[20430]: In update_ltcfg_field().
    info dhcp_config[20430]: LTCFG Field => ('system', 'hostname', 'system')
    info dhcp_config[20430]: New value => 'bigip1.default.svc.cluster.local'
    info dhcp_config[20430]: Existing value => 'bigip1.default.svc.cluster.local'
    info dhcp_config[20430]: No change in ltcfg field 'hostname'. Skip update.
    info dhcp_config[20430]: Successfully finished the execution of /usr/libexec/dhcp-config.

Notice that in addition to changing the management IP address it also changes the DNS and hostname.

Conditions:
- rSeries tenant running for 999 days and its DHCP-enabled eth2 interface renews the lease.
- This may also occur if an administrator manually executes a command that forces eth2 to renew its lease.

Impact:
Loss of remote connectivity to management interface.

Workaround:
Reboot the affected BIG-IP tenant or
change tenant state from "deployed" to "configured" and back to "deployed" via F5OS host.

DNS and hostname settings may also need to be changed back to their previous value.

Fixed Versions:
21.1.0


2221517 : BIG-IP SCP hardening

Component: TMOS

Symptoms:
SCP does not follow current best practices.

Impact:
Can lead to undesirable behaviour

Fix:
SCP is now following best practices.

Fixed Versions:
21.1.0


2221493 : SCP Improvement

Component: TMOS

Symptoms:
SCP is not following best practices

Conditions:
NA

Impact:
Could lead to unexpected behaviour

Fix:
SCP now following best practices.

Fixed Versions:
21.1.0


2221445 : Improving scripts of Failover

Component: TMOS

Symptoms:
Failover scripts not working as expected

Conditions:
NA

Impact:
Can lead to unexpected behaviour

Fix:
Failover scripts working as expected

Fixed Versions:
21.1.0


2221413 : SCP Improvement

Component: TMOS

Symptoms:
SCP is not following best practices

Conditions:
NA

Impact:
Could lead to unexpected behaviour

Workaround:
NA

Fix:
SCP now following best practices.

Fixed Versions:
21.1.0


2221177 : Big3d cannot validate certificates after they are renewed

Links to More Info: K000159906, BT2221177

Component: Global Traffic Manager (DNS)

Symptoms:
After renewing your big3d certificates, LTM virtual servers become unavailable in GTM, and the bigip_add command starts failing.

Logs in /varl/og/ltm

"big3d SSL cert EXPIRED at IP <IP_ADDRESS>"
"SSL error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed"
"SSL error:14094413:SSL routines:ssl3_read_bytes:sslv3 alert unsupported certificate"

Conditions:
-- BIG-IP DNS (GTM)
-- A Public CA is used to sign the certificates used by big3d

Impact:
Big3d fails to verify the new certificate.

Note: This can also occur if you use a public CA to sign the device certificate used for high availability.

Workaround:
Follow the worksteps described in K000159906: BIG-IP GTM/DNS iQuery Connection Failure Due to Missing Extended Key Usage (EKU) Extensions in Device Certificates, available at https://my.f5.com/manage/s/article/K000159906

Fix:
Both `gtmd` and `big3d` traditionally use the device certificate for mutual TLS connections. This works if the certificate supports both client and server authentication or lacks extended key usage.

If the device certificate is limited to server authentication, configure a client certificate using DB variables `gtm.ssl.crt` and `gtm.ssl.key`. Once set, `gtmd` immediately uses the new certificates, and the `gtm_add` script exchanges them for TLS connections.

Updating the DB variables while in a sync group breaks existing TLS connections. Restore trust using `bigip_add`, `big3d_install`, or manually installing the client certificate as trusted on remote devices.

Fixed Versions:
21.1.0


2221169-4 : iControl REST Hardening

Component: TMOS

Symptoms:
iControl REST not working as expected

Conditions:
NA

Impact:
Leads to undesirable behaviour

Fix:
iControl REST now working as expected

Fixed Versions:
21.1.0


2221161-1 : TMSH hardening

Component: TMOS

Symptoms:
TMSH not working as expected

Conditions:
NA

Impact:
Leads to undesirable behaviour

Fix:
TMSH now working as expected.

Fixed Versions:
21.1.0


2221017-4 : The BIG-IP virtio driver may core during startup

Links to More Info: BT2221017

Component: Local Traffic Manager

Symptoms:
If a failure occurs in the BIG-IP's virtio driver during startup, it may core when attempting to modify statistics that have not yet been initialized.

Conditions:
-- Virtio driver in use.
-- BIG-IP is starting up.
-- An error occurs that is tracked by a statistic.

Impact:
TMM cores and restarts.

Fixed Versions:
21.1.0


2221001 : TMM might restart with certain network traffic

Component: Local Traffic Manager

Symptoms:
TMM is not handling specific traffic as expected.

Conditions:
When configured with Multipath TCP configuration.

Impact:
Traffic disrupted while TMM restarts.

Fix:
TMM is now handling traffic as expected.

Fixed Versions:
21.1.0


2220389 : Enabling tm.ipv4dagfrag results in tmm not ready for world on a cluster with more than 4 blades

Links to More Info: BT2220389

Component: Local Traffic Manager

Symptoms:
If tm.ipv4dagfrag is enabled on a multi slot system, tmm on all blades may not fully start up.

Conditions:
-- F5OS tenant or chassis with more than 4 blades.
- -tm.ipv4dagfrag enabled

Impact:
-- tmsh show sys cluster will show "TMM not ready"
-- The affected blades will not pass traffic

Workaround:
Disable tm.ipv4dagfrag

Fixed Versions:
21.1.0


2220369 : BIG-IP GUI/API Improvements

Component: TMOS

Symptoms:
BIG-IP management plane (GUI/API) is not following best practices.

Conditions:
When LDAP authentication is configured.

Impact:
Unexpected behaviour on BIG-IP.

Workaround:
NA

Fix:
BIG-IP management plane (GUI/API) is now following best practices.

Fixed Versions:
21.1.0


2219929 : Tmm running in Hyper-V environments might not receive multicast traffic

Links to More Info: BT2219929

Component: Local Traffic Manager

Symptoms:
Multicast is being sent towards the BIG-IP, but a capture on the BIG-IP does not show multicast packets arriving.

Conditions:
BIG-IP running on Hyper-V using the dpdk driver:

The interface is using the xnet driver:
# tmctl -d blade tmm/device_probed
pci_bdf pseudo_name type available_drivers driver_in_use
------------ ----------- --------- ----------------- -------------
0000:00:e1.0 1.1 F5DEV_PCI xnet, sock, xnet

And the xnet driver is using the dpdk driver:
# tmctl -d blade tmm/xnet/device_probed
id available_drivers driver_selected driver_in_use
------ ----------------- --------------- -------------
{UUID} sock, dpdk, dpdk Yes

Impact:
Tmm does not see multicast packets. If the BIG-IP us using IPv6, this will cause IPv6 neighbor discovery to fail for addresses on the BIG-IP.

It can also impact other multicast based traffic.

Workaround:
Switch to the sock driver: https://my.f5.com/manage/s/article/K000153024

Fixed Versions:
21.1.0


2219889 : Specific iRule with undefined var in remote syslog via HSL leads to crash

Links to More Info: BT2219889

Component: TMOS

Symptoms:
Tmm crashes when an iRule command is triggered.

Conditions:
1. An iRule invokes HSL::send on an undefined variable and which reference an HSL pool
2. Syslog messages are configured to be sent to the same HSL pool, which causes a log recursion to occur on the error message


# See undefined $hsl
ltm rule /Common/c_hsl_rule {
    when CLIENT_DATA {
        # Log the raw payload to /var/log/ltm for debugging
        log local0. "Payload received from [IP::client_addr]:[UDP::client_port] -> [UDP::payload]"
        # Send the raw payload to the C pool
        HSL::send $hsl "[UDP::payload]"
    }
}
which leads to logging of the error

And syslog is redirected to the same pool, thus causing errors generated by the iRule to end up recursing into MDS.


sys log-config destination remote-high-speed-log /Common/clog-rhl {
    pool-name /Common/clog
    protocol udp
}
sys log-config destination remote-syslog /Common/clog-rs {
    remote-high-speed-log /Common/clog-rhl
}

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Make sure variable is defined.
Potentially use a "catch" as well.

Fixed Versions:
21.1.0


2219801 : Visual Policy Editor AD group search is limited to current page

Links to More Info: BT2219801

Component: Access Policy Manager

Symptoms:
The Search in AD Groups in the Visual Policy Editor is limited to the current page instead of a global search

Conditions:
1. Access Policy -> Edit
2. AD Groups Resource Assign -> Add new entry -> edit
3. Have multiple pages of AD groups

Impact:
Won't be able to search among AD Groups spanning multiple pages

Workaround:
None

Fixed Versions:
21.1.0


2219745 : iControl REST hardening

Component: TMOS

Symptoms:
iControl REST is not working as expected

Conditions:
NA

Impact:
Can lead to unexpected behaviour

Fix:
iControl REST is working as expected

Fixed Versions:
21.1.0


2219381 : TMSH improvement

Component: Local Traffic Manager

Symptoms:
TMSH is not working as expected

Conditions:
NA

Impact:
Can lead to unexpected behaviour

Workaround:
None

Fix:
TMSH is working as expected

Fixed Versions:
21.1.0


2219209 : Resetting profile statistics may lead to memory corruption

Links to More Info: BT2219209

Component: Access Policy Manager

Symptoms:
TMM may crash or generate wrong behavior

Conditions:
API Protection profile statistics have been reset, an issue internally might overwrite memory in other area.

Impact:
Can cause unexpected behavior or even a crash

Workaround:
N/A

Fix:
Profile statistics can safely be reset.

Fixed Versions:
21.1.0


2219173 : TMSH improvements

Component: TMOS

Symptoms:
TMSH is not following best practices

Conditions:
NA

Impact:
Unexpected behavior

Fix:
Implemented best practices in TMSH

Fixed Versions:
21.1.0


2219081 : Live Update configuration sync failure in HA setup

Links to More Info: BT2219081

Component: Application Security Manager

Symptoms:
The Live Update log records a YamlReader error for full_sync_asm-live-update, causing the Live Update configuration sync to fail.

Conditions:
The Live Update log shows a YamlReader error for the full_sync_asm-live-update file.

Impact:
Some servers in the HA setup may have incorrect Live Update configurations.

Workaround:
N/A

Fix:
Live Update sync process uses simplified YAML file

Fixed Versions:
21.1.0


2219053 : CVE-2025-13878: Malformed BRID/HHIT records can cause named to terminate unexpectedly

Component: Global Traffic Manager (DNS)

Symptoms:
Malformed BRID/HHIT records can cause `named` to terminate unexpectedly. This issue affects BIND 9 versions 9.18.40 through 9.18.43, 9.20.13 through 9.20.17, 9.21.12 through 9.21.16, 9.18.40-S1 through 9.18.43-S1, and 9.20.13-S1 through 9.20.17-S1.

Conditions:
Triggered by specially crafted or malicious DNS queries.

Impact:
Potential denial of service (DoS) for DNS services.

Workaround:
None

Fix:
Upgraded BIND to a patched version that resolves CVE-2025-13878.

Fixed Versions:
21.1.0


2218261 : iControl REST Improvements

Component: TMOS

Symptoms:
iControl REST was not following best practices.

Conditions:
NA

Impact:
Could lead to unexpected behaviour.

Workaround:
NA

Fix:
iControl REST is now following best practices.

Fixed Versions:
21.1.0


2218181-2 : JSESSIONID missing from APM NTLM SSO responses after successful login

Component: Access Policy Manager

Symptoms:
When APM uses NTLM SSO to a backend application, the backend first returns 401 Unauthorized with WWW-Authenticate: NTLM and a Set-Cookie for JSESSIONID. After NTLM completes, APM sends a 200 OK to the client but does not include the JSESSIONID cookie. The client does not receive the backend session cookie. Packet captures show the backend sent the JSESSIONID during the NTLM challenge, but APM did not pass this cookie in the final 200 OK.

Conditions:
Occurs when,
- APM is configured for NTLM SSO to a backend application.
- The backend issues a session cookie (e.g., JSESSIONID) during the NTLM handshake.
- The client depends on that session cookie to maintain application state.
- APM terminates the client connection and proxies authentication to the backend.

Impact:
Applications that rely on the backend JSESSIONID may not establish or maintain sessions, leading to repeated authentication prompts, errors, or unexpected redirects after NTLM login.

Workaround:
N/A

Fix:
N/A

Fixed Versions:
21.1.0


2218157 : IP Intelligence database load log displayed periodically

Links to More Info: BT2218157

Component: Advanced Firewall Manager

Symptoms:
IP Intelligence database load log is displayed periodically in TMM log files.

Conditions:
- Configuration refers to IP intelligence feature.
- No active subscription for IP intelligence.
- IP intelligence database load fails periodically.

Impact:
- TMM log files contain messages similar to:
  <13> Sep 24 09:55:01 bigip1 notice Failed to open /var/IpRep/F5IpRep.dat
  <13> Sep 24 09:55:01 bigip1 notice Failed to open /var/IpRep/F5IpV6Rep.dat


- LTM log files contain messages similar to this one, logged by each tmm into the every 5 minutes:

Sep 24 10:00:05 f5test.localhost err tmm2[1492]: 01010377:3: Failed to open IpRep database file /var/IpRep/F5IpV6Rep.dat

Workaround:
- Update the license to include an IP Intelligence subscription

or

- Remove the ip-intelligence objects from the configuration

Fixed Versions:
21.1.0


2218109 : Unable to delete LTM Policy Strategy with Address Selector via UI. VE goes offline and displays an error after manual deletion of the MCPD shared database file during operations such as reboot.

Component: TMOS

Symptoms:
Not able to delete LTM "policy-strategy" with the address selector from the UI. When attempting operations such as "load sys license" or rebooting by manually deleting the MCPD shared DB file, the virtual edition (VE) gets stuck offline and displays an error.

Conditions:
The issue occurs under the following circumstances:
The system contains a policy-strategy with the "address" selector.

Impact:
The virtual edition (VE) becomes stuck offline, rendering it non-operational.

Fix:
Ensure Virtual Edition (VE) remains online and error-free during operations, such as reboot, by adding the address selector to the policy strategy schema.

Fixed Versions:
21.1.0


2217721 : Delete checkbox in dcp policy for adding endpoint is not seen for endpoint >37 char and string is out of text box

Component: Leak Signal

Symptoms:
When creating or editing a DCP policy, if an endpoint name exceeds 37 characters, the delete checkbox/button for that endpoint becomes invisible. Additionally, the endpoint name overflows outside of the text box, resulting in a UI rendering issue. As a result, users are unable to edit or delete the affected endpoint.

Conditions:
This issue arises when a user creates or edits a DCP policy by entering an endpoint name that exceeds 37 characters. It affects all versions prior to the fix.

Impact:
Users are unable to delete or edit endpoints with names longer than 37 characters in DCP policies.

Workaround:
Limit endpoint names to 37 characters or fewer when creating DCP policies. This can be accomplished by using wildcard (*) characters in the endpoint name.

Fix:
Updated CSS to wrap endpoint name characters to a new line on overflow, ensuring the delete button remains visible and accessible for endpoint names of any length.

Fixed Versions:
21.1.0


2217713 : TMSH improvements

Component: TMOS

Symptoms:
TMSH not following best practices

Conditions:
NA

Impact:
Can lead to unexpected behaviour

Fix:
TMSH is now following best practices.

Fixed Versions:
21.1.0


2217545 : Unable to License BIG-IP Booted on KVM UEFI Machine

Component: TMOS

Symptoms:
For a BIG-IP booted on a KVM UEFI machine, licensing is failing

Conditions:
When trying to license a BIG-IP on a KVM UEFI machine

Impact:
User will not be able to license BIG-IP on a KVM UEFI machine

Workaround:
None

Fix:
With the addition of a new platform ID for the KVM UEFI platform, the licensing will now work.

Fixed Versions:
21.1.0


2217485 : TMSH Improvements

Component: TMOS

Symptoms:
TMSH is not following best practices

Conditions:
NA

Impact:
Unexpected behavior.

Fix:
TMSH is now following best practices.

Fixed Versions:
21.1.0


2217445 : GTM Virtual Server can be deleted while referenced by GTM Pools

Component: Global Traffic Manager (DNS)

Symptoms:
A GTM virtual server object can be deleted even if it is referenced by GTM pools. Deleting the server will also remove it from the associated pool members without any warning.

Conditions:
Occurs when a GTM virtual server is referenced in one or more GTM pools.

Impact:
This may cause unexpected behavior or service disruption if the server is deleted while still in use.

Workaround:
None.

Fix:
A validation check has been added to prevent deletion of a GTM virtual server that is referenced by GTM pools, and a warning is now displayed to the user. This behavior is controlled by the DB variable gtm.gtmserverdeletevalidation, which is disabled by default and must be enabled to enforce the deletion restriction.

Fixed Versions:
21.1.0


2217093 : L2 traffic to masquarade MAC on Standby might be flooded when multiple interfaces are used

Links to More Info: BT2217093

Component: Local Traffic Manager

Symptoms:
On platforms without the switch (i2000/i4000) configured with multiple interfaces under a single VLAN, traffic to masquerade MAC address will be flooded to all available interfaces and will not follow FDB entries.

Conditions:
- Switchless platform (like i2000/i4000).
- Multiple interfaces configured under a single VLAN. For example:

net vlan vlan2 {
    interfaces {
        2.0 {
            tagged
        }
        trunk1 {
            tagged
        }
    }
}
- traffic to masquarade MAC is misdirected to Standby unit.

Impact:
Unnecessary flooding occurs.

Workaround:
None.

Fixed Versions:
21.1.0


2217053 : HTML5 Citrix Client Bundle Upload Fails with Unpack Error Due to Invalid Entry Filename

Component: TMOS

Symptoms:
When uploading an HTML5 Citrix client bundle (ZIP file) to BIG‑IP through the Configuration utility, the upload fails with an unpack error indicating that the archive contains invalid or special characters in one or more entry filenames.

Conditions:
This issue occurs when all of the following conditions are met:

The latest HTML5 Citrix client executable is downloaded from citrix.com
The client is installed on a supported Windows Server using the default installation settings

The HTML5Client directory is manually compressed into a ZIP file using Windows Explorer

The ZIP archive is uploaded as a Windows Package File under Access Policy > Application Access > Remote Desktops > Citrix Client Bundles

The bundle name includes html5

Impact:
The HTML5 Citrix client bundle cannot be uploaded or configured on BIG‑IP. As a result, administrators are unable to deploy or update the HTML5 Citrix client for remote desktop access.

Fix:
it is fixed now

Fixed Versions:
21.1.0


2216645 : UCS Backup Improvements

Component: TMOS

Symptoms:
UCS Backup is not following best practices.

Conditions:
When BIG-IP is under Appliance mode.

Impact:
Could lead to unexpected behaviour.

Workaround:
NA

Fix:
UCS Backup is now working as expected.

Fixed Versions:
21.1.0


2213605 : "Live Update" ASU File Listed as Not Installed After Successful Scheduled Installation

Links to More Info: BT2213605

Component: Application Security Manager

Symptoms:
The "Live Update" ASU file appears with a "Pending" status in the GUI, even though it was successfully downloaded and installed.

Conditions:
Installations run in "Scheduled" mode

Impact:
The system provides incorrect reporting on the installation status of the latest "Live Update" ASU file.

Workaround:
Click on "Install" button for latest "Pending" ASU file

Fixed Versions:
21.1.0


2211137 : EPSEC upgrade fails when default package is pre-uploaded

Links to More Info: BT2211137

Component: Access Policy Manager

Symptoms:
After upgrading BIG-IP APM from version 17.1.2 to 17.1.3, the APM directories /var/apm/lib and /var/apm/www are missing. The system shows an empty EPSEC version (apm.epsec.version = ""), and APM functionality is impacted. This issue occurs on both units in an HA pair.

Conditions:
This issue occurs when all of the following conditions are met:

1. BIG-IP APM is running version 17.1.2 (default EPSEC package version 1749)
2. EPSEC package version 1915 was uploaded via GUI but not installed on the 17.1.2 system
3. System is upgraded to version 17.1.3 (which has EPSEC 1915 as the default package)
4. The upgrade creates an upload marker for EPSEC 1915 in the configuration filestore

Impact:
Endpoint security checks cannot be performed, APM policies and access profiles may fail to function properly, and end users may be unable to access APM-protected resources.

Workaround:
Upload and install a newer EPSEC package (version 1941 or later) via the GUI:
1. Navigate to Access > System > File Management > Endpoint Software Management
2. Upload a newer EPSEC package (e.g., epsec-1.0.0-1941.0.iso or later)
3. Install the uploaded package
4. Verify the directories are created: ls -l /var/apm/
5. Confirm EPSEC version: tmsh list sys db apm.epsec.version

Fixed Versions:
21.1.0


2211133 : ICMP error length does not follow RFC 812 guidance

Links to More Info: BT2211133

Component: Local Traffic Manager

Symptoms:
Only 8 bytes of original payload is included in ICMP error message sent from BIG-IP. RFC 1812 section 4.3.2.3 indicates systems should include as much as possible, up to 576 bytes total.

Conditions:
ICMP error message sent from BIG-IP.

Impact:
With only 8 bytes included in the ICMP error message, provides limited context for debugging. The TCP and UDP headers are truncated mid-header.

Workaround:
None.

Fixed Versions:
21.1.0


2209157 : FastL4 late binding does not proxy MSS when establishing server-side connection.

Links to More Info: BT2209157

Component: Local Traffic Manager

Symptoms:
FastL4 late binding does not proxy MSS when establishing server-side connection.

Conditions:
FastL4 profile with late-binding option enabled.

Impact:
Sub-optimal connection performance.

Workaround:
MSS-overwrite option can be used to manually adjust server-side MSS.

Fixed Versions:
21.1.0


2208913-3 : iControl SOAP hardening

Component: TMOS

Symptoms:
iControl SOAP not following best practices

Conditions:
NA

Impact:
Can lead to unexpected behaviour

Fix:
iControl SOAP now following best practices

Fixed Versions:
21.1.0


2208709 : Failure to match specific WAF signatures

Links to More Info: BT2208709

Component: Application Security Manager

Symptoms:
A signature is not matched as expected.

Conditions:
Specific configuration and traffic.

Impact:
A false negative on a specific scenario.

Workaround:
None.

Fixed Versions:
21.1.0


2208701 : Tmm crash when the spvawl_timer_sweep callback_timer is being processed

Links to More Info: BT2208701

Component: Advanced Firewall Manager

Symptoms:
TMM crash occurs when HSB delivers events to incorrect TMM threads. The crash happens due to accessing uninitialized per-thread resources (spvawl_timer_sweep).

Conditions:
TMM passing traffic through HSB; the conditions under which this are encountered are rare and difficult to reproduce.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None

Fix:
Entry Point Validation: Unrecognized FSU subtypes are caught, marked as INVALID, and dropped immediately.

Early Data Validation: Check for spva.type == SPVA_TYPE_INVALID during function entry. Drop corrupted or garbage data immediately without processing.

Fixed Versions:
21.1.0


2202281 : Primary Admin DB Change to Non-Existing User Results in Admin User Lockout

Component: TMOS

Symptoms:
When the `systemauth.primaryadminuser` value is changed to a non-existing user, the primary admin value is updated to the non-existing user, resulting in an admin user lockout scenario.

Conditions:
When a user does not existing in the system and primary admin value is changed to non existing user value.

Impact:
-- The admin user becomes disabled, logged out of TMUI and TMSH, and is unable to log back in.
-- If the root account login is also disabled, both the root and admin users are logged out of the system.

Workaround:
None

Fix:
When the primary admin DB is udated below operations takes place; in case of failure to update sys db these will get rollbacked.

-> Writes localusers file
-> Writes URP file
-> Clears PAM cache
-> Writes f5_public file

Fixed Versions:
21.1.0


2202097 : Apply limitations on certain object creation

Component: TMOS

Symptoms:
Creation with certain objects could cause unexpected behavior.

Conditions:
NA

Impact:
Could result in unexpected behavior.

Fix:
The objects now have limitations to avoid the unexpected behavior.

Fixed Versions:
21.1.0


2202005-1 : IPsec can send packets across tunnels on standby node.

Links to More Info: BT2202005

Component: TMOS

Symptoms:
IPsec is sending packets over the tunnel from the standby node, which should not occur.

Conditions:
In an HA setup with IPsec configured, once the tunnel is established, there is a possibility that the standby node may send packets.

Impact:
IPsec functionality may be impacted if both the active and standby nodes send ESP packets to the peer.

Workaround:
Added an HA check that first verifies the device status, if it is in standby, the packet is dropped accordingly.

Fix:
Added an HA check that first verifies the device status, if it is in standby, the packet is dropped accordingly.

Fixed Versions:
21.1.0


2201965 : TMSH improvement

Component: TMOS

Symptoms:
TMSH is not working as expected.

Conditions:
NA

Impact:
Can lead to unexpected behaviour

Fix:
TMSH is working as expected.

Fixed Versions:
21.1.0


2201877 : SCTP multihoming fails with ICMP unreachable for alternate paths.

Links to More Info: BT2201877

Component: TMOS

Symptoms:
SCTP multihoming fails with ICMP protocol unreachable for alternate paths.

Conditions:
- SCTP profile with multihoming and alternate addresses configured.
- Alternate address is a self-ip configured on a system.

Impact:
Unable to establish alternate path connection.

Workaround:
None

Fixed Versions:
21.1.0


2201813 : BIG-IP enforces maximum concurrent streams limit immediately over HTTP/2 connection

Links to More Info: BT2201813

Component: Local Traffic Manager

Symptoms:
BIG-IP negotiates a number of concurrent streams over HTTP/2 connection per RFC requirement. It immediately enforces this limitation once the protocol is agreed and first SETTINGS frame is issued.

Conditions:
-- BIG-IP virtual server with a http2 profile.
-- A client connects to the virtual server and negotiates or starts HTTP/2 connection.

Impact:
The client may send more requests than the limit set by BIG-IP over the established HTTP/2 connection and it causes the BIG-IP system to reset the extra streams. If Reset Stream Protection is enabled, it may result in the connection being shutdown by the BIG-IP system.

Workaround:
None.

Fix:
BIG-IP no longer sends RST_STREAM frames when the number of streams exceeded the configured limit until SETTINGS/ACK is received to designate the honoring of the the limit by BIG-IP peer.

Behavior Change:
On initial period until SETTINGS/ACK frame is arrived from the peer, TMM follows HTTP/2 RFC and assumes "unlimited" number of concurrent streams rather than enforcing the configured limit right away. If SETTINGS/ACK is not received, the timeout of 1 (one) seconds is used to start the stream concurrency enforcement. Until the enforcement starts, TMM queues stream-specific frames and "softly" enforces the limit to the configured one, allowing 128 frames and 128K of frame body (frame->length) at most.

Fixed Versions:
21.1.0


2201789 : TMSH improvements

Component: TMOS

Symptoms:
TMSH is not following best practices

Conditions:
NA

Impact:
Unexpected behavior

Workaround:
None

Fix:
Implemented best practices in TMSH

Fixed Versions:
21.1.0


2201769 : TMSH improvements

Component: TMOS

Symptoms:
TMSH is not following best practices

Conditions:
NA

Impact:
Unexpected behavior

Workaround:
None

Fix:
Implemented best practices in TMSH

Fixed Versions:
21.1.0


2201745 : TMSH improvements

Component: TMOS

Symptoms:
TMSH is not following best practices

Conditions:
NA

Impact:
Unexpected behavior

Workaround:
None

Fix:
Implemented best practices in TMSH

Fixed Versions:
21.1.0


2201725 : TMSH improvements

Component: TMOS

Symptoms:
TMSH is not following best practices

Conditions:
NA

Impact:
Unexpected behavior

Workaround:
None

Fix:
Implemented best practices in TMSH

Fixed Versions:
21.1.0


2201697 : TMSH improvements

Component: TMOS

Symptoms:
TMSH is not following best practices

Conditions:
NA

Impact:
Unexpected behavior

Workaround:
None

Fix:
Implemented best practices in TMSH

Fixed Versions:
21.1.0


2201693 : Empty Detected Value Length for Parameters with Empty Values

Component: Application Security Manager

Symptoms:
When a request contains a parameter with a zero-length value, the system fails to recognize it as having zero length and instead displays the parameter as having an empty value.

Conditions:
Using GUI with "Illegal parameter value length" violation

Impact:
GUI displays parameter length with an empty value when the parameter has zero length

Workaround:
Modify checking the parameter length also for zero length

Fix:
Modified the condition logic to use <= instead of < when comparing parameter lengths, ensuring zero-length values are correctly set

Fixed Versions:
21.1.0


2201377 : iControl REST improvements

Component: TMOS

Symptoms:
iControl REST is not following best practices

Conditions:
NA

Impact:
It can lead to unexpected system behaviour

Fix:
iControl REST is now following best practices

Fixed Versions:
21.1.0


2200653 : [LocalUserDB Auth]: UID parameter ignored during user deletion – deletes all users instead of specified user

Links to More Info: BT2200653

Component: Access Policy Manager

Symptoms:
You try to delete the user using the UID, but the UID seems to be ignored, and all users in that instance are deleted instead of just the specified user.

Conditions:
1) Create a localdb instance and create a few users. Verify using "ldbutil --allusers --list"

2) Using ldbutil command, try to delete a specific user by passing their UID in the request.
 
    Ex: ldbutil --delete --uid="22222" --instance="/Common/sbudemgari-localdb-01"
          
3) Observe the behavior after the deletion request is executed.

Impact:
All users in the instance are deleted, ignoring the provided UID.

Workaround:
None

Fixed Versions:
21.1.0


2200561 : Repeated MCPD service crashes

Component: TMOS

Symptoms:
Repeated restart of the MCPD service in HA setup, or when a modified object is getting deleted in the same transaction.

Conditions:
In the same transaction when a modified object is getting deleted then it leads to restart of mcpd service due to SW issue.

Impact:
Restart of MCPD service which implies that the data path is disrupted due to TMM restart triggered as a result of MCPD crash.

Workaround:
There is no workaround other than to patch the software with a new release version.

Fix:
Avoid modification to the deleted object in the same transaction.

Fixed Versions:
21.1.0


2200537 : Audio captcha script error

Links to More Info: BT2200537

Component: Application Security Manager

Symptoms:
A script error in audio captcha on specific browsers

Conditions:
-- Audio captcha is required.
-- The user is using Internet Explorer on Windows 11

Impact:
Error in the captcha page. Unable to use captcha causing client side enforcement to fail.

Workaround:
None

Fixed Versions:
21.1.0


2200437 : SNMP Improvement

Component: TMOS

Symptoms:
SNMP is not following best practices

Conditions:
NA

Impact:
Could lead to unexpected behaviour

Workaround:
NA

Fix:
SNMP now following best practices

Fixed Versions:
21.1.0


2200421 : SNMP Improvement

Component: TMOS

Symptoms:
SNMP is not following best practices

Conditions:
NA

Impact:
Could lead to unexpected behaviour

Workaround:
NA

Fix:
SNMP now following best practices

Fixed Versions:
21.1.0


2200389 : CDS and CDNSKEY not included in DNSX zone transfer data

Links to More Info: BT2200389

Component: Global Traffic Manager (DNS)

Symptoms:
CDS and CDNSKEY not included in DNSX zone transfer data

Conditions:
Dnssec zone with "Publish CDS/CDNSKEY" option is enabled

Impact:
Missing CDS/CDNSKEY in zone transfer

Workaround:
None

Fixed Versions:
21.1.0


2200217 : DNSSEC validation failures due to missing DS records in zone transfers

Links to More Info: BT2200217

Component: Global Traffic Manager (DNS)

Symptoms:
DNSSEC validation failures occur when querying child zones despite proper DNSSEC configuration, caused by missing DS records in parent zone transfers. The issue affects child zone delegations that use nameservers located outside the child zone itself, such as external nameservers or nameservers under the parent zone. Only delegations where nameservers are within the child zone's own domain hierarchy work correctly. This breaks the DNSSEC chain of trust between parent and child zones, preventing secure DNS resolution for affected delegations.

Conditions:
- DNSSEC is enabled on both parent and child zones.
- Child zones have DS records configured in the system.
- Child zone delegations use nameservers that are either external or located under the parent zone.
-Zone transfers are being performed for the parent zone.

Impact:
DNSSEC chain of trust broken.

Workaround:
None

Fixed Versions:
21.1.0


2200209 : Support NVMe-based disk (newer generation instance families)

Component: TMOS

Symptoms:
The newer generation of instance families were not being supported for BIG IP Images

Conditions:
All prior versions of BIG-IP that did not have the NVMe Support flag set

Impact:
Enabling the NVMe support flag enhances disk I/O performance and ensures compatibility with modern Alibaba Cloud instance types, which utilize NVMe devices for disk exposure. This adjustment modifies the way block devices are identified and accessed at the operating system level.

Workaround:
Save the image as a custom image and set the NVMe support flag to yes

Fix:
Newer images are being published with the relevant flag turned on

Fixed Versions:
21.1.0


2200009 : PEM HA failover may cause traffic drops for new connections

Links to More Info: BT2200009

Component: Policy Enforcement Manager

Symptoms:
All traffic belonging to some connections established to the new Active unit immediately after a failover between PEM units could be dropped.

Conditions:
- PEM units in HA pair.

- New connections established to the new Active unit immediately after a failover.

Impact:
All traffic belonging to new connections established immediately after a failover could be dropped.

Workaround:
None

Fixed Versions:
21.1.0


2199701-3 : big3d was stuck in high CPU after network disruption

Links to More Info: BT2199701

Component: Global Traffic Manager (DNS)

Symptoms:
big3d consuming high CPU

Conditions:
Network disruption

Impact:
big3d overloaded with high CPU usage

Fixed Versions:
21.1.0


2199565 : TMSH and TMUI accessiblity issue during monitors at scale

Links to More Info: BT2199565

Component: Local Traffic Manager

Symptoms:
TMUI and TMSH were unreachable/ inaccessible, when monitors are configured at scale.
SSH connectivity is also impacted due to the same reason.

Conditions:
When monitors are configured at scale and active probing is enabled, access via tmsh, TMUI, and SSH degrades, resulting in BIG-IP system inaccessibility.

Impact:
Access via tmsh, TMUI, and SSH degrades, resulting in BIG-IP system inaccessibility.

Workaround:
ARP Cache threshold and NF connection tracking configuration values have been fine tuned to reduce the ARP cache flooding and connection tracking limit.

Fix:
ARP Cache threshold and NF connection tracking configuration values have been fine tuned to reduce the ARP cache flooding and connection tracking limit.

ARP cache threshold configs:
net.ipv4.neigh.default.gc_thresh1, thresh2, thresh3
net.ipv6.neigh.default.gc_thresh1, thresh2, thresh3

Connection tracking:
net.netfilter.nf_conntrack_max

Fixed Versions:
21.1.0


2199485 : Export and re-import of a security policy in XML format fails due to invalid 'openapi-array' user_input_format value

Links to More Info: BT2199485

Component: Application Security Manager

Symptoms:
Import fails with error: Field 'parameter/user_input_format' may not contain the value 'openapi-array'.

Conditions:
URL level parameter configured with Parameter value type: User-input value and Data type: URI

Impact:
Import of security policy in XML format fails.

Workaround:
Manually change user_input_format from openapi-array to uri in the xml file before importing.

Fixed Versions:
21.1.0


2199469 : Serverssl-use-sni not working in HTTP2 to HTTP gateway setups.

Links to More Info: BT2199469

Component: Local Traffic Manager

Symptoms:
Virtual server's 'serverssl-use-sni' setting does not work when virtual server has HTTP2 profile attached on the client-side and HTTP profile on the server-side.

Conditions:
HTTP2 to HTTP gateway config with 'serverssl-use-sni' option enabled.

Impact:
Incorrect serverssl profile might be selected when establishing server-side connection.

Workaround:
iRule can be used to select the profile based on presented SNI, for example:

when CLIENTSSL_CLIENTHELLO {
    binary scan [SSL::extensions -type 0] @9a* sni
    log local0. "SNI: $sni"
}

when SERVER_CONNECTED {
    switch -glob [string tolower $sni] {
        "foo.com" {
            SSL::profile foo-serverssl
        }
        "bar.com" {
            SSL::profile bar-serverssl
        }
    }
}

Fixed Versions:
21.1.0


2199289 : Updating systemauth.primaryadminuser from system-defined admin user (admin) to a user-defined admin user using iControl REST returns 500 error

Component: TMOS

Symptoms:
Updating systemauth.primaryadminuser sys DB parameter from system-defined admin user (admin) to a user-defined admin user (i.e., 'newadmin') returns the following error:

PATCH /mgmt/tm/sys/db/systemauth.primaryadminuser
{
  "value": "newadmin"
}
---
500 Server Error
{
  "code": 500,
  "message": "MCP Session terminated",
  "errorStack": [],
  "apiError": 32768003
}

Conditions:
Occurs while updating systemauth.primaryadminuser sys DB parameter from system-defined admin user to a user-defined admin user

Impact:
The REST response returns '500 Server Error' with 'MCP Session terminated' response even though the request is successfully processed

Workaround:
The error response can be ignored

Fix:
Updating systemauth.primaryadminuser sys DB parameter from system-defined admin user (admin) returns 200 OK:

PATCH /mgmt/tm/sys/db/systemauth.primaryadminuser
{
  "value": "newadmin"
}
---
200 OK
{
  "value": "newadmin"
}

Make a GET call to verify the update:

GET/mgmt/tm/sys/db/systemauth.primaryadminuser:
200 OK
{
  "kind": "tm:sys:db:dbstate",
  "name": "systemauth.primaryadminuser",
  "fullPath": "systemauth.primaryadminuser",
  "generation": 127,
  "selfLink": "https://localhost/mgmt/tm/sys/db/systemauth.primaryadminuser?ver=21.0.0",
  "defaultValue": "admin",
  "scfConfig": "true",
  "value": "newadmin",
  "valueRange": "string"
}

Fixed Versions:
21.1.0


2198757 : PEM: use-after-free of mw_msg in session_del_msg_entries hash

Links to More Info: BT2198757

Component: Policy Enforcement Manager

Symptoms:
There is a rare scenario where tmm crashes while passing PEM traffic.

Conditions:
-- PEM is licensed and enabled.
-- Policies are assigned from the PCRF. Subscriber additions and deletions are happening regularly.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None.

Fix:
The delayed response or timeout of the request is now handled gracefully.

Fixed Versions:
21.1.0


2198701 : TMSH/MCP validation of management route dependencies

Component: TMOS

Symptoms:
Deleting an interface route that serves as a gateway leaves dependent routes intact, creating orphan routes with invalid next-hop references.

Conditions:
Occurs when an interface route (gateway provider) has dependent routes using it as the next hop.
If that interface route is deleted without dependency validation, those dependent routes become orphaned.

Impact:
Leads to orphan routes causing traffic failures and inconsistent routing behavior.

Workaround:
Avoid deleting interface routes that are in use; first identify and update or remove all dependent routes (or ensure an alternate valid gateway exists) before deletion.

Fix:
Implemented dependency validation for interface route deletion: block deletion if dependent routes exist, and allow deletion only when those routes still have at least one alternate valid interface route (gateway).

Fixed Versions:
21.1.0


2198661 : Resource administrator not working as expected

Links to More Info: BT2198661

Component: TMOS

Symptoms:
The resource administrator user role is not working as expected

Conditions:
NA

Impact:
Unexpected behaviour

Workaround:
None

Fix:
Resource administrator user is now working as expected.

Fixed Versions:
21.1.0


2197377 : TMM crashes under specific traffic.

Component: Global Traffic Manager (DNS)

Symptoms:
The TMM crashes when handling a specific traffic.

Conditions:
A virtual with a DNS resolver or validating cache is configured.

Impact:
Traffic is interrupted as TMM restarts.

Fix:
TMM is now handling traffic as expected.

Fixed Versions:
21.1.0, 21.0.0.1


2197305 : BIG-IP generates invalid SSL key share

Links to More Info: BT2197305

Component: Local Traffic Manager

Symptoms:
SSL handshakes fail on the client due to an Illegal Parameter alert.

Conditions:
ClientSSL that mixes both FFDHE and Non-FFDHE groups and has session tickets enabled.

The client tries to resume an SSL session with a Non-FFDHE key share that used FFDHE previously.

Impact:
SSL handshake fails and the connection terminates

Workaround:
None

Fixed Versions:
21.1.0


2197289 : Enabling SSH access via the GUI blocks MCPD for 90 seconds

Links to More Info: BT2197289

Component: TMOS

Symptoms:
- Disconnections from the GUI occur (no responses to color advisory probe)
- SNMP query timeouts
- iQuery interruptions

Conditions:
-- SSH access is disabled via the GUI
-- SSH access is then enabled via the GUI

Impact:
-- MCPD is blocked for 90 seconds
-- sshd service does not come up for the first 90 seconds after enabling SSH access

Workaround:
None

Fixed Versions:
21.1.0


2197173 : Insufficient sanitization in SNMP configuration

Component: TMOS

Symptoms:
SNMP configuration is not sanitizing input properly.

Conditions:
NA

Impact:
It can lead to unexpected behaviour.

Workaround:
Restrict SNMP access to localhost.

Fix:
SNMP configuration is now properly sanitizing the inputs.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


2196761-3 : TMM core found while doing DAG and SP DAG related tests

Component: TMOS

Symptoms:
TMM crashes and restarts.

Conditions:
In an F5OS multi-slot tenant environment, during boot-up after a tmsh reboot slot all or upgrading to a new volume, a switch of the primary slot can occur between the slots due to slot readiness states. If tmm sends a shared_random_data message before receiving the updated primary slot ID from mcpd, it might use the previous primary slot ID, resulting in a data mismatch and causing tmm to crash and restart.

Note: This issue occurs very rarely as it depends on a race condition.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None.

Fix:
The issue has been fixed by skipping the setting of shared random data when this race condition occurs. The operation will be retried after TMM receives the primary slot change notification.

Fixed Versions:
21.1.0


2196137 : Issue observed only in BIG-IP 17.5.1.4: traffic processed by AFM or DDoS Hybrid Defender may cause TMM to restart

Links to More Info: K000160003, BT2196137


2195709 : TCP fingerprint tethering detection does not work when a subscriber's traffic comes from a tethering Mac OS system.

Links to More Info: BT2195709

Component: Policy Enforcement Manager

Symptoms:
TCP fingerprinting tethering detection does not work when a subscriber's traffic comes from a tethering Mac OS system.

Conditions:
- PEM tethering detection, is configured in a PEM policy rule like this one:

pem policy policy-01 {
    rules {
        detect-01 {
            dtos-tethering {
                dtos-detect enabled
                report {
                    dest {
                        hsl {
                            publisher default-ipsec-log-publisher
                        }
                    }
                }
                tethering-detect enabled
            }
            precedence 1000
        }
    }
    transactional enabled
}



- The subscriber connects through a Windows, Android or IoS phone, and the phone OS is recognised in the PEM "Device OS" PEM session field, for example:

Device Name Nokia_Corporation-Nokia_Lumia_710
Device OS Windows_Mobile_8



- An iRule to detect tethering is configured in the relevant virtual server, for example:

ltm rule tethering-detection {
  when CLIENT_ACCEPTED {
    set ip [IP::client_addr]
    set tether [PEM::session info tethering detected $ip]
    if {$tether eq "1"} {
        log local0. "Tethering detected !"
    } else {
        log local0. "no tethering detected"
    }
  }
}



- The subscriber is tethering through the phone using a MacOS operating system.

Impact:
Tethering from a MacOS operating system is never detected.

Workaround:
None

Fixed Versions:
21.1.0


2195321 : Validations for certificate's notBefore and notAfter to comply with CC/FIPS/STIP Certifications

Component: Local Traffic Manager

Symptoms:
To conform to Certification Requirements specified in the FIPS 140-3, Common Criteria, and SSL/TLS Inspection Proxy (STIP) standards, the following validations to temporarily-issued (i.e. forged) certificates are added:

1. notBefore field test: If the established server certificate's notBefore time precedes the current time as well as the notBefore field of the CA certificate, then the forged certificate should have a notBefore value that does not precede the current time (except, perhaps, by a small amount).

2a. notAfter field test: IF the following hold, based upon the maximum duration specified in the configuration:
(i). The notAfter field of the CA certificate does not exceed the current time by more than the maximum duration, AND
(ii). The notAfter field of the server certificate exceeds the current time by more than the maximum duration, THEN:

The notAfter field in the forged certificate should not exceed that in the CA certificate.

2b. notAfter field test: IF the following hold, based upon the maximum duration specified in the configuration:
(i) The notAfter field of the CA certificate exceeds the current time by more than the maximum duration, AND
(ii). The notAfter field of the server certificate exceeds the notAfter field in the CA certificate by more than the maximum duration, THEN:

The notAfter field in the forged certificate should not exceed the maximum duration.

2c. notAfter field test: If the notAfter field in the server certificate precedes both that in the CA certificate as well as the (current time + maximum duration), then the notAfter field in the forged certificate should not exceed that in the server certificate.

Conditions:
-- The BIG-IP device should necessarily be in CC/FIPS/STIP mode
-- Forward Proxy should be enabled
-- TLS/SSL profile is configured for forward proxy, along with a front-end client and a back-end server. The back-end server will also contain an issuer (i.e., CA) certificate that issued its own (server) certificate.

Impact:
This change is only for BigIP TMOS, in particular the newer versions starting BigIP17.5.x being newly certified to conform to STIP standards. Existing TMOS versions, configured in CC/FIPS/STIP modes, will continue to ignore the absent validations but these are already certified and will not be impacted.

There is no impact on BigIP device that are not in FIPS / CC / STIP mode(s).

Workaround:
None, in CC/FIPS/STIP modes.
Not applicable to devices not configured in any of the aforementioned modes.

Fix:
CC/FIPS/STIP certification validations have been added to notBefore and notAfter dates in BIG-IP temporarily-issued (i.e. forged) certificates for Forward Proxy configurations.

Fixed Versions:
21.1.0


2187529-2 : CVE-2025-12818: postgresql: libpq undersizes allocations, via integer wraparound

Links to More Info: K000160291, BT2187529


2187385 : Brute force set to CAPTCHA also raises a violation and blocks traffic

Links to More Info: BT2187385

Component: Application Security Manager

Symptoms:
Brute force is raised, but the config is set to CAPTCHA. Brute force contributes to the violation rating, and traffic is blocked by the violation rating, instead of triggering a CAPTCHA.

Conditions:
Brute force and violation Rating threat detected are both enabled.

Impact:
CAPTCHA does not occur as expected.

Workaround:
None

Fixed Versions:
21.1.0


2187365-1 : BIG-IP v21.0.0 VE or F5OS tenant remains INOPERATIVE after cold boot

Links to More Info: BT2187365

Component: TMOS

Symptoms:
BIG-IP VE or F5OS tenant fails to reach an operational state after cold boot. For example, after stopping and starting the VM, or power cycling the rSeries appliance.

A message similar to the following is observed in /var/log/ltm:

err mcpd[983]: 01070596:3: An unexpected failure has occurred, Can't load structure (global_sync_status.sync_status) status:52 transaction: 2, status: 52 - EdbStructData.cpp, line 39, exiting...

Conditions:
- BIG-IP VE or F5OS tenant running TMOS v21.0.0
- Cold boot of the BIG-IP VE or F5OS tenant
- First startup of the BIG-IP VE or F5OS tenant ("cold boot")

Impact:
- MCPD starts but never becomes ready; the system remains INOPERATIVE
- ecmd CPU utilization is elevated
- Configuration management and control-plane services are unavailable due to MCPD not becoming ready
- High CPU utilization by ecmd can impact overall system stability and resource availability

Workaround:
From bash, delete the /var/db/mcpdb.bin and /var/db/mcpd.info files and reboot the BIG-IP VE or F5OS tenant:

rm -fv /var/db/mcpdb.bin /var/db/mcpdb.info
reboot

MCPD will perform a full configuration load on the next startup and the system will return to operation.

Note: In some cases the workaround may need to be applied more than once before a successful startup and configuration load will occur.

Fixed Versions:
21.1.0, 21.0.0.1


2187185 : BIG-IP v21.0 REST framework incorrectly processes Content-Range in HTTP GET requests

Links to More Info: BT2187185

Component: Device Management

Symptoms:
On BIG-IP v21.0, REST-based file download requests may fail with errors such as “attempt to read past end of file” when the client includes a Content-Range header in an HTTP GET request. This occurs when the specified byte range exceeds the actual size of the requested file.

The failure is triggered by the BIG-IP REST framework incorrectly attempting to process the Content-Range header for GET requests, resulting in an invalid file offset calculation and an EOF read condition. As a result, the REST request is terminated and the file download does not complete.

Conditions:
HTTP GET request includes a Content-Range header

The byte range specified in Content-Range exceeds the actual size of the requested file

Impact:
REST-based file downloads fail unexpectedly

Workaround:
Determine the actual size of the target file and ensure that any Content-Range header sent by the client specifies a byte range that does not exceed the file length.

Alternatively, remove the Content-Range header entirely from HTTP GET requests, as it is not required and may cause request failures.

Fixed Versions:
21.1.0


2186933 : ILX Plugin may not work after use of npm install command on workspace.

Component: Local Traffic Manager

Symptoms:
After using the 'npm install' command on the workspace.

The below message will be logged in ltm logs after plugin reload:
err sdmd[21349]: 018e0018:3: pid[17783] plugin[<plugin-name>.<extension-name>] Error: Cannot find module 'f5-nodejs'
err sdmd[21349]: 018e0010:3: Extension <plugin-name>.<extension-name> exceeded the maximum number of restarts (5) over the last 60 seconds and has been disabled

Conditions:
1. The ILX plugin is in use with node version 6.
2. ILX workspace has been modified with npm install command.
3. Plugin has been reloaded after 'npm install'

Impact:
Traffic processing on virtual server with plugin attached will fail with the following logs:
Could not find ILX extension <extension-name> in path <workspace-name>

Workaround:
To prevent the issue:
1. Use NPM install command with '--no-package-lock' flag.
- npm install --no-package-lock <package-name>
 
If already Encountered the issue:
1. Restore package.json from /usr/share/packages
 
- tar -xzf /usr/share/packages/nodejs/f5-nodejs-6.tgz -C /var/ilx/workspaces/Common/<workspace-name>/extensions/<extension-name>/node_modules
 
2. Update package.json at path /var/ilx/workspaces/Common/<workspace-name>/extensions/<extension-name>/
- Set the "f5-nodejs" version to "1.0.0" instead of "0.0.3".
 
3. Reload the plugin.

Fixed Versions:
21.1.0


2186897 : TMM core SIGSEVG upon replacing L7 DOS policy

Links to More Info: BT2186897

Component: Anomaly Detection Services

Symptoms:
On rare cases of expired connection, tmm can crash.

Conditions:
BADOS L7 configured
Replacing DOS policy under traffic

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None

Fix:
TMM does not crash upon replacing L7 DOS policy.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


2186697 : BIG-IP REST Improvements

Component: Device Management

Symptoms:
BIG-IP REST is not following best practices

Conditions:
NA

Impact:
BIG-IP GUI can behave unexpectedly.

Workaround:
None

Fix:
BIG-IP REST is following best practices and GUI is working as expected.

Fixed Versions:
21.1.0


2186625 : Zone transfer from dns express with dnssec enabled includes extra RRSIG

Links to More Info: BT2186625

Component: Global Traffic Manager (DNS)

Symptoms:
AXFR zone transfer includes extra RRSIG for A/AAAA records.

Conditions:
When delegated NS record includes multiple name servers.

Impact:
Extra RRSIGs added to records that do not need RRSIG.

Workaround:
None

Fixed Versions:
21.1.0


2186153 : CVE-2025-8194 cpython: Cpython infinite loop when parsing a tarfile

Component: TMOS

Symptoms:
A flaw was found in the Python tarfile module. Processing a specially crafted tar archive, specifically an archive with negative offsets, can cause an infinite loop and deadlock. This issue results in a denial of service in the Python application using the tarfile module.

Conditions:
The application uses the Python tarfile module to process an attacker-supplied malicious tar archive containing negative offsets.

Impact:
It can cause an infinite loop leading to application hang or denial of service.

Workaround:
Update to a patched Python version and avoid processing untrusted tar archives, or validate archives before extraction

Fix:
Upgrade to a Python version that includes the tarfile module fix for this issue.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


2186009 : Increased TX IQ size for netvsc

Links to More Info: BT2186009

Component: TMOS

Symptoms:
In some environments, during periods of high traffic, messages could build up in the TX internal queue due to xnet-DPDK being slow to inform that messages were sent. If this goes for long enough, the internal queue will fill up and become stuck.

Conditions:
1) Using xnet-DPDK driver
2) Azure or Hyper-V
3) Sustained high (multi-GB/s) traffic rate

Impact:
Internal queue gets stuck preventing BIG-IP from being able to send messages and causing traffic disruption.

Workaround:
Create '/config/tmm_init.tcl' and add the following line
  ndal tx_iq_sz 1024 f5f5:f550

Afterwards, restart tmm with 'bigstart restart tmm' to apply change.

Fix:
Increased default size of TX IQ when netvsc driver is being used

Fixed Versions:
21.1.0


2185833 : VLAN Modification and Transition Between Q-in-Q and Non-Q-in-Q Configurations failed

Component: Local Traffic Manager

Symptoms:
Direct switching between Non-QinQ and QinQ modes, or vice versa, is not permitted. The configuration will not be applied to the tenant, and the attempt will be rejected, leaving the previous configuration intact on the tenant.

Conditions:
The following steps are required to switch between QinQ and Non-QinQ:

-- Remove the VLAN from the F5OS UI
-- Delete all tenant vlans configurations (tmsh delete net vlan all)
-- Apply a fresh configuration with the required type (Q-in-Q or Non-Q-in-Q)

Impact:
VLAN Modification and Transition Between Q-in-Q and Non-Q-in-Q Configurations failed

Workaround:
The following steps are required to switch between QinQ and Non-QinQ:

-- Remove the VLAN from the F5OS UI
-- Delete all tenant vlans configurations (tmsh delete net vlan all)
-- Apply a fresh configuration with the required type (Q-in-Q or Non-Q-in-Q)

Fix:
Added proper validation and proper steps to do switching between Non-QinQ and QinQ modes

Fixed Versions:
21.1.0


2185829 : VLAN Modification and Transition Between Q-in-Q and Non-Q-in-Q Configurations failed

Component: Local Traffic Manager

Symptoms:
Direct switching between Non-QinQ and QinQ modes, and QinQ to Non-QinQ modes, is not allowed. The configuration will not be applied to the tenant, and the change will be rejected, retaining the previous configuration on the tenant side.

Conditions:
The following steps are required to switch between QinQ and Non-QinQ:

-- Remove the VLAN from the F5OS UI
-- Delete all tenant vlans configurations (tmsh delete net vlan all)
-- Apply a fresh configuration with the required type (Q-in-Q or Non-Q-in-Q)

Impact:
VLAN Modification and Transition Between Q-in-Q and Non-Q-in-Q Configurations failed

Workaround:
Below steps are required to switching between QinQ and Non-QinQ:

-- Remove the VLAN from the F5OS UI
-- Delete all tenant vlans configurations (tmsh delete net vlan all)
-- Apply a fresh configuration with the required type (Q-in-Q or Non-Q-in-Q)

Fix:
Added proper validation and proper steps to do switching between Non-QinQ and QinQ modes

Fixed Versions:
21.1.0


2185485 : The value of /proc/sys/vm/min_free_kbytes might be too big on Hyper-V and Azure VEs with multiple cores and multiple NICs

Links to More Info: BT2185485

Component: TMOS

Symptoms:
After a software upgrade to one of the affected versions, the value of /proc/sys/vm/min_free_kbytes might too big on Hyper-V and Azure VEs with multiple cores and multiple NICs.

This can prevent the Virtual Edition from booting into the new software volume installed with one of the affected versions.

Conditions:
BIG-IP VE running on Hyper-V hypervisor or on Azure with:
- more than 4 cores and more than 4 NICs configured
- 16GB of RAM or less allocated

Attempt to upgrade to one of the affected versions.

Impact:
After an upgrade to one of the affected versions, the BIG-IP VE boot process hangs, or the VE takes hours to boot into the new volume and is so slow to result unusable.

Workaround:
There are two possible workarounds:


(1)
Before booting into the new volume, shutdown the VE and increase the total allocated RAM to 32GB.


(2)
- Install the new software volume.

- Take note of the current value <KBYTES> of /proc/sys/vm/min_free_kbyte :

# cat /proc/sys/vm/min_free_kbyte

- Before rebooting into the new software volume, mount the "vg--db--vda-set.<N>.root" disk volume on a temporary directory, where <N> is the number of the new volume after the dot.
E.G.: if the new volume is "HD1.2", then <N> is 2.

# mkdir /mnt/temp
# mount /dev/mapper/vg--db--vda-set.<N>.root /mnt/temp/

- Edit the /etc/rc.sysinit.f5 file:

# vi /mnt/temp/etc/rc.sysinit.f5

- Replace this line:

        echo $VADC_MIN_FREE_KB > /proc/sys/vm/min_free_kbytes

with this line (use the <KBYTES> value noted before):

        echo <KBYTES> > /proc/sys/vm/min_free_kbytes

- Unmount the disk volume:

# umount /mnt/temp/

- Reboot into the new software volume

Fixed Versions:
21.1.0


2185281 : Per-request policy variable assignment of perflow.category_lookup.result.primarycategory may lead to crash

Links to More Info: BT2185281

Component: Access Policy Manager

Symptoms:
Assigning a wrong value longer than 4096 to perflow.category_lookup.result.primarycategory may lead to a TMM crash.

Conditions:
-- Per-request policy
-- Assign the value of an incompatible variable to perflow.category_lookup.result.primarycategory

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Do not assign values that are not supposed to be category id to perflow.category_lookup.result.primarycategory.
If such value is assigned change variable assign to correct one.

Fixed Versions:
21.1.0


2185109 : High memory usage in REST query for ASM policies and virtualServers with huge L7 policy

Component: Application Security Manager

Symptoms:
A REST query for ASM policies with associated Virtual Servers fails and causes the ASM-config daemon process to consume massive amounts of memory. This only occurs if there is a large LTM policy on the system with many ASM policy associations.

Conditions:
There is a large LTM policy on the system with many ASM policy associations, and a REST query for ASM policies with associated Virtual Servers is issued.

Impact:
The REST query fails and causes the ASM-config daemon process to consume massive amounts of memory.

Fix:
ASM policies with Virtual Server associations can be successfully retrieved in REST.

Fixed Versions:
21.1.0


2184897-3 : Tenant disk size modification is ineffective for var/log folder

Links to More Info: BT2184897

Component: TMOS

Symptoms:
Due to insufficient free disk space on the VM, the /var/log resize operation could not be applied on reboot.

Conditions:
When available disk space on the VM is insufficient for the requested directory resizing.

Impact:
You will not know if resizing will succeed/fail ahead of time.

Workaround:
Manually calculate and allocate disk space within the range of available disk space.

Fix:
Improved validation has been added for directory resize operations. If the available disk space is less than the requested size, the command now fails immediately with a clear error message, allowing users to identify resize issues at the time of requesting.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.3, 17.1.3.1


2183705 : Improper access control on SMTP

Links to More Info: K000156643, BT2183705

Component: Application Visibility and Reporting

Symptoms:
Security best practices are not being followed for SMTP in BIGIP.

Conditions:
NA

Impact:
Unexpected behaviour

Fix:
Security best practices are being followed.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


2183353 : TMM Intel E810 VF driver updates the link state with 1 second delay

Links to More Info: BT2183353

Component: Local Traffic Manager

Symptoms:
TMM gets the old link state from the driver level. It leads to 1 second delay for the link state change.
The problem may also create link flapping messages in /var/log/ltm for the same interface in some conditions:
Sep 17 15:02:22 notice mcpd[7553]: 01b5004a:5: Link: 1.8 is UP
Sep 17 15:02:22 notice mcpd[7553]: 01b5004a:5: Link: 1.2 is UP
Sep 17 15:02:22 notice mcpd[7553]: 01b5004a:5: Link: 1.8 is DOWN
Sep 17 15:02:22 notice mcpd[7553]: 01b5004a:5: Link: 1.2 is DOWN
Sep 17 15:02:22 notice mcpd[7553]: 01b5004a:5: Link: 1.8 is UP

Conditions:
- The interface link state is changed.
- Multiple VFs of the same physical interface are attached to BIG-IP VE.

Impact:
Link state is updated with a delay.

Workaround:
None

Fix:
TMM correctly get the link state from the driver layer.

Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1


2183241 : Trunk egress traffic is not balanced on some platforms.

Links to More Info: BT2183241

Component: TMOS

Symptoms:
Trunk egress traffic (out) distribution might not be balanced on the following platforms:
- C117 iSeries i2000
- C117 iSeries i850 (Japan)
- C115 iSeries i4000

Conditions:
- Trunk configured.
- Platform on the affected list:
 C117 iSeries i2000
 C117 iSeries i850 (Japan)
 C115 iSeries i4000

Impact:
Trunk egress (out) traffic is not balanced.

Workaround:
None

Fixed Versions:
21.1.0


2183233 : TMM crash due to extra trailing CR/LF in iSession reconnects

Links to More Info: BT2183233

Component: Access Policy Manager

Symptoms:
On BIG-IP APM systems, a Traffic Management Microkernel (TMM) crash may occur when a client device sends an extra trailing carriage return/line feed (CR/LF) during an iSession tunnel reconnect. This issue was observed to be triggered by a specific client device and user scenario, where the Edge Client installation was a hybrid of multiple versions, resulting in the transmission of unexpected CR/LF characters after the iSession request.

Conditions:
iSession tunnels in use.
Client device sends an extra CR/LF after the iSession request, often due to a hybrid or corrupted Edge Client installation.

Impact:
Traffic disrupted while tmm restarts.
Disruption of user sessions.
The issue is highly specific to certain client configurations and is not expected to be widespread.

Workaround:
None.

Fix:
The fix addresses the scenario where the HTTP filter does not unpause ingress when moving to passthrough mode, and iSession/VPN filters may mishandle unexpected CR/LF data.
The fix ensures that extra CR/LF data does not cause the TMM to crash during iSession reconnects.
Engineering Hotfixes (EHF) are available for 17.1.3 (including rollup with EHF 0.20.11).

Fixed Versions:
21.1.0


2182357 : Inconsistent Default Source Address Selection for Virtual Server Between POST and PUT Requests

Component: TMOS

Symptoms:
When a PUT request is made without specifying a source address, the system defaults to an IPv6 address (::). If the destination address is IPv4, this causes a validation error due to the mismatch between the source and destination address types.

Conditions:
A PUT request issued without a source address, having the destination address IPv4
The system attempts to apply a default IPv6 source address

Impact:
The request fails with an address type mismatch error, requiring users to specify a compatible source address. This inconsistency between POST and PUT operations may cause confusion for users.

Workaround:
Explicitly specify a source address that matches the type (IPv4 or IPv6) of the destination address in the request payload.

Fix:
The behavior of PUT requests has been updated to match that of POST requests. If a source address is not specified, the system now selects an appropriate default (IPv4 or IPv6) based on the destination address, ensuring consistency and avoiding address type mismatch errors.

Fixed Versions:
21.1.0


2182061 : Management routes not installed on reboots when interface route is recursively required.

Links to More Info: BT2182061

Component: TMOS

Symptoms:
Management routes might not be installed on reboots or config loads when interface route is recursively required.

Conditions:
Have an interface mgmt route, similar to:

    sys management-route /Common/mgmt_gw {
        network 10.10.10.10/32
        type interface
    }

And a mgmt route that uses a hop defined by an interface route:

sys management-route r1{
    gateway 10.10.10.10
    network 10.10.20.1/32
}

Impact:
Some management routes are not installed properly post reboot or config load.

Workaround:
None

Fixed Versions:
21.1.0


2182045 : The iavf driver might drop some IPv6 packets that contain destination option or routing type 2 headers

Links to More Info: BT2182045

Component: Local Traffic Manager

Symptoms:
Some IPv6 packets that contain a destination option header and/or a routing type 2 header are processed by the BIG-IP.

A tcpdump on the BIG-IP does not show the packets.

The tmm/xnet_rx_stats:cd_empty stat is incremented
The tmm/xnet/iavf/per_q_stats:rx_sw_drop might be incremented.

Conditions:
A platform that utilizes the iavf driver:
  R2800
  R4800
  VE with SR-IOV with an Intel 810 NIC

IPv6 traffic is sent to the BIG-IP that contains a destination option or routing type 2 header.

Impact:
Packets are dropped and not processed.

Workaround:
None

Fixed Versions:
21.1.0, 17.1.3.1


2179729 : MCPD memory leaks during repetitive configuration create/modify/delete cycles combined with ongoing config-sync activity.

Links to More Info: BT2179729

Component: TMOS

Symptoms:
The eXtremeDB configuration database grows continuously over time in long‑duration testing, even when objects are deleted.

Conditions:
-- Long duration run with create, modify, delete configuration objects.
-- High Availability (HA) enabled

Impact:
MCPD memory becomes very large on lab HA devices.

Workaround:
None

Fixed Versions:
21.1.0, 21.0.0.1


2173429 : Digest and NTLM Authorizations Not Functioning

Component: Application Security Manager

Symptoms:
-- Bruteforce violations are not raised for NTLM or Digest authorization types.

Conditions:
-- Bruteforce with NTLM or Digest authorization enabled

Impact:
-- Bruteforce enforcement is not happening for Digest and NTLM Authorization types

Workaround:
None

Fix:
Digest and NTLM authorizations work as expected

Fixed Versions:
21.1.0


2172069 : GTM topology regions updates do not take effect within tmm

Links to More Info: BT2172069

Component: Global Traffic Manager (DNS)

Symptoms:
GTM topology regions updates do not take effect within tmm

Conditions:
Modifications made to gtm topology regions do not take effect when only one client is sending queries. Note that this issue is tmm-thread specific, meaning one or more tmm threads can get into this state, as long as DNS queries keep hitting the same tmm thread(s), coming from the same source IP address(es)

This is a very unlikely scenario in most production environments, and is likely to only be seen during lab testing with client traffic from one or few IP addresses.

Impact:
GTM not answering with latest GTM topology region updates.

Workaround:
Restart tmm, or perform the DNS lookup from a different client IP address (not the same address that the affected tmm thread previously processed a topology-based DNS query from)

Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1


2172041 : Zone transfer fails for dnsx when the zone file contains TLSA records

Links to More Info: BT2172041

Component: Global Traffic Manager (DNS)

Symptoms:
Dns express zone transfer fails.

Conditions:
Zone containing TLSA records.

Impact:
Zone not able to be transferred to dns express.

Workaround:
None

Fixed Versions:
21.1.0


2171845 : Manual Sync in Sync-Failover device group may result in differences in attached Logging Profiles on virtual server

Links to More Info: BT2171845

Component: TMOS

Symptoms:
Devices show "In Sync" but have different logging profiles attached to the same Virtual Server.

Conditions:
- Manual with Incremental sync or Manual with Full sync in sync and overwrite scenario

Impact:
Discrepancy in attached logging profiles on the Virtual Server across HA devices.

Workaround:
Manually align logging profiles

Fixed Versions:
21.1.0


2163777-1 : Tmm core on fw_nat_classify() while nat rule configuration is being changed

Links to More Info: BT2163777

Component: Advanced Firewall Manager

Symptoms:
TMM may crash with a segmentation fault in fw_nat_classify() during NAT rule configuration changes, causing service disruption.

Conditions:
Occurs during NAT rule delete configuration modification

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None

Fixed Versions:
21.1.0


2163585 : Migration fails "Spanning Tree Protocol (STP) is not supported on this platform"

Links to More Info: BT2163585

Component: TMOS

Symptoms:
Migration fails due to "Spanning Tree Protocol (STP) is not supported on this platform".
STP is a configuration for physical interfaces; F5OS tenants use interfaces/vlans defined in the F5OS underlying operating system.

Conditions:
migration to F5OS tenant from bare-metal BIG-IP with STP configured (e.g. from iSeries bare-metal to F5OS tenant).

Impact:
migration fails with:
010713d0:3: Symmetric Unit Key decrypt failure - decrypt failure
Unexpected Error: Loading configuration process failed.

/var/log/ltm shows:
Dec 2 13:55:11 localhost.localdomain err mcpd[7147]: 010713d0:3: Symmetric Unit Key decrypt failure - decrypt failure
...
Dec 2 13:55:14 localhost. localdomain err mcpd[7147]: 01070686:3: Spanning Tree Protocol (STP) is not supported on this platform.
Dec 2 13:55:14 localhost.localdomain err tmsh[20673]: 01420006:3: Loading configuration process failed.
Dec 2 13:55:14 localhost.localdomain emerg load_config_files[20656]: "/usr/bin/tmsh -n -g -a load sys config partitions all platform-migrate" - failed. -- Loading schema version: <BIG-IP-version>

Workaround:
Modify the "net stp-globals" object to not contain "mode" stp/mstp/rstp

Fix:
STP configuration is removed during the migration to F5OS tenant.

Fixed Versions:
21.1.0, 21.0.0.1


2163545 : Bot Defense profile does not support js tag injection for compressed html pages.

Component: Bot Defense

Symptoms:
Bot defense Javascript injection does not occur if the HTML pages are compressed.

Conditions:
Virtual server is configured with a bot defense profile. Virtual server serving content from a backend server that serves compressed html pages.

Impact:
Compressed html page is sent to the client without the injected Javascript. As a result, Bot Defense checks are not performed for sessions that serve compressed HTML pages from the backend server.

Workaround:
None

Fixed Versions:
21.1.0


2163321 : Broken Address List hyperlink in the destination field of Virtual Server list

Links to More Info: BT2163321

Component: TMOS

Symptoms:
Clicking on the Address List hyperlink in the destination field of Virtual Server list directs the user to a Create new address list page instead of the expected address list page

Conditions:
1) A Virtual Server is set up with an address list
2) User clicks on the address list hyperlink in the Virtual Server list

Impact:
Hyperlink takes you to the wrong page.

Workaround:
None

Fixed Versions:
21.1.0, 17.5.1.4


2162941-2 : Support MDM with GCC High / DoD Environments

Links to More Info: BT2162941

Component: Access Policy Manager

Symptoms:
Endpoint Management Systems for Intune communicate only with commercial Intune endpoints. Now MDM needs to be integrated with Microsoft GCC High and DoD environments.

Conditions:
When MDM needs to be integrated with the Microsoft GCC High and DoD environment

Impact:
User may not be able to use Microsoft GCC High and DoD environments because of non-configurable Graph and Auth URLs in APM.

Workaround:
None

Fix:
User should have configurable options for Microsoft Graph and Auth URLs.

Fixed Versions:
21.1.0


2162937-1 : TMM crash when AFM is enabled

Links to More Info: BT2162937

Component: Advanced Firewall Manager

Symptoms:
The BIG-IP system experiences repeated TMM crashes when handling DNS DoS traffic.

Conditions:
This issue occurs on BIG-IP AFM version 21.0.0 with DNS DoS

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None

Fix:
Handled malformed packets.

Fixed Versions:
21.1.0, 21.0.0.1


2162905 : AFM GUI does not display Port List members in Properties panel

Links to More Info: BT2162905

Component: Advanced Firewall Manager

Symptoms:
AFM GUI fails to display port-list members in the Properties pane

Conditions:
Occurs when viewing any Port List object in the AFM Policy Editor GUI

Impact:
Administrators cannot visually verify port-list contents in the GUI

Workaround:
Tmsh list security firewall port-list <port_list_name>

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4


2162861 : 'Connectors' creation screen does not appear

Links to More Info: BT2162861

Component: Access Policy Manager

Symptoms:
When you click Access > Authentication from the WebUI, select AAA Server By Type > Connectors & Configurations from the pull-down menu, and click the Create button, the creation screen does not appear.

Conditions:
Connectors & Configurations from AAA Server by Type

Impact:
Creation screen does not appear.

Workaround:
None

Fixed Versions:
21.1.0


2162849-3 : Removing the active controller does not trigger an immediate tenant failover

Links to More Info: BT2162849

Component: TMOS

Symptoms:
When a system controller is removed from a VELOS chassis, any Active BIG-IP tenants running from that controller do not automatically fail over.

Conditions:
-- BIG-IP Tenant is active for a traffic group
-- The BIG-IP tenant is running on a controller that is active for the partition on which the tenant is running
-- The Active system controller is removed or powered off using AOM

Impact:
Tenant failover is delayed by up to 4 minutes when an active system controller of the active tenant is pulled out .

Workaround:
None

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4


2162801-1 : MCP hung during shutdown when any exception/ abnormal restart while booting up

Links to More Info: BT2162801

Component: TMOS

Symptoms:
The MCP would hang during shutdown if any exceptions or abnormal restarts occurred while booting up.

Conditions:
Rarely getting this, so there is no specific scenario

Impact:
MCPD will not be up and running

Workaround:
MCPD restart

Fix:
Make sure it kills the proper PID while rebooting.

Fixed Versions:
21.1.0, 21.0.0.1


2162705 : Tmm restarting on multi-NUMA AWS instances with ENA interfaces

Links to More Info: BT2162705

Component: Local Traffic Manager

Symptoms:
Tmm is in the restart loop because dpdk driver is failing to attach with the error message in tmm log:

notice dpdk: [0000:00:06.0]: Multiple NUMA nodes usage is unsupported.

Conditions:
- BIG-IP VE large instance deployed on AWS cloud.
- NUMA node count more than 1 (check "lscpu | grep NUMA").

Impact:
Unable to use dpdk driver on some large AWS instances.

Workaround:
Switch to sock driver: https://my.f5.com/manage/s/article/K10142141

Fix:
DPDK correctly initializes the memory on multi-NUMA AWS instances.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4


2162589 : BD crash with a specific configuration

Component: Application Security Manager

Symptoms:
BD daemon crash and restart

Conditions:
Navigation parameter is configured

Impact:
traffic disturbance, failover.

Workaround:
Remove navigation parameter from the configuration.

Fix:
BD working properly.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


2162573 : Per Cache setting to turn off QNAME minimization

Component: Global Traffic Manager (DNS)

Symptoms:
QNAME minimization is turned on by default in BIGIP (RFC 7816: DNS Query Name Minimisation to Improve Privacy).
BIGIP now provides the ability to turn it off.

Conditions:
NA

Impact:
NA

Workaround:
Not a defect but an improvement.

Fix:
BIGIP provides a setting to turn off QNAME minimization

Fixed Versions:
21.1.0


2162189 : "Live Update" reinstalls the genesis ASU file, while the latest ASU file is installed manually

Links to More Info: BT2162189

Component: Application Security Manager

Symptoms:
When operating in automatic mode, Live Update installs the genesis Automatic Signature Update (ASU) file instead of the manually installed latest ASU file.

Conditions:
Live Update is operating in automatic mode, there are only 2 installations in ASU files installations list, one is genesis file and another is latest ASU file that was published on ESDM.

Impact:
BIG-IP will not install the latest signatures.

Workaround:
Live Update should be switched to manual mode. The latest ASU file should be installed manually again instead of the genesis ASU file. When the newer ASU file is available on ESDM, do not install it manually, but switch Live Update to automatic mode again.

Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1


2161077-1 : Bot profile properties page does not load when there are large number of SSL certs (> 1000)

Links to More Info: BT2161077

Component: TMOS

Symptoms:
When a large number of SSL certs are present, the Bot Defense profile properties page (Security > Bot Defense > Bot Profile Properties) does not load correctly

Conditions:
- ASM is provisioned
- SSL cert count > 1000

Impact:
Bot Defense profile properties page does not load

Workaround:
Use tmsh to manage the Bot profiles.

Fix:
Increase restjavad memory to 1.3GB after applying the fix and restart restjavad

> tmsh modify sys db provision.restjavad.extramb value 1280
> bigstart restart restjavad

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


2161073 : Certificate Bundle Improvement

Component: Local Traffic Manager

Symptoms:
Certificate Bundle is not following best practices

Conditions:
NA

Impact:
Can lead to unexpected behaviour.

Workaround:
No workaround.

Fix:
Certificate bundle is now following best practices

Fixed Versions:
21.1.0


2154057 : MCPD validations not throwing error when snmpv3 password contains more than 77 characters

Links to More Info: BT2154057

Component: TMOS

Symptoms:
After upgrading, mcpd goes into a restart loop. /var/log/ltm contains the following:

err mcpd[13691]: 0107102b:3: Master Key decrypt failure - decrypt failure - final
notice mcpd[13691]: 01071029:5: Master decrypt final
notice mcpd[13691]: 01071027:5: Master key OpenSSL error: 4006860532:error:0606506D:digital envelope routines:EVP_DecryptFinal_ex:wrong final block length:evp_enc.c:653:
notice mcpd[13691]: 01b00001:5: Processed value is empty: class name (usmuser) field name ()
err mcpd[13691]: 01071684:3: Unable to encrypt application variable (/Common/snmpv3user auth_password usmuser /Common/snmpd).

Conditions:
-- SNMPv3 configuration that uses a password containing more than 77 characters
-- An upgrade is performed

This also occurs within a release by saving the config and then forcing a load from text files (`touch /service/mcpd/forceload && pkill mcpd`)

This may also occur with auth-password or privacy-password values that are 78 characters in length or longer

Impact:
- SNMP configuration does not function.
- If the device is rebooted or MCPD is restarted, the system will remain INOPERATIVE or MCPD will be in a restart loop.

Workaround:
If a device is currently in an inoperative state and affected by this issue:

- Create a backup copy of /config/bigip_base.conf
- Manually edit bigip_base.conf and remove the SNMPv3 users and traps
- If the system does not recover automatically, restart MCPD or reboot the device once.

Fixed Versions:
21.1.0


2154005 : Importing iApp RPM may not provide a message about already installed, upgrading, or downgrading.

Links to More Info: BT2154005

Component: iApp Technology

Symptoms:
No warning messages appear when importing an RPM for an iApp Package already installed.

Conditions:
Multiple different iApp RPMs are installed, and trying to import an RPM for one of them.

Impact:
User is not presented with warning messages about the RPM:
-- Already Installed
-- Upgrading the RPM
-- Downgrading the RPM

Workaround:
Previously, the JavaScript code tracked only the most recently installed package when comparing against the current package, ignoring older packages. This issue has been fixed by adding support to track all packages.

Fix:
Previously, the JavaScript code tracked only the most recently installed package when comparing against the current package, ignoring older packages. This issue has been fixed by adding support to track all packages.

Fixed Versions:
21.1.0


2154001 : Virtual server statistics dashboard "Requests" column does not increment when http2 MRF option is in use

Links to More Info: BT2154001

Component: Local Traffic Manager

Symptoms:
When running tmsh show ltm virtual, it shows
Total Requests=0 even when there is traffic to the virtual server.

Conditions:
Http2 MRF enabled per
https://techdocs.f5.com/kb/en-us/products/big-ip_ltm/manuals/product/big-ip-http2-full-proxy-configuration-14-1-0/01.html

Impact:
Virtual server stats not reflecting reality

Workaround:
None

Fixed Versions:
21.1.0


2153893 : With DNS64 configured, resolution aborts early on the first error response without trying other name servers.

Links to More Info: BT2153893

Component: Global Traffic Manager (DNS)

Symptoms:
When multiple name servers for a zone are known, as soon as one name server responds with an error rcode, resolution is aborted and other name server are not tried.

Conditions:
-- DNS64 is configured.
-- More than one name server is configured for a zone.
-- One name server responds with an error rcode.

Impact:
DNS resolution will intermittently fail. DNS resolution will succeed only if the cache randomly selects a working name server to contact first.

Workaround:
Disable DNS64.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


2153489 : MCPD crash in FolderMgr::validate_deleted_folder_queue due to race condition clearing folder_delete_queue mid-iteration (v21)

Links to More Info: BT2153489

Component: TMOS

Symptoms:
-- System crashes with a segmentation fault during folder deletion operations.

-- Core dump observed in FolderMgr::validate_deleted_folder_queue.

Conditions:
Concurrent Operations

Thread 1 is performing a folder deletion and iterating over folder_delete_queue in FolderMgr::validate_deleted_folder_queue.

Thread 2 is processing a virtual server query and calls AuthZ::current_context (setter), which invokes FolderMgr::reset_deleted_folder_queue().

Impact:
Traffic and management disrupted while mcpd restarts.

Workaround:
None

Fixed Versions:
21.1.0, 21.0.0.1


2153425-1 : MCPD worker core

Links to More Info: BT2153425

Component: TMOS

Symptoms:
MCPD worker core due to a possible double free.

Conditions:
While the main thread is processing the folders, the worker is processing the query and, in doing so, sets the context, which resets the delete folder queue as well. This causes the main thread to access an empty queue and could lead to a crash.

Impact:
MCPD core

Fix:
Make sure the worker is not going to delete folders while handling the folder context

Fixed Versions:
21.1.0, 21.0.0.1


2152877 : Exclude /opt/CrowdStrike directory from Integrity Test

Links to More Info: BT2152877

Component: TMOS

Symptoms:
CrowdStrike directory needs to be excluded from Integrity Test

Conditions:
CrowdStrike directory not present in Integrity Test exception list

Impact:
System integrity fails after Crowdstrike installation via falcon sensor

Workaround:
None

Fix:
CrowdStrike directory added Integrity Test exclusion

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


2152785 : TMM may crash under certain conditions.

Component: Local Traffic Manager

Symptoms:
TMM crashes when HTTP/2 traffic

Conditions:
When HTTP/2 profile is configured on TMM.

Impact:
Traffic is disrupted

Workaround:
Add http router to the virtual, converting to HTTP/2 Full Proxy mode from HTTP/2 Gateway mode.

Fix:
TMM handling HTTP/2 traffic properly

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


2152689 : ASM GUI "Failed to load requests" pop-up

Links to More Info: BT2152689

Component: Application Security Manager

Symptoms:
A "Failed to load requests" pop-up appears on the page.

REST framework responds with:
{"code":400,"message":"A valid filename must be supplied"}
This is visible in the log of the web browser's interaction with the BIG-IP UI (.har file).

Conditions:
A user with username that contains a slash i.e. "my\name"
clicking
on Security -> Event Logs -> Application -> Requests
or Security -> Event Logs -> Bot Defense -> Bot Requests

Impact:
Can't view request details

Workaround:
Do not use '/' in the username

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


2152601-1 : Repeated restarts of the MCPD service result in a continuous restart loop accompanied by error messages: An unexpected failure has occurred, MCO_ERR_EV_SYN - Synchronous events

Links to More Info: BT2152601

Component: TMOS

Symptoms:
Continuous restart of MCPD accompanied by error messages: An unexpected failure has occurred, MCO_ERR_EV_SYN - Synchronous events.

Conditions:
This occurs after 10 restarts of MCPD service.

Impact:
BIGIP services are impacted as MCPD is down.

Workaround:
Reboot device.

Fix:
This issue is fixed by cleaning up the resource during every MCPD restart.

Fixed Versions:
21.1.0, 21.0.0.1


2152545-1 : [APM][SAML] High TMM memory sso_saml leak

Links to More Info: BT2152545

Component: Access Policy Manager

Symptoms:
Tmm crashes due to out of memory while passing SAML-SSO traffic

Conditions:
-- Configure a BIG-IP as SAML-SP with ACS binding.
-- Configure SSO for IDP.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None

Fixed Versions:
21.1.0


2152445 : "Live Update" API is unresponsive after upgrade and recover only after tomcat restart

Links to More Info: BT2152445

Component: Application Security Manager

Symptoms:
After upgrading BIG-IP, the Live Update GUI displays an empty installation list. Errors are logged in the Tomcat log file. When attempting to refresh the Live Update page, additional errors appear in the Live Update log file.

Conditions:
"Live Update" has very long list of installations of ASU files.

Impact:
After the upgrade, BIG-IP retains the latest signatures that were present before the upgrade. The Live Update feature becomes non-functional until it is restarted.

Workaround:
Before upgrading, shorten ASU file installations by removing old entries. This helps prevent issues. If a problem occurs, restart the Live Update system.

Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1


2152397 : BIG-IP support for f5optics packages built after October 2025

Component: TMOS

Symptoms:
-- F5optics v1.0.0 packages released in November 2025 (build 66.0) or later cannot be installed on BIG-IP or BIG-IQ versions released during November 2025 or earlier.
-- If F5optics v1.0.0 packages prior to build 67.0 (January 2026) are included in an Engineering Hotfix, the F5optics v1.0.0 package will not be upgraded successfully.

Conditions:
This may occur under the following conditions:
-- Attempting to install an updated f5optics v1.0.0 package build 66.0 (November 2025) or later, on a BIG-IP or BIG-IQ version released November 2025 or earlier.
-- Installing an Engineering Hotfix containing F5optics v1.0.0 package build 66.0 or earlier.

Impact:
-- You cannot install the latest f5optics v1.0.0 package.
-- You may not be able to update the f5optics v1.0.0 package when included in an Engineering Hotfix.

Workaround:
None

Fix:
F5optics v1.0.0 packages released in November 2025 (build 66.0) or later can now be successfully installed.
F5optics v1.0.0 packages released in January 2026 (build 67.0) or later can now be successfully installed via an Engineering Hotfix.

Behavior Change:
BIG-IP and BIG-IQ releases with this fix will not allow installation of f5optics v1.0.0 packages prior to build 66.0.

Fixed Versions:
21.1.0


2152301-1 : After upgrading from version 17.1.2 to 17.5.1.3, the guest-role user is unable to run the command show running-config in TMSH.

Links to More Info: BT2152301

Component: TMOS

Symptoms:
Guest-role user is unable to run the command show running-config in TMSH.
Executing this command from TMSH results in an error:

"Unexpected Error: Can't display all items, can't get object count from mcpd"

MCPD throws error:

result_message "01070823:3: Read Access Denied: user (myguest) type (HPKE Key)"

Conditions:
Except for all these 4 user roles, all the other user roles (operator, cert manager, app editor...etc) hit the same error.

- admin
- resource-admin
- log-manager
- auditor

Impact:
Unable to show the running config, or use list or list sys commands.

Workaround:
Login with an account with admin access.

Fixed Versions:
21.1.0, 17.5.1.4


2152269 : Low reputation URIs are found in the URL DB binary

Links to More Info: BT2152269

Component: Access Policy Manager

Symptoms:
Publishing BIG-IQ image to Azure cloud is blocked due to malware scan detecting these low reputed URLs.

Conditions:
When uploading the image on Azure Cloud and these low reputed URLs are detected in malware scanners.

Impact:
No impact on the functionality

Workaround:
None.

Fix:
Low reputation URIs such as che168, cssplay, newliveplayer, tinypic.info referring test code are removed from the product.

Fixed Versions:
21.1.0, 21.0.0.1, 21.0.0, 17.5.1.4, 17.1.3.1


2152137 : New DB variable ve.ndal.driver.netvsc to provide driver selection for Azure/HyperV deployments

Component: TMOS

Symptoms:
Starting v17.5.0, data-plane interfaces in BIG-IP VE deployed in HyperV or Azure automatically use the high-speed, user-space "dpdk" as the default driver.

Conditions:
BIG-IP VE deployments on Microsoft Azure or HyperV with multiple interfaces.

Impact:
None

Workaround:
No mitigation needed as this is not a bug.

Fix:
The new DB variable ve.ndal.driver.netvsc is introduced to allow to switch the driver back to sock.

To switch to sock driver:
tmsh modify sys db ve.ndal.driver.netvsc value sock && reboot

To switch back to dpdk driver:
tmsh modify sys db ve.ndal.driver.netvsc value dpdk && reboot

Fixed Versions:
21.1.0


2151885 : When using service-down-action reset/drop on a pool attached to a DHCP virtual TMM might experience a crash.

Links to More Info: BT2151885

Component: Local Traffic Manager

Symptoms:
When using service-down-action reset/drop on a pool attached to a DHCP virtual TMM might experience a crash.

Conditions:
DCHP virtual-server with a pool member using service-down-action feature set to 'reject' or 'drop'.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Re-configure service-down-action on a pool member to 'none'.

Fixed Versions:
21.1.0


2151785 : Importing iApp RPM may provide an incorrect downgrading warning message

Links to More Info: BT2151785

Component: iApp Technology

Symptoms:
When importing an iApp RPM, the following warning is shown:
"You are downgrading an iApp package"

Conditions:
Have a an RPM with a version or release that contains a single digit number, and trying upgrade to a newer RPM with a version or release that contains a double digit number.

Impact:
User is presented with a misleading message that the iApp is going to be downgraded.

Workaround:
While the message indicates the iApp is being downgraded, this is misleading and the iApp can still be upgraded.

Fixed Versions:
21.1.0


2151505 : Cmp_dest_velos is automatically installed on system startup.

Links to More Info: BT2151505

Component: TMOS

Symptoms:
/var/run/cmp_dest_velos is automatically installed on tenant startup.
You no longer need to download it from the host containers.

Conditions:
A need to use the VELOS version of the cmp_dest utility.

Impact:
Previously, the cmp_dest utility had to be manually downloaded from the host containers.

Workaround:
Manually download cmp_dest from the host containers.

Fix:
/var/run/cmp_dest_velos is now automatically installed on tenant startup.

Fixed Versions:
21.1.0


2151173 : Starting this release, file uploads that include the percent sign (%) in the filename will be rejected by server-side validation.

Links to More Info: BT2151173

Component: TMOS

Symptoms:
The percent character is reserved for URL encoding and can potentially introduce decoding-related issues. Rejecting '%' in filenames reduces this risk and improves the security of file handling.

Conditions:
Filename with % (URL encoded as %25)

Impact:
Uploads that include '%' in the filename will fail with a validation error.

Workaround:
Rename files to remove or replace '%' before uploading.

Fix:
Upload attempts with a '%' in the filename will return a validation error and the file will not be accepted.

Fixed Versions:
21.1.0


2150669 : TCP Packet loss after upgrade with AFM provisisoned

Links to More Info: BT2150669

Component: Advanced Firewall Manager

Symptoms:
After an upgrade, disabled hardware DOS vectors may use old values.

Conditions:
-- F5OS tenant
-- Upgrade
-- AFM provisioned

Impact:
DOS thresholds may be incorrectly set or set too low resulting in packet loss that causes poor throughput.

Workaround:
Disable and re-enable the disabled DOS vectors.


Log into the BIG-IP GUI and navigate to
Security ›› DoS Protection : Device Protection

Filter attack vectors: tcp

click the "Network" text

Enable all the disabled vectors by clicking on the vector name and changing state from "disabled" to "mitigate".

Then disable the vectors by clicking on the vector name and changing state from "mitigate" to "disabled".

Fixed Versions:
21.1.0


2150525 : Improvements in iControl SOAP

Component: TMOS

Symptoms:
Security best practices were not being followed in iControl SOAP.

Conditions:
NA

Impact:
Can lead to unexpected behaviour.

Workaround:
NA

Fix:
iControl SOAP now has security best practices.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


2150489 : Most DB keys encrypted by SecureVault master key are not persisted to BigDB.dat when the system master key is changed.

Links to More Info: BT2150489

Component: TMOS

Symptoms:
After restarting mcpd, mcpd is stuck in a restart loop.

Conditions:
-- You set a DB variable that's encrypted ( proxy.password, configsync.password)
-- Change the SecureVault master key and save the configuration

Impact:
BIG-IP is in inoperative state , MCPD in a restart loop

Workaround:
If a system is affected by this issue, set the DB key back to its default value. Once the configuration is loaded, set the DB key back to the correct value:

   - tmsh modify /sys db config.auditing.forward.sharedsecret value '<null>'


After changing the SecureValue master key but before encountering the issue, run the following command to update the value of the DB key on-disk:

    setdb config.auditing.forward.sharedsecret "$(getdb config.auditing.forward.sharedsecret)"

Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1


2149253 : QUIC connection stalls with early data

Links to More Info: BT2149253

Component: Local Traffic Manager

Symptoms:
When QUIC client connect with early data, connection stalled.

Conditions:
Configure virtual server with quic + client-ssl with Data 0-RTT enabled (w/ anti-replay).

QUIC client connects with existing session and early data.

Impact:
Failed QUIC/HTTP3 connections.

Workaround:
Disable client-ssl Data 0-RTT.

Fix:
Release SSL egress data.

Fixed Versions:
21.1.0, 21.0.0.1


2149233 : TMM crashes when using SSL

Component: Local Traffic Manager

Symptoms:
Under certain SSL condition, TMM crashes.

Conditions:
When SSL is configured

Impact:
Traffic is disrupted.

Fix:
TMM working properly now.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


2149197 : Rotated Public key used for signature verification of apmclients iso bundle in BIG-IP

Component: Access Policy Manager

Symptoms:
When liveinstall.checksig sys db variable is enabled on the BIG-IP, the automatic installation of apmclients iso image fails.

Conditions:
Starting from apmclients-7262.2025.1203.525-7005.0.iso the automatic installation will fail.

Impact:
Apmclients iso installation fails.

Workaround:
-- Disable ISO Signature Verification
-- Install the desired apmclients iso version
-- Re-enable ISO Signature Verification

Fix:
Apmclients iso installation will be successful.

Fixed Versions:
21.1.0


2144521 : WAF plugin gets incorrect response body when SSE profile is configured on virtual server

Links to More Info: BT2144521

Component: Local Traffic Manager

Symptoms:
When the SSE plugin is enabled, the WAF plugin receives a partial response body.

Conditions:
SSE Profile (Server Sent Events) and WAF plugin enabled on a Virtual Server.

Impact:
WAF plugin sees only part of the ingress stream.

Workaround:
Disable SSE profile on virtual server when WAF plugin is configured.

Fix:
The HUDFILTER order on server side was adjusted to ensure both WAF plugin and SSE HUDFILTER receive the complete response body.

Fixed Versions:
21.1.0, 21.0.0.1


2144513 : Cannot install any BIG-IP version with ISO signature verification enabled

Links to More Info: BT2144513

Component: TMOS

Symptoms:
On affected versions of BIG-IP, if the BIG-IP software ISO file signature checking feature is enabled, attempting to install any BIG-IP version will fail.

Attempting to install the BIG-IP image using either tmsh or the GUI will result in the following error messages (as shown by the "tmsh show /sys software status" command, or hovering a mouse over the "Failed" Install Status message in the GUI):

failed (Signature verification failed - no sig file found)

Conditions:
This occurs on affected versions if the BIG-IP software ISO file signature checking feature is enabled, as described in the following article:
K15225: Enabling signature verification for BIG-IP and BIG-IQ ISO image files
https://my.f5.com/manage/s/article/K15225

Impact:
It is not possible to install any BIG-IP version with the BIG-IP software ISO file signature checking feature enabled.

Workaround:
To successfully install the desired BIG-IP version in such cases:
1. Disable ISO Signature Verification
2. Install the desired BIG-IP version
3. Re-enable ISO Signature Verification

Fix:
BIG-IP versions released on or after October 2025 can be successfully installed with the BIG-IP software ISO file signature checking feature enabled.

Fixed Versions:
21.1.0, 21.0.0.1


2144497 : Mellanox driver timeouts and packet drops on Azure instances with high NIC count

Links to More Info: BT2144497

Component: TMOS

Symptoms:
On Azure instances with high interface count (6 or more) Mellanox linux kernel driver mlx5_core may fail to initialize the interface or attach it very slow. Another symptom of this problem: packets drops because of timeouts in Mellanox device queue processing.
mlx_core will report multiple errors in the kernel logs (run "dmesg | grep mlx5_core" to display it).

Conditions:
- BIG-IP VE instance deployed in Azure with 6 or more interfaces
- Accelerated networking is enabled

Impact:
- Azure instance starting time may be significant
- SSH access may be unavailable
- Packets drops on dataplane Mellanox interfaces

Workaround:
None

Fix:
Device interrupts are assigned on correct vCPUs in Azure/HyperV environments to prevent Mellanox device timeouts.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


2144445 : Insufficient sanitization in TMSH

Component: TMOS

Symptoms:
TMSH is not sanitizing input properly

Conditions:
NA

Impact:
Can cause unexpected behaviour in TMSH

Fix:
TMSH is now properly sanitizing the input.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


2144389 : CVE-2025-40780 BIND vulnerability

Links to More Info: K000157948, BT2144389


2144353 : BIND upgrade to stable version 9.18.41

Links to More Info: BT2144353

Component: Global Traffic Manager (DNS)

Symptoms:
BIND upgrade to stable version 9.18.41.

Conditions:
Using local BIND.

Impact:
BIND upgrade to stable version 9.18.41.

Workaround:
None.

Fix:
BIND upgrade to stable version 9.18.41.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


2144309 : TMM might experience a crash when using a fix for Bug783077

Links to More Info: BT2144309

Component: Local Traffic Manager

Symptoms:
TMM might experience a crash when using a fix for Bug783077.

Conditions:
- Running a fix Bug783077.
- Performing operations on IPv6 routes that use nexthop over link-local address.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None

Fixed Versions:
21.1.0


2143305 : Tmm crash

Links to More Info: BT2143305

Component: Application Security Manager

Symptoms:
TMM may crash when a policy dynamically disables and re-enables L7 DoS through multiple rules.

Conditions:
-- A policy containing multiple rules that disable and then re-enable L7 DoS is attached to a virtual server.
-- An L7 DoS profile is attached to the same virtual server.
-- The policy rule that re-enables L7 DoS does not specify the from-profile attribute.
-- Traffic passes through tmm.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Modify the policy rules that enable L7 DoS to explicitly include the from-profile attribute referencing the attached DoS profile.

Fix:
Handle policy rules that enable L7 DoS without the from-profile attribute in cases where L7 DoS was previously disabled.

Fixed Versions:
21.1.0, 21.0.0.1


2143177 : Add Drop Action to LTM Policy

Component: Local Traffic Manager

Symptoms:
LTM Policy on TMOS currently has action reset to reset the traffic flow.

Conditions:
NA

Impact:
NA

Workaround:
NA

Fix:
LTM Policy on TMOS currently has action reset to reset the traffic flow. In this release, a new action called Drop is added.

Fixed Versions:
21.1.0


2143165 : Oauth tokens are not shown in UI

Links to More Info: BT2143165

Component: Access Policy Manager

Symptoms:
Oauth tokens are not shown in UI

Conditions:
Access >> Overview >> OAuth Reports >> Tokens

Impact:
Oauth tokens are not visible

Workaround:
Use tmsh to see the Oauth Tokens:
"tmsh list / apm oauth token-details db-instance oauthdb"

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


2143101 : SNMP Malfunctioning for IPI BL: Incorrect Statistics Reported

Links to More Info: BT2143101

Component: Advanced Firewall Manager

Symptoms:
The statistics counters retrieved via SNMP and tmctl do not reflect any increments for the corresponding blacklist category, despite packets being dropped and logged as expected.

Conditions:
Blacklist categories populated dynamically via feed lists or automatic updates.

Impact:
Inaccurate stats due to missing statistics.

Workaround:
None.

Fix:
When an IP address is dynamically blacklisted by IP Intelligence (IPI), packets from that source are dropped and logged as expected. The statistics counters for the relevant blacklist category viewed via SNMP or tmctl are also incremented.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


2141365 : Certificates fail to load when whitespace characters are present in multi-cert PEM file

Links to More Info: BT2141365

Component: Local Traffic Manager

Symptoms:
When BIG-IP attempts to load a cert file containing 4 certs and one hf the certificates has a CR/LF before the end delimiter, only the certificates prior to the CR/LF are loaded.

Conditions:
-- Certificate file containing more than one certificate
-- One of the certificates is separated by an extra linefeed

Impact:
The BIG-IP system fails to load the subsequent certs when a previous cert has an extra blank line before the end delimiter. This occurs with no errors.

Workaround:
None

Fixed Versions:
21.1.0


2141337 : Auto-upgrade of the BIG-IP APM Edge Client does not upgrade the MachineTunnel Service on Windows systems

Links to More Info: BT2141337

Component: Access Policy Manager

Symptoms:
When a new version of the MachineTunnel Service is available, the updated BIG-IP APM Edge Client package must be installed.

Conditions:
A new version of the MachineTunnel Service is available for Windows systems.

Impact:
Run the updated BIG-IP APM Edge Client installer package to upgrade the MachineTunnel Service.

Workaround:
Manually install the newest version of the BIG-IP APM Edge Client.

Fix:
The MachineTunnel Service automatically upgrades via the BIG-IP APM Edge Client on Windows systems.

Fixed Versions:
21.1.0, 17.5.1.4


2141305 : SSH Proxy Profile Properties page does not render

Links to More Info: BT2141305

Component: TMOS

Symptoms:
The 'Properties' button of a ssh proxy security profile does not correctly render the profile's page

Conditions:
- AFM provisioned
- Security ›› Protocol Security : Security Profiles : SSH Proxy : SSH
- Right-click on 'Properties' and open in new tab.

Impact:
You are unable to view the SSH Proxy security profile properties.

Workaround:
None

Fix:
SSH Proxy Profile Properties Page Rendering issue is fixed

Fixed Versions:
21.1.0, 21.0.0.1


2141245 : Undisclosed traffic to TMM can lead to resource exhaustion

Component: Global Traffic Manager (DNS)

Symptoms:
Certain traffic sent to TMM is leading to resource exhaustion.

Conditions:
Undisclosed conditions

Impact:
TMM Resource exhaustion

Fix:
DNS LDNS API correction.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


2141233 : Client authentication profile as "Request" in FIPS-CC mode causes connection termination without certificate

Links to More Info: BT2141233

Component: Local Traffic Manager

Symptoms:
SSL handshakes timeout instead of finishing.

Conditions:
1. Clientssl profile configured with Client Authentication enabled with "Request" option
2. BIG-IP is in FIPS-CC mode
3. Client does not provide a certificate

or

1. Clientssl profile configured with Client Authentication enabled with "Ignore" option
2. BIG-IP is in FIPS-CC mode
3. Access Policy applied to the Virtual Server contains an OnDemand Cert Auth agent.
4. Client does not provide a certificate

Impact:
SSL handshakes do not finish but instead timeout.

Workaround:
Workaround 1:
Disable Client authentication.

Workaround 2:
Configure CRL on the Client SSL profile

Workaround 3:
Enable Client Certificate Constrained Delegation (c3d) feature on the SSL profiles(requires Server-SSL profile and this feature forges client cert to server upon cert request from app-server).

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4


2141205 : Tpm-status returns: "System Integrity: Invalid" on BIG-IP versions released since October 2025

Links to More Info: BT2141205

Component: TMOS

Symptoms:
The 'tmsh run sys integrity status-check -a -v' or 'tpm-status' commands incorrectly report system integrity status as 'Invalid' even when the system software has not been modified.

Detailed output of the "tpm-status -v 3 -q" command includes the following messages:

A SIRR database is invalid.
/shared/lib/sirr/v1.0/SIRR validity: 1
/usr/lib/sirr/SIRR validity: 0

Conditions:
This occurs if all of the following conditions are true:

-- You are using one of the following BIG-IP software versions:
   -- v17.5.1.4 or v17.1.3.1, or later v17.x releases.
   -- Engineering Hotfixes built on or after October 15, 2025, based on BIG-IP software v17.5.1.3, v17.1.3, v16.1.6.1, v15.1.10.8 or later version, which contains an updated 'sirr-tmos' package in the Engineering Hotfix ISO.

-- You have installed one of the above software releases on one of the following TPM-supported BIG-IP platforms:
   -- iSeries appliances
   -- VIPRION B44xx blades (B4450, B4460)

Impact:
The integrity of the system boot components validated by the Trusted Platform Module (TPM) may not be correctly reported. The system integrity status shows Invalid, when the actual status may be Valid.

Workaround:
None.

Fix:
Trusted Platform Module (TPM) status now shows the correct system integrity status for supported releases and platforms.

Fixed Versions:
21.1.0


2141125-1 : Multicast traffic is dropped with incorrect VLAN tagging

Links to More Info: BT2141125

Component: Local Traffic Manager

Symptoms:
F5OS hardware platforms utilizing multicast routing and PIM across multiple VLAN interfaces may forward incoming multicast traffic to multiple outgoing VLAN interfaces with incorrect VLAN tagging. This behavior can lead to the successive addition of VLAN headers, resulting in a cascading accumulation of VLAN tags.

Conditions:
F5OS platforms configured with
 - Multicast routing enabled.
 - Configured with multicast protocols - PIM, OSPF etc.
 - 2 or more VLAN interfaces present for outgoing multicast traffic path .i.e. minimum of 3 or more VLAN interfaces configured with multicast routing, so that if one interface has incoming multicast traffic, it goes through atleast 2 or more other VLAN interfaces.

Impact:
Multicast traffic dropped on VLAN interfaces receiving more than 1 VLAN tagging in the packet.

Workaround:
None.

Fixed Versions:
21.1.0


2141109 : The URL categorisation daemon's DNS cache is never refreshed

Links to More Info: BT2141109

Component: Traffic Classification Engine

Symptoms:
When the URL categorisation daemon (wr_urldbd) starts or restarts, it queries the DNS resolver for the Brightcloud online service domains that are used for some of the real-time URL queries, and populates the DNS Cache with the results.
After populating the cache, it never refreshes or updates it.

When Brightcloud change the DNS records of their service domains, all the new SSL handshakes from the URL categorisation daemon, needed for the real-time URL categorisation queries, fail with these errors in wr_urldbd.out:

WR_URLDBD: Sep 30 12:01:08.836:Tid(41843):async_lookupCallback:702 Error processing URL:*.example.com and Status Code:S_ErrArg
BC_SDK: 2025-09-30 12:01:08 ERROR: SslIO::StartSSLHandshake::SSL_connect() failed::SSL error: 1

BC_SDK: 2025-09-30 12:01:08 ERROR: SSL error: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
BC_SDK: 2025-09-30 12:01:08 ERROR: SslIO::StartSSLHandshake::SSL_connect() failed::SSL error: 1

Conditions:
- URL categorisation license installed on the system, and URL categorisation configured and in use.

Impact:
Some time after the URL categorisation daemon starts or restarts, all URL categorisation real-time queries for URLs not already in the local database fail.

Workaround:
When the real-time queries start failing with the error described above, restart the wr_urldbd daemon with:
"bigstart restart wr_urlrdbd"

Fixed Versions:
21.1.0


2141061 : iControl REST API Endpoints enhancements

Component: Local Traffic Manager

Symptoms:
iControl REST API endpoints were not following best practices

Conditions:
NA

Impact:
Can lead to arbitrary behaviour

Fix:
iControl REST API endpoints are now following best practices

Fixed Versions:
21.1.0


2140949 : Need a clean up of dns-resolver f5-aws-dns

Links to More Info: BT2140949

Component: Application Security Manager

Symptoms:
Unused configuration is included in profile_base.conf

Conditions:
Configurations containing "dns-resolver f5-aws-dns" in profile_base.conf

Impact:
Some unused configuration is in profile_base.conf. It is otherwise benign.

Workaround:
None

Fixed Versions:
21.1.0


2140905 : System Integrity Test on VE is halting the whole system in FIPS mode

Links to More Info: BT2140905

Component: TMOS

Symptoms:
System Integrity Test on VE halts the whole system in FIPS mode

Conditions:
-- BIG-IP Virtual Edition
-- FIPS Mode enabled
-- Falcon sensor installed

Impact:
System integrity test fails and the system will not boot.

Workaround:
None

Fix:
System Integrity Test on VE will stop tmm in FIPS mode now and user can bigstart tmm start.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


2140901 : Add new ssl-certificate subject and issuer DN conditions to LTM Policy.

Component: Local Traffic Manager

Symptoms:
LTM Policy on TMOS currently has condition ssl-certificate only support common-name selector.
In this release, added new selectors subject-dn and issuer-dn for ssl-certificate with "contains" condtion.

Conditions:
Configure LTM policy.

Impact:
N/A

Workaround:
Add new ssl-certificate subject and issuer DN conditions to LTM Policy.

Fix:
Added new ssl-certificate subject and issuer DN conditions to LTM Policy.

Fixed Versions:
21.1.0


2140621 : CVE-2025-8677: Resource exhaustion via malformed DNSKEY handling

Links to More Info: K000157317, BT2140621


2140213 : Xnet-netvsc driver crash

Links to More Info: BT2140213

Component: TMOS

Symptoms:
TMM crashes due to lack of memory to configure subchannels needed for queues in DPDK which ultimately results in a NULL pointer exception.

The lack of memory occurs when the product of (number of TMMS)*(number of NICs) becomes very large due to memory footprint each TMM needs to operate so many NICs.

In /var/log/tmm:

notice hn_nvs_alloc_subchans(): nvs subch alloc failed: 0x2
notice hn_dev_configure(): subchannel configuration failed
notice Port5 dev_configure = -5

Conditions:
1) xnet-netvsc driver (HyperV or Azure)
2) (number of TMMs)*(number of NICs) is big; confirmed with 8 TMMs and 4 NICs on Azure F8s v2 instance.

Impact:
TMM goes into restart loop and never becomes Active, disrupting traffic.

Workaround:
A) Reduce the number of NICs in the environment
B) Reduce the number of TMMs by running the following and then restarting with 'bigstart restart tmm'
  tmsh modify sys db provision.tmmcount value <tmm_count>

Fix:
Added handling when DPDK subchannel configuration errors occur

Fixed Versions:
21.1.0, 17.5.1.4


2139965 : AFM DNS DOS logging protocol_dns_dos_nxdomain_field_attack_name()

Links to More Info: BT2139965

Component: Advanced Firewall Manager

Symptoms:
Tmm crashes are observed for specific configurations where log_data_autodos or related settings (log_data_dos_nxdomain) are used.

The crash occurs for every 1 to 2 hours after DNS NXDOMAIN learning begins.

Logs from the crash may indicate issues in protocol_dns_dos_nxdomain_field_attack_name() function or references to log_data_dos_nxdomain.

DNS NXDOMAIN learning fails entirely and does not function as expected, preventing proper logging or learning.

Conditions:
This can occur 1-2 hours after enabling log_data_autodos or log_data_dos_nxdomain

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Set the dos.dnsnxdomain.learnperiod parameter to a larger value that is more comfortable for the situation.

Fixed Versions:
21.1.0


2139921 : Invalid Length PCRE Expression Was Allowed Through REST API

Links to More Info: BT2139921

Component: Application Security Manager

Symptoms:
The regex validation string for parameters is intended to be limited to a maximum length of 254 characters, but this validation was not enforced correctly via the REST API.

Conditions:
A lengthy PRCE expression is set for a parameter using the REST API

Impact:
ASM goes into a restart loop.

Workaround:
None

Fix:
PCRE Expression with invalid length is no longer allowed through REST API

Fixed Versions:
21.1.0


2139901 : Server-ssl profile "do-not-remove-without-replacement" is recreated

Links to More Info: BT2139901

Component: Application Security Manager

Symptoms:
A required profile for a deprecated service is recreated on restart, but not saved to bigip.conf

Conditions:
The "do-not-remove-without-replacement" profile is deleted and the bewaf daemon is restarted

Impact:
The profile is recreated, but not saved to bigip.conf without another user action.

Workaround:
"tmsh save sys config" can be run to save the active config to bigip.conf

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


2139637 : TMM crash because of invalid context

Links to More Info: BT2139637

Component: Local Traffic Manager

Symptoms:
Tmm crashes during QUIC packet loss handling due to invalid context.

Conditions:
LTM configured with UDP and QUIC.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None

Fix:
Use the proper context in QUIC packet loss handling.

Fixed Versions:
21.1.0


2138077 : SAML redirect signature validation fails when RelayState is present with want-detached-signature=true in BIG-IP APM 17.1.x

Links to More Info: BT2138077

Component: Access Policy Manager

Symptoms:
SAML authentication fails with errors such as “Invalid signature” or “Signature verification failed”

Conditions:
SAML SP is configured with:

is-authn-request-signed = true

sso-binding = http-redirect

want-detached-signature = true

A RelayState parameter is included in the SAML AuthnRequest.

Occurs on BIG-IP APM versions 17.1.x and above.

Impact:
End users are unable to log in using SSO due to authentication errors

Workaround:
Remove the RelayState parameter from the SAML AuthnRequest configuration, if possible.

This restores successful signature validation.

Example: remove relay-state from the SP AAA SAML object configuration.

Alternatively, use HTTP-POST binding instead of HTTP-Redirect.

There is no configuration-based workaround if RelayState is required and Redirect binding must be used.

Fixed Versions:
21.1.0, 21.0.0.1


2137977 : Clicking on a policy in a virtual server's resource page navigates to the full policy list, instead of the specific policy

Links to More Info: BT2137977

Component: TMOS

Symptoms:
The hyperlink for the policy on virtual server's resource page navigates to the incorrect location.

Conditions:
Virtual server with an ltm policy attached.

Impact:
The hyperlink navigates to the full policy list, so the specific policy would still need to be found in the full list to navigate to it.

Workaround:
None

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


2137973 : Common Criteria requirements mandate strict values for notBefore and notAfter that current implementation does not satisfy

Links to More Info: BT2137973

Component: Local Traffic Manager

Symptoms:
Currently, the notBefore and notAfter fields of the temporarily-issued certificate equal those of the server certificate. It is possible that the notBefore field precedes the current time while the notAfter field may be later than the expiry date of the CA's signing certificate.

Common Criteria does not allow these. It requires that, for a temporarily-issued (i.e. forged) certificate:
1. The notBefore date is equal to or greater than the current time, and
2. The notAfter date is less than or equal to the expiry date of the CA's signing certificate, i.e. the forged certificate expires prior to the signing certificate.

Conditions:
1. The device is in CC/FIPS mode
2. The backend server certificate has a notBefore date that is before the current time
3. The backend server certificate expires after its CA signing certificate (i.e. after its issuer expires)

Impact:
The temporarily-issued certificate has validity dates that do not comply with Common Criteria requirements.

Workaround:
None

Fix:
The temporarily-issued certificates will have validity dates that conform to Common Criteria requirements.

Fixed Versions:
21.1.0, 17.5.1.4


2137861-1 : MCPD throws a validation error during upgrade to v17.1.3.x when TACACS servers are configured with hostname

Links to More Info: BT2137861

Component: TMOS

Symptoms:
After upgrading the system and rebooting, config load fails with an mcpd validation error:

"IPv6 is not supported in 17.1.x and lower versions"
"Unexpected Error: Loading configuration process failed."

Conditions:
The TACACS server object is configured with a hostname. For example, the following TACACS+ configuration in the /config/bigip.conf

auth tacacs /Common/system-auth {
    protocol ip
    secret <omitted>
    servers { bigip.example.com } <<====
    service ppp
}

Impact:
Validation does not accept a hostname. Cannot add hostname as a server.

Workaround:
Use the IPV4 addresses of the TACACS server, instead of hostnames

Fixed Versions:
21.1.0, 17.1.3.1


2137805 : Jetty vulnerabilities CVE-2023-36478, CVE-2024-6763, CVE-2023-26049, CVE-2024-8184, and CVE-2023-41900

Links to More Info: K000157844


2135621 : Poor TCP performance on Hyper-V non-accelerated deployments with Cisco VIC interfaces

Links to More Info: BT2135621

Component: Local Traffic Manager

Symptoms:
TCP retransmits occur on Hyper-V deployments with Cisco VIC networks (SR-IOV disabled).
The problem is related to large segments processing (TSO packets)

Conditions:
- Hyper-V VM with Network adapter on top of Cisco VIC interface
- SR-IOV is not enabled
- Virtual server uses TCP profile

Impact:
Poor TCP performance for virtual servers with TCP profile

Workaround:
- Disable TSO feature:
tmsh modify sys db tm.tcpsegmentationoffload value disable
- Other workaround is to switch to sock driver:
https://my.f5.com/manage/s/article/K000153024

Fixed Versions:
21.1.0


2132213 : Hyper-V/Azure: Unable to pass traffic with tagged vlans when using the default dpdk driver.

Links to More Info: BT2132213

Component: TMOS

Symptoms:
On a BIG-IP VE deployed in a HyperV or Azure environment, traffic passing fails with tagged VLAN interfaces

Conditions:
-- BIG-IP VE is deployed in Azure or HyperV environment and has DPDK driver in use for the dataplane interfaces.
    -- User can check the driver in use by running "tmctl -d blade tmm/xnet/device_probed" table that should show them "dpdk" in the "driver_selected" column for their dataplane interfaces.
-- User has tagged VLANs configured.

Impact:
BIG-IP is unable to pass any data-plane traffic.

Workaround:
-- Switch to the default "sock" driver by running:
tmsh modify sys db ve.ndal.driver.netvsc value sock

-- For BIG-IP versions where the above dbvar is not available, the user can directly modify the /config/tmm_init.tcl file and set "sock" as the default driver for netvsc devices by adding this command:

>> cat tmm_init.tcl
device driver vendor_dev f5f5:f550 sock

Fix:
Unable to pass traffic with vlan tagging when using the default dpdk driver in HyperV or Azure environments.

Fixed Versions:
21.1.0


2132209 : TMM crash while sending ACKs in invalid context

Links to More Info: BT2132209

Component: Local Traffic Manager

Symptoms:
Tmm crashes while QUIC is trying to send an ACK in invalid context.

Conditions:
LTM configured with UDP and QUIC.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None

Fix:
QUIC ACKs are generated/sent for valid contexts.

Fixed Versions:
21.1.0


2132185 : Add Action SSL Proxy with Bypass Intercept options to LTM Policy

Component: Local Traffic Manager

Symptoms:
LTM Policy on TMOS currently has action ssl-intercept enable/disable for forward proxy only at SSL Client Serverhello Send event.

In this release, a new action 'ssl-proxy' with 'bypass' and 'intercept' for both Forward and Reverse Proxy at following events is added
Client Accepted
SSL Client Hello
SSL Client Serverhello Send

Enable/Disable ssl-intercept will be deprecated from TMUI

Conditions:
NA

Impact:
NA

Workaround:
A new action 'ssl-proxy' with 'bypass' and 'intercept' for both Forward and Reverse Proxy at following events is added
Client Accepted
SSL Client Hello
SSL Client Serverhello Send

Enable/Disable ssl-intercept will be deprecated from TMUI

Fix:
New action 'ssl-proxy' with 'bypass' and 'intercept' is added for both Forward and Reverse Proxy at events
Client Accepted
SSL Client Hello
SSL Client Serverhello Send

Enable/Disable ssl-intercept will be deprecated from TMUI

Fixed Versions:
21.1.0


2132153 : `tmsh show sys hardware` doesn't show F5OS version

Component: F5OS Messaging Agent

Symptoms:
When you run the command `tmsh show sys hardware`, it doesnot show F5OS version.

Conditions:
Run the command `tmsh show sys hardware`.

Impact:
Unable to check the F5OS version on the tenant side.

Workaround:
Run `vcmpshm_tool -s hal -d 0 | grep host_software_version`

Fix:
Fixed `tmsh show sys hardware` to correctly display the F5OS version.

Fixed Versions:
21.1.0


2131861 : Snapshot file count decreases over time.

Component: TMOS

Symptoms:
Stored snapshot files decrease even when no new files are created.

Conditions:
If a tmstat merge fails due to a generation change or another error, no new snapshot is created.

Impact:
Because the system increments the file count even when no snapshot is created, it deletes older files, causing the number of stored snapshots to drop with each failed merge.

Workaround:
N/A

Fix:
The fix ensures merge failures do not increment the file count or trigger cleanup.

Fixed Versions:
21.1.0


2131833 : F5OS/rSeries r2xxx/r4xxx BIG-IP Tenant management interface not reachable

Links to More Info: BT2131833

Component: TMOS

Symptoms:
On F5OS/rSeriers r2xxx/r4xxx , in rare conditions the management interface is not reachable due to a timing and ordering issue probing network interfaces

In the BIG-IP Tenant, the network interfaces eth0 or mgmt are missing

Conditions:
This condition is rare and when it does its usually seen on tenant first boot.

Impact:
Unable to reach BIG-IP Tenant management address.

Workaround:
Reboot tenant

Fix:
Upgrade to latest BIG-IP software which ensures management network interface driver is loaded first.

Fixed Versions:
21.1.0


2131597-4 : BGP graceful restart might not accept a new connection immediately after neighbor failover.

Links to More Info: BT2131597

Component: TMOS

Symptoms:
When a remote peer restarts and BGP graceful restart mechanism is advertised and received, BIG-IP might not immediately accept a new connection from a restarting peer.

Conditions:
- BIG-IP system is licensed for Routing Bundle.
- BGP graceful restart mechanism is advertised and received.
- Remote peer is still restarting.

Impact:
New connection might take longer to establish.

Workaround:
Make sure the BIG-IP local router-ID is lower than the re-connecting peer ID.

Fixed Versions:
21.1.0


2131225 : Unclear Actions Displayed with L7 Profiles in Rule Creation

Links to More Info: BT2131225

Component: TMOS

Symptoms:
When creating a simple L7 profile and adding rules with specific actions (e.g., "Enable" + select "decompression" at "client accepted"), the actions are displayed unclearly with placeholders such as {{vm.getCapitalizedLabel(vm.action.action)}} instead of the expected action names.

Conditions:
Occurs when creating an L7 profile, adding a rule with custom options (e.g., "Match all of the following conditions: Enable + select decompression at client accepted"), and saving the rule.

Impact:
This issue confuses administrators, as it displays unclear placeholders instead of specific actions, potentially leading to misconfigurations and delayed troubleshooting.

Workaround:
Monitor release notes and timelines for the fixed version. Plan updates as per the release schedule to resolve the issue effectively.

Fix:
The issue is resolved by updating the actionText.controller.js file. The placeholders displaying {{vm.getCapitalizedLabel(vm.action.action)}} were replaced with the actual action labels. The fix is available in the patched version. Follow-up with support for patch application.

Fixed Versions:
21.1.0, 21.0.0.1


2131085 : Running 'tmsh reboot slot all' on multi-slot tenant or vCMP guest causes it to get stuck in unhealthy state

Links to More Info: BT2131085

Component: Local Traffic Manager

Symptoms:
Running 'tmsh reboot slot all' on multi-slot tenant or vCMP guest or VIPRION causes BIG-IP to get stuck in unhealthy state.

MCPD is failing to load with the error '01070710:3: Could not find master-key object':

slot3/tenant1.example.com notice clusterd[7956]: 013a0024:5: Blade 3: Changing primary from 0 (none) to 2
slot3/tenant1.example.com err clusterd[7956]: 013a0018:3: Blade 3 turned RED: Quorum: stepping slow clock forward by 747.133704 ms, HA TABLE offline
slot3/tenant1.example.com notice clusterd[7956]: 013a0006:5: Blade status: 0 GREEN 1 YELLOW 1 Not Ready
slot1/tenant1.example.com notice mcpd[4785]: 01070419:5: Platform initialization phase triggered.
slot2/tenant1.example.com emerg load_config_files[9951]: "/usr/bin/tmsh -n -g -a load sys config partitions all base " - failed. -- 01070710:3: Could not find master-key object - sys/validation/MasterKey.cpp, line 3070

All slots will have an Availability of "offline" as reported in tmsh show sys cluster:

[root@rdt2:/S1-red-P::INOPERATIVE:Standalone] config # tmsh show sys cluster

-----------------------------------------
Sys::Cluster: default
-----------------------------------------
Address 10.0.0.2/16
Alt-Address ::
Availability available
State enabled
Reason Cluster Enabled
Primary Slot ID 1
Primary Selection Time 11/01/25 18:06:26

  -----------------------------------------------------------------------------------------------------
  | Sys::Cluster Members
  | ID Address Alt-Address Availability State Licensed HA Clusterd Reason
  -----------------------------------------------------------------------------------------------------
  | 1 :: :: offline enabled true offline running Run, HA TABLE offline
  | 2 :: :: offline enabled false offline running Run, HA TABLE offline

Conditions:
1. Multi-slot F5OS tenant or Multi-slot vCMP guest or multi-bladed VIPRION.

2. Rebooting all the slots of the guest or tenant (e.g. 'tmsh reboot slot all' or 'clsh reboot')

Impact:
All tenant or VCMP guest slots remain offline, and are inoperable from a traffic standpoint.

Multiple blades might hold the cluster mgmt addr.

Workaround:
For both tenants and guests, re-deploying them has a high probability of resolving the issue.
That is changing the tenant's or guest's state from "deployed" to "provisioned" or "configured", and then back to "deployed".

or

Restarting mcpd on the primary slot also has a high probability of resolving the issue.

Tmsh show sys cluster will report the "Primary Slot ID"

# tmsh show sys cluster

-----------------------------------------
Sys::Cluster: default
-----------------------------------------
Address address
Alt-Address ::
Availability available
State enabled
Reason Cluster Enabled
Primary Slot ID 1
Primary Selection Time 11/01/25 18:06:26

Both workarounds are highly likely to restore the tenant or guest to full functionality.

Note: the issue might return if all tenant or guest slots are rebooted.

Fixed Versions:
21.1.0, 17.5.1.4


2130913 : PUT request errors when trying to modify a firewall rule-list and firewall management-ip-rules

Links to More Info: BT2130913

Component: TMOS

Symptoms:
Attempting to update a firewall rule-list or firewall management-ip-rules with a PUT request won't work and an error will be returned.

Conditions:
Doing a PUT request to an existing firewall rule-list or to firewall management-ip-rules.

Impact:
A PUT request to a firewall rule-list and firewall management-ip-rules returns an error.

Workaround:
Using a PATCH request or a TMSH modify command to update the firewall rule-list or firewall management-ip-rules will work.

Fix:
A PUT request can be used to modify a firewall rule-list or firewall management-ip-rules.

Fixed Versions:
21.1.0


2130485-2 : Warning: the current license is not valid - Fault code: 51133

Links to More Info: BT2130485

Component: TMOS

Symptoms:
License activation may fail on specific platforms.

root@(localhost)(cfg-sync Standalone)(NO LICENSE)(/Common)(tmos)# install sys license registration-key D1234-12345-12345-12345-1234567
Warning: the current license is not valid
License server has returned an exception.
   Fault code: 51133
   Fault text: Error 51133, F5 registration key is not compatible with the detected platform - This platform, "", cannot be activated with this registration key "I123456-1234567".

Conditions:
- KVM on HP AMD server
- IBM Bare Metal

Impact:
Unable to license BIG-IP.

Workaround:
None

Fix:
License activation is successful.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


2125953 : Insufficient access control to REST endpoint and TMSH for some CLI versions.

Component: TMOS

Symptoms:
Security best practices are not followed for some CLI versions.

Conditions:
Not specified.

Impact:
Unexpected behaviour

Fix:
Security best practices are being followed.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


2106789 : BIGIP LTM Monitors Hardening

Component: Global Traffic Manager (DNS)

Symptoms:
BIG-IP LTM External Monitors are not following the best security practices

Conditions:
When external montiors is configured

Impact:
Unexpected behaviour

Fix:
Best security practices are now applied

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


2099449 : Cannot configure websocket profile on a performance virtual server from the GUI

Links to More Info: BT2099449

Component: Local Traffic Manager

Symptoms:
If a performance (fastL4) virtual server is selected it's impossible to configure the client or server side WebSocket profile.

After selecting WebSocket profile and clicking update, the configuration is not applied and the profile field displays "None".



, this option is available for configuration in the GUI, but once it's pushed (i.e. "Update" button pressed), the config is not applied, and the websocket profile is removed from the select field.

Conditions:
Performance (fastL4) profile is selected instead of Standard type.

Impact:
Configuration of WebSocket profiles does not work via GUI.

Workaround:
WebSocket profiles can be configured via tmsh:

modify ltm virtual http-vs profiles add { websocket }

Fixed Versions:
21.1.0


2099441 : Garbled character in warning message when HA peer is added

Links to More Info: BT2099441

Component: TMOS

Symptoms:
Garbled character in warning message

Conditions:
When adding HA peer

Impact:
Unexpected behavior

Workaround:
None

Fixed Versions:
21.1.0, 21.0.0.1


2086097 : PEM iRules causing traffic disruption

Component: Policy Enforcement Manager

Symptoms:
In some scenario, there is improper termination of connection and it is leading to TMM core

Conditions:
PEM iRules configured.

Impact:
TMM core. Service disruption.

Fix:
Connection is properly terminating and TMM is not coring.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


2083257 : 502 error from BIG-IP during large AFM rule deployment

Component: TMOS

Symptoms:
Pushing large AFM rule sets from BIG-IQ to BIG-IP greatly increases response processing time, exceeding the default Apache HTTPD timeout and causing a 502 error on BIG-IQ.

Conditions:
Occurs when,
- AFM is provisioned on the device.
- The device has a large AFM rule set.
- BIG-IQ encounters a 502 error when communicating with BIG-IP.

Impact:
BIG-IQ receives a 502 error from BIG-IP when deploying AFM rules.

Workaround:
1. Apply the required sys db parameters:

modify sys db provision.extramb value 8192
modify sys db icrd.timeout value 600
modify sys db restjavad.timeout value 600
modify sys db restnoded.timeout value 600
modify sys db provision.restjavad.extramb value 4096
modify sys db provision.tomcat.extramb value 1024

2. Update and verify HTTPD timeout:
 grep -E '^Timeout[[:space:]]+[0-9]+' /etc/httpd/conf/httpd.conf
 sed -i 's/^Timeout <timeoutValue>$/Timeout 900/' /etc/httpd/conf/httpd.conf
 Example:      
   # grep -E '^Timeout[[:space:]]+[0-9]+' /etc/httpd/conf/httpd.conf Timeout
     300
   # sed -i 's/^Timeout 300$/Timeout 900/' /etc/httpd/conf/httpd.conf
   # grep -E '^Timeout[[:space:]]+[0-9]+' /etc/httpd/conf/httpd.conf Timeout
     900 

3. Restart HTTPD
bigstart restart httpd

Fix:
Added support for configuring the HTTPD request timeout via tmsh:
tmsh modify sys httpd request-timeout 900

Fixed Versions:
21.1.0


2078297-2 : Unexpected PVA traffic spike

Component: TMOS

Symptoms:
In rare circumstances, traffic may spike on the graphs inside the tenant without corresponding graphs on the external interfaces.

Conditions:
F5OS tenant
ePVA traffic

Impact:
Loss of connectivity,
extremely high PVA traffic spike
tcpdump on the appliance ceases to function

Workaround:
Disabling PVA acceleration on affected virtual servers

Fix:
PVA traffic not spiking.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


2078277 : BD crash with an inappropriate configuration for request_max_chunks_number

Links to More Info: BT2078277

Component: Application Security Manager

Symptoms:
BD crash

Conditions:
BD internal variable request_max_chunks_number has been configured with inappropriate value (above 200,000)

Impact:
ASM traffic disrupted while bd restarts.

Workaround:
Revert request_max_chunks_number to the default value, 1000

Fixed Versions:
21.1.0


2077525 : Incomplete or missing IP Intelligence databases result in connection reset, high TMM CPU usage and/or TMM crash

Links to More Info: BT2077525

Component: Advanced Firewall Manager

Symptoms:
Both of the following messages are frequently (several times per second) logged to /var/log/tmm*:
  <13> Sep 24 09:55:01 bigip1 notice Failed to open /var/IpRep/F5IpRep.dat
  <13> Sep 24 09:55:01 bigip1 notice Failed to open /var/IpRep/F5IpV6Rep.dat

Heavy log file writing can result in a possible tmm SIGABRT due to a heartbeat failure.

Conditions:
ip-intelligence is configured, and both the IPv4 and IPv6 intelligence databases are missing. IP intelligence is a optional subscription feature that can be configured in various BIG-IP modules, such as AFM, ASM, and APM, and irules.

Impact:
A frequent log message might slow TMM.

This might result in TMM missing a heartbeat, which will trigger a tmm SIGABRT and resulting core. Traffic disrupted while tmm restarts.

Workaround:
Unconfigure ip-intelligence and remove any configuration that refers to IP reputation, or ensure that the ip-intelligence databases are available.

Fixed Versions:
21.1.0, 21.0.0.1


2077465-1 : Missing audit logs for dropped IP option packets (LSR/SSR/RR) prior to attack detection

Links to More Info: BT2077465

Component: Advanced Firewall Manager

Symptoms:
-- Packets containing IP options (RR, LSR, SSR) are dropped when the IP Option Frames DoS vector threshold is set to 0.

-- No audit logs are generated for these dropped packets unless attack detection is triggered.

-- Very low packet counts (e.g., 1–2 packets) do not increment the attack counter and therefore do not produce logs.

Conditions:
-- DoS vectors such as “IP Option Frames” or “Bad TCP Flags Malformed” are configured with a rate limit of 0.

-- Packets containing:

   IP Record Route (RR) / Loose Source Routing (LSR) / Strict Source Routing (SSR)

-- Packet rate is low (below the stats_1m aggregation threshold).

-- Attack detection is not triggered.

Impact:
-- Dropped packets with prohibited IP options are not logged.

Workaround:
-- No effective workaround currently available.

-- Increasing the traffic rate to trigger attack detection generates logs; however, this approach does not satisfy CC requirements regarding low-rate packet drops.

Fix:
Audit logging has been improved for DoS vectors configured with a zero rate limit. Packets containing prohibited IP options (RR, LSR, SSR) that are dropped due to policy enforcement are now logged regardless of whether traffic rates exceed the attack detection threshold. This enhancement provides visibility into low-rate packet drops without the need for attack detection to be triggered.

Fixed Versions:
21.1.0, 17.5.1.4


2077357 : Virtual-wire with proxy listener may generate packets with 00:00:00:00:00:00 source MAC.

Links to More Info: BT2077357

Component: Local Traffic Manager

Symptoms:
In a case where a proxy listener intercepts traffic going over a virtual-wire and there is no server-side traffic (TCP re-transmit timeout), a RST generated towards the server might have 00:00:00:00:00:00 source MAC.

Conditions:
Proxy listener intercepts traffic going over a virtual-wire.
There is no server-side traffic for the flow.

Impact:
RST might not be delivered to the server.

Workaround:
None

Fixed Versions:
21.1.0


2077329 : IBD profile is injecting the Javascript tag in non html pages

Links to More Info: BT2077329

Component: Bot Defense

Symptoms:
Setup IBD profile
Set up a backend server to serve js file with some HTML tags in string format

Example Javascript
function PrintPreview(htmlpage) {
    var page = "<script>function Print(){window.document.getElementById(\"printtool\").setAttribute(\"style\",\"display:none\");window.print();window.document.getElementById(\"printtool\").setAttribute(\"style\",\"\");}; function Close(){close();}</script>";
    htmlpage = "<html><head></header><body>" +htmlpage+ scp+ "</body></html>";
    myWindow.document.write(htmlpage);
     
}

Able to see js tags injected with non html pages with content-type= application/javascript in response

Conditions:
Virtual server with the IBD profile and a Javascript file with some HTML tags in string format

Impact:
Javascript tag injection is happening for response pages with content-type= application/javascript instead of happening with html pages with content-type = html or xhtml.

Workaround:
None

Fix:
None

Fixed Versions:
21.1.0


2064333 : [AFM] pccd cores during the service restart

Links to More Info: BT2064333

Component: Advanced Firewall Manager

Symptoms:
Pccd core occurs while the service restarts. The core file may be generated when upgrading BIG-IP.

Conditions:
- AFM provisioned
- pccd is restarted

Impact:
Pccd core is generated during process restart or upgrade, but it does not appear to persist after the initial event.

Workaround:
None

Fixed Versions:
21.1.0


2063265 : Improvements in HTTP headers

Component: TMOS

Symptoms:
Certain flags were missing from HTTP headers.

Conditions:
NA

Impact:
Can lead to unexpected behaviour

Fix:
Headers now have proper flags.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


2058541-3 : [BGP] BIG-IP does not follow updated section of rfc4724.html#section-4.2 when handling a new connection from peer.

Links to More Info: BT2058541

Component: TMOS

Symptoms:
BIG-IP does not follow the updated section (https://www.rfc-editor.org/rfc/rfc4724.html#section-4.2) when handling a new connection from a peer. Instead, section https://datatracker.ietf.org/doc/html/rfc4271#section-6.8 is followed.

This leads to a new connection from a peer being dropped when Graceful Restart happens.

Conditions:
BGP is configured with graceful restart.
Peer restarts.

Impact:
BIG-IP will drop a new connection request and try to open a new connection right away.

Workaround:
None

Fixed Versions:
21.1.0, 17.1.3.1


2053289-4 : Increased OAuth instances in TMM memory

Links to More Info: BT2053289

Component: Access Policy Manager

Symptoms:
In a successful OAuth attempt a single M_OAUTH instance leak is observed.

Conditions:
OAuth Agents are configured in a per-request policy.

Impact:
Increased TMM memory usage.

Workaround:
None

Fixed Versions:
21.1.0


2053165 : CVE-2025-47268 iputils: Signed Integer Overflow in Timestamp Multiplication in iputils ping

Links to More Info: K000158112, BT2053165


2050177-1 : LDAP cache optimisation, required as session establishment, takes more time

Links to More Info: BT2050177

Component: Access Policy Manager

Symptoms:
When LDAP is configured with a larger number of groups, delays in the session establishment rate may occur. This happens only during cache buildup, and later when the sessions are created concurrently.

Conditions:
LDAP server is configured with large number of groups and sessions are created concurrently.

Impact:
User may observe slow session establishment rate.

Workaround:
None

Fixed Versions:
21.1.0


2047429 : PostgreSQL should dump a corefile when not exiting

Links to More Info: BT2047429

Component: TMOS

Symptoms:
When PostgreSQL does not exit gracefully, it does not create a core file.

Conditions:
PostgreSQL crashes.

Impact:
Diagnostic data missing.

Workaround:
None

Fixed Versions:
21.1.0, 21.0.0.1


2047137 : TMM core may occur while using APM VDI with Blast UDP

Links to More Info: BT2047137

Component: Access Policy Manager

Symptoms:
User may fail to access the remote desktop using APM vmware VDI, if a TMM core occurs due to the unavailability of one of the internal database variable.

Conditions:
The user attempts to connect to the desktop or app using VMware Client or a browser via the Blast protocol over UDP, and the session variable is deleted due to a timeout.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None

Fix:
When internal variable is not available, it should fallback to TCP without TMM core.

Fixed Versions:
21.1.0, 17.1.3.1


2046941 : Distributed Cloud-facing BIG-IP instance with bot-defense profile might block XC health monitor

Links to More Info: BT2046941

Component: Application Security Manager

Symptoms:
Bot-defense profile detects a Distributed Cloud health monitor as a bot, and might block it (depends on configuration).

Conditions:
-- Bot-defense profile is attached to a virtual server.
-- BIG-IP is configured in front of Distributed Cloud.

Impact:
Distributed Cloud health monitors are blocked, false-positive bots are detected and logs.

Workaround:
None

Fix:
Signature Category 'F5 Health Monitor' description added. New signature of category 'F5 Health Monitor' is included in latest Bot Signatures Live Update. While configuring BIG-IP device to work, user should make sure DNS resolvers are properly configured and reachable via data path

Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1


2046553 : Memory leak when modifying PEM policies with flow-info-filters

Links to More Info: BT2046553

Component: Policy Enforcement Manager

Symptoms:
Tmm memory slowly grows over time.

Conditions:
Modifying PEM policies with flow-info-filters

Impact:
Tmm can run out of memory

Workaround:
Restart tmm before memory is exhausted. Subscriber traffic will be impacted while tmm restarts.

Fix:
Tmm does no longer leak memory.

Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1


2038393-4 : Looped dtls virtual can cause crash due to NULL dereference

Links to More Info: BT2038393

Component: Local Traffic Manager

Symptoms:
Tmm crashes while passing dtls traffic.

Conditions:
An iRule uses the 'virtual' command to loop into a dtls virtual as a second virtual, and using serverside dtls on the first virtual.

Impact:
Tmm crashes

Workaround:
Do not use the virtual command or any other form to loop into dtls virtual.

Fix:
Fixed a tmm crash with a dtls virtual server.

Fixed Versions:
21.1.0, 17.5.1.4


2038277 : Double memory release in the enforcer

Links to More Info: BT2038277

Component: Application Security Manager

Symptoms:
Possible bd cores due to ignore positional parameter configurations

Conditions:
Positional parameters configured with ignore value flag enabled.

Impact:
Error in logs, and possible crash and core. Traffic disrupted while bd restarts.

Workaround:
None

Fix:
No core and no errors.

Fixed Versions:
21.1.0


2035641 : APMd resource exhaustion

Component: TMOS

Symptoms:
Under certain conditions, APMd is exhausting resources leading to core.

Conditions:
Access sessions create, and sessions are processed

Impact:
APMd core may cause temporary traffic disruption.

Fix:
APMd not coring.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


2035177-4 : Use of OCSP responder with SSL C3D enabled in virtual server may leak SSL handshake instances

Links to More Info: BT2035177

Component: Local Traffic Manager

Symptoms:
SSL C3D with OCSP responder may cause SSL handshake instances to be leaked because of MPI dropping replies due to traffic bursts.

Conditions:
Traffic flows through a virtual server with C3D enabled, utilizing an OCSP responder to validate the status of the client's certificate.

Impact:
TMM ssl_hs_m memory usage grows over time, eventually causing memory pressure, and potentially a traffic disruption due to TMM restart.

Workaround:
None

Fix:
Added a timeout and considers session timeouts as an OCSP 'try-later' error response.

Fixed Versions:
21.1.0, 17.5.1.4


2034753-2 : Domain name validation does not align with the error message on GUI

Links to More Info: BT2034753

Component: Access Policy Manager

Symptoms:
Domain names which include hyphens are not accepted, an error message is shown on GUI.

Conditions:
Domain names with hyphens or forward slashes will cause this issue.

Impact:
BIG-IP administrator will not be able to update DNS Exclude/Include Fields in Network Access settings if they include hyphens/dashes.

Workaround:
None

Fix:
Update the mcp validation regex to allow hyphens and forward slashes.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


2033781-5 : Memory allocation failed: can't allocate memory to extend db size

Links to More Info: BT2033781

Component: Local Traffic Manager

Symptoms:
When tmm cannot expand the eXtremeDB database, it logs an error in /var/log/tmm:

err tmm1[21087]: 01010004:3: Memory allocation failed: can't allocate memory to extend db size

Conditions:
-- BIG-IP in operation
-- A configuration change is made that causes tmm to allocate more memory to eXtremeDB. Examples include:
  - Adding a clientssl or serverssl profile
  - Modifying a datagroup
  - A bot defense sync occurs

Impact:
Tmm does not crash but the eXtremeDB state is inconsistent with other tmms and could lead to unpredictable behavior such as virtual servers not working, iRules failing to work, bot defense failing to work

Workaround:
None

Fixed Versions:
21.1.0


2017137-1 : Pkcs11d Crash Risk Due to Unbounded Label/Password Length from MCPd

Links to More Info: BT2017137

Component: Local Traffic Manager

Symptoms:
Unexpected behaviour or even a crash of pkcs11d

Conditions:
Configure the label/password values more than or equal to 32 characters.

Impact:
Configuring the label or password exceeding the allowed length, it could lead to memory corruption, unexpected behavior, or even a crash of the pkcs11d daemon.

Workaround:
Configure the values with 31 or fewer characters.

Fix:
The daemon now gracefully rejects inputs that exceed the length limit, logs an appropriate error, and exits the operation safely.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.2, 17.1.3


2016465 : Policy auto merge does not work for Base64 Decoding

Links to More Info: BT2016465

Component: Application Security Manager

Symptoms:
If an entity (Parameters, Cookies, Headers) in two policies have differing values for how to handle Base64 values (enabled, disabled, required), policy diff does not merge the values correctly.

Conditions:
An entity (Parameters, Cookies, Headers) in two policies have differing values for how to handle Base64 values (enabled, disabled, required), policy diff does not merge the values correctly.

Impact:
Expected changes may not be made to the merged policy resulting in unexpected Base64 value handling.

Workaround:
The values can be changed manually through GUI or REST.

Fix:
Policy Diff/Merge functions correctly for differing Base64 Decoding values.

Fixed Versions:
21.1.0


2008409-1 : MAC masquerade does not work on an F5OS tenant if there are no floating self-ips configured on the VLAN

Links to More Info: BT2008409

Component: F5OS Messaging Agent

Symptoms:
Network traffic fails on a VLAN that is shared by multiple tenants.

Conditions:
-- F5OS tenants sharing a VLAN
-- MAC masquerade enabled on both tenants
-- No floating self-ips configured

Impact:
MAC masquerade may not work properly causing traffic failures such as packets not arriving on the tenant. Or excessive DLFs on the network.

Workaround:
Add floating self-ips to all traffic VLANs that are using MAC masquerade.

Fixed Versions:
21.1.0, 21.0.0.1


2007433 : CAPTCHA submit button text not configurable

Links to More Info: BT2007433

Component: Application Security Manager

Symptoms:
The CAPTCHA challenge displays a lowercase "submit" button, with no option to customize the label.

Conditions:
Bot Defense with Captcha mitigation is attached to a virtual server
OR
WAF policy with brute force using captcha mitigation is attached to a virtual server.

Impact:
Limited customization options may affect branding consistency or localization needs, especially for specific capitalization or language support requirements.

Workaround:
None

Fixed Versions:
21.1.0


1998985-3 : "Page Unresponsive" error message when editing Active Directory group resource with large AD group count

Links to More Info: BT1998985

Component: Access Policy Manager

Symptoms:
The Active Directory Group resource page becomes unresponsive

Conditions:
AD Group Resource is configured for an Active Directory server that has a large group count.

Impact:
Active Directory Group Resource agent cannot be edited

Workaround:
Delete the existing Active Directory Group Resource agent and recreate it by first adding the desired resources (e.g., VDI, RDP, Webtops, etc.) during the edit operation. After adding the resources, attach the Active Directory server as the final step.

Fixed Versions:
21.1.0, 17.5.1.4


1991297-2 : [APD][SAML-SSO]high memory due to SAML SSO leak

Links to More Info: BT1991297

Component: Access Policy Manager

Symptoms:
Tmm crashes due to out of memory while passing SAML-SSO traffic

Conditions:
SAML SSO configured with saml artifact sign.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None

Fixed Versions:
21.1.0, 21.0.0.1


1989033 : IPsec IKEv2 tunnel may fail to initiate or respond due to ERR_PORT

Links to More Info: BT1989033

Component: TMOS

Symptoms:
In very rare circumstances the BIG-IP may fail to initiate or respond to an IKEv2 tunnel.

When debug2 is enabled, the following log messages in the tmm log indicates a potential match for this bug. ERR_PORT is a critical indicator of the failure condition.

<13> <date> <hostname> notice ike_connect/3154: @F: ike flow created 172.16.61.100:172.16.61.200 rd: 0 owner=0.2 me=0.2
<13> <date> <hostname> notice ike_connect/3218: @F: ISAKMP_CONN local=172.16.61.100:500 remote=172.16.61.200:500
<13> <date> <hostname> notice ike_proxy_connect/1510: @E: flow_connect() ERR ERR_PORT
<13> <date> <hostname> notice ike_connect/3241: @E: ERR ERR_PORT
<13> <date> <hostname> notice pfkey_isakmp_reconnect/5231: @E: can't create isakmp flow to 172.16.61.100:500 172.16.61.200:500 %0, err ERR_PORT.
<13> <date> <hostname> notice pfkey_isakmp_reconnect/5241: @E: ERR ERR_PORT

The ipsec.log will contain different messages.

ipsec.log - BIG-IP attempts to start the connection, the INTERNAL_ERR is a critical indicator:

<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: rcf_remote_cite: (remote why='@B:deepcopy:MAKE' me=0x4000c6cbaa08#4035 pa=2643 name='/Common/<ike peer name>' ip='<remote IP>[500]')
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INTERNAL_ERR]: ikev2_allocate_sa: ERR Invalid BIG-IP flow context for <local IP>[500]-><remote IP>[500] peer='/Common/<ike peer name>'
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_allocate_sa: @A: Insert ike_sa 0x4000c7aa2c88, SPI 1c96e4465b82fc39 0000000000000000 in list (peer='/Common/<ike peer name>')
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_state_transition: [ikev2_dh_generate] @I:ike_sa 0x4000c7aa2c88 SPI=1c96e4465b82fc39 0000000000000000 state IDLING -> DH_REQ
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_state_transition: [ikev2_dh_generate_callback] @I:ike_sa 0x4000c7aa2c88 SPI=1c96e4465b82fc39 0000000000000000 state DH_REQ -> DH_DONE
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_next_request_id: @A: send message (id 0) sa=0x4000c7aa2c88 (loc=<local IP>[500] rem=<remote IP>[500])
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_state_transition: [ikev2_set_state] @I:ike_sa 0x4000c7aa2c88 SPI=1c96e4465b82fc39 0000000000000000 state DH_DONE -> INI_IKE_SA_INIT_SENT
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] (req at='@M:PUSH:ikev2_send_request' SPI='1c96e4465b82fc39 0000000000000000' gen=0x1 MID=0 pkt=0x4000c7ec9558)
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] (payloads dir=SEND at=ikev2_send_request payl=0x4000c442ca88 len=432 crc=0x47699687
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] @ . (v2_head i_spi=0x1c96e4465b82fc39 r_spi=0x0000000000000000 next=33:PAYLOAD_SA
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] @ . . . ver=0x20 exch=34:IKE_SA_INIT flags=0x8:I-Q id=0 len=432 crc=0x47699687)
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] @ . (hd type=33:PAYLOAD_SA next=34:PAYLOAD_KE byte=0 len=48 off=0x1c)
...

ipsec.log - BIG-IP retransmits a few more times:

<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_retransmit: @M: retransmit 0x4000c7d77b78 pkt 0x4000c7ec9558 msg_id=0 req 0x4000c7d77b08 SPI 1c96e4465b82fc39 0000000000000000 count 0
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_retransmit: @M: retransmit 0x4000c7d77b78 pkt 0x4000c7ec9558 msg_id=0 req 0x4000c7d77b08 SPI 1c96e4465b82fc39 0000000000000000 count 1
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_retransmit: @M: retransmit 0x4000c7d77b78 pkt 0x4000c7ec9558 msg_id=0 req 0x4000c7d77b08 SPI 1c96e4465b82fc39 0000000000000000 count 2
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_retransmit: @M: retransmit 0x4000c7d77b78 pkt 0x4000c7ec9558 msg_id=0 req 0x4000c7d77b08 SPI 1c96e4465b82fc39 0000000000000000 count 3

ipsec.log - BIG-IP cancels the negotiation after a timeout:

<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_negotiation_timeout_callback: ikev2_negotiation_timeout_callback1 ike_sa rmconf : 3335236104
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_negotiation_timeout_callback: ikev2_negotiation_timeout_callback2 rmconf ikev2 : 3343372872
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_negotiation_timeout_callback: ikev2_negotiation_timeout_callback3 ikev2 plog : 0
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_negotiation_timeout_callback: negotiation timeout: ike_sa (ick=0x1c96e4465b82fc39, rck=0x0000000000000000)
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [PROTO_ERR]: __ikev2_abort: ike_sa=0x4000c7aa2c88 ABORT, ERR errno='110', SPI 1c96e4465b82fc39 0000000000000000
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_state_transition: [ikev2_set_state] @I:ike_sa 0x4000c7aa2c88 SPI=1c96e4465b82fc39 0000000000000000 state INI_IKE_SA_INIT_SENT -> DYING
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] (req at='@M:POP:ikev2_cancel_retransmit_req' SPI='1c96e4465b82fc39 0000000000000000' gen=0x1 MID=0 pkt=0x4000c7ec9558)
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_state_transition: [ikev2_set_state] @I:ike_sa 0x4000c7aa2c88 SPI=1c96e4465b82fc39 0000000000000000 state DYING -> DEAD
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_ha_send_sa_delete: high availability (HA) SA is already deleted from Session DB
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: rcf_remote_cite: (remote why='@B:clean:FREE' me=0x4000c6cbaa08#4035 pa=2643 name='/Common/<ike peer name>' ip='<remote IP>[500]')

Conditions:
-- IPsec IKEv2
-- Tunnel may be newly configured
-- BIG-IP does not transmit or respond to any packets related to the configured tunnel.

Impact:
When this occurs, the tunnel will be down permanently.

Workaround:
If this is a High Availability (HA) peer and the config is sync'd with the Standby, failing over to the Standby may bring the tunnel up.

However, a second failover (fail back to the original high availability (HA) device) will lead to the tunnel down again. The original device once Active again, is still in the same failure mode.

One workaround is to failover, check the tunnel is up and then reboot or 'bigstart restart' the failing Standby device.

After that, the IKE SA should appear correctly mirrored on the Standby, use 'tmsh show net ipsec ike-sa' and check there is an SA with the peer's IP.

The second workaround is to delete all IPsec config objects, self IP and route-domain associated with the tunnel. In the case where the IPsec config, self IPs and routes exist entirely in route-domain 0 this is not a reasonable solution and rebooting is the most sensible recovery step.

Fixed Versions:
21.1.0


1988993-1 : CVE-2024-42516 Apache HTTP Server vulnerability

Links to More Info: K000153074, BT1988993


1987309 : Bigd may get stuck in legacy mode

Links to More Info: BT1987309

Component: Local Traffic Manager

Symptoms:
Https monitors may spuriously mark a pool member as down and it will fail to mark the pool member back up.

The monitor remains in legacy mode, and probes are sent using TLS 1.0.

Conditions:
-- Server supports version TLSv1.2 and above.
-- bigd is configured to monitor the server with SSL.
-- The monitor flips into legacy mode.

Impact:
Bigd is stuck in legacy mode.

Workaround:
Bigd can be brought out of legacy mode by detaching and re-attaching monitor to the pool.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


1983349-2 : CVE-2023-2454, CVE-2023-39417, CVE-2023-39418, CVE-2023-5868, CVE-2023-5869, CVE-2023-5870 PostgreSQL vulnerabilities

Links to More Info: K000152931, BT1983349


1983209 : Zone does not sync correctly when record is modified

Links to More Info: BT1983209

Component: Global Traffic Manager (DNS)

Symptoms:
BIND zones do not synchronize properly across devices in a sync group when the synchronization involves a large configuration.

Conditions:
BIG-IP GTM sync setup with a large BIND configuration

Modification of resource records in BIND zones

Impact:
The zone synchronization issue causes BIG-IP to serve outdated or stale DNS data.

Fixed Versions:
21.1.0


1983145 : Memory Corruption due to xnet-DPDK

Links to More Info: K000153024, BT1983145

Component: TMOS

Symptoms:
TMM crashes due to data corruption caused by xnet-DPDK. This can occur after upgrading from version 17.5.0 to version 17.5.1.

Conditions:
1) Using xnet-DPDK driver
2) DPDK v20.11 is being used (BIG-IP v17.5.x or higher)

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Two possible workarounds here:
1. Disable TSO globally:
tmsh modify sys db tm.tcpsegmentationoffload value disable
2. Switch to the sock driver:
https://my.f5.com/manage/s/article/K000153024

Fixed Versions:
21.1.0


1977057-4 : Memory leak when using an iRule to overwrite MR peer route

Links to More Info: BT1977057

Component: Service Provider

Symptoms:
Messagerouter memory consumption is excessive:

tmctl memory_usage_stat -w 300 | grep 'name\|messagerou'
name allocated max_allocated size slop cur_allocs tot_allocs fail_allocs type caches_used
dns_qname_cache 0 0 1280 255 0 0 0 std:
messagerouter 5384040 5924240 1 0 3253 122000 0 var:

Conditions:
'MR::message route' is used to overwrite peer route.

Impact:
Memory leak possibly leading to system overload/crash.

Workaround:
None

Fixed Versions:
21.1.0, 17.5.1.4


1975297 : TMM may fail to start up with max number of interfaces for Azure instances <= 16 vCPUs

Links to More Info: BT1975297

Component: TMOS

Symptoms:
There are "vmbus_open subchannel failed: -12" kernel errors for uio module, uio_hv_generic. These errors prevent the TMM module from finishing initialization.

Conditions:
-- Using VE Azure
-- Using Azure instances with <= 16 vCPUs

Impact:
Azure VM is unable to reach Active state.

Workaround:
Use an Azure instance with more RAM. For example, F8s_v2 has 16 GiB of RAM and has a total limit of 4 interfaces. Instance size, E8ds_v5, has 64 GiB of RAM and can reach Active state with 4 interfaces.

Fix:
N/A

Fixed Versions:
21.1.0


1974701 : PVA stats may be double incremented when pva mode is dedicated

Links to More Info: BT1974701

Component: TMOS

Symptoms:
Offloaded connections may be double counted for dedicated PVA flows.

Conditions:
PVA mode is set to dedicated in fastl4 profile.

Impact:
Incorrect stats.

Workaround:
None

Fix:
Offloaded dedicated PVA flows are counted once.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


1972541 : Tmsh load sys config verify leaks compiled ltm (CPM) policies

Links to More Info: BT1972541

Component: Local Traffic Manager

Symptoms:
When LTM (CPM) policies are in use on virtual servers and 'tmsh load sys config verify' is used, memory in /dev/shm is leaked each time the verify command is used.

With multiple uses and many virtual servers with policies this could lead to the BIG-IP system having low memory and suffering from low memory symptoms (see impact).

df -h may show /dev/shm/ having abnormally high use.
cat /proc/meminfo may show abnormally high shmem, and low memory indicated by low MemAvailable. These statistics are also available in qkviews loaded on iHealth.

Conditions:
-- LTM (CPM) policy attached to one or more virtual servers
-- Use of 'tmsh load sys config verify'

Impact:
The amount of shared memory leaked at each use of 'tmsh load sys config verify' is typically:

Number of virtual servers with attached policies * 4KB.

Very large or complex policies may be a multiple of 4KB.

The number of compiled LTM policies in shared memory is:
ls -1 /dev/shm | grep loipc_vs_ | wc -l

There should be one for each virtual server with LTM policies.

Low memory symptoms can include:
- sluggishness to loss of contact when managed via GUI (web interface) or tmsh/bash over ssh
- poor process scheduling which may lead to daemons being aborted by software watchdog leading to production of core files.
- oom killer activity, where processes are terminated by kernel to free memory as an emergency measure
- loss of service
- reboot if symptoms develop fully into protracted thrashing

Workaround:
Reboot of the system will clear the leaked memory.

Fixed Versions:
21.1.0


1970969 : Stale Record Answers counter increments for SERVFAIL responses from DNS resolver cache

Links to More Info: BT1970969

Component: Global Traffic Manager (DNS)

Symptoms:
Stale Record Answers counter increments incorrectly when no stale record is served and a SERVFAIL is sent.

Conditions:
-- Configure DNS cache resolver with a forwarder.
-- Make sure forwarder does not respond to DNS queries.
-- Enable 'ltm dns cache global-settings serve-expired'
-- Send a few DNS requests to DNS cache for a record which is to be handled by not responding forwarder.
-- Observe 'Stale Record Answers' counter for DNS cache.

Impact:
Leads to incorrect Stale Record Answers stat, potentially misleading monitoring, troubleshooting, and operational decisions.

Workaround:
None

Fixed Versions:
21.1.0


1969889-2 : Expired certificates sent to clients by tmm due to network time synchronization

Links to More Info: BT1969889

Component: Local Traffic Manager

Symptoms:
Clients are receiving certificates that are expired or invalid, leading to SSL handshake failures accompanied by security warnings.

Conditions:
-- A virtual server configured with ClientSSL and ServerSSL profiles, both having SSL forward proxy enabled, experiences a change in system time (time advanced) due to a network glitch or issue.

Impact:
Clients receiving expired/invalid certificates causes traffic disruption.

Workaround:
From TMSH, Running the following command will delete the cached certificates associated with the specified virtual server and client SSL profile.

(tmos)# delete ltm clientssl-proxy cached-certs virtual <name> clientssl-profile <name>

Fix:
Before sending a certificate to the client, the certificate from the SSL cache is checked for expiration. If the cached certificate is found to be expired, it is removed from the cache, and a new forged certificate is generated and stored in the cache.

Fixed Versions:
21.1.0


1967485-1 : Old Logs in /var/log Not Deleted When Storage Exceeds Threshold

Component: TMOS

Symptoms:
Logs for various modules are stored in the /var/log directory, with older files compressed into tar files over time. When the storage in /var/log exceeds the warning threshold, a cleanup mechanism is triggered to delete tar files and free up space for incoming logs. However, the cleanup process deletes newer tar files first, leaving the oldest tar files untouched.

Conditions:
This issue occurs when BIG-IP accumulates logs to the point where the /var/log directory surpasses the storage threshold.

Impact:
When the storage threshold is exceeded, BIG-IP initiates cleanup of tar files. However, tar files containing the oldest module logs are not deleted.

Workaround:
Use the command below to delete the old tar files available in /var/log/ directory

rm <tarFileName>

Fix:
A fix has been implemented to ensure that when the /var/log directory exceeds its storage threshold, all tar files, including those containing the oldest logs, are deleted during the cleanup process.

Fixed Versions:
21.1.0


1967005 : TMM crash on R2x00/R4x00 platforms

Links to More Info: BT1967005

Component: Local Traffic Manager

Symptoms:
Tmm crashes repeatedly.

Conditions:
1. BIG-IP tenant running on R2x00/R4x00 platforms.
2. More than 510 multicast MAC addresses are configured on VF MAC filters.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
If a config backup file is being loaded, remove a few entries of IPv6 address (either VIPs or Selfips) to make sure the entries does not exceed 510.

If this occurs after configuring more than 510 multicast MAC addresses, remove the configuration related to the IPv6 addresses.

Fixed Versions:
21.1.0


1966965 : Client Download page update for linux client packages

Component: Access Policy Manager

Symptoms:
Client Download page missed download links for linux VPN client package (F5 VPN for Linux ( linux_f5vpn.aarch64.deb )).

Conditions:
Have APM Licensed
1. Go to Access -> Connectivity/VPN -> Connectivity -> Client Downloads

Impact:
Not able to download F5 VPN for Linux package.

Workaround:
1. Click on any VPN package from the download page (ex F5 VPN for Linux ( linux_f5vpn.x86_64.deb ))
2. Change the end of the url in the newly opened tab from linux_f5vpn.x86_64.deb to sam/webtop/public/download/linux_f5vpn.aarch64.deb

Fix:
Client Download page updated for linux client packages.

Fixed Versions:
21.1.0


1966941 : High CPU or increased translation errors following upgrade or restart when DAG distribution changes

Links to More Info: BT1966941

Component: TMOS

Symptoms:
Dagv2 tables are randomized and may change when a tmm is restarted. This can result in a change of traffic distribution, which in some cases may lead to traffic disruption.

The specific condition when this option was introduced is using a CGNAT pool that is not large enough.

Other ways of encountering include increased translation failed errors following an upgrade or restart or blade replacement.

Conditions:
Tenant tmm is restarted (or VELOS chassis rebooted)

Impact:
- dag distribution changes which may cause a traffic disruption.

Workaround:
You can restart tmm until the distribution is good, which can be checked using tools like cmp_dest.

Fix:
Added DB variables to control dagv2 behavior - sdag.runtime.hashtable and sdag.runtime.mirror.hashtable. The format is a list of hexadecimal entries separated by a colon, same as `tmctl -d blade tmm/sdaglib_hash_table`. Both variables must be set. A tmm restart is required after locking the new dag tables. The default value is "<null>".

Fixed Versions:
21.1.0, 17.5.1.4


1966669-3 : [PVA] Provide a DB variable disabling NAT46/64 snoop inserts.

Links to More Info: BT1966669

Component: TMOS

Symptoms:
Starting from version 16.X NAt64/46 traffic can be accelerated in PVA. Under some circumstances this is not desired. A DB variable is needed to disable NAt64/46 offload to hardware.

Conditions:
- Nat46/64 configured on virtual-servers eligible for hardware offload.
- Version 16.X or above.

Impact:
Hardware offload of Nat64/46 traffic is not desired in some cases.

Workaround:
None

Fixed Versions:
21.1.0, 17.5.1.4


1966633 : Non-eth0 management interface unbound after tmm restart on 17.5.0 in AWS

Links to More Info: BT1966633

Component: TMOS

Symptoms:
Management connectivity is lost after licensing BIG-IP 17.5.0 on AWS. The parameter provision.managementeth was changed to non-eth0 interface during deployment with cloud-init. When the issue occurs, the mgmt bridge loses the associated interface ethX.

Conditions:
1. Deploy an instance on AWS.
2. Change provision.managementeth to non-eth0 device and reboot.
3. After boot up, any operation that restart tmm (i.e. licensing BIG-IP) will cause the issue.

Impact:
Management connectivity is lost to BIG-IP instance.

Workaround:
Reboot the device twice after licensing the device. One reboot will not resolve the issue.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4


1966405 : Changes to DNS cache resolver may cause service disruption on BIG-IP DNS v17.1.2.1

Links to More Info: BT1966405

Component: Global Traffic Manager (DNS)

Symptoms:
All DNS PTR queries are forwarded to the configured forward zone. If any change is made to the local zones, such as adding a new local zone; the system begins responding to PTR queries with NXDOMAIN.

Conditions:
Occurs on BIG-IP DNS version 17.1.2 and above
Triggered when changes are made to local zones

Impact:
Queries respond with NXDOMAIN.

Workaround:
Restart tmm:
bigstart restart tmm

Fixed Versions:
21.1.0, 21.0.0.1


1959629 : CSR generation via the GUI removes Subject Alternative Name (SAN) string. Also, when SAN is configured with small prefix chars "dns:", no error is thrown.

Links to More Info: BT1959629

Component: Local Traffic Manager

Symptoms:
1) The GUI does not throw an error when subject alternative name is set with lower case prefix "dns:".
2) The GUI does not set SAN strings while generating CSR on GUI. (this does not occur on 17.1.2.2)

Conditions:
-- Use the GUI to create a CSR which is to be signed by other CA, setting "Subject Alternative Name (SAN)" strings with prefix "dns:" in lower case instead of "DNS:".

In this case, the CSR is generated but an error should occur.


-- Use the GUI to create a CSR with a SAN string containing the correct prefix with capitalized "DNS:".

In this case, CSR generation finishes with no error. However, looking at generated CSR, the SAN field is omitted.

Impact:
An invalid certificate is created.

Workaround:
Create the CSR via tmsh (tmsh create sys crypto csr) instead of the GUI

Fixed Versions:
21.1.0


1959549 : Upgrade to 17.5.0 or later overwrites #TMSH-VERSION in bigip_base.conf when source UCS is pre-17.5.0

Links to More Info: BT1959549

Component: TMOS

Symptoms:
When upgrading from versions below 17.5.0 to 17.5.0 or later, the #TMSH-VERSION marker in bigip_base.conf is rewritten to the target system version instead of preserving the source UCS version. This prevents MCPD schema migration code from executing, potentially causing configuration mismatches and missing schema-based workarounds.

Conditions:
- roll-forward upgrade from v14.x/v15.x/v16.x/v17.1.x to v17.5.1 and later releases. upgrade from v17.5.x to v21.x and later versions is not affected.

Impact:
Overwriting TMSH-VERSION in bigip_base.conf file, uses the wrong schema when loading the configuration and miss applying MCP schema based workarounds.

Workaround:
None

Fixed Versions:
21.1.0, 17.5.1.4


1959361 : When running a tenant with more than 72 VCPUs / cores, adminstall crashes

Links to More Info: BT1959361

Component: Anomaly Detection Services

Symptoms:
When running a tenant with more than 72 VCPUs / cores, adminstall crashes.

Conditions:
When ASM provisioned and running a Tenant with more than 72 VCPUs / cores per blade.

Impact:
DOSL7 (BADOS) is not functioning. Core created.

Workaround:
None

Fix:
Now adminstall donot crash, when ASM provisioned and Tenant with more than 72 VCPUs / cores per blade.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


1959181 : Proxy Select Agent does not persist clients to their selected upstream proxy

Component: SSL Orchestrator

Symptoms:
When per-request policy uses the Proxy Select Agent to route traffic to an upstream HTTP proxy pool, clients are not consistently sent to the same proxy on each new connection. A different proxy pool member may be selected each time even when a persistence profile is attached to the virtual server.

Conditions:
This issue occurs when all of the following are true:
-- LTM/APM virtual or SSLO topology uses a per-request policy with a Proxy Select Agent configured.
-- A persistence profile is attached to the virtual server.

Impact:
Each connection from the same client can be routed to a different upstream proxy.

Workaround:
None.

Fix:
The Proxy Select Agent now passes only the pool selection to the virtual server, which applies the configured persistence profile to select the correct member. This ensures clients are consistently routed to the same upstream proxy.

Fixed Versions:
21.1.0


1953369-4 : DB monitor queries repeatedly if recv string configured but response does not match

Links to More Info: BT1953369

Component: Local Traffic Manager

Symptoms:
A database monitor (mssql, mysql, oracle, postgresql) may send multiple queries to the database server in quick succession if the monitor is configured with a 'recv' string, but the response from the server does not contain the configured string.

Conditions:
-- A database monitor (mssql, mysql, oracle, postgresql) is configured with a 'recv' string.
-- The query to the database server completes successfully, but the response does not contain the configured 'recv' string.

Impact:
The database monitor correctly marks the configured pool member 'DOWN' as appropriate, but generates unnecessary queries to the database server.

Workaround:
None

Fixed Versions:
21.1.0, 17.5.1.4


1953357 : Persistence Profiles do not work on SSLO inspection service virtual servers

Component: SSL Orchestrator

Symptoms:
When a persistence profile (for example, source address affinity) is attached to an SSLO inspection service entry virtual server, traffic from the same client is not always sent to the same pool member or inspection device. Clients get distributed across different service pool members instead of sticking to one.

Conditions:
This issue occurs on F5OS based physical appliances (for example, VELOS or rSeries hardware). SSLO topology must have an inspection service pool with more than one member and a persistence profile attached to the inspection service entry virtual server.

Impact:
Client traffic is not consistently routed to the same inspection service.

Workaround:
None.

Fix:
This fix ensures that clients are consistently sent to the same inspection service pool member when a persistence profile is attached to the SSLO inspection service entry virtual server. This is supported for all services except ICAP.

Fixed Versions:
21.1.0


1953273 : Big3d high CPU with thousands of https monitors with SNI

Links to More Info: BT1953273

Component: Global Traffic Manager (DNS)

Symptoms:
Big3d high CPU utilization occurs

Conditions:
Large volume of https monitors and monitored resources with SNI configured.

Impact:
Big3d high CPU utilization

Workaround:
None

Fixed Versions:
21.1.0


1943269 : GTM Server can be deleted while referenced by GTM Pools

Links to More Info: BT1943269

Component: Global Traffic Manager (DNS)

Symptoms:
A GTM server object can be deleted even when it was referenced by GTM pools. Deleting the server will also remove it from the associated pool members without any warning.

Conditions:
Occurs when a GTM virtual server is referenced in one or more GTM pools.

Impact:
This may cause unexpected behavior or service disruption if the server is deleted while still in use.

Workaround:
None.

Fix:
A validation check has been added to prevent deletion of a GTM server that is referenced by GTM pools, and a warning is now displayed to the user. This behavior is controlled by the DB variable gtm.gtmserverdeletevalidation, which is disabled by default and must be enabled to enforce the deletion restriction.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


1943217-3 : BGP - using 'no bgp default ipv4-unicast' might lead to a crash

Links to More Info: BT1943217

Component: TMOS

Symptoms:
Using 'no bgp default ipv4-unicast' might lead to a crash when saving a configuration.

Conditions:
'no bgp default ipv4-unicast' configured.

Impact:
Bgpd crash/core.

Workaround:
Do not use 'no bgp default ipv4-unicast' configuration statement.

Fixed Versions:
21.1.0, 17.5.1.3, 17.1.3.1


1938101 : Performance issue on specific parameters extractions

Links to More Info: BT1938101

Component: Application Security Manager

Symptoms:
Performance degradation on specific pages

Conditions:
When there are dynamic parameters extractions using HTML and also AJAX response page enabled.

Impact:
Slowdown of the extraction page load time

Workaround:
None

Fixed Versions:
21.1.0


1934373 : DoS attack is blocking while transparent

Links to More Info: BT1934373

Component: Application Security Manager

Symptoms:
A DoS attack is blocking while configured as transparent.
The blocking is only by resets

Conditions:
A transparent volumetric dosl7 and web acceleration profile are configured on the same virtual

Impact:
Blocking even though the configuration is transparent.

Workaround:
tmsh modify sys db dosl7d.static_uri_protection value disable

Fixed Versions:
21.1.0


1934073 : PEM policy rule incorrectly matching when using a flow condition

Links to More Info: BT1934073

Component: Policy Enforcement Manager

Symptoms:
When a PEM policy rule is configured to match the destination IP address and port, the message might match the source IP and port instead.

Conditions:
PEM policy rule is using flow conditions to match IP address and port

Impact:
An incorrect policy rule might be matched

Workaround:
None

Fix:
The PEM policy rule now correctly matches the source and destination IP addresses and ports when the flow condition is used.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.3, 17.1.3, 16.1.6.1


1933373 : Newly added Threat Campaigns are missing REST ID

Links to More Info: BT1933373

Component: Application Security Manager

Symptoms:
Newly created UTF-8 policies have an empty value for the REST ID (rest_uuid) in some or all Policy Threat Campaigns.

Conditions:
- Create a new UTF-8 policy using BIG-IP with no Threat Campaign license.
- License the Threat Campaign functionality.
- Create a second UTF-8 policy with the Threat Campaign enabled.

Impact:
Newly added Threat Campaigns are missing the REST ID.

Workaround:
- After license Threat Campaigns, the cached binary policy templates must be cleared to ensure newly created policies use updated templates reflecting the licensed Threat Campaign functionality.

Remove cached binary policy templates by running:

rm /var/ts/install/policy_templates/*.bin

- Threat Campaigns in new UTF-8 policy should have REST IDs.

Fix:
Fix newly created UTF-8 policies have value for REST ID (rest_uuid) in all Policy Threat Campaigns.

Fixed Versions:
21.1.0, 17.1.3.1


1933357 : DNS64 stats between cache resolver and TMM non-cache have inconsistent behavior.

Links to More Info: BT1933357

Component: Global Traffic Manager (DNS)

Symptoms:
DNS64 stats (tmstat table profile_dns_stat) in the TMM behave as follows:

dns64reqs - A queries to the server after the AAAA queries fail. Does not include the AAAA queries.
dns64fails - Failed AAAA queries to the server. Does not include the subsequent A queries.

DNS64 stats (tmstat table dns_cache_resolver_stat) in the cache behave as follows:

mesh.dns64reqs - Includes both A and AAAA queries to the server. Includes both successful and failed AAAA queries.
mesh.dns64nodata - Includes both A and AAAA query nodata responses (rcode=0 and no records).
mesh.dns64error - Includes both A and AAAA query error rcode responses.
mesh.dns64timeout - Includes both A and AAAA query timed-out responses.

Conditions:
-- A DNS resolver cache is enabled on a DNS profile.
-- The DNS profile has DNS64 configured.

Impact:
The current cache resolver stats makes it difficult to diagnose backend DNS64 performance.

Workaround:
None

Fix:
Mesh.dns64reqs behaves like the TMM's dns64reqs (counts only DNS64 A queries to the server.) Additionally, a new stat mesh.dns64fails sums all failures (mesh.dns64nodata, mesh.dns64error, mesh.dns64timeout) and, like the TMM, only counts DNS64 AAAA failures to the server.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


1933105 : TMM does not fragment the output before encapsulating the payload

Links to More Info: BT1933105

Component: TMOS

Symptoms:
Tmm does not fragment the traffic before it goes to encapsulation

Conditions:
- IPSec
-- Tmm receives fragmented payload

Impact:
Large packets are not fragmented on egress.

Workaround:
None

Fixed Versions:
21.1.0


1930897 : Tmm core due to overflow of ifc ref counts with flow forwarding

Links to More Info: BT1930897

Component: Local Traffic Manager

Symptoms:
Tmm crashes when passing high amounts of traffic.

Conditions:
Flow forwarding rejected when accepting flows due to high volume of packets that exhausts connection limit and overflows the ifc ref count.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None

Fix:
Release ifc ref counts for flow forwarding when flow_accept rejects a packet.

Fixed Versions:
21.1.0, 17.1.3


1927521 : DPDK has dependency on SSSE3

Links to More Info: BT1927521

Component: TMOS

Symptoms:
TMM goes into restart loop with following error in /var/log/tmm regarding SSSE3 not being available

notice ERROR: This system does not support "SSSE3".
notice Please check that RTE_MACHINE is set correctly.
notice EAL: FATAL: unsupported cpu type.
notice EAL: unsupported cpu type.
notice dpdk: Error: rte_eal_init() failed, err=-1
notice xnet_lib [pci:0000:02:00.0]: Error: Failed to initialize driver
notice xnet[02:00.0]: Error: Unable to attach to xnet dev
notice xnet(1.1)[02:00.0]: Error: Unable to initialize device
notice xnet(1.1)[02:00.0]: Waiting for tmm1 to reach state 4...
notice ndal Error: Restarting TMM
notice Initiating TMM shutdown.
notice tap(tap)[00:00.0]: Waiting for tmm1 to reach state 4...
notice ---------------------------------------------

Conditions:
1) xnet-DPDK is being used
2) BIG-IP running in an environment where SSSE3 is not available either because CPU is so old that it does not support SSSE3 or SSSE3 has been disabled in VM's config.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Modify guest VM's config on hypervisor and enable SSSE3 feature in CPU settings. Most CPUs should support SSSE3, but hypervisor may be masking off feature from virtual CPU for guest. For best performance in this and other areas such as crypto it may be best to not mask the real CPU feature set from the virtual CPU.
For Azure/Hyper-V see https://my.f5.com/manage/s/article/K000159028 and note link for processor compatibility mode.

Or:

Switch to 'sock' driver by adding the following line into /config/tmm_init.tcl, replacing <VENDOR_ID:DEVICE_ID> with the corresponding interfaces' Vendor and Device IDs shown via 'lspci -nn'.
For environments in HyperV or Azure, f5f5:f550 should be used for Vendor and Device.

[root@BIGIP:Active:Standalone] log # cat /config/tmm_init.tcl
device driver vendor_dev <VENDOR_ID:DEVICE_ID> sock
[root@BIGIP:Active:Standalone] log #

Fix:
Fallback from DPDK to sock driver if CPU feature 'SSSE3' is not exposed in virtual CPU.

Fixed Versions:
21.1.0


1925485-2 : CVE-2020-12655 kernel: sync of excessive duration via an XFS v5 image with crafted metadata

Component: TMOS

Symptoms:
An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767.

Conditions:
NA

Impact:
It can cause a kernel crash or hang, resulting in a denial of service.

Workaround:
NA

Fix:
Denial of Service issue in the kernel has been resolved.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


1925369-2 : CVE-2018-10322 kernel: Invalid pointer dereference in xfs_ilock_attr_map_shared() when mounting crafted xfs image allowing denial of service

Component: TMOS

Symptoms:
The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_ilock_attr_map_shared invalid pointer dereference) via a crafted xfs image.

Conditions:
NA

Impact:
It can trigger a kernel panic, resulting in a denial of service.

Workaround:
NA

Fix:
The Denial of Service issue has been resolved in the kernel.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


1925045-2 : CVE-2024-35849 - Linux Kernel Btrfs Information Leak Vulnerability

Component: TMOS

Symptoms:
In the Linux kernel, the following vulnerability has been resolved: btrfs: fix information leak in btrfs_ioctl_logical_to_ino() Syzbot reported the following information leak for in btrfs_ioctl_logical_to_ino(): BUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:114 [inline] BUG: KMSAN: kernel-infoleak in _copy_to_user+0xbc/0x110 lib/usercopy.c:40 instrument_copy_to_user include/linux/instrumented.h:114 [inline] _copy_to_user+0xbc/0x110 lib/usercopy.c:40 copy_to_user include/linux/uaccess.h:191 [inline] btrfs_ioctl_logical_to_ino+0x440/0x750 fs/btrfs/ioctl.c:3499 btrfs_ioctl+0x714/0x1260 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:904 [inline] __se_sys_ioctl+0x261/0x450 fs/ioctl.c:890 __x64_sys_ioctl+0x96/0xe0 fs/ioctl.c:890 x64_sys_call+0x1883/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:17 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f Uninit was created at: __kmalloc_large_node+0x231/0x370 mm/slub.c:3921 __do_kmalloc_node mm/slub.c:3954 [inline] __kmalloc_node+0xb07/0x1060 mm/slub.c:3973 kmalloc_node include/linux/slab.h:648 [inline] kvmalloc_node+0xc0/0x2d0 mm/util.c:634 kvmalloc include/linux/slab.h:766 [inline] init_data_container+0x49/0x1e0 fs/btrfs/backref.c:2779 btrfs_ioctl_logical_to_ino+0x17c/0x750 fs/btrfs/ioctl.c:3480 btrfs_ioctl+0x714/0x1260 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:904 [inline] __se_sys_ioctl+0x261/0x450 fs/ioctl.c:890 __x64_sys_ioctl+0x96/0xe0 fs/ioctl.c:890 x64_sys_call+0x1883/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:17 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f Bytes 40-65535 of 65536 are uninitialized Memory access of size 65536 starts at ffff888045a40000 This happens, because we're copying a 'struct btrfs_data_container' back to user-space. This btrfs_data_container is allocated in 'init_data_container()' via kvmalloc(), which does not zero-fill the memory. Fix this by using kvzalloc() which zeroes out the memory on allocation.

Conditions:
NA

Impact:
It can leak uninitialized kernel memory to user space, potentially exposing sensitive information.

Workaround:
NA

Fix:
The information leak issue has been resolved in the kernel.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


1925029-2 : CVE-2023-1611 - Linux Kernel btrfs Use-After-Free Vulnerability Leading to System Crash and Information Leak

Component: TMOS

Symptoms:
A use-after-free flaw was found in btrfs_search_slot in fs/btrfs/ctree.c in btrfs in the Linux Kernel.This flaw allows an attacker to crash the system and possibly cause a kernel information leak

Conditions:
NA

Impact:
It can cause a kernel crash (denial of service) and may lead to a kernel information leak.

Fix:
The system crash and information leak issue has been resolved in the kernel.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


1924693-2 : CVE-2020-26939 bouncycastle: Address OAEP decoding side-channel leaking RSA private exponent

Component: TMOS

Symptoms:
Attackers can obtain sensitive information about a private exponent because of Observable Differences in Behavior to Error Inputs. This occurs in org.bouncycastle.crypto.encodings.OAEPEncoding. Sending invalid ciphertext that decrypts to a short payload in the OAEP Decoder could result in the throwing of an early exception, potentially leaking some information about the private exponent of the RSA private key performing the encryption.

Conditions:
Bouncy Castle BC versions before 1.61 are vulnerable

Impact:
The vulnerability leaks side-channel information about the RSA private exponent

Workaround:
N/A

Fix:
bouncycastle has been upgraded to 1.61 to address this vulnerability.

Fixed Versions:
21.1.0


1923997-2 : CVE-2023-1668-openvswitch: ip proto 0 triggers incorrect handling

Component: TMOS

Symptoms:
A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow.

Conditions:
NA

Impact:
It can cause incorrect handling or misrouting of other IP packets, potentially leading to traffic disruption or denial of service.

Workaround:
NA

Fix:
The denial of service issue has been resolved in the package.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


1923817-2 : CVE-2017-11499: Constant Hashtable Seeds vulnerability (NodeJS v6.9.1)

Component: Local Traffic Manager

Symptoms:
Node.js v4.0 through v4.8.3, all versions of v5.x, v6.0 through v6.11.0, v7.0 through v7.10.0, and v8.0 through v8.1.3 was susceptible to hash flooding remote DoS attacks as the HashTable seed was constant across a given released version of Node.js. This was a result of building with V8 snapshots enabled by default which caused the initially randomized seed to be overwritten on startup.

Conditions:
NA

Impact:
It can cause high CPU usage and event loop blocking, leading to a remote denial of service.

Workaround:
NA

Fix:
Hash flooding remote DoS issue has been resolved in the package.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


1923793-2 : CVE-2019-5739: DoS with keep-alive HTTP connection

Component: Local Traffic Manager

Symptoms:
Keep-alive HTTP and HTTPS connections can remain open and inactive for up to 2 minutes in Node.js 6.16.0 and earlier. Node.js 8.0.0 introduced a dedicated server.keepAliveTimeout which defaults to 5 seconds. The behavior in Node.js 6.16.0 and earlier is a potential Denial of Service (DoS) attack vector. Node.js 6.17.0 introduces server.keepAliveTimeout and the 5-second default.

Conditions:
NA

Impact:
It can exhaust server connections and resources, leading to a denial of service.

Fix:
The Denial of Service issue has been resolved in the package.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


1922661 : JSON profile settings not displayed in REST API after attaching schema files

Links to More Info: BT1922661

Component: Application Security Manager

Symptoms:
When a JSON content profile has validation files attached, the following settings are not visible through the REST API:

"sensitiveData"
"attackSignaturesCheck"
"metacharElementCheck"

Conditions:
JSON content profile has schema validation files attached.

Impact:
JSON profile settings not visible in REST API.

Workaround:
None

Fix:
The REST API now correctly returns the JSON profile settings when schema files are attached.

Fixed Versions:
21.1.0, 17.1.3.1


1920973 : Ordering nested JSON objects during full json policy export

Component: Application Security Manager

Symptoms:
The order of the nested entities in the exported Full Json policy is random.

Conditions:
Exporting an ASM security policy using the "Full" export method through JSON.

Impact:
Since the order of the sub-values keeps changing when re-importing, systems detect the entire policy file as modified, making it difficult to accurately compare and track actual configuration changes.

Workaround:
Exporting the policy using the template-based JSON export method will give ordered sub entities. Note that this export method does not give a full view of all of the policies.

Fix:
After the fix, the sub entities in the exported Json policy will be ordered.

Fixed Versions:
21.1.0


1920637 : Duplicate user-defined Signature Set based on Attack Type is created upon policy import during upgrade

Links to More Info: BT1920637

Component: Application Security Manager

Symptoms:
After an upgrade or a re-import, duplicate signature sets denoted by a "_1" are created containing NULL values instead of empty strings.

Conditions:
A user-defined signature set has an empty string for the tagged signature filter.

Impact:
Additional "duplicate" sets are created every time a policy is re-imported. This does not affect any functionality, but does increase the total configuration size, and makes the configuration more difficult to manage.

Workaround:
You can repair the policy by navigating to “Security ›› Application Security : Policy Building : Learning and Blocking Settings”, clicking on “change”, and choosing the original created sets instead of the duplicated sets. Save, and then apply the policy. The duplicated sets can be deleted after that.

Fixed Versions:
21.1.0


1893905 : Python vulnerability CVE-2023-40217

Links to More Info: K000139685, BT1893905


1893473 : Apache vulnerability CVE-2021-40438

Links to More Info: K01552024, BT1893473


1893369-2 : CVE-2021-33033 kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c

Component: TMOS

Symptoms:
The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.

Conditions:
NA

Impact:
It can either lead to a DOS or cause arbitrary write on the system.

Workaround:
NA

Fix:
The DOS and arbitrary write issue has been resolved in the kernel.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


1889845 : Improvements in Radius Monitor

Component: Local Traffic Manager

Symptoms:
Certain headers were missing from radius monitor packet.

Conditions:
When radius monitors is configured

Impact:
Can lead to unexpected behaviour

Fix:
Missing headers are now included in the packets.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


1849265-5 : A VCMP guest may not exit hardware syncookie mode

Links to More Info: BT1849265

Component: TMOS

Symptoms:
On a VCMP guest, if a virtual server enters hardware syncookie mode due to a syn flood, and the virtual server is passing a significant amount of valid traffic, it may not exit syncooke mode.

Conditions:
-- VCMP guest
-- Hardware syncookie mode

Impact:
Syncookies may continue to be issued even though the attack has stopped.

Workaround:
Remove traffic from the virtual server until syncookies deactivates.
This can be accomplished by using cli transaction to alter the first virtual server and create an identical new virtual server.
Example:
Assume my_vs1 is the existing virtual server listening on port 80
tmsh
create /cli transaction
delete ltm virtual my_vs1
create ltm virtual my_vs2 destination 10.10.10.16:80 pool pool1 profiles add { fastL4 http } source-address-translation { type automap }
submit /cli transaction

This will, delete the first virtual server but existing TCP connections will be maintained. And then the new virtual server will be created which will accept new transaction. Since syncookie are enabled per virtual server, this new virtual server will not be in hardware syncookie mode.

Fix:
Syncookie threshold calculation is now accurate.

Fixed Versions:
21.1.0, 17.5.1.4


1849029-4 : Debug TMM crashes in FIPS/CC mode

Links to More Info: BT1849029

Component: Local Traffic Manager

Symptoms:
A TMM in debug mode crash occurs in FIPS/CC mode when using ClientSSL or ServerSSL profile.

Conditions:
-- Debug tmm is running
-- FIPS/CC mode enabled

Impact:
Traffic disrupted while tmm restarts.

Workaround:
N/A

Fix:
Fix memory issue.

Fixed Versions:
21.1.0, 21.0.0.1, 17.1.3, 16.1.6.1


1826505 : Restjavad API usage statistics memory leak

Links to More Info: BT1826505

Component: TMOS

Symptoms:
A memory leak develops on the standby device but may persist on the active device.

Restjavad may fail and restart with a similar error to the following log snippet (in /var/log/restjavad.0.log if failure is recent):

'DieOnUncaughtErrorHandler Uncaught Error causing restjavad to exit.'

It may also trigger frequent CPU intensive garbage collection such as many invocations of 'Full GC'. These will not be able to clear the memory, and that may be observable in GC logs as only small drops in restjavad heap size when Full GC runs.

Restart of restjavad may not clear the issue fully or for long. Issue may persist after upgrade.

/var/log/restjavad-api-usage.json has a large file size. Typically it will be tens of Kilobytes before leak develops and eventually grow to Megabytes or tens of MB.

Conditions:
Restjavad that fails or exhibits issues will have had a long time as standby in a HA cluster, but may not be standby at time of failure.

Impact:
Restjavad exits and restarts, perhaps repeatedly.
High CPU use due to frequent intensive garbage collection may occur.

Workaround:
See K000153118: Procedure to clear restjavad API statistics memory leak, ID 1826505
https://my.f5.com/manage/s/article/K000153118

This procedure should have a low impact if your environment does not require constant availability of REST API. For systems that are more dependent on REST API availability such as SSL Orchestrator, you may want to restrict this to a maintenance window.

Fix:
Restjavad API usage statistics data is now reset after each periodic save and is no longer loaded from disk on startup. This prevents unbounded memory growth from accumulating transient API statistics entries over time.

Fixed Versions:
21.1.0


1826345 : Security improvements in ca-bundle.crt

Component: TMOS

Symptoms:
Security best practices were not being followed for CA bundles.

Conditions:
When SSL profile is configured.

Impact:
Can lead to unexpected behaviour

Workaround:
Manually updating the default CA bundle or using CA bundle Manager.

Fix:
Security best practices are now being followed.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


1825357 : Possible tmm crash or traffic loss after making vlan interface changes with an empty trunk

Links to More Info: BT1825357

Component: Local Traffic Manager

Symptoms:
Tmm crashes and generates a core file.

or

Network traffic via a trunk does not work.

Conditions:
Platform i2600, i2800, i4600, i4800, r2800, r4800 or VADC

All trunk members are removed from a trunk attached to a vlan.
Then, the trunk is removed from one or more vlans.
Then, the trunk is deleted.
This could result in a tmm crash.

or

A trunk with no members is added to a vlan.
Then, one or more members are added to the trunk.
This will result in traffic on that vlan not being being sent over that trunk.

Impact:
Traffic disrupted while tmm restarts
or
Traffic is not sent out via the trunk

Workaround:
Do not remove and a trunk with no members from a vlan.
It will be necessary to restart tmm to correct this situation.

Do not add a trunk with no members to a vlan.
If a trunk with no members was added to the vlan, the issue can be corrected by removing the trunk from the vlan, ensuring that there are members in the trunk and adding it back to the vlan.

Fix:
FIX is not yet available.

Fixed Versions:
21.1.0, 17.5.1.4


1825057 : 'vs_name' field truncated at 64 characters with ASM's remote logging

Links to More Info: BT1825057

Component: Application Security Manager

Symptoms:
The virtual server name field (vs_name) is truncated at 64 bytes with ASM's remote logging handled by BD process.

The 'vs_name' field comprises of the partition name as well as virtual server name and the 64 character limit is inclusive of both these names.

Conditions:
ASM/Advanced WAF device running one of the versions listed under Known Affected Versions.

Impact:
Virtual server name gets truncated in remote logging events

Workaround:
None.

Fixed Versions:
21.1.0


1824985 : In rare cases the Nitrox hardware compression queue may stop servicing requests.

Links to More Info: BT1824985

Component: Local Traffic Manager

Symptoms:
In rare cases, the Nitrox hardware may stop servicing requests.

When this issue occurs the tmctl compress table shows a high number of cur_enqueued entries and the number of requests handled in software (zlib) will be growing.

Conditions:
-- Nitrox compression hardware.
-- HTTP compression in use.

Impact:
Some connections may fail, and higher than expected CPU usage will be observed since requests will be handled in software.

Workaround:
Remove traffic from the device, or disable compression until the queues are completely drained.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


1820489 : Rule list order changes when modifying a rule using Filer Active Rules List

Links to More Info: BT1820489

Component: Advanced Firewall Manager

Symptoms:
Firewall Policy rule ID changes when Modifying a rule using "Filer Active Rules List" and commit the changes.

Conditions:
- AFM licensed and provisioned.
- Create a rule-list with 4-5 rules in it.
- Create a Policy and add rule-list under it.
- Now Filer any of 2 Active Rules from rule List and then the Rule ID order changes, Now do any modification on filtered rules and commit the changes.
- Now remove the filter and observe the Rule ID changes for all the rules once after commit the changes.

Impact:
May lead to a change in the rule order and priority.

Workaround:
Remove the filter before committing the changes.

Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1


1818949-1 : [APM] BIG-IP as OAuth AS sending invalid grant error when refresh token expired.

Links to More Info: BT1818949

Component: Access Policy Manager

Symptoms:
As per RFC states that, the provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client then should send a 400 Bad Request status code and a error json response
{"error": "invalid_grant", ...}

currently BIG-IP sending as {"error": "access_denied", ...}
with 400 status code.

Conditions:
OAuth configured.
using the refresh token to get the access token, when refresh token is expired. (ex: using postman)

Impact:
Returns Invalid error

Workaround:
None

Fix:
Corrected the logging as per Rfc.

Fixed Versions:
21.1.0, 21.0.0.1


1818137 : Tmm IPv4 fragmentation handling distribution

Links to More Info: BT1818137

Component: Local Traffic Manager

Symptoms:
BIG-IP VE handles fragmented IPv4 traffic on the first tmm thread/tmm0. With this change the ability to spread the fragmented IPv4 traffic is introduced.

Conditions:
Handling of fragmented IPv4 traffic.

Impact:
Handling of fragmented IPv4 traffics distribution.

Workaround:
None

Fix:
With this fix the Handling of fragmented IPv4 traffic can be distributed.

Fixed Versions:
21.1.0, 21.0.0.1


1814413 : Dynamic parameters are not extracted and cookies are not generated

Links to More Info: BT1814413

Component: Application Security Manager

Symptoms:
Dynamic parameters are not extracted and cookies are missed.

Conditions:
Create a parameter in extraction and in the Extracted Items configuration.

Impact:
Unable to extract dynamic parameters due to which false positives are generated.

Workaround:
Include the file type in the Extracted Items configuration.

Fixed Versions:
21.1.0


1813505-3 : Snmpd may seg fault on systems with large amounts of virtual memory

Links to More Info: BT1813505

Component: TMOS

Symptoms:
Snmpd cores

Conditions:
* systems with large amounts of virtual memory (e.g. 3.5 TB)
* attempt to access dot3StatsTable

Impact:
Snmp unavailable when snmpd restarts

Workaround:
Avoid using dot3StatsTable.

Fixed Versions:
21.1.0, 17.5.1.4


1788105 : TLS1.3 connections between BIG-IP and server hangs with an APM policy that is invoked after the server's SSL handshake finishes

Links to More Info: BT1788105

Component: Local Traffic Manager

Symptoms:
A TLS1.3 connection between the BIG-IP system and the server hangs.

Other reported symptoms:
-- SSL decryption fails
-- SSL handshake failure
-- SSL Orchestrator explicit proxy stops responding

This can be encountered after an upgrade to an affected version.

Conditions:
A virtual server that uses
1. TLS1.3 in the serverSSL profile
2. An APM policy that uses events that trigger after the SSL handshake on the server has completed

In an SSL Orchestrator setting, inline HTTP and ICAP services make use of APM policies that use L7 protocol lookup. Server Certificate and L7 protocol lookup conditions also make use of events that trigger the APM policy after the SSL handshake has completed.

Impact:
The connection hangs and the client is unable to connect to the server.

Workaround:
Apply either of these workarounds

1. Disable TLS1.3 on the serverSSL profile
2. Avoid using events that trigger the policy after the SSL handshake on the server has completed (for example avoid Event Wait and L7 protocol Lookup)

Fix:
The TLS1.3 connection between the BIG-IP and server no longer hangs if the APM policy is invoked after the SSL handshake.

Fixed Versions:
21.1.0, 21.0.0.1, 17.1.3


1787701 : [APM]Customization in German contains French language

Links to More Info: BT1787701

Component: Access Policy Manager

Symptoms:
Observe "Change password" contains a French word "Modifier le mot de passe" in Logon Page agent.

Conditions:
Access policy with German language.

Impact:
It is confusing to see a different language in customization.

Workaround:
None

Fixed Versions:
21.1.0


1787645 : BD process fail to startup on specific XML configuration

Links to More Info: BT1787645

Component: Application Security Manager

Symptoms:
BD does not start up (restart loop).

Conditions:
An XML configuration with specific configuration in the profile.

Impact:
System does not start up.

Workaround:
Remove the specific configuration in the profile.

Fixed Versions:
21.1.0


1787457 : GRPC communication may fail when server responds without trailers and any payload

Component: Local Traffic Manager

Symptoms:
Virtual server has http2 profile and handles GRPC traffic. When the HTTP Trailer with GRPC code is omitted, i.e. servers sends a response with no payload, BIG-IP issues HEADERS frame followed by empty DATA frame with END_STREAM flag, breaking GRPC communication.

Conditions:
GRPC server send a response without Trailers and any payload, lacking any sizing for the payload in HTTP headers.

Impact:
GRPC client sends RST_STREAM, breaking GRPC communication with the server.

Workaround:
None

Fix:
BIG-IP recognizes HTTP/2 responses without any payload and forwards it to the client in HEADERS frame with END_STREAM flag.

Behavior Change:
When BIG-IP receives HTTP/2 response in HEADERS frame with END_STREAM flag and this frame has no sizing payload HTTP header(s) like Content-Length, it forwards HEADERS frame with END_STREAM flag to the client instead of previous behavior of sending HEADERS frame followed by empty DATA frame with END_STREAM flag.

Fixed Versions:
21.1.0


1785145-4 : TMM SIGSEGV core due to NULL check is not handled properly in PEM

Links to More Info: BT1785145

Component: Policy Enforcement Manager

Symptoms:
TMM crashes while passing PEM traffic

Conditions:
A PEM profile is enabled on a virtual server.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None

Fix:
Core will not be seen after the changes.

Fixed Versions:
21.1.0, 17.5.1.3, 17.1.3


1783677-3 : HSB v3.11.8.0 bitstream release for VIPRION B4450N and B4460N blades

Links to More Info: BT1783677

Component: TMOS

Symptoms:
A new HSB bitfile is available for release to VIPRION B4450N and B4460N blades.

Conditions:
VIPRION B4450N and B4460N blades using the HSB FPGA bitfile.

Impact:
Enables use of HSB bitfile v3.11.8.0 on the VIPRION B4450N and B4460N blades.

Workaround:
None.

Fix:
Updated HSB FPGA bitfile to v3.11.8.0.

Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1


1778793 : Database health monitors may use the wrong connection when attempting to connect to database

Links to More Info: BT1778793

Component: Local Traffic Manager

Symptoms:
Database monitors fail periodically and mark a pool member down.

Periodically, the DB monitor will create user sessions on the DB server without closing them.

Conditions:
- Multiple database health monitor instances exist to probe a given node.

- The monitor instances share the same values for the following parameters:
 - destination IP address
 - destination port
 - database name.

Impact:
Healthy pool members are not selected to receive traffic.

Workaround:
You can work around this issue by using a BIG-IP EAV external monitor to probe the health of your database. An example for MySQL is available on DevCentral at https://community.f5.com/kb/codeshare/mysql-monitor/273565.
 
Alternatively, you may also work around this issue by adding a unique connection property as a suffix to the database name. This ensures a unique JDBC connection string is constructed for each monitor in order to avoid this issue.
 
For example you can use the connection properties "ApplicationName=<monitor_name>" or "applicationName=<monitor_name>" in PostgreSQL or Microsoft SQL Server respectively to provide the name of the calling monitor to the database.

In Oracle a connection string similar to the following can be used:

database (DESCRIPTION=(ADDRESS=(PROTOCOL=tcp)(HOST=%node_ip%)(PORT=%node_port%))(CONNECT_DATA=(SERVICE_NAME=ORACLE1))(SERVER=dedicated)(customKey=1))

or

database "%node_ip%:%node_port%:ORCLDB1?customkey=1"

Note that the PostgreSQL monitor requires a "?" character as a separator between the database name and the connection property, while MS SQL Server requires a ";" as separator.
 
Example tmsh commands to disambiguate monitorA and monitorB which both probe database "samedb" on the same node:
 
- PostgreSQL monitors:
  - tmsh modify ltm monitor postgresql monitorA database samedb?ApplicationName=monitorA
  - tmsh modify ltm monitor postgresql monitorB database samedb?ApplicationName=monitorB
 
- MS SQL Server:
  - tmsh modify ltm monitor mssql monitorA database '"samedb;applicationName=monitorA"'
  - tmsh modify ltm monitor mssql monitorB database '"samedb;applicationName=monitorB"'

- Oracle Server:
  - tmsh modify ltm monitor oracle myoracle database '%node_ip%:%node_port%:PTDB3CC1?customkey=1'

Note that the extra quoting in the example command for MS SQL Server is required to preserve the ";" separator in the database name.

Fixed Versions:
21.1.0


1772353 : Defaults for Associated Violations are re-added to a policy

Links to More Info: BT1772353

Component: Application Security Manager

Symptoms:
When Associated Violations is empty ("Selected" list is empty), and the policy is exported to XML or JSON format, and reimported, the default elements are re-added to the list.

Conditions:
Associated Violations is empty ("Selected" list is empty), and the policy is exported to XML or JSON format, and reimported

Impact:
The default Session Awareness Violations are set back to delay blocking unexpectedly.

Workaround:
Use binary format export and import.

Fixed Versions:
21.1.0


1772317-1 : [APM][SAML SP] sp fails authentication with error "SAML assertion is invalid, error: NameID is missing"

Links to More Info: BT1772317

Component: Access Policy Manager

Symptoms:
SAML authentication fails and following log is seen on BIG-IP as sp: "SAML Agent: /Common/web_auth_act_saml_auth_subsession_ag SAML assertion is invalid, error: NameID is missing, but idp-connector's identity location is set to subject"

Conditions:
-- SAML auth is configured as SP on BIG-IP as part of per-request policy
-- assertion has an encrypted subject "<saml2:Subject><saml2:EncryptedID><xenc:EncryptedData xmlns:xenc="http://www.w3.org/2001/04/xmlenc#"...."

Impact:
Authentication fails

Workaround:
Disable "encrypt-subject " in idp config

Fixed Versions:
21.1.0, 21.0.0.1


1758957 : If two tenants share the same VLAN, TMM may egress broadcast traffic even when VLANs are disabled in F5OS

Links to More Info: BT1758957

Component: F5OS Messaging Agent

Symptoms:
In certain scenarios, such as restoring a UCS on an F5OS tenant, if the VLANs in F5OS are disabled, the TMM may egress broadcast traffic such as gratuitous ARPs onto the disabled VLANs.

Conditions:
-- VLAN is currently assigned to any tenant.
-- An F5OS tenant where VLANs were assigned and then removed.
-- An F5OS tenant where TMM is not in forced-offline mode.
-- An action occurs on the tenant (such as restoring a UCS or restarting TMM, or loading the config) that results in gratuitous ARPs.

Impact:
This could cause IP address conflicts on the network or other issues related to unexpected broadcast traffic such as gratuitous ARPs on the network.

Workaround:
- In F5OS, remove the affected VLANs from the LAG or interface.

- In F5OS, ensure there is at least one VLAN still attached to the tenant. This could be a temporary VLAN.

- On the tenant, use forced offline to prevent traffic egress.

- If you are restoring a UCS from another BIG-IP such as for a platform migration, put the source BIG-IP into a forcedoffline state before taking the UCS.

- Delete the tenant, and recreate without any VLANs assigned.

- In F5OS, remove the VLAN from all tenants.

Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1


1756897 : [APM][PA]Failed to execute 'observe' on 'MutationObserver': parameter 1 is not of type 'Node'

Links to More Info: BT1756897

Component: Access Policy Manager

Symptoms:
Application fails to load with below console error in developer tools.

Uncaught TypeError: Failed to execute 'observe' on 'MutationObserver': parameter 1 is not of type 'Node'.

Conditions:
Portal Access configured.

Impact:
Unable to load application via portal access.

Workaround:
Customized cache-fm-Modern.js ifile workaround is available for this.

Fixed Versions:
21.1.0, 17.5.1.4


1752873-1 : [APM][SAML SP] Order of SAML attribute values saml.last.attr.name is reversed

Links to More Info: BT1752873

Component: Access Policy Manager

Symptoms:
After upgrading, the order of SAML attribute values parsed from assertion are stored in reverse order.

Conditions:
-- BIG-IP as SAML SP,
-- Upgrade to 17.1.0

Impact:
The SAML assertion values are parsed in reverse order, which can cause iRules or policies to fail if they expect the values to arrive in a certain order.

Workaround:
None

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


1701177 : HTTP request handling improvements

Component: TMOS

Symptoms:
Under certain request patterns, management HTTP responsiveness may degrade.

Conditions:
Specific request-handling configurations.

Impact:
Could lead to reduced availability.

Workaround:
NA

Fix:
Improved connection and request handling for better resilience.

Fixed Versions:
21.1.0


1696965 : When URL is created from session and login, the staging on the URL is disabled

Links to More Info: BT1696965

Component: Application Security Manager

Symptoms:
The staging is disabled on a new URL.

Conditions:
The URL was created from the session and login section in the UI.

Impact:
The URL generate violations that may be in alarm and blocking.

Workaround:
None

Fixed Versions:
21.1.0, 17.1.3, 16.1.6


1696641 : aced core running out of file descriptors

Links to More Info: BT1696641

Component: Access Policy Manager

Symptoms:
-- The aced process may exhaust available file descriptors over time when using SecurID authentication
-- Users are unable to authenticate using RSA SecurID
-- Complete APM service outage with "Too many open files" errors in /var/log/apm
-- aced process may core and restart

Conditions:
-- BIG-IP APM system configured with SecurID authentication
-- aced process runs for extended periods (typically weeks)
-- Authentication failures or connection issues between APM and SecurID server may accelerate the issue.

Impact:
-- Complete APM service outage.
-- All VPN clients unable to establish connections
-- SecurID authentication failures.
-- Service becomes unstable and stops processing authentication requests.

Workaround:
Restart the aced process: bigstart restart aced.
Perform system failover to restore service temporarily.

Fix:
The aced daemon now properly cleans up file descriptors (sockets) created during SecurID authentication requests, particularly during error scenarios such as authentication failures. This prevents file descriptor exhaustion that previously caused the aced process to crash and resulted in complete APM service outages.

Fixed Versions:
21.1.0, 17.5.1.4


1690005-1 : Unable to ping the floating self addresses from the Standby tenant

Links to More Info: BT1690005

Component: F5OS Messaging Agent

Symptoms:
Masquerade Mac is not removed when F5OS is rebooted.
It can be observed using the 'show fdb' command in confd

This can cause the standby tenant to be unable to ping the floating SelfIP address on the active device, but the active device can ping the standby device.

Conditions:
- An HA pair of tenants is used
- Tenants running on a VELOS chassis, or on r5000-series, r10000-series, or r12000-series appliances
- A traffic group uses a masquerade mac
- The Active tenant is rebooted

Impact:
Active and Standby act as if they are the owners of Floating MAC and IP.

Workaround:
The masquerade mac's fdb can be manually deleted using the F5OS CLI.
From the standby F5OS system CLI:
config
no fdb mac-table entries entry <mac masquerade address>
commit

Fix:
Masquerade Mac is now removed after F5OS is rebooted.

Fixed Versions:
21.1.0


1678597 : Rate-limit external iControl REST API calls on BIG-IP

Component: Device Management

Symptoms:
You are unable to rate-limit incoming iControl REST API calls.

Conditions:
-- The BIG-IP system is encountering a heavy load of incoming iControl REST API calls
-- You wish to rate limit or throttle the API calls in order to reduce the system resource requirements

Impact:
System instability due to heavy external API access.

Workaround:
None

Fixed Versions:
21.1.0


1678105 : F5OS tenant, TMM crashing after loading a UCS

Links to More Info: BT1678105

Component: TMOS

Symptoms:
If a UCS is loaded on a F5OS tenant and the name of the tenant from where the UCS was saved does not match the tenant name where it is restored.

Conditions:
- UCS restored on tenant with a different tenant name than were the UCS was created.

Impact:
The tenant will not become operational because TMM fails to start.

Workaround:
Refer to following steps for workaround:

1. Remove the file "tmm_velocity_init.tcl" in /config/.
2. Perform bigstart restart platform_agent.
3. Ensure a new "tmm_velocity_init.tcl" is created and TMM stops failing.

Fixed Versions:
21.1.0


1677429 : BFD: TMM might not agree on session ownership.

Links to More Info: BT1677429

Component: TMOS

Symptoms:
Bidirectional forwarding detection (BFD): TMM might not agree on session ownership.

Conditions:
- Multi-bladed chassis.
- A blade is added or removed in a cluster.

Impact:
BFD session ownership moves to a new TMM.

Workaround:
None

Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1


1671149 : Timestamp cookies may cause issue for PVA-accelerated connections

Links to More Info: BT1671149

Component: Advanced Firewall Manager

Symptoms:
Timestamp cookies may cause performance issues for PVA-accelerated connections on some older platforms and/or platforms without a performance license.

Conditions:
- PVA offload configured (any stage).
- DOS ACK (TS) vector has timestamp cookies option enabled.
- Platform supporting ePVA feature (Ref. https://my.f5.com/manage/s/article/K12837)
- Platform does not belong to the following subset:
    B2250 (A112)
    B4450N (A114)
    B4460N (A121)
    i10800 (C116)
    i7800 (C118)
    i5800 (C119)
    i11800 (C123)
    i11800-DS (C124)
    i5820-DF (C125)
    i7820-DF (C126)
    i15800 (D116)
    i15820-DF (D120)
    VELOS BX110, BX520
    r5800/5900, r10800/10900, r12800/12900 r-series platforms
 
Additionally, for platforms specified in the list above a license with support of turboflex 'Basic DoS vectors' capability is required. Note, this requires a 'Performance' license on some of platforms.
For more information about Turboflex please check article https://techdocs.f5.com/en-us/hw-platforms/f5-platform-turboflex-profiles/title-turboflex-overview.html

Impact:
Tmm resets the connection or causes slow performance.

Workaround:
Disable timestamp-cookie feature.

Fixed Versions:
21.1.0


1670465 : TMMs might not agree on session ownership when multiple cluster geometry changes occur.

Links to More Info: BT1670465

Component: TMOS

Symptoms:
TMMs might not agree on session ownership when multiple cluster geometry changes occur in a quick succession.

Conditions:
Cluster geometry changes occur in a quick succession, for example two blades come up one after another during a software upgrade.

Impact:
Session might be dropped few minutes/seconds after cluster geometry change happens

Workaround:
None

Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1


1642533 : ipv4 forwarding is enabled on F5OS tenants

Component: TMOS

Symptoms:
The ipv4 forwarding sysctl, net.ipv4.ip_forward, is enabled on F5OS tenants.

Conditions:
NA

Impact:
May lead to unintended results.

Workaround:
Disable the sysctl.

Fix:
ipv4 forwarding is no longer enabled on F5OS tenants

Fixed Versions:
21.1.0


1632385 : Non-ASCII UTF-8 characters are mangled in JSON policy export

Links to More Info: BT1632385

Component: Application Security Manager

Symptoms:
Non-ASCII UTF-8 characters in a JSON policy are mangled when exported in JSON policy.

Conditions:
Values contains Non-ASCII UTF-8 characters and the policy is exported and imported back

Impact:
After re-importing the exported policy, the values change

Workaround:
None

Fix:
After exporting the policy with the Non-ASCII UTF-8 characters, the imported policy has the same identical values as before.

Fixed Versions:
21.1.0


1628129 : SSL Orchestrator traffic summary log does not display url-category for HTTP request if a SWG as a service blocks the connection

Links to More Info: BT1628129

Component: SSL Orchestrator

Symptoms:
The traffic summary for an SSL Orchestrator explicit proxy topology in the apm logs when log levels are set to Information does not display the url-category for the connection. Instead just `url-category: NA` is displayed.

Conditions:
An explicit proxy topology is deployed that uses a Secure Web Gateway (SWG) as a service to process traffic and the SWG rejects an http connection coming through the proxy.

Impact:
The traffic summary log message is incomplete not displaying the url-category.

Workaround:
There is no workaround for the traffic summary log message. Instead the category would need to be logged in a different way such as
1. Use a logging macro in the Secure Web Gateway's Per-Request-Policy

Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3


1627093 : DNS's HTTP Monitor provides the ability to show Response Code in Logs

Component: Global Traffic Manager (DNS)

Symptoms:
DNS's HTTP Monitor provides the ability to show Response Code in Logs.

Conditions:
NA

Impact:
NA

Workaround:
None.

Fix:
Added response code status in DNS's HTTP monitor logs for all possible scenarios.

Fixed Versions:
21.1.0


1624701 : Security improvement in BIGIP GUI

Component: TMOS

Symptoms:
BIGIP GUI was not following best security practices.

Conditions:
NA

Impact:
Unexpected behaviour

Fix:
Security best practices are now being followed.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


1623921-4 : IPencap monitor probes from bigd are prone to connection re-use.

Links to More Info: BT1623921

Component: Local Traffic Manager

Symptoms:
When using a DNS monitor with IP encapsulation, TMM handles probe encapsulation. Bigd reuses source ports after closing sockets quickly, but TMM applies a 30-second timeout, leading to connection re-use. This can result in probes being incorrectly encapsulated to the wrong pool member, causing inaccurate health monitoring

Conditions:
1. DNS monitor configured with 'transparent' destination and IP encapsulation enabled.
2. Large number of pool members (e.g., 60).

Impact:
Probes may be encapsulated to the wrong destination, leading to inaccurate health monitoring of pool members.

Workaround:
None

Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1


1623669 : False “Illegal dynamic parameter value” violations when extracting parameters from links (HREF)

Links to More Info: BT1623669

Component: Application Security Manager

Symptoms:
Requests may be blocked with the violation “Illegal dynamic parameter value” even though the parameter values were correctly extracted from application responses using “Search in Links” and should be treated as valid.

Conditions:
- A parameter is configured with Dynamic content value

- “Check – Search in Links” is enabled for the parameter

- The parameter value is extracted from response links (HREF)

- The extracted value is later used in a client request while the policy is enforced

Impact:
Legitimate application traffic may be blocked because values extracted from links are not recognized as valid dynamic parameter values.

Workaround:
None

Fix:
Values extracted from response links are properly learned and recognized, and requests using those values are no longer incorrectly blocked with “Illegal dynamic parameter value.”

Fixed Versions:
21.1.0, 17.1.3.1


1623601 : Invalid PCRE expressions are allowed

Links to More Info: BT1623601

Component: Application Security Manager

Symptoms:
Some invalid PCRE expressions pass config validation and are stored.

Conditions:
PCRE validation is used for parameters

Impact:
ASM goes into a restart loop.

Workaround:
None

Fixed Versions:
21.1.0


1623325 : VLAN groups or VLAN group members may be deleted on F5OS tenant

Links to More Info: BT1623325

Component: Local Traffic Manager

Symptoms:
If using VLAN groups on a tenant running on an rSeries appliance or VELOS chassis, the system may delete the VLAN group or VLAN group members unexpectedly.

This will happen when configuration changes to the tenant are made in F5OS or if the interface members of the VLAN change state (i.e. link down)

- If the VLAN groups are in a non-common partition, any members of the VLAN group will be removed, but the VLAN group will remain.

- If the VLAN groups are in common partition, but are not referenced by higher-level objects, the VLAN group will be removed.

- If the VLAN groups are in common partition and are referenced by higher-level objects, the system will not delete the VLAN group, but will log messages similar to the following:

err mcpd[9181]: 01070623:3: The vlangroup (/Common/otters-vlangroup) is referenced by one or more virtual servers.
err chmand[4691]: 012a0003:3: hal_mcp_process_error: result_code=0x1070623 for result_operation=eom result_type=eom

Conditions:
- BIG-IP tenant running on rSeries appliance or VELOS chassis
- VLAN group configured in tenant, and not using virtual wire

Impact:
Traffic disrupted due to removal of VLAN group objects or VLAN group members.

Workaround:
To avoid this problem, define an unused VLAN group in the common partition and assign it to the VLAN list for a virtual server.

tmsh create net vlan-group /Common/unused-vg
tmsh create ltm virtual /Common/unused-virtual vlans-enabled vlans add { unused-vg } description "Workaround for ID1623325"
tmsh save sys config

Note the use of "vlans-enabled" and adding the empty VLAN group to the virtual server's VLAN list. This means that the BIG-IP system will never actually process traffic via this virtual server, as it would only accept traffic to the virtual server that arrives over the VLAN group, but the VLAN group will never receive any actual traffic.

As a result of implementing this workaround, when the tenant processes any configuration updates from F5OS, the tenant will log error messages similar to the following:

err mcpd[10720]: 01070623:3: The vlangroup (/Common/unused-vg) is referenced by one or more virtual servers.
err chmand[6781]: 012a0003:3: hal_mcp_process_error: result_code=0x1070623 for result_operation=eom result_type=eom

Fix:
VLAN groups created by users on the tenant are now preserved during F5OS host events. Only system-managed virtual-wire VLAN groups are updated during these events.

Fixed Versions:
21.1.0


1621417 : WALinuxAgent Updated to Version 2.14.0.1

Component: TMOS

Symptoms:
Unexpected Behavior When Using Deprecated Waagent Configurations: Stricter Validation May Cause VM Extensions to Fail

Conditions:
Applicable to All Previous Versions of BIG-IP Azure Distributions

Impact:
The Azure Linux Agent (waLinuxAgent) has been upgraded from version 2.2.48.1 to 2.14.0.1, bringing enhanced security, stability, and compatibility with newer Azure features and Linux distributions. This major version update includes stricter extension handling.

Fix:
The bundled WALinuxAgent for Azure images has been updated to version 2.14.0.1.

Fixed Versions:
21.1.0


1602345-3 : Resource records are not always created when wideips are created in a bundle

Links to More Info: BT1602345

Component: Global Traffic Manager (DNS)

Symptoms:
Resource records are not created for some of the created WideIPs.

Conditions:
WideIPs are created in a bundle.

Impact:
Resource records are missing.

Workaround:
Wait for more than a minute before creating another wideip;
Or
When resource records are found missing, delete the related wideips and also delete related db zone file for that wideip, then recreate the wideip.

Fixed Versions:
21.1.0, 17.1.3.1


1600617-6 : Few virtio driver configurations may result in excessive memory usage

Links to More Info: BT1600617

Component: Local Traffic Manager

Symptoms:
Certain virtio driver configurations may result in excessive memory usage, which in some cases, leads to issues with forwarding traffic.

'tmctl page_stats' output can be examined on a newly launched system to verify if any of the TMMs except for TMM0 have their memory exhausted.

Conditions:
Virtio driver memory usage scales up with:
- Number of queues.
- Number of TMMs.
- Number of interfaces.
- Queue size.

Increasing these numbers might cause a problem trigger.

Impact:
Excessive memory usage, in some cases, leads to problems with traffic forwarding.

Workaround:
Scale down on the number of queues and their size. Reduce the number of interfaces.

Fixed Versions:
21.1.0


1589629 : An ICMPv6 Neighbor Solicitation sent to the last address on an IPv6 subnet uses the wrong Destination MAC address

Links to More Info: BT1589629

Component: Local Traffic Manager

Symptoms:
The destination MAC address of the ICMPv6 Neighbor Solicitation message is incorrect.

Conditions:
An IPv6 SelfIP address is used, and tmm attempts to resolve the address of (for example) an IPv6 pool memeber which is using the last IPv6 address in the available subnet range.

Impact:
Nodes on the network do not respond to ICMPv6 Neighbor Solicitation messages.

In large environments with many affected addresses, this could potentially contribute to a broadcast storm or degrade overall network performance.

Workaround:
None (other than avoiding the use of the last address in the IPv6 subnet range)

Fixed Versions:
21.1.0


1589269-5 : The maximum value of sys db provision.extramb was reduced from 8192 to 4096 MB

Links to More Info: BT1589269

Component: SSL Orchestrator

Symptoms:
From version 16.1.0 the maximum value of sys db provision.extramb is 4096 MB, reduced from 8192 MB. It will be automatically set to 4096 during the upgrade if it has a higher setting.

Conditions:
Any BIG-IP device running software version 16.1.0 or higher.

Impact:
It is extremely rare to need values of provision.extramb above 4096 MB.

If the value of sys db provision.extramb is 4096 or less prior to upgrading, then there will be no impact post-upgrade. After the upgrade, it is not possible to increase the value above 4096.

If the value is greater than 4096, it will be reduced to 4096 when upgrading to version 16.1.0 or higher. This may leave devices with insufficient 4KB page memory (also known as host memory) which may lead to issues due to memory pressure, such as OOM killer killing processes, poor scheduling of processes leading to core dumps, and sluggish management access.

Workaround:
None

Fix:
The maximum value of sys db provision.extramb is now configurable to 8192(MB).

Behavior Change:
The maximum value of sys db provision.extramb was reduced from 8192 to 4096 MB from version 16.1.0

Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1


1583381 : "Insert Secure Attribute" must be enabled and "Insert SameSite Attribute" must be set to "Lax" for pure wildcard cookie in all templates by default

Links to More Info: BT1583381

Component: Application Security Manager

Symptoms:
The pure wildcard cookie configuration "Insert Secure Attribute" is disabled and "Insert SameSite Attribute" is not set to "Lax".

Conditions:
Creating the policy using the policy templates.

Impact:
The configuration is incorrect.

Workaround:
Configure it manually: Enable "Insert Secure Attribute" and set "Insert SameSite Attribute" to "Lax".

Fix:
Fixed the templates and now BIG-IP has the correct configuration for the pure wildcard cookie.

Fixed Versions:
21.1.0


1580369 : MCPD thrown exception when syncing from active device to standby device.

Links to More Info: BT1580369

Component: TMOS

Symptoms:
Config sync fails on the secondary blade and MCPD restarts.

In /var/log/ltm:

err mcpd[7906]: 0107134b:3: (rsync: link_stat "/config/filestore/.snapshots_d/custom_urldb_d/:Common:custom_feedlist_348871_3751" (in csync) failed: No such file or directory (2) ) errno(0) errstr().

err mcpd[7906]: 0107134b:3: (rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1518) [Receiver=3.0.9] ) errno(0) errstr().

err mcpd[7906]: 0107134b:3: (syncer /usr/bin/rsync failed! (5888) () Couldn't rsync files for mcpd. ) errno(0) errstr().

err mcpd[7906]: 0107134b:3: (rsync process failed.) errno(255) errstr().

err mcpd[7906]: 01070712:3: Caught configuration exception (0), Failed to sync files..

Conditions:
- A BIG-IP system with multiple blades and multiple slots configured for high availability
- Active device has to download the custom_urldb file from a server
- A config sync occurs

Impact:
Config sync to the secondary blade fails and MCPD throws an exception and restarts on the secondary. The cluster primary blade has the correct custom_urldb file. This will impact incremental syncing to other peers in the device group.

Workaround:
None

Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1


1574521 : Intermittent high packet latency on R4000 and R2000 tenants

Links to More Info: BT1574521

Component: Performance

Symptoms:
When compared to previous platforms, BIG-IP tenants on R4000 and R2000 platforms may demonstrate higher jitter and packet latency / rtt. This affects pings, tcp, udp, and any other protocols processed by the software data plane (tmm).

This is because the r4000 and r2000 appliances have a slightly different hardware architecture than other appliances.

CPUs on this platform are not dedicated to the tenant and these platforms also run a different class of Intel processing, and do not utilize hyperthreading like the higher end platforms do.

See:
https://clouddocs.f5.com/training/community/rseries-training/html/rseries_performance_and_sizing.html#r4000-vcpu-sizing

Conditions:
BIG-IP tenants on R4000 and R2000 platforms

Impact:
Intermittent high latency and jitter.

Workaround:
None

Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1


1562733 : Bd can crash using JSON schema

Component: Application Security Manager

Symptoms:
Bd crashes while passing traffic.

Conditions:
Using JSON schema

Impact:
Traffic disrupted while bd restarts.

Workaround:
Remove JSON schema from JSON content profile, and enforce JSON payload via "parse parameter" feature available in JSON content profile.

Fixed Versions:
21.1.0


1554961-3 : APM - Websso leeway time of 60 seconds

Links to More Info: BT1554961

Component: Access Policy Manager

Symptoms:
When JWT is cached, then the error "JWT Expired and cannot be used" is observed.

Conditions:
WebSSO is used with bearer option to generate JWT tokens.

Impact:
JWT fails in upper layer

Workaround:
None

Fix:
Increasing leeway time to 60 sec to accommodate jwt token to be used continuously.

Fixed Versions:
21.1.0, 17.5.1.4


1552341 : Excessive tmm memory during bot signature updates

Links to More Info: BT1552341

Component: Application Security Manager

Symptoms:
During bot signature updates, memory usage may become unusually high. In some cases, updates can fail and leave the system in an inconsistent state.

Conditions:
This issue may occur when multiple bot signature overrides are configured in Bot Defense profiles. Updates that involve multiple signature overrides are more likely to trigger higher memory usage.

Impact:
Bot signature updates may fail due to insufficient memory, which can temporarily prevent new signatures from being applied.

Workaround:
Increase available TMM memory by provisioning the LTM module.

Reduce the number of multiple overrides (either individual signature overrides or signature category overrides) in Bot Defense profiles, as multiple overrides significantly increase memory usage during updates.

Fix:
The fix will optimize the bot signature update mechanism to reduce memory consumption, improve failure handling.

Fixed Versions:
21.1.0, 21.0.0.1


1539997 : Secure HA connections cannot be established due to zombie HA flow

Links to More Info: BT1539997

Component: Local Traffic Manager

Symptoms:
Secure HA connections cannot be established due to zombie HA flow.
A timing issue could end up in a zombie flow, leading to subsequent legitimate connections becoming zombie flows instead of being established.

Conditions:
SSL connections and HA configuration

Impact:
No reproduction and only seen while testing in performance test lab

Workaround:
NONE

Fix:
NA

Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1


1505813 : CVE-2018-16487 lodash: Prototype pollution in utilities

Component: iApp Technology

Symptoms:
A prototype pollution vulnerability was found in lodash <4.17.11 where the functions merge, mergeWith, and defaultsDeep can be tricked into adding or modifying properties of Object.prototype.

Conditions:
NA

Impact:
An attacker can use Function inside of vulnerable versions of lodash to execute malicious code using the Traffic Management User Interface (TMUI) or iControl REST API .it can impact confidentiality,integrity and availability of application.

Workaround:
NA

Fix:
Updated lodash version to 4.17.21

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


1505309 : CVE-2021-23337 nodejs-lodash: command injection via template

Links to More Info: K12492858, BT1505309


1505297 : CVE-2020-8203 nodejs-lodash: prototype pollution in zipObjectDeep function

Component: iApp Technology

Symptoms:
A flaw was found in nodejs-lodash in versions 4.17.15 and earlier. A prototype pollution attack is possible which can lead to arbitrary code execution. The primary threat from this vulnerability is to data integrity and system availability.

Conditions:
The vulnerability can be exploited when a vulnerable lodash version (≤ 4.17.15) processes attacker-controlled input using prototype-modifying functions (e.g., merge, defaultsDeep) with malicious keys like __proto__ or constructor.

Impact:
It can allow prototype pollution, leading to data integrity issues, application crashes (DoS), or potentially arbitrary code execution.

Workaround:
Upgrade lodash to a fixed version (≥ 4.17.16), avoid using prototype-modifying functions on untrusted input, and validate or sanitize user-controlled data.

Fix:
Update nodejs-lodash to version 4.17.16 or later

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


1505257 : False positive with "illegal base64 value" for Authorization header

Links to More Info: BT1505257

Component: Application Security Manager

Symptoms:
False positive "illegal base64 value" is detected

Conditions:
The given base64 encoded value is legal base64 but the decoded auth-param is unparsable. Such request triggers "HTTP Protocol Compliance" violation when configured to do so and it is indeed triggering, but such request should not trigger "illegal base64 value".

Impact:
A false positive is detected.

Workaround:
None

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


1498949 : CVE-2023-2283 libssh: authorization bypass in pki_verify_data_signature

Links to More Info: K000138682, BT1498949


1497633 : TMC incorrectly set /32 mask for virtual-address 0.0.0.0/0 when attached to a VS

Links to More Info: BT1497633

Component: Local Traffic Manager

Symptoms:
When a 0.0.0.0/0 virtual-address created by a wildcard virtual server and a Traffic-Matching-Criteria (TMC) is attached to it, the mask for the 0.0.0.0 virtual address will be incorrectly modified.

Conditions:
Create a wildcard Virtual server with virtual address 0.0.0.0/0.

Attach a Traffic-Matching-Criteria with destination and source addresses as 0.0.0.0/0.

Impact:
The virtual server's address is advertised with an incorrect mask of /32, making the redistributed route via ZebOS ineffective.

Fixed Versions:
21.1.0


1497061 : Added support for VLANs above 512 with xnet-IAVF driver

Links to More Info: BT1497061

Component: TMOS

Symptoms:
TMM crashes when there are more than 512 VLANs

Conditions:
-- BIG-IP uses xnet-IAVF driver
-- Create more than 512 VLANs

Impact:
Traffic disrupted while tmm restarts.

You cannot create an environment to handle >512 VLANs

Workaround:
Reduce the number of VLANs to 512 or below 512.

Fix:
Reduce the number of VLANs to 512 or below 512.

Fixed Versions:
21.1.0, 17.1.3


1489817 : Fix crash due to number of VLANs

Links to More Info: BT1489817

Component: TMOS

Symptoms:
TMM crashes.

Conditions:
- xnet-iavf driver
- Number of VLANs for a given interface >=128

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Reduce the number of VLANs to <128

Fix:
Refactored driver to support large number of VLANs

Fixed Versions:
21.1.0, 17.1.3


1481889-6 : High CPU utilization or crash when CACHE_REQUEST iRule parks.

Links to More Info: BT1481889

Component: Local Traffic Manager

Symptoms:
When CACHE_REQUEST iRule stops, the Ramcache filter stays in CACHE_INIT state when it restarts. This causes the request to be processed twice, which causes high CPU usage or a crash when an incorrect address is encountered.

Conditions:
- HTTP Virtual server
- CACHE_REQUEST iRule with ms delay
- Multiple attempts to request a compressed doc

Impact:
- High CPU on boxes with 4G of valid memory after the key is hashed - on smaller boxes, will crash when an invalid address is encountered.

Workaround:
- Removal of CACHE_REQUEST iRule if avoidable

Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1


1474877-6 : Unable to download large files through VIP due RST Compression error.

Links to More Info: BT1474877

Component: Local Traffic Manager

Symptoms:
- Download of files exceeding maximum tmm.deflate.memory.threshold fails at client.
- Client receives RSTs (Compression error)

Conditions:
- Virtual server with HTML profile or REWRITE profile.
- Size of decompressed http response from server exceeds max tmm.deflate.memory.threshold value i.e. 4718592 bytes.

Impact:
- Client may lose connection to the server.

Workaround:
- Based on URI matches in the HTTP request, decide which responses should NOT be rewritten (e.g. big downloads) and disable REWRITE profile for the selected responses.
- For example, URI starting with "/headsupp/api/data/compare/measures" :

when HTTP_REQUEST {
   if { [HTTP::uri] starts_with "/headsupp/api/data/compare/measures" } {
      set no_rewrite 1
   }
}
when HTTP_RESPONSE {
  if { $no_rewrite == 1 } {
     REWRITE::disable
  }
}

Fix:
- Raised the max tmm.deflate.memory.threshold to approx. 9MB,
- Changes introduced to allow disabling this threshold altogether if so desired, by changing default value for the same threshold to '0'.
- NOTE: Disabling this threshold altogether can lead to exposure to zip bomb attacks.

Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1


1473913 : Proxy Connections drop due to wrong counting

Links to More Info: BT1473913

Component: Local Traffic Manager

Symptoms:
Proxy Connections are dropped. The reset cause in a package capture indicates "F5RST: Not connected"

Conditions:
Can happen during a DOS attack with standard mitigation mode enabled.

Impact:
Random connections are dropped

Workaround:
Use conservative mitigation mode.

Fix:
No random connection drops

Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3, 16.1.6


1473189 : Offending IP is not logged when rate limiting is triggered

Links to More Info: BT1473189

Component: Global Traffic Manager (DNS)

Symptoms:
The log only contains the rate limit message without the offending IP address.

Conditions:
The number of requests exceeds the server's configured maximum rate limit.

Impact:
You are unable to determine which IP address exceeded the threshold.

Workaround:
None

Fix:
The system now logs the offending IP address when the rate limit is triggered.

Fixed Versions:
21.1.0, 21.0.0.1


1463089-3 : TMM crash because of corrupted MQTT queue

Links to More Info: BT1463089

Component: Local Traffic Manager

Symptoms:
Tmm crashes while terminating an MQTT flow. Core file analysis indicates MQTT queue corruption.

Conditions:
LTM configured with TCP and MQTT.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None

Fix:
The queue used to handle specific data is removed and replaced with new handling.

Fixed Versions:
21.1.0


1455741 : Httpd consumes excessive amount of CPU in FIPS mode

Links to More Info: BT1455741

Component: TMOS

Symptoms:
The management plane's httpd process consumes excessive CPU when the system is running in FIPS mode.

Conditions:
FIPS license is installed.

Impact:
Performance impact on management plane.

Workaround:
None

Fix:
Set the correct RNG in FIPS mode.

Fixed Versions:
21.1.0


1450481 : TMSH hardening

Component: TMOS

Symptoms:
TMSH is not following security best practices.

Conditions:
NA

Impact:
Unexpected behaviour

Workaround:
NA

Fix:
TMSH is now following security best practices.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


1440409 : TMM might crash or leak memory with certain logging configurations

Links to More Info: BT1440409

Component: Local Traffic Manager

Symptoms:
TMM might crash or leak memory with certain logging configurations.

Conditions:
Virtual-to-virtual chaining is used for handling syslog messages.

Impact:
Memory leak or Crash.

Workaround:
None

Fix:
None

Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1


1429861 : CVE-2019-5737: HTTP or HTTPS Denial of Service in keep-alive mode (NodeJS v6)

Component: Local Traffic Manager

Symptoms:
It was found that the original fix for Slowloris, CVE-2018-12122, was insufficient. It is possible to bypass the server's headersTimeout by sending two specially crafted HTTP requests in the same connection. An attacker could use this flaw to bypass Slowloris protection, resulting in a denial of service.

Conditions:
The server runs a vulnerable Node.js HTTP implementation and accepts persistent connections where an attacker can send two specially crafted HTTP requests on the same connection to bypass headersTimeout.

Impact:
An attacker can bypass Slowloris protections and cause a denial of service by exhausting server connections.

Workaround:
Upgrade to a Node.js version that includes the corrected Slowloris fix and enforce strict request timeouts and connection limits.

Fix:
Upgrade to a Node.js version with the updated Slowloris fix and enforce strict request timeout and connection limits.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


1403869-6 : CONNFLOW_FLAG_DOUBLE_LB flows might route traffic to a stale next hop

Links to More Info: BT1403869

Component: TMOS

Symptoms:
Pool members configured with IP encapsulation or any type of flow using CONNFLOW_FLAG_DOUBLE_LB flag might take some time to refresh its nexthops.

Conditions:
BIG-IP receives an ECMP route towards a server over two different BGP peers and the server is a pool member with IPIP encapsulation enabled. One of the BGP peers goes down and the route gets removed immediately, but BIG-IP is still forwarding traffic to this peer for the next few seconds, even though tmm.inline_route_update is enabled.

Impact:
The connection is using the old, invalid next hop for a few seconds.

Workaround:
None

Fix:
None

Fixed Versions:
21.1.0, 17.5.1.4


1401569 : Engineering Hotfix readme file refers to non-applicable "full_box_reboot" command

Component: TMOS

Symptoms:
The readme file automatically produced for BIG-IP Engineering Hotfixes contains the following instructions:

This hotfix may not be operational without a FULL
system restart. To accomplish this, use the command:
/usr/bin/full_box_reboot

However, the full_box_reboot command is not part of the documented or recommended workflows for current BIG-IP versions.

Conditions:
These instructions are contained in the .readme file that may accompany a BIG-IP Engineering Hotfix provided by F5 to resolve critical issues, under the terms and conditions of the F5 critical issue hotfix policy as described at:
https://my.f5.com/manage/s/article/K4918

Impact:
The instructions in the Engineering Hotfix readme file may be confusing due to inconsistency with documented workflows for installing BIG-IP Engineering Hotfixes.

Workaround:
After the software installs and boots to the volume with installed software no further reboot is required.

Fix:
None

Fixed Versions:
21.1.0


1380009 : TLS 1.3 server-side resumption resulting in TMM crash due to NULL session

Links to More Info: BT1380009

Component: Local Traffic Manager

Symptoms:
TMM core is observed when TLS 1.3 server-side resumes.

Conditions:
- TLS 1.3 handshake

Impact:
TMM cores, traffic is disrupted.

Workaround:
None

Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1


1379649 : GTM iRule not verifying WideIP type while getting pool from TCL command

Links to More Info: BT1379649

Component: Global Traffic Manager (DNS)

Symptoms:
When the pool name is same for different pool types, the GTM iRule cannot segregate the pool types thus giving a wrong DNS response.

Conditions:
-- Both A/AAAA same name WideIP and pools.
-- GTM iRule with pool command pointing to common pool name in different WideIP types.

Impact:
Traffic impact as a non-existent pool member address in DNS response.

Workaround:
None

Fixed Versions:
21.1.0, 21.0.0.1, 17.1.3.1


1377737-2 : SSL Orchestrator does not pass traffic when MAC masquerading is configured on R4k or R2k systems

Links to More Info: BT1377737

Component: TMOS

Symptoms:
In BIG-IP tenants launched on R4x00/R2x00 systems, configuring a MAC Masquerade address on the SSL Orchestrator (SSL Orchestrator) egress port prevents traffic from passing.

Conditions:
-- R4x00 or R2x00 systems
-- BIG-IP Tenant
-- High availability (HA) configured in BIG-IP
-- MAC Masquerade address configured on SSL Orchestrator egress port

Impact:
Egress traffic on the SSL Orchestrator port will be dropped in the physical NIC card. Hence SSL Orchestrator egress traffic on the port wouldn't be received on L2 device.

Workaround:
None

Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3


1352213-6 : Handshake fails with FFDHE key share extension

Links to More Info: BT1352213

Component: Local Traffic Manager

Symptoms:
SSL handshake fails to complete and various errors show in the LTM logs


01010025:2: Device error: crypto codec Couldn't create an OpenSSL EC group object OpenSSL error:00000000:lib(0):func(0):reason(0)
01010282:3: Crypto codec error: sw_crypto-1 Couldn't initialize the elliptic curve parameters.
01010025:2: Device error: crypto codec No codec available to initialize request context.

Conditions:
An SSL profile uses TLS1.3, and a TLS Client Hello attempts to use FFDHE as part of the key share extension.

Impact:
SSL handshake fails and results in connection failure.

Workaround:
Set the SSL profile to disallow using FFDHE groups.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3


1341517 : With longer vlan names qkview generates invalid proc_module.xml file and ihealth parsing fails.

Links to More Info: BT1341517

Component: TMOS

Symptoms:
With longer vlan names, invalid proc_module.xml file are generated by qkview and iHealth parsing fails intermittently.

Conditions:
VLAN names longer than 13 characters are used.

Impact:
iHealth may fail to process the qkview file.

Workaround:
Use shorter VLAN names.

Fixed Versions:
21.1.0, 21.0.0.1


1341093 : MCPD returns configuration error when attaching a client SSL profile containing TLS 1.3 to a virtual server with HTTP/2 profile

Links to More Info: BT1341093

Component: Local Traffic Manager

Symptoms:
A configuration error is seen on BIG-IP as below:
01070734:3: Configuration error: In Virtual Server (/Common/vsname) an http2 profile with enforce-tls-requirements enabled is incompatible with client ssl profile '/Common/PORTAL-3119-cssl-tls13'; cipher ECDHE-RSA-AES128-GCM-SHA256 must be available

Conditions:
- Virtual Server with cipher rule that uses tlsv1_3 ciphers only
- Cipher group
- Client-SSL profile and HTTP/2 profile with enforce-tls-requirements enabled

Impact:
HTTP/2 and Client-SSL Profiles with TLS 1.3 is not supported.

Workaround:
None

Fixed Versions:
21.1.0


1327649-1 : Invalid certificate order within cert-chain associated to JWK configuration

Links to More Info: BT1327649

Component: TMOS

Symptoms:
An error occurs while validating the certificate and certificate chain in JSON web key configuration:

General error: 01071ca4:3: Invalid certificate order within cert-chain (/Common/mycert.crt) associated to JWK config (/Common/myjwk). in statement [SET TRANSACTION END]

Conditions:
Issue occurs when the certificate chain contains three or more certificates.

The proper order in issuing:
endpointchild
|
 endpoint
 |
  intermediate
   |
    ca

Impact:
You are unable to create a policy with key configuration for OAuth when the certificate chain contains more than two certificates.

Workaround:
Note that there is no impact when the certificate chain order is valid and contains only two certificates in the chain.

Fixed Versions:
21.1.0


1325737 : Standby tenant cannot access floating traffic group when MAC masquerade is enabled

Links to More Info: BT1325737

Component: TMOS

Symptoms:
A standby BIG-IP tenant running on an r2000 or r4000 appliance cannot access addresses in the floating traffic group if MAC masquerade is enabled. For instance, the standby tenant will not be able to ping the floating self IP address.

External devices can access the floating self IP address without issue.

If the tenants swap HA roles (the active device becomes standby, and the standby device becomes active), the problem follows the standby device -- the newly-standby system is not able to ping the floating self IP address.

Conditions:
-- F5 r2000 or BIG-IP r4000 system
-- BIG-IP tenant with MAC masquerade configured for floating traffic group

Impact:
Standby tenant unable to access resources in the floating traffic group when MAC masquerade is configured.

Workaround:
None

Fix:
A configuration option to disable MAC filter installation has been added.

To disable MAC filters:

echo -e "drvcfg iavf uc_mac_filter 0\ndrvcfg iavf mc_mac_filter 0" >> /config/xnet_init.tcl

bigstart restart tmm

Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3


1325649-5 : POST request with "Expect: 100-Continue" and HTTP::collect + HTTP::release is not being passed to pool member

Links to More Info: BT1325649

Component: Local Traffic Manager

Symptoms:
After upgrading from a BIG-IP version prior to v16.1.0 to BIG-IP v16.1.0 or later, one specific virtual-server is not working as expected and unable to forward the POST request towards the pool member.

Conditions:
1) Upgrade to v16.1.0 or later

2) Send a POST request from client with "Expect: 100-Continue".

3) Attach an irule using http::collect plus http::release to the Virtual Server.

Impact:
Cannot send POST requests from client to server

Workaround:
If ASM is provisioned, a transparent ASM policy can be a workaround.

1. Create a transparent ASM policy
At GUI Security >> Application Security: Security Policies
Click Create
Fill in following
Policy name: <unique policy Name>
Policy Type: Security(Default)
Policy Template: Fundamental (Default)
Leaning and Blocking
Enforcement Mode: Transparent
Save
Click the policy name created above, and modify following
Policy Building Learning Mode: Disabled
Save and Apply Policy

2. Enable Application Security Policy with the ASM Policy created above at the LTM Virtul Server Security configuration.

Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3


1325633 : Limit the value of MAX_DP_TARGET_COUNT in processQueryTargets.

Links to More Info: BT1325633

Component: Global Traffic Manager (DNS)

Symptoms:
The limit check for dp_target_count existed only in query_for_targets(), allowing the counter to increment unchecked in a loop (processQueryTargets() -> iter_server_selection() -> infra cache lookups), which could lead to a crash.

Conditions:
NA

Impact:
Unexpected traffic volume triggered the crash.

Workaround:
NA

Fix:
Added an early validation at the start of processQueryTargets() to check if dp_target_count > MAX_DP_TARGET_COUNT and immediately return SERVFAIL, preventing the runaway loop and crash.

Fixed Versions:
21.1.0


1324085 : Multiple OpenSSL Vulnerabilities

Links to More Info: K000137969


1322413 : After config sync, FQDN node status changes to Unknown/Unchecked on peer device

Links to More Info: BT1322413

Component: TMOS

Symptoms:
If changes are made to the FQDN node configuration, which has a node monitor configured, and the configuration is synced to a device group, ephemeral nodes generated from the FQDN node may show Availability as “unknown” and Monitor Status as “unchecked”.

Conditions:
This may occur on versions of BIG-IP with fixes for ID724824 and ID1006157, under the following conditions:
- BIG-IP systems are configured in a device group
- The device group is configured for Manual Sync (Full or Incremental)
- One or more FQDN nodes are configured with a node monitor (which could be the Default Node Monitor)
- A change is made to the configuration of the FQDN node
- A Full configuration sync is performed (by a Manual sync with the device group configured for a Full sync, as an automatic fallback/recovery action from a failed Incremental sync, or by using the “force-full-load-push” keyword):
   tmsh run cm config-sync to-group example-group force-full-load-push

Impact:
The affected nodes will be displayed with an Availability as “unknown” and Monitor Status as “unchecked”.

Workaround:
To resolve this condition, remove and add the node monitor:
- Remove the node monitor from the FQDN node configuration (or from default-node-monitor):
   tmsh mod ltm node example monitor none
   (tmsh mod ltm default-node-monitor rule none)
- Sync this change to the device group (Incremental sync)
- Add the node monitor again to the FQDN node configuration (or to default-node-monitor):
   tmsh mod ltm node example monitor my_node_monitor
   (tmsh mod ltm default-node-monitor rule my_node_monitor)
- Sync this change to the device group (Incremental sync)

Fixed Versions:
21.1.0


1290937-3 : 'contentWindow' of a dynamically genereated iframe becomes null

Component: Access Policy Manager

Symptoms:
A web application using iframes may not work/render as expected using Portal Access.

Conditions:
A web application attempts to configure 'contentWindow' for an iframe while the Portal Access feature is in use.

Impact:
Web Application through Portal Access may fails to work/render as expected

Workaround:
Workaround: Using a customized irule/ifile to return un-patched 'contentWindow' from cache-fm*.js file. ifile has modern cache-fm file.

when CLIENT_ACCEPTED {
  ACCESS::restrict_irule_events disable
}

when HTTP_REQUEST {
 if {
   [HTTP::path] ends_with "/cache-fm-Modern.js"
 } {
   HTTP::respond 200 content [ifile get cachefmUploadIssueWorkaround]
 }
}

Fixed Versions:
21.1.0


1282769 : Localdb user can change the password of other user

Component: Access Policy Manager

Symptoms:
The user was able to change the password for another user in the logon page, when local DB authentication was used.

Conditions:
-- At least one user in the local DB instance is forced to change the password
-- the virtual server is tied in with the trusted CA certificates (that is, it would not happen if the virtual server for the SSL-VPN is associated with self-signed certificates).

Impact:
User authentication based on local DB will be impacted.

Workaround:
None

Fixed Versions:
21.1.0


1281493 : Tmsh and gui errors when checking tmm memory

Links to More Info: BT1281493

Component: Local Traffic Manager

Symptoms:
Checking statistics in the GUI (Statistics ›› Module Statistics : Memory ) may result in "As error has occurred while trying to process your request."

Checking memory via tmsh may show invalid values for tmm's memory usage:

# tmsh show sys memory | grep nan

TMM Memory Used -nan -nan -nan

Conditions:
When the files in /var/tmstat/blade/ exceed 4GB. This could be to a large number of tmms or due to an extremely large config.

Impact:
Tmm memory stats may be zero, or may be half the size they should be.

Workaround:
Check tmm's memory using tmctl instead:

tmctl tmm_stat -s cpu,memory_total,memory_used

Or reduce the size of the config and restart tmm.

Fixed Versions:
21.1.0


1271453 : DNS requests with NSEC or NSEC3 RR type Responding with no NSEC3 and no authority section from BIG-IP authoritative server.

Links to More Info: BT1271453

Component: Global Traffic Manager (DNS)

Symptoms:
DNS requests with NSEC or NSEC3 RR type Responding with no NSEC/NSEC3 and no authority section from BIG-IP authoritative server.

Conditions:
-- Create a Zone in BIND.
-- Create DNSSEC zone on BIG-IP.
-- Send dig -t nsec3 ZONENAME @BIG_IP_listener +dnssec
-- Observe the lack of AUTHORITY SECTION, NSEC3 and RRSIG records in the reply

Impact:
DNSSEC Validation failure at resolver.

Workaround:
None

Fix:
None

Fixed Versions:
21.1.0


1271341 : Unable to use DTLS without TMM crashing

Component: Local Traffic Manager

Symptoms:
The TMM crashes when DTLS is used.

Conditions:
- Using DTLS.

Impact:
TMM core is observed, traffic is disrupted while TMM restarts.

Workaround:
Disable 'allow-dynamic-record-sizing' in the client-ssl profile.


Following is an example:

ltm profile client-ssl /Common/otters-ssl {
    allow-dynamic-record-sizing disabled

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


1268373 : MRF flow tear down can fill up the hudq causing leaks

Links to More Info: BT1268373

Component: Service Provider

Symptoms:
TMM Memory leaks are observed when MRF flows were torn down at once and the hud queue was full.

Conditions:
When the message queue becomes full.

Impact:
TMM memory leak

Workaround:
None

Fixed Versions:
21.1.0, 17.5.1.4


1256757 : Suspect keymgmtd memory leak while using dynamic CRL.

Links to More Info: BT1256757

Component: TMOS

Symptoms:
keymagmtd's memory size steadily increases. Specifically, in the emdeviced memory size.

Conditions:
CRL validation is enabled

Impact:
keymgmtd might crash due to out of memory conditions.

Workaround:
Need to reboot the machine to reset the memory usage.

Fixed Versions:
21.1.0


1231889 : Mismatched VLAN names (or VLANs in non-Common partitions) do not work properly BIG-IP tenants running on r2000 / r4000-series appliances

Links to More Info: BT1231889

Component: TMOS

Symptoms:
When a VLAN configured in the tenant does not have the same name as the VLAN on in F5OS or the VLAN in the tenant is created in a partition other than "Common", VLANs may not pass traffic properly without manual configuration.

If any such VLANs exist, newly-configured VLANs may also exhibit this issue, even if the VLAN is in Common and has a name that matches the name in F5OS.

The system will have log messages similar to the following; these errors will still occur even once the workaround has been applied.

Feb 15 15:39:49 r4000-1.example.com err mcpd[19522]: 01070094:3: Referenced vlan (/Common/external) is hidden, does not exist, or is already on another instance.
Feb 15 15:39:49 r4000-1.example.com err chmand[19520]: 012a0003:3: hal_mcp_process_error: result_code=0x1070094 for result_operation=eom result_type=eom


Tenants running on an r2000 or r4000-series appliance need to know the VLAN<>interface associations, but the system is not able to populate this information when the VLAN is not in the Common partition. VLANs may not have any 'interfaces' referenced, or will have 'interfaces' that are not in-sync with the configuration on the F5OS host. For example:

R2000# show running-config interfaces interface LAG; show running-config vlans vlan 47
interfaces interface LAG
 config type ieee8023adLag
 config description ""
 aggregation config lag-type LACP
 aggregation config distribution-hash src-dst-ipport
 aggregation switched-vlan config trunk-vlans [ 42 47 ]
!
vlans vlan 47
 config vlan-id 47
 config name vlan_47
!

R2000#

[root@tenant:Active:Standalone] config # tmsh list net vlan /ottersPart/vlan_47
net vlan /ottersPart/vlan_47 {
    dag-adjustment none
    if-index 240 # <-- interfaces is not listed
    partition ottersPart
    [...]
    tag 47
}
[root@tenant:Active:Standalone] config #




[root@tenant:Active:Standalone] config # tmsh list net vlan /ottersPart/vlan_47
net vlan /ottersPart/vlan_47 {
    dag-adjustment none
    if-index 240
    partition ottersPart
    interfaces { # <-- configuration with a workaround in place
        LAG {
            tagged
        }
    }
    [...]
    tag 47
}

Conditions:
- BIG-IP tenant running on r2000 and r4000-series platforms
- VLANs moved to partitions other than "Common", or renamed so that the name does not match between hypervisor and tenant.

Impact:
Partitions other than the Common partition cannot have VLANs. VLANs created in other partitions will not be operational in the data path.

If such VLANs exist in the tenant, newly added VLANs will also exhibit this issue.

Workaround:
In the BIG-IP tenant, modify all VLAN objects to have 'interfaces' that align with the configuration on the host.

For example, for the VLAN 47 described above, the VLAN should be listed as being 'tagged' on the 'LAG' trunk:

tmsh modify net vlan /ottersPart/vlan_47 interfaces replace-all-with { LAG { tagged } }
tmsh save sys config

Fixed Versions:
21.1.0


1189909 : Active SSL Connections Curve is always kept at Zero on Performance Graph

Links to More Info: BT1189909

Component: Local Traffic Manager

Symptoms:
In the BIG-IP GUI, if a user navigates to Statistics :: Performance Reports : Performance Reports, then clicks "View Detailed Graph", next to "Active Connections" is a graph named Active SSL Connections.

Even though many client SSL connections were received by SSL virtual servers, the SSL Client curve in the graph always shows 0.

The same behavior is seen via CLI with the 'tmsh show sys performance all-stats historical detail' output where the output displays all zeroes within Active SSL Connections for SSL Client.

Conditions:
SSL connections exist from a client over a period of time.

Impact:
You are unable to determine how many active SSL/TLS connections are present.

Workaround:
Use the alternate method mentioned in article K76898322 to see the Active client-side SSL connections.

Fixed Versions:
21.1.0


1183529-1 : OCSP request burst when cert-ldap authentication is enabled

Links to More Info: BT1183529

Component: TMOS

Symptoms:
Issue observed : When Remote client cert-ldap authentication is enabled in Big-IP and ocsp-responder is configured.

Cause: webUI update default value is 5 seconds - updates every 5 seconds triggering SSL handshake which results in OCSP request bursts on the OCSP responder which may be lead to responder becoming irresponsive . Each request triggers two OCSP responder messages, leading to unnecessary traffic and causing performance issues in customer environments.

Conditions:
When Remote client cert-ldap authentication is enabled in Big-IP and ocsp-responder is configured.

WebUI makes an OCSP check for every HTTP request. This generates a lot of OCSP requests and If the OCSP server doesn't respond consistently, then the system is immediately redirected to the login page to re-authenticate.

Impact:
The OCSP (Online Certificate Status Protocol) Responder may experience service degradation or complete failure when subjected to excessive request volumes within compressed time intervals, particularly in environments where multiple systems share a single OCSP endpoint.

Workaround:
1. In /etc/httpd/conf.d/ssl.conf ,replace the below lines

SSLVerifyClient none
<LocationMatch "^[/][^/]+[/]">
SSLVerifyClient require
</LocationMatch>

with
 
SSLVerifyClient require

2. restart the httpd service - bigstart restart httpd

Note:The workaround does not survive a device reboot, an upgrade, or modification of any of the authentication and/or HTTPD configurations.

Fix:
1. Configure the bigip for Remote client cert-ldap authentication
2. Login via UI to the bigip
3. On the OCSP responder , look for OCSP requests from Big-IP - there should be requests only during authentication and every SSLOCSPResponderTimeout interval

Fixed Versions:
21.1.0


1181933 : Portal Access support for ES8/9/10/11

Component: Access Policy Manager

Symptoms:
Applications may not function at the client side when accessed via portal access

Conditions:
-- APM proxying a web application
-- Web-application uses ES8/9/10/11 javascript

Impact:
Web application mis-function

Workaround:
None

Fixed Versions:
21.1.0


1178225-5 : Scalability issues with F5-VE deployments

Component: TMOS

Symptoms:
Two TMM threads can end up running on the same physical core on hypervisors where any 2 consecutive virtual cores are hyperthreaded siblings running on the same physical core.

Seen on any platform which assigns virtual CPUs in the order given in the example below, where numerically adjacent logical CPU numbers represent cores on the same physical CPU:

cpu0 - assigned to physical core 0
cpu1 - assigned to physical core 0

cpu2 - assigned to physical core 1
cpu3 - assigned to physical core 1

cpu4 - assigned to physical core 2
cpu5 - assigned to physical core 2
etc.

BIG-IP expects the order of the logical CPUs to iterate through the physical cores, so that hyperthreaded siblings are never numberically adjacent, for example:

cpu0 - assigned to physical core 0
cpu1 - assigned to physical core 1
cpu2 - assigned to physical core 2
cpu3 - assigned to physical core 3

cpu4 - assigned to physical core 0
cpu5 - assigned to physical core 1
cpu6 - assigned to physical core 2
cpu7 - assigned to physical core 3

The order that logical CPUs are assigned to the virtual machine can be determined with the 'lscpu --extended' command.

Conditions:
Virtual Edition (VE) BIG-IP as it does not support split planes

Impact:
Scalability issues with F5-VE deployments which run on infrastructures/hypervisors which provide virtual CPU resources in the order given above.

Workaround:
None

An EHF is available that adds a db variable that alter the the order that tmm allocates CPU cores to threads.

Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1


1166929 : [AdminUI][Rewrite Profile][PA] Add "*://*" to to rewrite list if an RCL has been entered

Links to More Info: BT1166929

Component: Access Policy Manager

Symptoms:
"Rewrite-List" field is empty Rewrite profile configuration

Conditions:
Portal Access configuaration

Impact:
Rewrite may not work as expected

Workaround:
Add "*://*" manually for Rewrite-List

Fixed Versions:
21.1.0


1161169 : TLS X25519 hardware offload support

Component: Local Traffic Manager

Symptoms:
TLS ECDH group X25519 operations are not offloaded to hardware.

Conditions:
N/A

Impact:
TLS CPS performance may not be optimal on certain platforms.

Workaround:
N/A

Fix:
Added hardware offload support.

Fixed Versions:
21.1.0


1148185 : getdb insufficient sanitisation

Links to More Info: K05403841

Component: TMOS

Symptoms:
https://support.f5.com/csp/article/K05403841

Conditions:
https://support.f5.com/csp/article/K05403841

Impact:
https://support.f5.com/csp/article/K05403841

Fix:
https://support.f5.com/csp/article/K05403841

Fixed Versions:
21.1.0, 21.0.0.1


1137269-7 : MCPD fails to reply if a request is proxied to another daemon and the connection to that daemon closes

Links to More Info: BT1137269

Component: TMOS

Symptoms:
MCPD does not reply to the request if the publisher's connection closes or fails. In this case, when bcm56xxd
is restarted, the perceivable signs of failure are:
- The snmpwalk failing with a timeout and
- The "MCPD query response exceeding" log messages.

Conditions:
1) Configure SNMP on the BIG-IP to run snmpwalk locally on the BIG-IP.
2) From the first session on the BIG-IP, run a snmpwalk in the while loop.
    
while true;do date; snmpwalk -v2c -c public 127.0.0.1 sysDot1dbaseStat;sleep 2;done
Sample output:
Sat Aug 21 00:57:23 PDT 2021
F5-BIGIP-SYSTEM-MIB::sysDot1dbaseStatResetStats.0 = INTEGER: 0
F5-BIGIP-SYSTEM-MIB::sysDot1dbaseStatMacAddr.0 = STRING: 0:23:e9:e3:8b:41
F5-BIGIP-SYSTEM-MIB::sysDot1dbaseStatNumPorts.0 = INTEGER: 12
F5-BIGIP-SYSTEM-MIB::sysDot1dbaseStatType.0 = INTEGER: transparentonly(2)

3) From a second session on the BIG-IP restart bcm56xxd

bigstart restart bcm56xxd

4) The snmpwalk will continually report the following:

Timeout: No Response from 127.0.0.1

      And snmpd will continually log "MCPD query response exceeding" every 30 seconds in /var/log/ltm.

Impact:
SNMP stopped responding to queries after upgrade.

Workaround:
Restart SNMP.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


1125381-4 : Extraneous warnings recorded in when using only intermediate certificates

Links to More Info: BT1125381

Component: Local Traffic Manager

Symptoms:
When client authentication is enabled on the client SSL profile but the trusted-ca file includes only an intermediate certificate and no CA root cert to build the whole cert chain, although the TLS connection is made, as expected, there is an error message reported following.

Jun 21 20:43:01 bigip warning tmm6[18125]: 01260006:4: Peer cert verify error: unable to get issuer certificate (depth 1; cert /CN=subca)
Jun 21 20:43:01 bigip warning tmm6[18125]: 01260005:4: Unable to get certificate for peer cert issuer /CN=rootca

Conditions:
Trusted-ca includes only inter-cert and no root CA-cert
is configured.

Impact:
Although the TLS handshake succeeds without any issue and the connection is processed, as expected, a confusing warning is reported.

Workaround:
Because the connection is made, you can safely ignore this message.

Note: This issue does not occur if the root CA cert is also configured in the CA-cert bundle.

Fixed Versions:
21.1.0


1106489 : GRO/LRO is disabled in environments using the TMM raw socket "sock" driver.

Links to More Info: BT1106489

Component: TMOS

Symptoms:
GRO/LRO packets are not received: "tmctl -d blade tmm/ndal_rx_stats" shows "0" in "lro". The linux host has GRO disabled: "ethtool -k eth1 | grep generic-receive-offload" shows "off".

Conditions:
-- BIG-IP is deployed in a Hyper-V environment.
-- Any environment such that "tmctl -d blade tmm/device_probed" displays "sock" in "driver_in_use".

Impact:
Performance is degraded.

Workaround:
Manually enable GRO on the device: ethtool -K eth1 gro on

Check that it's enabled with: ethtool -k eth1 | grep generic-receive-offload

Fix:
When sending large payload, "tmctl -d blade tmm/ndal_rx_stats" shows "1" in "lro". "tmctl -d blade tmm/ndal_dev_status" shows "y:y" (available:enabled) in "lro". The linux host indicates the device has GRO enabled: "ethtool -k eth1 | grep generic-receive-offload" shows "on".

Fixed Versions:
21.1.0, 17.1.3, 16.1.4, 15.1.10


1103833 : Tmm core with SIGSEGV in gtmpoolmbr_UpdateStringProc

Links to More Info: BT1103833

Component: Global Traffic Manager (DNS)

Symptoms:
Tmm cored with SIGSEGV.

Conditions:
-- iRule pool command with member which is determined at run-time
-- A pool member is used for the iRule
-- The previous pool member is deleted and then re-created using the same name
-- That pool member is picked again for the next iRule event.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Use a string command to category the pool member variable like this:

  pool dnspool member [string trim $pool_member]

Fixed Versions:
21.1.0


1100421 : HTTP/2 full-proxy virtual server uses wrong source MAC address and incorrect SNAT address selection

Links to More Info: BT1100421

Component: Local Traffic Manager

Symptoms:
When using an HTTP/2 full-proxy virtual server (with httprouter profile), server-side connections may exhibit the following issues:

- Egress packets use the system base MAC address instead of the configured masquerade MAC address.
- SNAT automap selects a non-floating self-IP instead of the expected floating self-IP.
- SNAT pool member selection does not prefer members matching the traffic-group of the virtual server.

This can cause MAC address flapping alerts on upstream network equipment and may disrupt traffic during HA failover events.

Conditions:
- Virtual server configured with the httprouter profile (HTTP/2 full-proxy).
- Masquerade MAC address configured on a traffic-group, and/or SNAT automap or SNAT pool in use with floating self-IPs.

Impact:
Server-side traffic uses incorrect source MAC address and may select non-floating SNAT addresses. Upstream network devices (such as switches or SDN controllers) may detect duplicate MAC/IP entries, causing traffic disruption. During HA failover, connections may not behave as expected because the correct traffic-group was not used.

Workaround:
None. Use a standard virtual server configuration without the httprouter profile as an alternative if HTTP/2 full-proxy is not required.

Fix:
HTTP/2 full-proxy virtual servers now correctly use the traffic-group associated with the client-side connection for server-side connections, ensuring the correct masquerade MAC address and SNAT address selection.

Fixed Versions:
21.1.0


1086325 : CVE-2016-4658 libxml2 vulnerability

Links to More Info: K49419538, BT1086325


1083937 : CVE-2002-20001, CVE-2022-40735 DH Key Agreement vulnerability - OpenSSH Server

Links to More Info: K83120834, BT1083937


1083405-9 : "Error connecting to named socket" from zrd

Links to More Info: BT1083405

Component: Global Traffic Manager (DNS)

Symptoms:
After an mcpd restart, zrd may not be able to re-establish a connection to named. This shows up in the /var/log/gtm file or in the GUI with a message similar to the following:

err zrd[27809]: 01150306:3: Error connecting to named socket 'Connection refused'.
(or)
err zrd[16198]: 01150306:3: Error connecting to named socket 'Connection timed out'.

Conditions:
After an mcpd restart

Impact:
Looking up or modifying zone records may fail.

Workaround:
Restart zrd and named

tmsh restart sys service zrd named

Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1


1074285-6 : Apmd crashes while handling JWT tokens.

Links to More Info: BT1074285

Component: Access Policy Manager

Symptoms:
An apmd crash might occur while handling JWT tokens.

Conditions:
The payload has invalid JSON during authentication.

Impact:
BIG-IP authorization disrupted while apmd restarts.

Workaround:
None

Fix:
We now validate the received payload format before parsing.

Fixed Versions:
21.1.0, 17.5.1.4, 17.1.3.1


1071021-6 : Some URLs such as *cdn.onenote.net configured in the Office 365 dynamic address space are not processed by APM

Links to More Info: BT1071021

Component: Access Policy Manager

Symptoms:
Dynamic address space parser not accepting few patterns(*cdn.example.net) which are added at the DNS address space field.

Conditions:
When the user configures Office 365 Dynamic Address Space with URLs formats like:

 *-admin.sharepoint.com
 *cdn.onenote.net
 *-files.sharepoint.com
 *-myfiles.sharepoint.com

Impact:
Due to the above pattern DNS relay proxy is not compatible with them.

Workaround:
None

Fix:
Dynamic address space parser should accept a few patterns(*cdn.example.net) which are added to the DNS address space field.

Fixed Versions:
21.1.0, 17.1.3.1


1069381 : iControl REST rate limiting and connection handling improvements

Links to More Info: K15101402


1065385 : BIG-IP: NPM vulnerabilities

Component: TMOS

Symptoms:
npm CLI versions prior to 6.13.3/6.13.4 allow malicious packages to write, modify, or overwrite arbitrary files and binaries via the bin field during installation, bypassing --ignore-scripts, potentially leading to system compromise.

Conditions:
A user installs a malicious npm package using a vulnerable npm CLI version (< 6.13.4), where the package abuses the bin field to write or overwrite files outside the intended node_modules directory.

Impact:
It can allow arbitrary file write or overwrite, potentially leading to system compromise, privilege escalation, or denial of service.

Workaround:
Upgrade to npm CLI 6.13.4 or later and avoid installing untrusted or malicious npm packages.

Fix:
issue has been fixed with required patch/upgrade

Fixed Versions:
21.1.0, 17.1.3.1


1057557 : Exported policy has greater-than sign '>' not escaped to '&gt;' with response_html_code tag.

Links to More Info: BT1057557

Component: Application Security Manager

Symptoms:
The greater-than sign '>' is not escaped/converted to '&gt;' with response_html_code tag.

Having an un-escaped greater-than sign can cause issues when re-importing the policy, if the greater-than sign appears in a specific sequence, ']]>'. In other words, if the greater-than sign does not appear in the specific sequence, you can successfully re-import the policy without problem.

The specific sequence can be possible with a custom response page configuration. If you modify the custom response page in the way it has a sequence of characters ']]>', as the greater-than sign is not converted due this issue, the exported policy has the sequence of characters ']]>'. The expected characters are ']]&gt;'

The characters ']]>' in XML is CDATA End delimiter and not allowed. The exported policy causes parser error and can not be re-imported.

Conditions:
This issue occurs if you modify the default custom response page where this specific character sequence is observed ']]>'.

Impact:
The exported policy cannot be re-imported.

Workaround:
This workaround forces the greater-than sign to be escaped to '&gt;' so that that policy can be re-imported without problem.

- make /usr writable
# mount -o remount,rw /usr

- backup
# cp /usr/local/share/perl5/F5/ExportPolicy/XML.pm /usr/local/share/perl5/F5/ExportPolicy/XML.pm.orig

- see this line exists
# grep "gt;" /usr/local/share/perl5/F5/ExportPolicy/XML.pm
            $xml =~ s/&gt;/>/g;

- delete the line and verify
# sed -i '/$xml =~ s\/&gt;.*/d' /usr/local/share/perl5/F5/ExportPolicy/XML.pm

- should not see the line
# grep "gt;" /usr/local/share/perl5/F5/ExportPolicy/XML.pm

- move /usr read-only
mount -o remount,ro /usr

- make the change in effect
# pkill -f asm_config_server

Fixed Versions:
21.1.0


1057305 : On deployments that use DPDK, "-c" may be logged as the TMM process/thread name.

Links to More Info: BT1057305

Component: Local Traffic Manager

Symptoms:
"-c" may be logged as the process/thread name on deployments that use DPDK:

notice -c[17847]: 01010044:5: Gx feature is not licensed
notice -c[17847]: 01010044:5: LTM Transparent feature is licensed
notice -c[17847]: 01010044:5: NAT feature is licensed

Conditions:
- BIG-IP Virtual Edition using XNET with DPDK. This can be AWS, Mellanox, or Cisco eNIC.

Impact:
Confusing logging.

Workaround:
N/A

Fix:
N/A

Fixed Versions:
21.1.0


1053561 : TLS 1.3 Handshake fails when 0RTT enabled on the client-side SSL and iRule is specified

Links to More Info: BT1053561

Component: Local Traffic Manager

Symptoms:
On small virtual machines (e.g. 2 cores, 4GB RAM) when OpenSSL-1.1.1 client connects to a BIG-IP device running TLS 1.3, and containing an iRule, the handshake fails.

Conditions:
1. Small virtual machine (e.g. one with 2 cores and 4GB RAM).
2. TLS 1.3 is enabled on the BIG-IP device.
3. An iRule is specified for client-side SSL.

Impact:
The handshake is terminated.

Workaround:
Disable TLS 1.3 on the BIG-IP device only if an alternative protocol is available.

Fix:
The issue is fixed and will be backported to maintenance releases.

Fixed Versions:
21.1.0


1052477-2 : CVE-2020-10751 kernel: SELinux netlink permission check bypass

Component: TMOS

Symptoms:
A flaw was found in the Linux kernel SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.

Conditions:
NA

Impact:
A local attacker could bypass SELinux restrictions, potentially leading to unauthorized access, privilege escalation, or, in some scenarios, a system crash (denial of service).

Workaround:
NA

Fix:
Applied patch to fix the CVE

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4, 17.1.3.1


1044053 : The db variable pccd.maxblobsize can only be set to a minimum of 512

Component: Advanced Firewall Manager

Symptoms:
Packet Correlation Classification daemon uses blobs and the db variable pccd.maxblobsize configurable range is from 512 to 32720 with a default value of 4090.
On some system not requiring large blob, a minimum of 32 KB is more appropriate.

Conditions:
Not able to lower the range below 512.

Impact:
Memory usage increased.

Workaround:
N/A

Fix:
This release provides an enhancement to configure the range to lower to 32.

Fixed Versions:
21.1.0


1036221 : "Illegal parameter value length" is reported with parsing product length.

Links to More Info: BT1036221

Component: Application Security Manager

Symptoms:
"Illegal parameter value length" violation is reported with wrong parameter length.

Conditions:
A JSON parameter is encoded.

Impact:
The decoded value length of the parameter in the JSON payload will be reported instead of its original length.

Workaround:
None

Fix:
The original parameters value length is reported with "Illegal parameter value length" violation.

Fixed Versions:
21.1.0, 21.0.0.1, 17.5.1.4


1033537 : Cookie persistence handling with duplicate cookie names

Component: Local Traffic Manager

Symptoms:
When duplicate cookie names are present, only one may be evaluated.

Conditions:
NA

Impact:
Persistence selection may not behave as expected.

Workaround:
Consider alternative persistence methods if duplicate cookies are expected.

Fix:
Updated persistence cookie handling to better support duplicate cookie instances.

Behavior Change:
When sys DB variable tmm.http.cookie.decrypt.policy has value of "reject", it removes persistence cookie from the request if BIGIP failed to decrypt them and the cookie encryption policy in cookie persistence profile is set to "required".

If response has more than one instance of persistence cookie and the cookie encryption policy in cookie persistence profile is set to "required", then BIGIP encrypts all the instances.

If request has more than one instance of persistence cookie, BIGIP would try to decrypt all instances, and validate identity of their values. If the values were not identical, BIGIP would act per tmm.http.cookie.decrypt.policy value, removing all the instances on "reject" option, clearing values in "erase" option, and leave the values, possibly decrypted, when the policy is set to option "passthrough".

Fixed Versions:
21.1.0


1016273 : Standby TMM can core or cause incorrect mirroring during upgrade when session mirroring is enabled

Links to More Info: BT1016273

Component: TMOS

Symptoms:
TMM crash occurs on the standby device which is on a lower version

Conditions:
1) Active and Standby are on different versions during upgrade
2) Session mirroring enabled

Impact:
Continuous TMM crash on standby.

Workaround:
Disable session mirroring during the upgrade process. This can be done by disabling sys db statemirror.mirrorsessions.

Fixed Versions:
21.1.0


1004953-9 : HTTP does not fall back to HTTP/1.1

Links to More Info: BT1004953

Component: Local Traffic Manager

Symptoms:
After upgrading, the BIG-IP system's HTTP profile no longer falls back to HTTP/1.1 if a client sends a corrupted URI.

Conditions:
-- Client sends a corrupted URI (for example a URI containing a space).

Impact:
The BIG-IP system treats the URI as an HTTP/0.9 request (as per RFC) and forwards only the first request line. In previous releases, the BIG-IP system treated the URI as a HTTP/1.1 request.

Workaround:
None.

Fix:
Added db variable tmm.http.rfc.allowinsecureverfallback to allow insecure fallback to HTTP/1.1. Default is 'disable'.

Fixed Versions:
21.1.0, 17.5.1.4


1001429 : HTTP header Sanitization

Component: Device Management

Symptoms:
Some HTTP headers were improperly sanitised.

Conditions:
NA

Impact:
It could lead to unexpected behaviour

Fix:
Headers are now properly sanitised.

Fixed Versions:
21.1.0, 21.0.0.1



Known Issues in BIG-IP v21.1.x


TMOS Issues

ID Number Severity Links to More Info Description
826313 3-Major BT826313 Error: Media type is incompatible with other trunk members
741621-7 3-Major BT741621 CLI preference 'suppress-warnings' setting may show incorrectly
675742-2 3-Major BT675742 Hardware-to-VE-platform-migrate of a UCS may fail with an error on db variable license.maxcores
2291313 3-Major BT2291313 Azure/Hyper-V BIG-IP VE uses only a fraction of available memory
2261337-1 3-Major BT2261337 TMUI displays Local Traffic menu on rSeries Best Bundle tenant without LTM provisioned
2258825-1 3-Major The lind process may continuously restart when mcpd is down
2258305-1 3-Major TMSH sys/software syntax updated with experimental "dry-run" option
2149325-1 3-Major BT2149325 Db var not set when running tmsh load sys ucs ucs-file platform-migrate
1707921-3 3-Major BT1707921 Tenant upgrade fails with disk full error on BIG-IP 17.x created with T2 image
1603869 3-Major BT1603869 Wrong Fallback to local for TACACS authentication with empty password when source fallback is set to true
1596313-4 3-Major BT1596313 F5OS LAG fails MCPD validation, tenant trunk has no interfaces.
1296925-4 3-Major BT1296925 Unable to create two boot locations using the 'ALL' F5OS tenant image at default storage size
1120345 3-Major BT1120345 Running tmsh load sys config verify can trigger high availability (HA) failover
1050457-3 3-Major BT1050457 The "Permitted Versions" field of "tmsh show sys license" only shows on first boot
1043141-5 3-Major K36822000, BT1043141 Misleading error 'Symmetric Unit Key decrypt failure - decrypt failure' when loading UCS from another BIG-IP
2277421 4-Minor BT2277421 TCP profile Help tab displays incorrect default values for Memory Management fields
2262641-4 4-Minor BT2262641 [BGP] Peering deadlock when modifying supported capabilities
2259397-3 4-Minor BT2259397 [BGP] In route map the change in as-path does not automatically trigger soft outbound update
2251549 4-Minor BT2251549 Uneditable fields for Guest, Auditor, and Operator roles may appear to be editable in the GUI
1575805-1 4-Minor bcm56xxd Process Killed by SOD After Failing to Send a Heartbeat During Firewall Rule Statistics Query

Local Traffic Manager Issues

ID Number Severity Links to More Info Description
2208821 2-Critical BT2208821 VIPRION cluster becomes INOPERATIVE and fails to load configuration after software upgrade
683706-10 3-Major BT683706 Monitor status may show 'checking' after a pool member has been manually forced down
2291393-1 3-Major BT2291393 Splitsession Traffic Fails
2291301 3-Major BT2291301 Data-Group Lookup with 128-Character Key Length Will Not Match
2288173-4 3-Major BT2288173 Some TMMs not ready and failed to bring up full cluster due to failed cmp dag transition
2287865-1 3-Major BT2287865 Dynamic CRL always fails connections that use self-signed certificates
2269969-4 3-Major BT2269969 Using TCP congestion BBR might lead to TMM core
2264037-1 3-Major BT2264037 TMM may generate a core file after an SSL cipher group is deleted
2261529 3-Major BT2261529 HTTP2 RST_STREAM flood detection should be more sensitive
2244389 3-Major BT2244389 Small TLS record sizes reduce connection throughtput.
2183917-4 3-Major BT2183917 BIG-IP might fail to update received TCP window when tm.tcpstopblindinjection is enabled
1928169 3-Major BT1928169 HTTP2 RST_STREAM NO_ERROR received by BIG-IP not interpreted correctly
1758193-1 3-Major BT1758193 Trunk with LACP and virtual-wire flaps after an upgrade.
1354205 3-Major BT1354205 LTM policy with overlapping range in the TCP address match may fail
1251969 3-Major BT1251969 The ratio algorithm between pool members for load-balancing does not work
1196505 3-Major BT1196505 BIG-IP might RST HTTP2 connection with [F5RST:mrhttp_proxy bad transition] when ASM is in use.
1148053 3-Major BT1148053 When client SSL profile has "cache-size 0" or "authenticate always", BIG-IP is unable to decrypt client-side traffic when using tcpdump with "--f5 ssl" method
1128033 3-Major BT1128033 Neuron client constantly logs errors when TCAM database is full
1014633 3-Major BT1014633 Transparent / gateway monitors may fail if there is no route to a node
932553 4-Minor BT932553 An HTTP request is not served when a remote logging server is down
1350909 4-Minor BT1350909 Statsd error condition is not logged

Global Traffic Manager (DNS) Issues

ID Number Severity Links to More Info Description
2228869-5 2-Critical BT2228869 Continuous tmm cores in domain_table_search with null dereferencing
2224853-1 2-Critical BT2224853 BIG-IP DNS may not respond to RRSIG type queries correctly with DNSSEC zones
2277817 3-Major BT2277817 DNS64 may fall back to QTYPE=A if there is a delay in response for QTYPE=AAAA and "DNS IPv6 to IPv4" is set to 'secondary'
2264845-4 3-Major BT2264845 TMM may crash when enabling DNS Express
2263101 3-Major TMSH rrset commands do not list DNS cache serve-expired records
2261137-5 3-Major BT2261137 TMM may crash if DNS cache resolver concurrency settings are changed during live traffic
2258701 3-Major RPZ performance may have dropped in v21.1.0
2187141-4 3-Major BT2187141 DNS generic server stuck offline after monitor removal
2137661-3 3-Major BT2137661 GTM link object is deleted automatically after being added
2289937-1 4-Minor BT2289937 ldns.gz file remains empty despite Active Path and Persistence Records
2130329-4 4-Minor BT2130329 [GTM] Deletion of topology records makes MCPD memory ramp up

Application Security Manager Issues

ID Number Severity Links to More Info Description
1824745-4 2-Critical BT1824745 Bd crash and generate core
1755113-7 2-Critical BT1755113 BD crash with specific JSON schema
531848-3 3-Major BT531848 Call to Apply Policy can be lost and never retried in an autosync device group
2289885-1 3-Major BT2289885 Malformed protobuf file synced from secondary blades cause asmlogs coredump
2285073-2 3-Major BT2285073 AbandonedTaskSweep Removes Tasks Prematurely
2053893-5 3-Major BT2053893 Incompletely-synced ASM configuration can be synced back to the original device or group
1586877-4 3-Major BT1586877 Behavior difference in auto-full sync virtual server and manual-incremental config sync

Access Policy Manager Issues

ID Number Severity Links to More Info Description
2198721-4 3-Major BT2198721 SAML apmd memory leak
2163589 3-Major BT2163589 Access VPN traffic may be incorrectly routed to LTM IPsec wildcard forwarding virtual server

Service Provider Issues

ID Number Severity Links to More Info Description
2230889 3-Major BT2230889 SIP parser mishandles RFC 3261 folded headers, causing 200 OK forwarding failure with iRule routing
2077553 3-Major BT2077553 SIP message in quote containing special character after two backslashes will be generate a SIP error message
2153897 4-Minor BT2153897 BIG-IP closes the transport connection immediately after sending a DPA to a peer

Advanced Firewall Manager Issues

ID Number Severity Links to More Info Description
1818861-5 3-Major BT1818861 Timestamp cookies are not compatible with fastl4 mirroring.
2227661 4-Minor BT2227661 Sys variable db tm.fw.defaultaction is honor when AFM is not provisioned

Policy Enforcement Manager Issues

ID Number Severity Links to More Info Description
2291257 4-Minor BT2291257 Adding a Subscriber IP addresses with route-domain notation in the Subscriber Management 'Log Session Activity' box fails with ;Invalid IP Address'

Protocol Inspection Issues

ID Number Severity Links to More Info Description
1786457 3-Major BT1786457 Protocol Inspection auto update with latest is not working

In-tmm monitors Issues

ID Number Severity Links to More Info Description
1002345-8 3-Major BT1002345 Transparent monitor does not work after upgrade

Known Issue details for BIG-IP v21.1.x

932553 : An HTTP request is not served when a remote logging server is down

Links to More Info: BT932553

Component: Local Traffic Manager

Symptoms:
BIG-IP systems provide an option to sanitize HTTP traffic via the http_security profile. When the profile is configured to alarm on a violation, it is possible that a connection to the violating client is reset if a remote logging server is marked down.

Conditions:
-- A BIG-IP system has an HTTP profile and and an http_security profile with the alarm option set.
-- A remote logging server is configured via a BIG-IP pool.
-- The pool has a monitor that marks all the pool members down.
-- A request with an HTTP violation is processed and triggers an alarm configured in the http_security profile.

Impact:
-- A TCP connection to a client is reset by the BIG-IP system.
-- The web page may not render, or may not render as expected.
-- Data are not delivered to a server with a POST request.

Workaround:
None.


826313 : Error: Media type is incompatible with other trunk members

Links to More Info: BT826313

Component: TMOS

Symptoms:
Loading system configuration is failing after upgrade with an error message

01070619:3: Interface 5.0 media type is incompatible with other trunk members

Conditions:
-- Trunk interface created in BIG-IP version 12.3.4.
-- Trunk interfaces have different speeds (e.g. 100Mb interfaces and 1Gb interfaces)
-- Load the configuration after upgrading from v12.1.3.4 to v12.1.3.5.

Impact:
The system configuration is failing to load.

Workaround:
If you encounter this error, manually fix all trunks to only use interfaces of the same speed, and then load the configuration.


741621-7 : CLI preference 'suppress-warnings' setting may show incorrectly

Links to More Info: BT741621

Component: TMOS

Symptoms:
At times when the 'suppress-warnings' setting is at its default value ('none'), it may be listed like this instead:

suppress-warnings { }

After loading the configuration, the 'suppress-warnings' setting may return to the default value, in which case it is no longer visible when listing out the CLI preferences (without specifying 'all-properties').

Conditions:
-- Using the default value for 'suppress-warnings' in the CLI preferences.
-- Listing out the CLI preferences.

Impact:
Possibly confusing listing for this value. The 'suppress-warnings' setting auto-populates with an incorrect default of empty { } (instead of 'none') on config load, causing it to be displayed when listing CLI preference in tmsh.

Workaround:
None


683706-10 : Monitor status may show 'checking' after a pool member has been manually forced down

Links to More Info: BT683706

Component: Local Traffic Manager

Symptoms:
Following certain sequences of actions, a pool member that is forced offline (e.g., '{session user-disabled state user-down}'), may have an associated monitor status (status of the associated monitor instance) that is shown as 'checking'.

Conditions:
This result may occur as the result of one of the following sequences of actions:

1. A pool member is created with an associated monitor, and that pool member is simultaneously forced offline.

Example:
tmsh create ltm pool test1 members add { 10.1.108.2:80 { session user-disabled state user-down } } monitor http

2. A pool member is disabled or forced offline, the configuration is saved, and the BIG-IP system is restarted (for example, by 'bigstart restart' or 'reboot' commands).

Example:
tmsh modify ltm pool test1 members modify 10.1.108.2:80 { session user-disabled state user-down } }
tmsh save sys config
bigstart restart

Impact:
The pool member remains offline as directed, but the associated monitor status (monitor instance status) indicates 'checking', which does not appear to match the pool member status.

If the pool member is subsequently re-enabled, the associated monitor status (status of the associated monitor instance) will be updated to show the result of current monitor pings.

Workaround:
The 'checking' status of the monitor instance may be unexpected, in this context, but:

- The monitor status (monitor instance status) does not affect the status of a disabled pool member.

- This monitor status indicates that no monitor pings have been performed to update the initial state of the monitored object from 'checking' to a result determined by a monitor ping. The BIG-IP monitoring subsystem does not ping disabled pool members to update this status.


675742-2 : Hardware-to-VE-platform-migrate of a UCS may fail with an error on db variable license.maxcores

Links to More Info: BT675742

Component: TMOS

Symptoms:
Using the platform-migrate option to load a UCS from a different platform may show this error from loaddb:

01080023:3: Error return while getting reply from mcpd: 0x107178a, 0107178a:3: Modifying license.maxcores to a value other than 8 is not allowed.

The UCS loads successfully, other than the DB variable, but this error message is printed and the DB variables are not loaded.

Conditions:
-- Migrating a UCS from physical platform hardware to a Virtual Edition (VE) configuration.

-- License has an attribute limiting the maximum number of cores, and the incoming UCS has a value of the DB variable 'license.maxcores' that contradicts this.

Impact:
The DB variable file fails to load, generating the error message, but that does not stop the loading of the regular configuration files in BIG-IP*.conf.

Workaround:
The 'license.maxcores' value is ignored on hardware devices, so set it to 8 before saving the UCS.


531848-3 : Call to Apply Policy can be lost and never retried in an autosync device group

Links to More Info: BT531848

Component: Application Security Manager

Symptoms:
ASM Changes in an auto-sync device group are sent over a direct channel to a device's peers. In rare conditions it is possible that messages are lost over this channel.

Configuration changes have fallbacks to ensure the missing change will be noticed, but there is no such fallback currently for Apply Policy calls.

Therefore, if an Apply Policy call goes missing in an autosync group, it will never retry.

Conditions:
ASM sync is configured on an autosync device group.

Impact:
Enforcement changes will not take effect on the peer devices until the next Apply Policy action.

Workaround:
Make a spurious change to the policy and set it active again.


2291393-1 : Splitsession Traffic Fails

Links to More Info: BT2291393

Component: Local Traffic Manager

Symptoms:
Traffic does not flow through the split-session BigIPs, with the split-session server profile resetting the connection.
If the sys db variable tm.rstcause.log is enabled, the BigIP with the splitsession server profile will have "Failed to find sync data" as the cause logged in /var/log/ltm

Conditions:
Two BigIPs are configured where one has a virtual using a splitsession client profile and the other has a virtual that uses the peer splitsession server profile.

Impact:
Connections fail for the virtual until the proxy flow between the two BigIPs dies and is reestablished.

Workaround:
It is possible to workaround this by disabling SSL for the split-session proxy.

For the BigIP with the splitsession client profile, disabling Mode on the splitsession-default-serverssl profile, and for the BigIP with the splitsession server profiledisabling Mode on the splitsession-default-clientssl profile.

Note, this would mean the flow metadata would no longer be encrypted between the BigIPs.


2291313 : Azure/Hyper-V BIG-IP VE uses only a fraction of available memory

Links to More Info: BT2291313

Component: TMOS

Symptoms:
On Azure and Hyper-V deployments, BIG-IP VE allocates memory, but TMM only uses a small portion of it. In larger instances, a significant amount of memory remains unused.

Conditions:
BIG-IP VE is deployed on Microsoft Azure or Hyper-V with multiple data interfaces.

Impact:
Reduced memory available for traffic processing. Larger instance sizes do not provide a proportional memory benefit to TMM.

Workaround:
None


2291301 : Data-Group Lookup with 128-Character Key Length Will Not Match

Links to More Info: BT2291301

Component: Local Traffic Manager

Symptoms:
Some entries in a data-group of type string are never matched in an irule with class lookup or class match equals.

Conditions:
Keys in the data group of type string with a length of precisely 128 characters are not found. Keys with a length different than 128 have no issues.

Impact:
Missing match when it should be matched.

Workaround:
If somehow possible, avoid using a key of length 128 characters, or use class match begins_with or ends_with


2291257 : Adding a Subscriber IP addresses with route-domain notation in the Subscriber Management 'Log Session Activity' box fails with ;Invalid IP Address'

Links to More Info: BT2291257

Component: Policy Enforcement Manager

Symptoms:
Adding an IP with route-domain notation (like 10.0.0.2%2) via the GUI (under 'Subscriber Management ›› Subscribers: Activity Log: Configuration -> Log Session Activity') results in an error: "Invalid IP Address".

Conditions:
-- PEM licensed and provisioned
-- Adding an IP with route-domain notation (like 10.0.0.2%2) via the GUI (under 'Subscriber Management ›› Subscribers: Activity Log: Configuration -> Log Session Activity')

Impact:
An error is returned by the GUI: "Invalid IP Address".

Workaround:
Use tmsh to add the subscriber IP with route domain notation to the subscriber-activity-log settings:

# tmsh modify pem global-settings subscriber-activity-log subscriber-ip-addresses add { 10.0.0.2%2 }


2289937-1 : ldns.gz file remains empty despite Active Path and Persistence Records

Links to More Info: BT2289937

Component: Global Traffic Manager (DNS)

Symptoms:
The file /config/gtm/ldns.gz remains at 20 bytes (gzip header only) and contains no path or persistence records, even though GTM path and persistence entries are visible in memory via tmsh commands (show gtm path, show gtm persist).

Conditions:
The issue occurs when BIG-IP DNS is configured with GTM path and persistence record collection, and DNS queries are actively processed. Despite path and persistence records being visible in memory through tmsh commands, the scheduled dump process does not save these records to the /config/gtm/ldns.gz file.

Impact:
When the gtmd process is restarted, it is not to restore the previously known path and persistence records from ldns.gz and must relearn them through new DNS requests sent to members of the DNS sync group.

Workaround:
None


2289885-1 : Malformed protobuf file synced from secondary blades cause asmlogs coredump

Links to More Info: BT2289885

Component: Application Security Manager

Symptoms:
asmlogd spontaneously coredump on the tenant (SIGSEGV)

asmlogd log shows "Secondary file /var/asmdata1/cluster/request_log/transfer/request_log__20260331_230212__slot_2 does not match integrity check", right before the crash.

Conditions:
ASM provisioned

multi-blade platform with at least 2 blades

Impact:
asmlogd spontaneously crashed on the primary blade and then restarted automatically in about 30seconds

Workaround:
none


2288173-4 : Some TMMs not ready and failed to bring up full cluster due to failed cmp dag transition

Links to More Info: BT2288173

Component: Local Traffic Manager

Symptoms:
On VELOS chassis platforms, when you reboot or restart the tenant, the cluster fails to come up fully with some TMMs indicating tmm-not-ready state, and performance is degraded as it fails to bring up the full cluster.

Conditions:
VELOS chassis platforms, with scenarios leading to reboot or restart of the tenant, possibly triggered by
- some software upgrade
- some power reset or
- configuration change causes occasional problems in tmm cluster bring-up and reduces the capacity handled by the tenant.

When the problem happens, it is observed that
- tmctl tmm/cmp shows queue_drops
- tmctl tmm/mpi_mem shows tx-full
Due to a lot of internal background traffic in the cluster

and tmctl tmm/ready_for_world_stat indicates "not read" state for "dag_transition".

Impact:
Performance degraded due to reduced cluster size.

Workaround:
No Workaround
As it is an intermittent problem, reboot/restart the problematic blade may help to recover.


2287865-1 : Dynamic CRL always fails connections that use self-signed certificates

Links to More Info: BT2287865

Component: Local Traffic Manager

Symptoms:
Connections fail with alert(46) unknown certificate error

The following is logged in /var/log/ltm

"unable to build certificate trust chain for profile"

Conditions:
Serverssl profile that uses Dynamic CRL, and the backend servers are configured with self-signed certificates.

Impact:
Dynamic CRLs cannot be used if backend servers are configured with self-signed certificates.

Workaround:
Add any self-signed certificates to the trusted CA of the ssl profile.


2285073-2 : AbandonedTaskSweep Removes Tasks Prematurely

Links to More Info: BT2285073

Component: Application Security Manager

Symptoms:
When an asynchronous worker reaches a lifecycle limit for memory or calls handled, it hands its remaining task queue off to another worker.
Some timing conditions exist where the AbandonedTaskSweep periodic job will remove an unfinished task (such as a BulkTask) before the new worker updates the status to finished.

Conditions:
Normal operations.

Impact:
When the update to the task fails, the impact is cosmetic, as the task was already successfully completed.
The result of the task will not be retrievable.

Workaround:
None


2277817 : DNS64 may fall back to QTYPE=A if there is a delay in response for QTYPE=AAAA and "DNS IPv6 to IPv4" is set to 'secondary'

Links to More Info: BT2277817

Component: Global Traffic Manager (DNS)

Symptoms:
DNS64 may fall back to QTYPE=A if there is a delay in response for QTYPE=AAAA and "DNS IPv6 to IPv4" is set to 'secondary'.

Conditions:
DNS profile with DNS64 "DNS IPv6 to IPv4" is set to 'secondary'.
There is a delay in the response for QTYPE=AAAA

Impact:
DNS64 could fall back to QTYPE=A

Workaround:
NA


2277421 : TCP profile Help tab displays incorrect default values for Memory Management fields

Links to More Info: BT2277421

Component: TMOS

Symptoms:
The Help tab for TCP profiles shows incorrect default values for Proxy Buffer High (131072) and Proxy Buffer Low (98304) in the Memory Management section.

Conditions:
Viewing the Help tab for any built-in TCP profile in the GUI or tmsh help for TCP profile proxy-buffer-high/proxy-buffer-low.

Impact:
Help text displays incorrect default values, which may cause confusion when configuring TCP profiles. No functional impact - actual profile behavior is correct.

Workaround:
Refer to the actual profile values shown in the configuration instead of the Help tab text.


2269969-4 : Using TCP congestion BBR might lead to TMM core

Links to More Info: BT2269969

Component: Local Traffic Manager

Symptoms:
Using TCP congestion BBR might lead to TMM core

Conditions:
TCP congestion BBR is in use.

Impact:
TMM crash/core.

Workaround:
N/A


2264845-4 : TMM may crash when enabling DNS Express

Links to More Info: BT2264845

Component: Global Traffic Manager (DNS)

Symptoms:
TMM may crash when enabling DNS Express.

Conditions:
Occurs when enabling DNS express feature with traffic actively hitting the modified virtual-server.

Impact:
TMM core crashes.

Workaround:
N/A


2264037-1 : TMM may generate a core file after an SSL cipher group is deleted

Links to More Info: BT2264037

Component: Local Traffic Manager

Symptoms:
TMM crashes and generates a core file

Conditions:
- An SSL cipher group previously referenced by an SSL profile is removed from the configuration.
- Connections established while the profile referenced that cipher group remain active.
- At least one of those connections initiates a TLS renegotiation.

Impact:
Traffic interruption while TMM generates a core file and restarts.

Workaround:
Do not remove a cipher group if any active connections may still reference an older SSL profile that used it.


2263101 : TMSH rrset commands do not list DNS cache serve-expired records

Component: Global Traffic Manager (DNS)

Symptoms:
With serve-expired enabled on a DNS cache resolver, records at TTL=0 no longer appear in the rrset cache via tmsh show and cannot be deleted via tmsh delete, yet they may still be served to clients as stale responses.

Conditions:
Serve-expired is enabled for a DNS cache resolver

Impact:
Records could still be served to clients as stale responses via the serve-expired mechanism.

Workaround:
N/A


2262641-4 : [BGP] Peering deadlock when modifying supported capabilities

Links to More Info: BT2262641

Component: TMOS

Symptoms:
When modifying capabilities BGP peering might enter a deadlock with local peer ignoring incoming and not creating outbound connections.

Conditions:
Modifying BGP capabilities when local peer tries to connect.

Impact:
BGP peering enters a deadlock.

Workaround:
Remove peer (neighbor) configuration and reapply it.


2261529 : HTTP2 RST_STREAM flood detection should be more sensitive

Links to More Info: BT2261529

Component: Local Traffic Manager

Symptoms:
If an HTTP2 RST flood comes at an interval of 5 msec or more, TMM will not flag this as an attack.

Conditions:
These floods are not detected.

Impact:
Although not as impactful as an attack with less than 1 msec between RST_STREAMs, it could impact performance.

Workaround:
None


2261337-1 : TMUI displays Local Traffic menu on rSeries Best Bundle tenant without LTM provisioned

Links to More Info: BT2261337

Component: TMOS

Symptoms:
In rSeries BIG-IP tenants with a Best Bundle license, TMUI shows the Local Traffic menu even when LTM is not provisioned (GTM dedicated, LTM none), which does not occur on DNS-only tenants with the same provisioning.

Conditions:
This issue occurs when,

- Platform is rSeries (eg: R5900, R10900)
- Deployment is a BIG-IP tenant
- License is Best Bundle
- GTM is set to dedicated and LTM is set to none

Impact:
This reveals LTM configuration options (virtual servers, pools, nodes, etc.) on a DNS‑dedicated tenant, increasing the risk of accidental object creation.

Workaround:
None


2261137-5 : TMM may crash if DNS cache resolver concurrency settings are changed during live traffic

Links to More Info: BT2261137

Component: Global Traffic Manager (DNS)

Symptoms:
TMM crashes with a SIGSEGV and then restarts.

Conditions:
- The DNS cache resolver is configured and processing queries.
- A DNS cache-resolver object is changed, specifically a setting that alters max-concurrent-queries or max-concurrent-tcp.
- Live DNS traffic is in progress when the change is applied.

Impact:
Traffic is disrupted during a TMM restart, and the redundant unit fails over.


2259397-3 : [BGP] In route map the change in as-path does not automatically trigger soft outbound update

Links to More Info: BT2259397

Component: TMOS

Symptoms:
When updating route-map as-path a new path is not advertised automatically and manual update is needed.

Conditions:
Updating route-map as-path for the route-map attached to a BGP peer.

Impact:
Manual soft update is needed.


2258825-1 : The lind process may continuously restart when mcpd is down

Component: TMOS

Symptoms:
The lind process may continuously restart when connection to mcpd cannot be established.

2026 Mar 27 01:01:46 test.openstack.internal logger[28808]: Re-starting lind

Broadcast message from systemd-journald@test.openstack.internal (Fri 2026-03-27 01:01:47 PDT):

logger[28864]: Re-starting lind

2026 Mar 27 01:01:47 test.openstack.internal logger[28864]: Re-starting lind

[root@test:INOPERATIVE:Standalone] config #
Broadcast message from systemd-journald@test.openstack.internal (Fri 2026-03-27 01:01:48 PDT):

logger[28994]: Re-starting lind

2026 Mar 27 01:01:48 test.openstack.internal logger[28994]: Re-starting lind

Conditions:
Mcpd process is not in the running state.

[root@test:INOPERATIVE:Standalone] config # bigstart status mcpd
mcpd down 7 minutes, normally up

Impact:
Lind daemon continuously restarts, interfering operations in the terminal window.

Workaround:
Stop lind by running the command: bigstart stop lind.


2258701 : RPZ performance may have dropped in v21.1.0

Component: Global Traffic Manager (DNS)

Symptoms:
RPZ performance may have dropped due to additional processing introduced with the addition of three triggers, five actions, and multi-feed support.

Conditions:
RPZ configured and operational

Impact:
Some performance drop for the RPZ feature.
Actions are being taken to regain the performance drop over the next releases.

Workaround:
NA


2258305-1 : TMSH sys/software syntax updated with experimental "dry-run" option

Component: TMOS

Symptoms:
You may see the new "dry-run" option introduced for BIG-IP images verification listed as the Module, not as the Option.

Conditions:
Run one of the TMSH show, list, delete commands for sys software component.

# list sys software
Options:
  all-properties current-module non-default-properties one-line recursive |
Modules:
  dry-run
Components:
  hotfix image signature update update-status volume

Impact:
Any automation based on the current software "dry-run" syntax may break in the future.

Workaround:
None


2251549 : Uneditable fields for Guest, Auditor, and Operator roles may appear to be editable in the GUI

Links to More Info: BT2251549

Component: TMOS

Symptoms:
Protocol profile GUI fields for a virtual server appear to be editable for a Guest, Operator, or Auditor role although they are actually not accessible for these roles

Conditions:
1. A virtual server is present
2. This virtual server has selected at least one Client SSL Profile
3. On the virtual server's properties page, a guest/auditor/operator user clicks on the name of a profile in the Selected column of Client SSL Profile field

Impact:
GUI fields appear to be editable as if the user had admin access.
The save/update of any edits does not occur; the fields only appear to be editable in the GUI

Workaround:
None


2244389 : Small TLS record sizes reduce connection throughtput.

Links to More Info: BT2244389

Component: Local Traffic Manager

Symptoms:
Low TLS connection throughput with small record sizes compared to a larger record size.

Conditions:
A virtual server configured with clientssl or serverssl profile, and ingress TLS records are of a smaller size.

Impact:
Reduced TLS throughput.


2230889 : SIP parser mishandles RFC 3261 folded headers, causing 200 OK forwarding failure with iRule routing

Links to More Info: BT2230889

Component: Service Provider

Symptoms:
With a SIP profile and iRule routing by string match, a valid 200 OK with a folded (multi-line) Accept header is not forwarded, but it forwards correctly if the Accept header is on a single line.

Conditions:
Virtual Server: UDP port 5060 (SIP)
Profiles: SIP profile, UDP profile (default settings)
Pool: At least one pool member
iRule: Attached to the virtual server

Send a SIP 200 OK response to the BIG-IP with a folded Accept header.

Impact:
When a SIP profile is applied and Content-Length is present, SIP messages with folded (multi-line) headers are silently dropped, causing call setup failures, missed responses, or other signaling disruptions.

Workaround:
Use the flattened Accept Header in payload:

Accept: application/sdp, application/isup, multipart/mixed, application/dtmf


2228869-5 : Continuous tmm cores in domain_table_search with null dereferencing

Links to More Info: BT2228869

Component: Global Traffic Manager (DNS)

Symptoms:
Tmm cores

Conditions:
Corrupt zone express database

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None


2227661 : Sys variable db tm.fw.defaultaction is honor when AFM is not provisioned

Links to More Info: BT2227661

Component: Advanced Firewall Manager

Symptoms:
Connections are dropped due to sys db variable tm.fw.defaultaction is set to drop when AFM is not provisioned.

Conditions:
-- LTM+ASM provisioned, AFM not provisioned
-- set "db tm.fw.defaultaction" to drop
-- send test traffic through a virutal server on the BIG-IP system

Impact:
Connections are dropped due to sys db variable tm.fw.defaultaction is set to drop when AFM is not provisioned.

Workaround:
Reset tm.fw.defaultaction to default value(accept):

tmsh modify sys db tm.fw.defaultaction value default


2224853-1 : BIG-IP DNS may not respond to RRSIG type queries correctly with DNSSEC zones

Links to More Info: BT2224853

Component: Global Traffic Manager (DNS)

Symptoms:
BIG-IP DNS may not return RRSIG records when queried directly via RRSIG type queries on DNSSEC-enabled zones.

Conditions:
A DNSSEC zone is created on BIG-IP-DNS and a DNS query with type RRSIG is sent.

Impact:
BIG-IP-DNS may not respond to RRSIG type queries correctly.
The response may differ for under apex records. If they exist, the response is NODATA; if they do not exist, the response is NXDOMAIN.
BIG-IP should respond as this is a valid request with RRSIG for all types.

Workaround:
NA


2208821 : VIPRION cluster becomes INOPERATIVE and fails to load configuration after software upgrade

Links to More Info: BT2208821

Component: Local Traffic Manager

Symptoms:
After upgrading BIG-IP software on a VIPRION system, the device may fail to load the configuration and enter an INOPERATIVE state. The system remains stuck during the configuration load phase, preventing normal operation.

Conditions:
1. VIPRION platform with clustered configuration.
2. Performing a BIG-IP software upgrade.
3. System attempts to load post-upgrade configuration during boot or blade role transition

Impact:
The VIPRION cluster becomes INOPERATIVE and is unable to load the configuration. Traffic is impacted as the system cannot process or pass traffic until the issue is resolved.

Workaround:
Restarting the system with a different blade set as primary, or reverting to the previously working software version, allows the configuration to load successfully. In some cases, re-attempting the upgrade after correcting the blade role transition also resolves the issue.


2198721-4 : SAML apmd memory leak

Links to More Info: BT2198721

Component: Access Policy Manager

Symptoms:
Apmd process will leak memory when configured with SAML authentication.

Conditions:
APM configured with SAML
Any BIG-IP version >= 17.1.0

Impact:
BIG-IP can run out of memory and some services killed to release memory.

Workaround:
None


2187141-4 : DNS generic server stuck offline after monitor removal

Links to More Info: BT2187141

Component: Global Traffic Manager (DNS)

Symptoms:
Removing the monitor from the virtual server can leave the DNS generic server stuck in “Offline (Enabled) – No enabled virtual server available.”

Conditions:
Removes a monitor from the Virtual Server and uses a Generic Server type.

Impact:
The generic server shows the same status as the Virtual Server.

Workaround:
NA


2183917-4 : BIG-IP might fail to update received TCP window when tm.tcpstopblindinjection is enabled

Links to More Info: BT2183917

Component: Local Traffic Manager

Symptoms:
BIG-IP might fail to update received TCP window when tm.tcpstopblindinjection db variable is enabled (CVE-2025-58424).

Conditions:
The tm.tcpstopblindinjection db variable is enabled (CVE-2025-58424 ).

This does not always occur.

Impact:
TCP transfer might stall.

Workaround:
None


2163589 : Access VPN traffic may be incorrectly routed to LTM IPsec wildcard forwarding virtual server

Links to More Info: BT2163589

Component: Access Policy Manager

Symptoms:
When both LTM IPSEC and Access VPN solutions are configured on the same device, traffic intended for the Access Virtual Server is incorrectly routed to the LTM IPSEC forwarding virtual server .
As a result, Access VPN traffic fails to be processed by the intended Access Virtual Server.

Conditions:
-- The configuration includes both LTM IPSEC and Access VPN on the same system.
-- LTM IPSEC uses a wildcard IP‑forwarding virtual server.
-- Access VPN is configured, which internally relies on an HTTP Access virtual server + internal Access forwarding VS.
-- VPN traffic is initiated for Access VPN.

Under these conditions, Access VPN traffic is consistently routed to LTM’s wildcard forward virtual server instead of the Access virtual server.

Impact:
-- Access VPN functionality does not work as expected.
-- Internal Access virtual server never receives Access VPN traffic.
-- Both Tunnel solutions cannot function simultaneously on the same VLAN.
-- Deployments requiring coexistence of LTM IPSEC + Access VPN are blocked unless the workaround is applied.

Workaround:
Use separate VLANs for LTM IPSEC and Access VPN.
When LTM IPSEC and Access VPN are placed on different VLANs, traffic flows independently and correctly to their respective virtual servers without conflict.
There is no full fix or configuration‑based resolution without using separate VLANs.


2153897 : BIG-IP closes the transport connection immediately after sending a DPA to a peer

Links to More Info: BT2153897

Component: Service Provider

Symptoms:
With Diameter MRF setup, when the BIG-IP receives a diameter DPR message (Disconnect-Peer-Request), it sends a DPA to the peer (Disconnect-Peer-Answer) and then immediately closes the transport connection.

According to RFC6733, ("Diameter Base Protocol") the transport connection should be closed by the remote peer instead.

Conditions:
- BIG-IP configured with a MRF Diameter setup
- BIG-IP receives a Diameter DPR message

Impact:
The BIG-IP system closes the transport connection instead of waiting for the remote peer to close it.

Workaround:
None


2149325-1 : Db var not set when running tmsh load sys ucs ucs-file platform-migrate

Links to More Info: BT2149325

Component: TMOS

Symptoms:
Some of the Db var part of a UCS file do not get change after loading
tmsh load sys ucs ucs-file platform-migrate

Conditions:
An error was encountered while loading and attempting to configure based on the UCS file which terminates the loading.
For example, one such error could be:
Error return while getting reply from mcpd: 0x1070734, 01070734:3: Configuration error: vmw-compat: vlan may only have one interface

Impact:
UCS was loaded however, custom value of db key, such as tm.minipfragsize, are not set to the content of the UCS.

Workaround:
A workaround is possible but depends on the type of errors received. It would require modifying the content of the UCS file to avoid the error before loading it again.


2137661-3 : GTM link object is deleted automatically after being added

Links to More Info: BT2137661

Component: Global Traffic Manager (DNS)

Symptoms:
GTM link is deleted.

Conditions:
Link auto discovery is enabled on GTM server object.

Impact:
GTM link is falsely deleted by the system.

Workaround:
Disable link auto discovery on GTM server object.


2130329-4 : [GTM] Deletion of topology records makes MCPD memory ramp up

Links to More Info: BT2130329

Component: Global Traffic Manager (DNS)

Symptoms:
The MCPD memory ramp-up might result in being killed by sod or out of memory.

Conditions:
Delete thousands of GTM topology records in a short period of time, and the full GTM sync is triggered.

Impact:
The MCDP memory is stuck or being killed by sod.

Workaround:
Do not delete a large number of GTM topology records in a short period of time.


2077553 : SIP message in quote containing special character after two backslashes will be generate a SIP error message

Links to More Info: BT2077553

Component: Service Provider

Symptoms:
Tmm resets connections with "SIP parser error (Illegal value)"

Conditions:
In the SIP message sent by the client, there is a string in quotes that contains two backslashes followed by a UTF8 character.

Impact:
Rejection of valid SIP message

Workaround:
Encode all characters with %
as in
%D0%A4%5C%5C%D0%A9%20
instead of
"Ф\\Щ "


2053893-5 : Incompletely-synced ASM configuration can be synced back to the original device or group

Links to More Info: BT2053893

Component: Application Security Manager

Symptoms:
The incomplete ASM configuration on the new device may be synced to the device group, overwriting the original and complete ASM configuration when an ASM configuration is in the process of being synced from an existing device or group to a new device joined to the group, and there is a request to sync the new device to the group.

Conditions:
This may occur when,
-- Multiple device groups are configured, including:
   -- a (non-ASM) Sync Failover device group
   -- an ASM Sync-Only device group
-- Both device groups are configured for Manual Full Sync.
-- The ASM configuration is large enough to require several minutes to apply the complete configuration.
-- A new device has joined the cluster and device groups, which has no existing ASM configuration (or, a much smaller subset of the cluster's existing ASM configuration.
-- The configuration is synced from an existing device to the non-ASM device group (and thus to the new device).
-- After the ASM configuration is synced from an existing device to the ASM device group (and thus to the new device).
-- After the ASM configuration is synced from the new device to the ASM device group (and thus to the existing devices).

Impact:
Depending on the size of the ASM configuration, system performance and network throughput, the ASM configuration may take a long time to sync to the new device, and may appear to be only partially synced in the meantime.
Depending on timing and other non-deterministic conditions, this partially-synced ASM configuration may be synced back to the device group.
When this occurs, the existing ASM configuration may be overwritten by the partial ASM configuration on the new device, resulting in a loss of ASM functionality.

Workaround:
To avoid this issue when multiple device groups are configured, which include both an ASM and non ASM device group, and both groups are configured for Manual Full Sync:
-- Sync the ASM device group first.
-- Wait to confirm that the full ASM configuration has been synced to the new device before initiating any further sync operations.
-- Be careful not to inadvertently select the new device (with incomplete ASM configuration) as the device to sync to the device group.


1928169 : HTTP2 RST_STREAM NO_ERROR received by BIG-IP not interpreted correctly

Links to More Info: BT1928169

Component: Local Traffic Manager

Symptoms:
Communication disrupted to the client when server sends a RST_STREAM NO ERROR

Conditions:
if the server has already sent a response (e.g., headers and body) and does not need additional data from the client (e.g., request body for POST or PUT requests), it might send a RST_STREAM with NO_ERROR to stop the stream and signal that no further data is required.

Impact:
Communication disrupted.

Workaround:
None


1824745-4 : Bd crash and generate core

Links to More Info: BT1824745

Component: Application Security Manager

Symptoms:
Bd crashes

Conditions:
Unknown

Impact:
Traffic disrupted while bd restarts.

Workaround:
None


1818861-5 : Timestamp cookies are not compatible with fastl4 mirroring.

Links to More Info: BT1818861

Component: Advanced Firewall Manager

Symptoms:
DOS tcp-ack-ts vector with tscookies option enabled is not compatible with fastl4 (L4) mirroring.

Conditions:
- DOS tcp-ack-ts vector with tscookies option enabled
- Mirroring configured on fastL4 TCP virtual.
- FastL4 profile with timestamp 'preserve' option configured.

Impact:
Existing connections hang due to tsval not being transformed properly on a newly active device.

Workaround:
Set fastl4 timestamp option to strip/rewrite.


1786457 : Protocol Inspection auto update with latest is not working

Links to More Info: BT1786457

Component: Protocol Inspection

Symptoms:
The latest Protocol Inspection IM package is not updating automatically. var/log/pi_hitless_upgrade contains errors and reports

ERROR Error: Exception caught in script. Check logs (/var/log/pi_hitless_upgrade) for details

Conditions:
The IPS is licensed and provisioned.

Impact:
The latest Protocol Inspection IM package is not updated.

Workaround:
Download IM package and install it manually. or click on "Security ›› Protocol Security : Inspection Updates --> Download Package --> From f5.com" and deploy the package manually.


1758193-1 : Trunk with LACP and virtual-wire flaps after an upgrade.

Links to More Info: BT1758193

Component: Local Traffic Manager

Symptoms:
After performing an upgrade from a version lower than 16.0 to a version higher or equal to 16.0, BIG-IP will fail to establish LACP trunk when interfaces are configured in virtual-wire mode.

Version 16.0 introduced transparent LACP bridging of LACP allowing LAG to be established across BIG-IP. This feature is enabled by default in versions > 16.0.

Conditions:
- Trunk configured with LACP.
- Virtual-wire configured across the trunk.
- Upgrading from version lower than 16.0 to a version higher or equal to 16.0.

Impact:
Fail to establish LACP trunk.

Workaround:
Setting l2.virtualwire.multicast.bridging to disabled allows BIG-IP to establish LACP directly with other devices without bridging maintaining the behavior from versions < 16.


1755113-7 : BD crash with specific JSON schema

Links to More Info: BT1755113

Component: Application Security Manager

Symptoms:
BD crash

Conditions:
Using specific JSON schema in the JSON content profile applied on the ASM policy

Impact:
ASM traffic disrupted while bd restarts.

Workaround:
None


1707921-3 : Tenant upgrade fails with disk full error on BIG-IP 17.x created with T2 image

Links to More Info: BT1707921

Component: TMOS

Symptoms:
Upgrade failed with "disk full" error in 17.1.x version.

-----------------------------------------------------------------------------------------------------------
Sys::Software Status
Volume Product Version Build Active Status Allowed Version
-----------------------------------------------------------------------------------------------------------
HD1.1 BIG-IP 17.1.1.4 0.0.9 yes complete yes
HD1.2 BIG-IP 17.1.1.3 0.0.5 no failed (Disk full (volume group). See SOL#10636)

Conditions:
- Deployed BIG-IP tenant with v17.x.x T2 image
- Trying to create an additional boot location

Impact:
Creation of additional boot location fails with "disk full" error.

Workaround:
Expand the tenant's virtual disk (storage-size) from F5OS to accommodate an additional boot location in the tenant.

Values of 46G/47G have worked well in lab testing.


1603869 : Wrong Fallback to local for TACACS authentication with empty password when source fallback is set to true

Links to More Info: BT1603869

Component: TMOS

Symptoms:
When remote auth configured with fallback is set to true and if try to login to the BIG-IP with local user credentials by providing empty password first then authentication mechanism fall back to local and then if provided with correct local user password the access is granted which causes security issues.

Conditions:
-- configure auth source fallback true.
-- Configure the remote auth mechanism in this case, TACACS.
-- Configure a local user that is not present in the TACACS server.

auth source {
fallback true
type tacacs
}

Impact:
Unauthorized access is given to the BIG-IP with a local user, even though the authentication mechanism is configured as remote.

Workaround:
Configure the auth source fallback as false.

auth source {
fallback false
type tacacs
}


1596313-4 : F5OS LAG fails MCPD validation, tenant trunk has no interfaces.

Links to More Info: BT1596313

Component: TMOS

Symptoms:
After creating an HA group with a trunk in an LTM tenant, the first reboot triggers an error: "Invalid attempt to register an n-stage validator; the stage must be greater than the current stage and within 1–101 (current stage: 7, registered: 5). Unexpected."

Conditions:
Occurs when,

- BIG-IP tenant running on F5OS
- High availability system
- HA group with a trunk
- The tenant is rebooted for the first time

Impact:
No impact on TMM VLAN traffic

Workaround:
Rerun the tmsh create sys ha-group command.


1586877-4 : Behavior difference in auto-full sync virtual server and manual-incremental config sync

Links to More Info: BT1586877

Component: Application Security Manager

Symptoms:
An ASM policy is assigned to a virtual server with the same name in a Sync-Only device group in Auto-Sync mode.

Conditions:
Devices with same virtual server name in a Sync-Only device group.

Impact:
The ASM policy is synced, which is unexpected behavior.

Workaround:
None


1575805-1 : bcm56xxd Process Killed by SOD After Failing to Send a Heartbeat During Firewall Rule Statistics Query

Component: TMOS

Symptoms:
When firewall rule statistics are requested using query_stats { fw_rule_stat { } }, the system may experience delays and bcm56xxd process is killed by sod, eventually impacting the traffic.

Conditions:
This issue may occur if a user/daemon sends a query_stats { l2_forward_stat {} } query where the mcp message header has validation_only set to 1

Impact:
Impact to Application traffic.

Workaround:
Limit validation‑only firewall rule statistics queries on systems with large or complex firewall rule configurations


1354205 : LTM policy with overlapping range in the TCP address match may fail

Links to More Info: BT1354205

Component: Local Traffic Manager

Symptoms:
An LTM policy using a rule that attempts to match based on a list of IP addresses may fail if more than one IP address range overlaps.

Conditions:
LTM policy rule with a 'tcp match address' statement that matches against more than one IP address range.
For example, if both 10.48.128.0/18 and 10.48.192.0/20 are used, then although 10.48.141.201 might match the /18 range, it will not match the /20 and therefore the match will fail.

Impact:
The action configured with the match will exclude IP address that do not match the more specific address range.

Workaround:
Avoid overlapping IP address range.


1350909 : Statsd error condition is not logged

Links to More Info: BT1350909

Component: Local Traffic Manager

Symptoms:
There is one statistics file per TMM and when large number of TMMs are in use, these statistics files have to be merged to view total memory usage of TMMs. These statistics files merge may fail if the total memory required is greater than 4 GB. There will not be any logs printed to inform the memory exhaustion condition.

Conditions:
When the files in /var/tmstat/blade/ exceed 4 GB, this could be to a large number of TMMs or due to an extremely large configuration.

Impact:
Incorrect TMM memory statistics and failure to log this message in debug logs.

Workaround:
Restart TMM.


1296925-4 : Unable to create two boot locations using the 'ALL' F5OS tenant image at default storage size

Links to More Info: BT1296925

Component: TMOS

Symptoms:
Configuration fails to load in second boot location created in F5OS tenant deployed with "ALL" image:

01071008:3: Provisioning failed with error 1 - 'Disk limit exceeded. 16188 MB are required to provision these modules, but only 16028 MB are available.'

Conditions:
-- Tenant deployed using the "ALL" image, with default "storage size"
-- Multiple modules provisioned (e.g. AFM+APM+ASM+LTM), or AFM provisioned
-- Create a second boot location

Impact:
This issue causes a configuration load failure in the second boot location.

Workaround:
Set the tenant(s) in question to configured state, increase the "storage size", then deploy the tenant once more.


1251969 : The ratio algorithm between pool members for load-balancing does not work

Links to More Info: BT1251969

Component: Local Traffic Manager

Symptoms:
In some cases, a pool using ratio-member load balancing directs all traffic to a single member, even when all members have identical ratios.

Conditions:
When a pool member exceeds its connection limit, round-robin selection is skipped, and TMM continues sending new connections to that same member.

For example, assume 10.107.94.197 had reached its limit of 5 connections, and suddenly, 2 connections are terminated.

tm pool Pool_01 {
load-balancing-mode ratio-member
members {
10.107.94.196:http {
address 10.107.94.196
session monitor-enabled
state up
}
10.107.94.197:http {
address 10.107.94.197
connection-limit 5
session monitor-enabled
state up
}
}
monitor http
}

When two new connections arrive, both go to the same pool member instead of round robin, despite equal ratios.

Impact:
Not working as expected.

Workaround:
N/A


1196505 : BIG-IP might RST HTTP2 connection with [F5RST:mrhttp_proxy bad transition] when ASM is in use.

Links to More Info: BT1196505

Component: Local Traffic Manager

Symptoms:
BIG-IP might RST HTTP2 connection with [F5RST:mrhttp_proxy bad transition] when ASM is in use.

Conditions:
- HTTP2
- ASM provisioned and passing traffic

Impact:
Unexpected connection reset.

Workaround:
None


1148053 : When client SSL profile has "cache-size 0" or "authenticate always", BIG-IP is unable to decrypt client-side traffic when using tcpdump with "--f5 ssl" method

Links to More Info: BT1148053

Component: Local Traffic Manager

Symptoms:
When client SSL profile has "cache-size 0" and/or "authenticate always", the SSL functionality fails to include SSL secrets in the F5 Ethernet Trailers (f5ethtrailer), thus not being able to decrypt client-side traffic.

Conditions:
- Client SSL profile has "cache-size 0"
- Client SSL profile has "authenticate always"

Impact:
The "cache-size 0" and the "authenticate always" options indicate that BIG-IP does not memorize any session, TMM disables session reuse. No renegotiation is provided even it is enabled.
No "session ID" should be present during the SSL/TLS handshake.

Workaround:
- For "cache-size 0" scenario, use client SSL profile default cache size
- For "authenticate always" scenario, use default value of "authenticate once"
- if changing config is not desired, iRule decryption method (K12783074) should work normally


1128033 : Neuron client constantly logs errors when TCAM database is full

Links to More Info: BT1128033

Component: Local Traffic Manager

Symptoms:
A database held in hardware (TCAM), shared between tenants, has a limit that is exceeded by software in tenants that adds and manages entries in the database.

Symptomatic logs on tenant:

in /var/log/ltm, repeating logs are recorded, following is an example:

  err tmm[635]: 01010331:3: Neuron client neuron_client_pva_hwl failed with rule request submit(client connection is busy (has outstanding requests))

in /var/log/tmm, cycles of following group of logs are recorded:

  notice neuron_client_negotiate: Neuron client connection established
  notice [DDOS Neuron]Neuron daemon started
  notice hudproxy_neuron_client_closed_cb: Neuron client connection terminated
  notice [DDOS Neuron]Neuron daemon stopped
  
  For F5OS host, in partition /var/F5/partitionX/log/velos.log repeating logs are recorded, following is an example:
  
  tcam-manager[41]: priority="Err" version=1.0 msgid=0x6b01000000000007 msg="ERROR" MSG="TCAM processing Error(-5) executing:TCAM_INSERT for ruleno:0x20000000937"
  
In the log message, the msgid and ruleno can vary, but the Error(-5) is an indication of this issue.

Conditions:
The BIG-IP system with a rSeries r5xxx, r10xxx, r12xxx or has VELOS blades such as BX110.
The rSeries 2xxx, 4xxx and iSeries platforms are not affected.

Large configurations, on the order of high hundreds of virtual servers, are more likely to encounter issue.

Impact:
The neuron client software will restart and log repeatedly.
Inefficient use of TCAM database.

Workaround:
None


1120345 : Running tmsh load sys config verify can trigger high availability (HA) failover

Links to More Info: BT1120345

Component: TMOS

Symptoms:
When running tmsh 'tmsh load sys config verify' on a config that contains both a high availability (HA) group and a traffic group referencing that high availability (HA) group, this will trigger a high availability (HA) fault and failover.

Conditions:
- Running 2 BIG-IP systems in a high availability (HA) pair
- Run tmsh 'load sys config verify' on a config with the following conditions:
- Config to be verified contains a high availability (HA) group
- Config to be verified also contains a traffic group referencing the high availability (HA) group

Impact:
HA fault and failover. The high availability (HA) pair will enter a degraded state.

Workaround:
No workaround currently known, but the failover fault can be cleared by running tmsh 'load sys config' on the system that had 'load sys config verify' run on it.


1050457-3 : The "Permitted Versions" field of "tmsh show sys license" only shows on first boot

Links to More Info: BT1050457

Component: TMOS

Symptoms:
As of BIG-IP Virtual Edition version 15.0.0, running "tmsh show sys license" should show the Permitted Versions. After the system is rebooted, this information is no longer displayed by TMSH.

Conditions:
-- Running the 'tmsh show sys license' command after a reboot

Impact:
Unable to see the permitted versions for the license.

Workaround:
The list of permitted versions can be seen in the /config/bigip.license file, by looking for Exclusive_version:

config # grep Exclusive_version /config/bigip.license
Exclusive_version : 11.6.*
Exclusive_version : 12.*.*
Exclusive_version : 13.*.*
Exclusive_version : 14.*.*
Exclusive_version : 15.*.*
Exclusive_version : 16.*.*
Exclusive_version : 5.*.*
Exclusive_version : 6.*.*
Exclusive_version : 7.*.*


1043141-5 : Misleading error 'Symmetric Unit Key decrypt failure - decrypt failure' when loading UCS from another BIG-IP

Links to More Info: K36822000, BT1043141

Component: TMOS

Symptoms:
Loading a UCS file from another BIG-IP results in an error message similar to:

"/usr/bin/tmsh -n -g -a load sys config partitions all platform-migrate" - failed. -- 010713d0:3: Symmetric Unit Key decrypt failure - decrypt failure

The error message is misleading as the issue is unrelated to master key decryption.

Conditions:
-- Loading a UCS archive from a different BIG-IP.
-- The UCS archive does not contain a ".unitkey" file.
-- The target system does have the correct master key value configured.
-- There is some other MCPD validation issue in the configuration.

Impact:
Platform migration fails with a misleading error message.

Workaround:
Once the issue has happened, you can either:

- Examine the LTM log file for other error messages from MCPD and then correct the configuration issue(s).

OR:

- Re-start MCPD.

For more information, refer K36822000.


1014633 : Transparent / gateway monitors may fail if there is no route to a node

Links to More Info: BT1014633

Component: Local Traffic Manager

Symptoms:
Transparent or gateway UDP monitors may fail.

Conditions:
-- Transparent or gateway monitor configured.
-- Route does not exist to destination.

Impact:
The UDP monitor fails and the node / pool member is marked unavailable.

Workaround:
Add a route to the destination.


1002345-8 : Transparent monitor does not work after upgrade

Links to More Info: BT1002345

Component: In-tmm monitors

Symptoms:
Pool state changes from up to down following an upgrade.

Conditions:
A transparent monitor is configured to use the loopback address.
You are using BIG-IP Virtual Edition with a TAP interface handling linux host traffic.

Impact:
The pool is marked down.

Workaround:
None




This issue may cause the configuration to fail to load or may significantly impact system performance after upgrade


*********************** NOTICE ***********************

For additional support resources and technical documentation, see:
******************************************************