Your review has been sent successfully

F5 Networks Alert

3264
Classification
These posts contain security alerts, including digital loopholes, electronic attacks, technical updates, and they are classified base on the level of severity.

Critical

High

Medium

Low

Warning Date

Severity Level

Warning Number

Target Sector

21 January, 2020

● Medium

2020-822

All

Description:

F5 Networks has released a clarification to address multiple vulnerabilities in the following products:

  • BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, FPS, GTM, Link Controller, PEM)
    • Hotfix-BIGIP-14.1.2.1.0.83.4-ENG
    • Hotfix-BIGIP-12.1.4.1.0.97.6-ENG
    • Hotfix-BIGIP-11.5.4.2.74.291-HF2
  • BIG-IP (APM)
    • 15.0.0 - 15.1.0
    • 14.0.0 - 14.1.2
    • 13.1.0 - 13.1.3
    • 12.1.0 - 12.1.5
    • 11.5.2 - 11.6.5
  • BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, FPS, GTM, Link Controller, PEM, WebAccelerator)
    • Hotfix-BIGIP-14.1.0.2.0.45.4-ENG2
    • Hotfix-BIGIP-14.1.0.2.0.62.4-ENG2

Threats:

  • Cross-site scripting (XSS).
  • Unable to detect any potential security compromise of the affected systems.
  • notice panic: Assertion "l3hdr set" failed error message in the /var/log/ltm file when TMM produces a core file.

Best practice and Recommendations:

  • BIG-IP (APM)
    • Use BIG-IP APM Access Control Lists (ACLs) to restrict user access to host, port, and URL path combinations (also known as resource items).

For the other versions:

For more details:

Last updated at 21 January, 2020

Rate the content

rate-icon
up icon