Diagnostics 2
Diagnostics 2
GCGRF5DMZ1.cnb.caymannational.com
CRITICAL
D000137353 BIG-IP TMUI Unauthenticated Remote Code Execution vulnerability Fixes Introduced In
K000137353 Undisclosed requests may bypass TMUI authentication. 15.1.10.3
16.1.4.2
17.1.1.1
HIGH
D000137365 BIG-IP TMUI authenticated SQL injection vulnerability CVE-2023-46748 Fixes Introduced In
K000137365 An authenticated SQL injection vulnerability exists in the BIG-IP Configuration utility. 15.1.10.3
16.1.4.2
17.1.1.1
D21800102 HTTP RFC enforcement is bypassed when a redirect iRule is applied to Fixes Introduced In
K21800102 A specifically crafted HTTP request may bypass BIG-IP HTTP RFC enforcement and may lead the BIG-IP 15.1.9
system to pass malformed HTTP requests to a target pool member web server. 16.1.4
17.1.0
HIGH
D75431121 BIG-IP APM OAuth Bearer with SSO does not process HTTP headers as Fixes Introduced In
K75431121 BIG-IP APM OAuth Bearer Single Sign-On (SSO) may forward HTTP headers as-is without the expected 15.1.9
processing when Bearer SSO is configured, API Protection profile is in use, and OAuth token failure 16.1.4
occurs
17.1.0
H00602225 BIG-IP Advanced WAF and ASM vulnerability CVE-2021-23028 Fixes Introduced In
K00602225 Traffic is disrupted while the bd process restarts. This vulnerability allows a remote attacker to cause a 13.1.4
denial of service (DoS) on the BIG-IP system. There is no control plane exposure, this is a data plane 14.1.4.2
issue only.
15.1.3.1
16.0.1.2
16.1.0
H03442392 BIG-IP ASM & Advanced WAF vulnerability CVE-2022-26890 Fixes Introduced In
K03442392 When ASM or Advanced WAF, as well as APM, are configured on a virtual server, the ASM policy is 13.1.5
configured with Session Awareness, and the "Use APM Username and Session ID" option is enabled, 14.1.4.6
undisclosed requests can cause the bd process to terminate.
15.1.5
16.1.2.1
17.0.0
HIGH
H11830089 BIG-IP Advanced WAF and ASM iControl REST vulnerability CVE-2022- Fixes Introduced In
K11830089 When the F5 BIG-IP Advanced WAF or BIG-IP ASM module is provisioned, an authenticated remote code 13.1.5.1
execution vulnerability exists in the BIG-IP iControl REST interface. 14.1.5.1
15.1.6.1
16.1.3.1
17.0.0
HIGH
H17542533 BIG-IP Advanced WAF and ASM vulnerability CVE-2023-23552 Fixes Introduced In
K17542533 When a BIG-IP Advanced WAF or BIG-IP ASM security policy is configured on a virtual server, 14.1.5.3
undisclosed requests can cause an increase in memory resource utilization 15.1.8
16.1.3.3
17.0.0.2
17.1.0
HIGH
HIGH
causing an authenticated user to submit malicious HTML or JavaScript code in the BIG-IP Configuration 16.1.0
utility. If successful, an attacker can run JavaScript in the context of the currently logged-in user. In the
case of an administrative user with access to the Advanced Shell (bash), an attacker can leverage
successful exploitation of this vulnerability to compromise the BIG-IP system.
H30150004 The BIG-IP Advanced WAF/ASM attack signature check may fail to Fixes Introduced In
K30150004 The BIG-IP Advanced Web Application Firewall (WAF) and ASM attack signature check may fail to detect 13.1.4.1
and block malicious request containing certain decimal-coded characters. 14.1.4.2
15.1.3.1
16.0.1.2
16.1.0
H30291321 Advanced WAF and BIG-IP ASM attack signature check may fail to Fixes Introduced In
K30291321 The F5 Advanced Web Application Firewall (WAF) and BIG-IP ASM attack signature check may fail to 11.6.5.3
detect and block illegal requests. This issue occurs when the affected policy is configured as case 12.1.6
insensitive (the Policy is case sensitive setting is disabled); one of the words from the attack signature
matches that of the parameter name; the word from the attack signature is case sensitive; it does not
13.1.4.1
have the nocase modifier in the signature. 14.1.4.2
15.1.2.1
16.0.1.2
16.1.0
H30911244 BIG-IP Advanced WAF/ASM and NGINX App Protect attack signature Fixes Introduced In
K30911244 The BIG-IP Advanced WAF/ASM and NGINX App Protect attack signature check may fail to detect and 14.1.4.5
block certain HTTP requests when some signatures are disabled on security policy and wildcard header. 15.1.4.1
The attack signature check fails to detect and block such requests as expected of a security policy.
16.1.2
The following clientssl profiles are used by at least one virtual server:
H33552735 BIG-IP Edge Client for Windows vulnerability CVE-2022-29263 Fixes Introduced In
K33552735 The BIG-IP Edge Client Component Installer Service does not use best practice while saving temporary 13.1.5
files. 14.1.4.6
15.1.5.1
16.1.2.2
17.0.0
HIGH
H39002226 F5 Advanced WAF and BIG-IP ASM multipart request security Fixes Introduced In
K39002226 Under certain conditions, the F5 Advanced Web Application Firewall (Advanced WAF) and BIG-IP ASM 13.1.5
systems may not correctly detect attack signatures. This issue occurs when the Advanced WAF or BIG- 14.1.4.6
IP ASM received a client request containing a specially-crafted multipart body.
15.1.5.1
16.1.2.2
17.0.0
H41503304 Advanced WAF and ASM and Nginx App Protect Attack Signature Fixes Introduced In
K41503304 The BIG-IP Advanced WAF/ASM and Nginx App Protect systems attack signature check may fail to 13.1.4.1
match attack signature 200000128 as expected for certain undisclosed requests. This issue occurs when 14.1.4.4
BIG-IP Advanced WAF or BIG-IP ASM modules or Nginx App Protect is configured and an attack
signature 200000128 is enabled on the policy.
15.1.4
16.0.1.2
16.1.1
HIGH
H48321015 The BIG-IP Advanced WAF and ASM systems may fail to correctly Fixes Introduced In
K48321015 The BIG-IP Advanced WAF and ASM systems may fail to correctly enforce HTML form login pages when 11.6.5.3
the request contains an incorrectly formatted parameter. This issue occurs when the security policy 12.1.6
includes a configuration that enables brute force protection for the HTML form login page.
13.1.4
14.1.4.1
15.1.3
16.0.1.2
16.1.0
H49237345 BIG-IP Advanced WAF, ASM, and NGINX App Protect Fixes Introduced In
K49237345 F5 BIG-IP Advanced WAF, BIG-IP ASM, and NGINX App Protect WAF incorrectly handle certain requests. 13.1.5
This issue occurs when .Advanced WAF, BIG-IP ASM, or NGINX App Protect WAF handles a malicious 14.1.4.6
request with XML content type and XML request body.
15.1.5.1
16.1.2.2
17.0.0
H49549213 Advanced WAF and BIG-IP ASM brute force mitigation may fail when Fixes Introduced In
K49549213 F5 Advanced Web Application Firewall (WAF) and BIG-IP ASM brute force mitigation may fail. This issue 13.1.4.1
occurs when all of the following ca security policy is configured with a login page using basic 14.1.4.2
authentication as its authentication type and the Advanced WAF and BIG-IP ASM systems received a
specially crafted request for the login page.
15.1.3
16.0.1.2
16.1.0
This Advanced WAF and BIG-IP ASM system may fail to stop brute force attacks on the protected login page.
H54460845 BIG-IP Edge Client for Windows vulnerability CVE-2022-28714 Fixes Introduced In
K54460845 A DLL Hijacking vulnerability exists in the BIG-IP Edge Client Windows Installer. 13.1.5
14.1.4.6
15.1.5.1
16.1.2.2
HIGH
17.0.0
H56412001 BIG-IP SSL OCSP Authentication profile vulnerability CVE-2023-22323 Fixes Introduced In
K56412001 When OCSP authentication profile is configured on a virtual server, undisclosed requests can cause an 14.1.5.3
increase in CPU resource utilization 15.1.8.1
16.1.3.3
17.0.0.2
17.1.0
You are running BIG-IP Application Security Manager (ASM). If you are running BIG-IP ASM Risk Engine, you are vulnerable to this
issue.
H67397230 BIG-IP ASM, Advanced WAF, and NGINX App Protect normalizing Fixes Introduced In
K67397230 The BIG-IP ASM, F5 Advanced Web Application Firewall (Advanced WAF), and NGINX App Protect 14.1.4.6
systems incorrectly normalize certain strings. 15.1.5
16.1.2.1
17.0.0
H70134152 BIG-IP ASM, F5 Advanced WAF, and NGINX App Protect encoded Fixes Introduced In
K70134152 The BIG-IP ASM, F5 Advanced Web Application Firewall (Advanced WAF), and NGINX App Protect 13.1.5
systems may fail to detect encoded directory traversal in the URL. This issue occurs when the affected 14.1.4.4
security policy is enabled with an evasion technique detected violation (enabled by default).
15.1.4
16.1.1
17.0.0
HIGH
H709036 SSL certificates are expired, about to expire, or are not yet valid Fixes Introduced In
K8187 SSL certificates have specific date ranges that identify when they are valid. The following output lists
K15664 expired, nearly expired, and not yet valid certificates, grouped by their status and whether they are in
use by a BIG-IP traffic object. Please note that in qkview files generated on BIG-IP 11.x systems, this
diagnostic does not calculate whether SSL certificates are not yet valid.
Expired SSL certificate associated with one or more profiles, but not in use by any virtual servers:
SSL certificate '/Common/cert_3dstest-2022' has the expiration date Aug 15 23:59:59 2022 GMT
SSL certificate '/Common/connect-external' has the expiration date Nov 11 23:59:59 2022 GMT
SSL certificate '/config/ssl/ssl.crt/ca-bundle.crt' has the expiration date Thu Dec 8 11:10:28 2022
SSL certificate '/Common/OnlinepreprodFDA' has the expiration date Oct 17 23:59:59 2023 GMT
SSL certificate '/Common/ActiveSync' has the expiration date Aug 30 23:59:59 2023 GMT
HIGH
H727910 The configuration contains user accounts with insecure passwords Fixes Introduced In
K11719 The passwords for the accounts listed below are either default passwords or commonly used
passwords, and are susceptible to compromise.
MEDIUM
D06110200 BIG-IP and BIG-IQ TACACS+ audit log vulnerability CVE-2023-43485 Fixes Introduced In
K06110200 When TACACS+ audit forwarding is configured on a BIG-IP or BIG-IQ system, shared secret is logged in 15.1.9
plaintext in the audit log. 16.1.4
17.1.0
If TACACS+ audit forwarding is configured, this system is affected by this vulnerability.
MEDIUM
D061719 Guided video demonstrations and free training for upgrading BIG-IP Fixes Introduced In
K41125752 Using the latest versions of BIG-IP software ensures that you have access to the most advanced
capabilities, the highest quality software, and the most secure releases. F5 recommends implementing
BIG-IP 14.1.x for BIG-IP appliances and BIG-IP 15.1.x for BIG-IP VEs, at a minimum.
D064237-1 The system experiences high CPU usage caused by the restjavad Fixes Introduced In
The restjavad process may become unstable if the amount of memory required by the process exceeds
the value allocated for its use. Overall system performance is degraded during the continuous restart of
the restjavad process due to relatively high CPU usage.
D98606833 BIG-IP and BIG-IQ secure copy vulnerability CVE-2024-21782 Fixes Introduced In
K98606833 BIG-IP or BIG-IQ Resource Administrators and Certificate Managers who have access to the secure copy 15.1.9
(scp) utility but do not have access to Advanced Shell (bash) can execute arbitrary commands with a 16.1.4
specially crafted command string. This vulnerability is due to an incomplete fix for CVE-2020-5873.
17.1.1
H000133472 BIG-IP and BIG-IQ iControl SOAP vulnerability CVE-2023-38419 Fixes Introduced In
K000133472 An authenticated attacker with guest privileges or higher can cause the iControl SOAP process to 14.1.5.5
terminate by sending undisclosed requests. 15.1.9.1
MEDIUM
16.1.3.5
17.1.0.2
H08152433 Intel processors MMIO stale data vulnerability CVE-2022-21166 Fixes Introduced In
K08152433 Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow
an authenticated user to potentially enable information disclosure via local access.
H08402414 BIG-IP ASM and Advanced WAF REST API endpoint vulnerability CVE- Fixes Introduced In
K08402414 An authenticated user with low privileges, such as a guest, can upload data using an undisclosed REST 14.1.4.5
endpoint causing an increase in disk resource utilization. 15.1.4.1
16.1.2
This heuristic does not check for a workaround.
MEDIUM
MEDIUM
it), then the response sent could be interpreted by the intermediary as HTTP/1 headers. This could be
used to poison the cache if the server allowed the origin client to generate arbitrary content in the
response.
H22505850 BIG-IP and BIG-IQ iControl REST vulnerability CVE-2022-41770 Fixes Introduced In
K22505850 An authenticated iControl REST user can cause an increase in memory resource utilization, via 14.1.5.1
undisclosed requests. 15.1.7
16.1.3.1
17.0.0.1
MEDIUM
encoding; and - Tomcat did not ensure that, if present, the chunked encoding was the final encoding.
MEDIUM
16.1.2.2
17.0.0
The service check date is 03/23/21, which is about 35 months old at the time this qkview was created. To download updated attack
signatures, the BIG-IP ASM system requires that the Service Check Date be no older than 18 months.
MEDIUM
H50310001 BIG-IP and BIG-IQ iControl SOAP vulnerability CVE-2022-34851 Fixes Introduced In
K50310001 An authenticated attacker may cause iControl SOAP to become unavailable through undisclosed 14.1.5.1
requests. 15.1.6.1
16.1.3.1
17.0.0.1
H53197140 BIG-IP iControl REST and tmsh vulnerabilities CVE-2022-26835 Fixes Introduced In
K53197140 Directory traversal vulnerabilities exist in undisclosed iControl REST endpoints and TMOS shell (tmsh) 13.1.5
commands in BIG-IP Guided Configuration (GC) which may allow an authenticated attacker with at least 14.1.4.6
resource administrator role privileges to read arbitrary files.
15.1.5.1
16.1.2.2
17.0.0
MEDIUM
H53593534 BIG-IP ASM and F5 Advanced WAF attack signature check failure on Fixes Introduced In
K53593534 The BIG-IP ASM and F5 Advanced Web Application Firewall (Advanced WAF) attack signature check may 13.1.5
fail to detect and block certain HTTP requests. 14.1.4.6
15.1.5.1
16.1.2.2
17.0.0
H57110035 BIG-IP APM edge client for windows logging vulnerability CVE-2022- Fixes Introduced In
K57110035 BIG-IP Edge Client may log APM session related information when VPN is launched on a Windows 13.1.5
system. 14.1.4.6
15.1.5.1
16.1.2.2
17.0.0
MEDIUM
MEDIUM
H67830124 Linux kernel ext3/ext4 file system vulnerability CVE-2020-14314 Fixes Introduced In
K67830124 A memory out-of-bounds read flaw was found in the Linux kernel's ext3/ext4 file systemin the way it
accesses a directory with broken indexing. This flaw allows a local user to crash the system if the
directory exists. The highest threat from this vulnerability is to system availability.
When a configuration that contains secure properties is created and deployed from Access Guided Configuration (AGC), secure
properties are logged in restnoded logs.
This heuristic does not check the BIG-IP (Guided Configuration) version or user permissions. Please check your configuration.
When a configuration that contains secure properties is created and deployed from Access Guided Configuration (AGC), secure
properties are logged in restnoded logs.
This heuristic does not check the BIG-IP (Guided Configuration) version or user permissions. Please check your configuration.
H72540690 BIG-IP high availability state mirroring vulnerability CVE-2020-5884 Fixes Introduced In
K72540690 The default deployment mode for BIG-IP high availability (HA) pair mirroring is insecure. This is a control 16.0.0
plane issue that is exposed only on the network used for mirroring.
H726514 There are not enough NTP servers either configured or reliably Fixes Introduced In
K3122 F5 recommends that you configure at least three external NTP servers. If fewer than three Network Time
K10240 Protocol (NTP) servers are reachable, the system will not be able to reliably detect incorrect time
sources.
The BIG-IP system is not configured to use enough Network Time Protocol servers.
Please confirm that unused objects are not being indirectly linked to other configuration objects via iRules/scripts before deleting
them from the system.
Please confirm that unused objects are not being indirectly linked to other configuration objects via data groups
MEDIUM
The following SSL certificates are not currently in use by a virtual server: '/Common/cert_3dstest-2022', '/Common/default.crt',
'/Common/connect-external', '/Common/ca-bundle.crt', '/Common/digicert-sha2-ev-inter2023', '/Common/f5-irule.crt', and
'/Common/f5-ca-bundle.crt'
The certificates below are attached to profiles, but the profiles themselves are not used by any virtual servers. It is up to the
administrator to utilize or delete those profiles. It is not advisable to delete default certificates and profiles, and profiles that are
referenced by iRules. Carefully review the configuration before removing any objects.
H80945213 BIG-IP ASM/Advanced WAF attack signature check failure security Fixes Introduced In
K80945213 A BIG-IP ASM/F5 Advanced Web Application Firewall (Advanced WAF) attack signature check may fail to 13.1.5
detect and block certain GET requests when cross-site request forgery (CSRF) protection is enabled. 14.1.4.4
15.1.4.1
16.1.0
MEDIUM
H830235 Cookie or universal persistence may fail for subsequent requests on Fixes Introduced In
K7964 The BIG-IP system may appear to ignore persistence information for subsequent requests on a Keep-
Alive HTTP connection when cookie or universal persistence is used.
These virtual servers have HTTP profiles and use cookie or universal persistence:
/Common/fda-preprod
/Common/fda-prod
H94142349 BIG-IP Advanced WAF and ASM WebSocket security exposure Fixes Introduced In
K94142349 BIG-IP Advanced WAF and ASM incorrectly handles certain WebSocket requests. This issue occurs 13.1.5
when BIG-IP Advanced WAF or ASM handles a malicious WebSocket message. 14.1.4.6
15.1.5.1
16.1.2.2
17.0.0
MEDIUM
LOW
H23465404 BIG-IP LTM and APM NTLM vulnerability CVE-2022-33968 Fixes Introduced In
K23465404 When an LTM monitor or APM SSO is configured on a virtual server, and NTLM challenge-response is in 14.1.5.1
use, undisclosed traffic can cause a buffer over-read. 15.1.6.1
16.1.3.1
17.0.0.1
The following monitors with username/password set are found on the system:
/Common/fda-prod-web_http
/Common/fda-preprod-app_http
/Common/ActiveSync.app/ActiveSync_as_http_monitor
/Common/https_head_f5
/Common/fda-prod-app_http
/Common/fda-preprod-web_http
/Common/https_443
/Common/http_head_f5
If you did not change default monitor settings, please disregard the results below.
The qkview indicates that the following default monitors with username/password set are found on the system:
/Common/http
/Common/https
For security reasons, a qkview may contain username/password values that are different from the device.
LOW
H380932 Optional modules or features may be configurable but will not Fixes Introduced In
K16538 Modules or features that are listed as optional modules in the BIG-IP license may be configurable;
however, functionality for these modules or features is not active unless the license includes support for
the module.
Advanced Protocols
External Interface and Network HSM
Routing Bundle
SSL, Forward Proxy, 2XXX/i2XXX
H391596 BIG-IP LTM may send requests to unexpected pools for subsequent Fixes Introduced In
K9800 BIG-IP LTM may send requests to unexpected pools for subsequent requests on a Keep-Alive HTTP
K13753 connection because BIG-IP LTM makes a load-balancing decision for only the first request. This
behavior may occur when using either an iRule or an HTTP Class profile that load balances HTTP
requests to multiple pools.
The following virtual servers do not have a OneConnect profile and may send traffic to unexpected pools:
LOW
H444724 The management interface is allowing access from public IP Fixes Introduced In
K7312 The management interface is ether configured to use a public IP address or is allowing public address to
K13309 access the Configuration Utility.
H701182 Non-ASCII characters removed from Qkview XML files Fixes Introduced In
Certain Non-ASCII characters cause parsing issues and prevent a ‘qkview’ file from being
processed by iHealth. These characters are removed at upload time so that the ‘qkview’
file can be viewed in iHealth. This is strictly an issue in the ‘qkview’ file, not the system
the ‘qkview’ file was generated from.
LOW
server deployment of Java. Attackers can exploit this vulnerability through sandboxed Java Web Start
applications and sandboxed Java applets. Attackers can also exploit this vulnerabilityby supplying data
to APIs in the specified component without using sandboxed Java Web Start applications or sandboxed
Java applets, such as through a web service. CVE-2020-14577