First published: Fri Feb 12 2021(Updated: )
On BIG-IP version 16.0.x before 16.0.1, 15.1.x before 15.1.1, 14.1.x before 14.1.2.8, 13.1.x before 13.1.3.5, and all 12.1.x versions, a reflected Cross-Site Scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility when Fraud Protection Service is provisioned and allows an attacker to execute JavaScript in the context of the current logged-in user. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Access Policy Manager | >=12.1.0<=12.1.5 | |
F5 BIG-IP Access Policy Manager | >=13.1.0<13.1.3.5 | |
F5 BIG-IP Access Policy Manager | >=14.1.0<14.1.2.8 | |
F5 BIG-IP Access Policy Manager | >=15.1.0<15.1.1 | |
F5 BIG-IP Access Policy Manager | >=16.0.0<16.0.1 | |
F5 BIG-IP Advanced Firewall Manager | >=12.1.0<=12.1.5 | |
F5 BIG-IP Advanced Firewall Manager | >=13.1.0<13.1.3.5 | |
F5 BIG-IP Advanced Firewall Manager | >=14.1.0<14.1.2.8 | |
F5 BIG-IP Advanced Firewall Manager | >=15.1.0<15.1.1 | |
F5 BIG-IP Advanced Firewall Manager | >=16.0.0<16.0.1 | |
F5 BIG-IP Advanced Web Application Firewall | >=12.1.0<=12.1.5 | |
F5 BIG-IP Advanced Web Application Firewall | >=13.1.0<13.1.3.5 | |
F5 BIG-IP Advanced Web Application Firewall | >=14.1.0<14.1.2.8 | |
F5 BIG-IP Advanced Web Application Firewall | >=15.1.0<15.1.1 | |
F5 BIG-IP Advanced Web Application Firewall | >=16.0.0<16.0.1 | |
F5 BIG-IP Analytics | >=12.1.0<=12.1.5 | |
F5 BIG-IP Analytics | >=13.1.0<13.1.3.5 | |
F5 BIG-IP Analytics | >=14.1.0<14.1.2.8 | |
F5 BIG-IP Analytics | >=15.1.0<15.1.1 | |
F5 BIG-IP Analytics | >=16.0.0<16.0.1 | |
f5 big-ip application acceleration manager | >=12.1.0<=12.1.5 | |
f5 big-ip application acceleration manager | >=13.1.0<13.1.3.5 | |
f5 big-ip application acceleration manager | >=14.1.0<14.1.2.8 | |
f5 big-ip application acceleration manager | >=15.1.0<15.1.1 | |
f5 big-ip application acceleration manager | >=16.0.0<16.0.1 | |
F5 BIG-IP Application Security Manager | >=12.1.0<=12.1.5 | |
F5 BIG-IP Application Security Manager | >=13.1.0<13.1.3.5 | |
F5 BIG-IP Application Security Manager | >=14.1.0<14.1.2.8 | |
F5 BIG-IP Application Security Manager | >=15.1.0<15.1.1 | |
F5 BIG-IP Application Security Manager | >=16.0.0<16.0.1 | |
F5 BIG-IP DDoS Hybrid Defender | >=12.1.0<=12.1.5 | |
F5 BIG-IP DDoS Hybrid Defender | >=13.1.0<13.1.3.5 | |
F5 BIG-IP DDoS Hybrid Defender | >=14.1.0<14.1.2.8 | |
F5 BIG-IP DDoS Hybrid Defender | >=15.1.0<15.1.1 | |
F5 BIG-IP DDoS Hybrid Defender | >=16.0.0<16.0.1 | |
f5 big-ip domain name system | >=12.1.0<=12.1.5 | |
f5 big-ip domain name system | >=13.1.0<13.1.3.5 | |
f5 big-ip domain name system | >=14.1.0<14.1.2.8 | |
f5 big-ip domain name system | >=15.1.0<15.1.1 | |
f5 big-ip domain name system | >=16.0.0<16.0.1 | |
f5 big-ip fraud protection service | >=12.1.0<=12.1.5 | |
f5 big-ip fraud protection service | >=13.1.0<13.1.3.5 | |
f5 big-ip fraud protection service | >=14.1.0<14.1.2.8 | |
f5 big-ip fraud protection service | >=15.1.0<15.1.1 | |
f5 big-ip fraud protection service | >=16.0.0<16.0.1 | |
F5 BIG-IP Global Traffic Manager | >=12.1.0<=12.1.5 | |
F5 BIG-IP Global Traffic Manager | >=13.1.0<13.1.3.5 | |
F5 BIG-IP Global Traffic Manager | >=14.1.0<14.1.2.8 | |
F5 BIG-IP Global Traffic Manager | >=15.1.0<15.1.1 | |
F5 BIG-IP Global Traffic Manager | >=16.0.0<16.0.1 | |
f5 big-ip link controller | >=12.1.0<=12.1.5 | |
f5 big-ip link controller | >=13.1.0<13.1.3.5 | |
f5 big-ip link controller | >=14.1.0<14.1.2.8 | |
f5 big-ip link controller | >=15.1.0<15.1.1 | |
f5 big-ip link controller | >=16.0.0<16.0.1 | |
F5 BIG-IP Local Traffic Manager | >=12.1.0<=12.1.5 | |
F5 BIG-IP Local Traffic Manager | >=13.1.0<13.1.3.5 | |
F5 BIG-IP Local Traffic Manager | >=14.1.0<14.1.2.8 | |
F5 BIG-IP Local Traffic Manager | >=15.1.0<15.1.1 | |
F5 BIG-IP Local Traffic Manager | >=16.0.0<16.0.1 | |
F5 BIG-IP Policy Enforcement Manager | >=12.1.0<=12.1.5 | |
F5 BIG-IP Policy Enforcement Manager | >=13.1.0<13.1.3.5 | |
F5 BIG-IP Policy Enforcement Manager | >=14.1.0<14.1.2.8 | |
F5 BIG-IP Policy Enforcement Manager | >=15.1.0<15.1.1 | |
F5 BIG-IP Policy Enforcement Manager | >=16.0.0<16.0.1 | |
F5 BIG-IP SSL Orchestrator | >=12.1.0<=12.1.5 | |
F5 BIG-IP SSL Orchestrator | >=13.1.0<13.1.3.5 | |
F5 BIG-IP SSL Orchestrator | >=14.1.0<14.1.2.8 | |
F5 BIG-IP SSL Orchestrator | >=15.1.0<15.1.1 | |
F5 BIG-IP SSL Orchestrator | >=16.0.0<16.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22979 is classified as a reflected Cross-Site Scripting (XSS) vulnerability.
To fix CVE-2021-22979, upgrade F5 BIG-IP software to the versions specified in the security advisory to mitigate the vulnerability.
CVE-2021-22979 affects BIG-IP versions 16.0.x before 16.0.1, 15.1.x before 15.1.1, 14.1.x before 14.1.2.8, 13.1.x before 13.1.3.5, and all 12.1.x versions.
Products impacted by CVE-2021-22979 include F5 BIG-IP Access Policy Manager, Advanced Firewall Manager, Application Security Manager, and others depending on the version.
Currently, the recommendation is to update to the latest versions, as no specific workaround is provided for CVE-2021-22979.