First published: Fri Feb 12 2021(Updated: )
On BIG-IP Advanced WAF and ASM version 15.1.x before 15.1.0.2, 15.0.x before 15.0.1.4, 14.1.x before 14.1.2.5, 13.1.x before 13.1.3.4, 12.1.x before 12.1.5.2, and 11.6.x before 11.6.5.2, when receiving a unauthenticated client request with a maliciously crafted URI, a BIG-IP Advanced WAF or ASM virtual server configured with a DoS profile with Proactive Bot Defense (versions prior to 14.1.0), or a Bot Defense profile (versions 14.1.0 and later), may subject clients and web servers to Open Redirection attacks. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Advanced WAF/ASM | >=11.6.1<11.6.5.2 | |
F5 BIG-IP Advanced WAF/ASM | >=12.1.0<12.1.5.2 | |
F5 BIG-IP Advanced WAF/ASM | >=13.1.0<13.1.3.4 | |
F5 BIG-IP Advanced WAF/ASM | >=14.1.0<14.1.2.5 | |
F5 BIG-IP Advanced WAF/ASM | >=15.0.0<15.0.1.4 | |
F5 BIG-IP Advanced WAF/ASM | >=15.1.0<15.1.0.2 | |
F5 Application Security Manager | >=11.6.1<11.6.5.2 | |
F5 Application Security Manager | >=12.1.0<12.1.5.2 | |
F5 Application Security Manager | >=13.1.0<13.1.3.4 | |
F5 Application Security Manager | >=14.1.0<14.1.2.5 | |
F5 Application Security Manager | >=15.0.0<15.0.1.4 | |
F5 Application Security Manager | >=15.1.0<15.1.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22984 is rated as critical due to its potential to allow unauthorized access via crafted requests.
To fix CVE-2021-22984, upgrade your F5 BIG-IP Advanced WAF or ASM to a patched version as specified in the advisory.
CVE-2021-22984 affects multiple versions including those prior to 15.1.0.2, 15.0.1.4, and several others listed in the CVE details.
The impact of CVE-2021-22984 includes the potential for attackers to bypass security measures through specially crafted requests.
No official workaround is provided for CVE-2021-22984; upgrading to a secure version is the recommended action.