First published: Wed May 03 2023(Updated: )
In the pre connection stage, an improper enforcement of message integrity vulnerability exists in BIG-IP Edge Client for Windows and Mac OS.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP (APM) | >=17.0.0<=17.1.0=3 | 17.1.0.2 |
F5 BIG-IP (APM) | >=16.1.0<=16.1.3=3 | 16.1.3.5 |
F5 BIG-IP (APM) | >=15.1.0<=15.1.8=3 | 15.1.9 |
F5 BIG-IP (APM) | >=14.1.0<=14.1.5=3 | 14.1.5.5 |
F5 BIG-IP (APM) | >=13.1.0<=13.1.5=3 | |
F5 BIG-IP APM Clients | >=7.2.2<=7.2.4 | 7.2.4.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of F5-K000132522 is categorized as high due to potential exploitation of improper message integrity enforcement.
To fix F5-K000132522, update the affected BIG-IP Edge Client to the recommended versions specified in the advisory.
F5-K000132522 affects various versions of F5 BIG-IP (APM) and BIG-IP APM Clients.
The vulnerable versions of F5 BIG-IP (APM) range from 13.1.0 to 17.1.0, excluding patched versions.
There is no specific workaround for F5-K000132522; applying the recommended software updates is the advised action.