First published: Wed Feb 22 2023(Updated: )
Prior to Apache HTTP Server 2.4.55, a malicious backend can cause the response headers to be truncated early, resulting in some headers being incorporated into the response body. If the later headers have any security purpose, they will not be interpreted by the client.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP and BIG-IQ Centralized Management | >=17.1.0<=17.1.2 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=16.1.0<=16.1.5 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=15.1.0<=15.1.10 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=14.1.0<=14.1.5 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=13.1.0<=13.1.5 | |
F5 F5OS-A | >=1.3.0<=1.3.2 | |
F5 F5OS-C | >=1.5.0<=1.5.1>=1.3.0<=1.3.2 | |
F5 Traffix Systems Signaling Delivery Controller | =5.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of F5-K000132665 is critical due to the potential exposure of security-related headers.
To fix F5-K000132665, update your system to Apache HTTP Server version 2.4.55 or later.
F5-K000132665 affects versions of F5 BIG-IP, F5OS-A, F5OS-C, and Traffix SDC before specific versions as detailed in the advisory.
The risks associated with F5-K000132665 include possible exposure of critical security headers in the response body to clients, compromising security.
You can identify if you are affected by F5-K000132665 by checking the version of Apache HTTP Server and associated F5 products in use.