First published: Wed Feb 14 2024(Updated: )
When a BIG-IP Advanced WAF or BIG-IP ASM policy with a Request Body Handling option is attached to a virtual server, undisclosed requests can cause the BD process to terminate. The condition results from setting the Request Body Handling option in the Header-Based Content Profile for an Allowed URL with "Apply value and content signatures and detect threat campaigns."
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Advanced Web Application Firewall | =17.1.0 | 17.1.1 |
F5 BIG-IP Advanced Web Application Firewall |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability F5-K000137416 has not been publicly assigned a CVSS score, but it may lead to service disruption if exploited.
To mitigate the effects of F5-K000137416, ensure that your BIG-IP Advanced WAF or ASM is updated to a patched version that addresses this vulnerability.
F5-K000137416 affects BIG-IP Advanced WAF and ASM, particularly version 17.1.0 and potentially earlier versions.
The BD process termination issue described in F5-K000137416 impacts the Request Body Handling option in advanced web application policies.
Currently, specific workarounds for F5-K000137416 are not documented, so users are encouraged to apply available patches as a preventative measure.