First published: Wed Feb 05 2025(Updated: )
A missing integrity check vulnerability exists in BIG-IP APM access policy endpoint inspection that may allow an attacker to bypass endpoint inspection checks for VPN connections initiated through the BIG-IP APM browser network access VPN client for Windows, macOS, and Linux.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Access Policy Manager | >=17.1.0<=17.1.1 | 17.1.2 |
F5 BIG-IP Access Policy Manager | >=16.1.0<=16.1.4 | 16.1.5 |
F5 BIG-IP Access Policy Manager | >=15.1.0<=15.1.10 | - |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
F5-K000139656 is considered a critical vulnerability due to the potential for attackers to bypass endpoint inspection checks.
To fix F5-K000139656, upgrade your BIG-IP APM to versions 17.1.2, 16.1.5, or any appropriate patch released by F5.
F5-K000139656 affects F5 BIG-IP APM versions including 17.1.0 to 17.1.1, 16.1.0 to 16.1.4, and 15.1.0 to 15.1.10.
By exploiting F5-K000139656, an attacker could potentially gain unauthorized access to VPN connections by bypassing security checks.
Currently, there is no official workaround provided for F5-K000139656, making immediate patching essential.