First published: Fri Feb 21 2025(Updated: )
inffast.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP and BIG-IQ Centralized Management | >=17.1.0<=17.1.2 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=16.1.0<=16.1.5 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=15.1.0<=15.1.10 | |
F5 Access Policy Manager | >=7.2.4<=7.2.5 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=8.2.0<=8.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of F5-K000149915 is not explicitly stated, but it involves improper pointer arithmetic that could lead to unspecified impacts.
To fix F5-K000149915, you should update your affected F5 software to the recommended patched versions provided by F5.
F5-K000149915 affects several F5 products including BIG-IP versions 15.1.0 to 15.1.10, 16.1.0 to 16.1.5, 17.1.0 to 17.1.2, APM Clients 7.2.4 to 7.2.5, and BIG-IQ Centralized Management 8.2.0 to 8.3.0.
Yes, context-dependent attackers can potentially exploit F5-K000149915 due to improper pointer arithmetic.
The nature of the vulnerability in F5-K000149915 is related to improper pointer arithmetic in the inffast.c component of zlib 1.2.8.