On BIG-IP versions 13.1.3.4-13.1.3.6 and 12.1.5.2, if the tmm.http.rfc.enforcement BigDB key is enabled in a BIG-IP system, or the Bad host header value is checked in the AFM HTTP security profile associated with a virtual server, in rare instances, a specific sequence of malicious requests may cause TMM to restart. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
f5 big-ip access policy manager 12.1.5.2 |
||
f5 big-ip access policy manager |
||
f5 big-ip advanced firewall manager 12.1.5.2 |
||
f5 big-ip advanced firewall manager |
||
f5 big-ip advanced web application firewall 12.1.5.2 |
||
f5 big-ip advanced web application firewall |
||
f5 big-ip analytics 12.1.5.2 |
||
f5 big-ip analytics |
||
f5 big-ip application acceleration manager 12.1.5.2 |
||
f5 big-ip application acceleration manager |
||
f5 big-ip application security manager 12.1.5.2 |
||
f5 big-ip application security manager |
||
f5 big-ip ddos hybrid defender 12.1.5.2 |
||
f5 big-ip ddos hybrid defender |
||
f5 big-ip domain name system 12.1.5.2 |
||
f5 big-ip domain name system |
||
f5 big-ip fraud protection service 12.1.5.2 |
||
f5 big-ip fraud protection service |
||
f5 big-ip global traffic manager 12.1.5.2 |
||
f5 big-ip global traffic manager |
||
f5 big-ip link controller 12.1.5.2 |
||
f5 big-ip link controller |
||
f5 big-ip local traffic manager 12.1.5.2 |
||
f5 big-ip local traffic manager |
||
f5 big-ip policy enforcement manager 12.1.5.2 |
||
f5 big-ip policy enforcement manager |
||
f5 ssl orchestrator 12.1.5.2 |
||
f5 ssl orchestrator |