Lucene search

K
f5F5F5:K000138898
HistoryMay 08, 2024 - 12:00 a.m.

K000138898 : BIG-IP Advanced WAF/ASM, BIG-IP Next WAF, and NGINX App Protect WAF attack signature check failure

2024-05-0800:00:00
my.f5.com
14
big-ip
waf
nginx
attack signature
security advisory
bypassed signature

7.1 High

AI Score

Confidence

Low

Security Advisory Description

BIG-IP Advanced WAF/ASM, BIG-IP Next WAF, or NGINX App Protect WAF may fail to match an attack signature.

This issue occurs when all of the following conditions are met:

  • The affected security policy has a large number of attack signatures enabled (for example, all or most F5 provided signatures).
  • A number of custom attack signatures is created and enabled on the affected security policy.

Impact

An attacker may be able to bypass the affected attack signature. As a result, the backend servers protected by the BIG-IP Advanced WAF/ASM, BIG-IP Next WAF, or NGINX App Protect WAF may be exposed to a vulnerability due to the bypassed attack signature.

Symptoms

As a result of this issue, you may encounter the following symptom:

  • The backend servers protected by the BIG-IP Advanced WAF/ASM, BIG-IP Next WAF, or NGINX App Protect WAF may be exposed to a vulnerability due to the bypassed attack signature.
VendorProductVersionCPE
f5big\-ip_next20.0.1cpe:2.3:a:f5:big\-ip_next:20.0.1:*:*:*:*:*:*:*
f5big\-ip_next20.0.2cpe:2.3:a:f5:big\-ip_next:20.0.2:*:*:*:*:*:*:*
f5big\-ip_next20.1.0cpe:2.3:a:f5:big\-ip_next:20.1.0:*:*:*:*:*:*:*
f5big\-ip_next20.1.1cpe:2.3:a:f5:big\-ip_next:20.1.1:*:*:*:*:*:*:*
f5big\-ip_next20.2.0cpe:2.3:a:f5:big\-ip_next:20.2.0:*:*:*:*:*:*:*
f5big\-ip_next1.1.0cpe:2.3:a:f5:big\-ip_next:1.1.0:*:*:*:*:*:*:*
f5big\-ip_next1.1.1cpe:2.3:a:f5:big\-ip_next:1.1.1:*:*:*:*:*:*:*
f5big\-ip_next1.2.0cpe:2.3:a:f5:big\-ip_next:1.2.0:*:*:*:*:*:*:*
f5big\-ip_next1.2.1cpe:2.3:a:f5:big\-ip_next:1.2.1:*:*:*:*:*:*:*
f5big\-ip_next1.3.0cpe:2.3:a:f5:big\-ip_next:1.3.0:*:*:*:*:*:*:*
Rows per page:
1-10 of 4221

7.1 High

AI Score

Confidence

Low