Description:
F5 has published security advisories to address multiple vulnerabilities in F5 Products. The details about the vulnerabilities can be found at the following website:
https://my.f5.com/manage/s/article/K00994461
https://my.f5.com/manage/s/article/K000135831
https://my.f5.com/manage/s/article/K000148495
https://my.f5.com/manage/s/article/K000153074
https://my.f5.com/manage/s/article/K000152614
https://my.f5.com/manage/s/article/K11542555
https://my.f5.com/manage/s/article/K000138682
https://my.f5.com/manage/s/article/K32380005
https://my.f5.com/manage/s/article/K78131906
Affected Systems:
- ARX versions 6.2.0 - 6.4.0
- BIG-IP versions 11.2.1 - 11.6.5
- BIG-IP versions 12.1.0 - 12.1.6
- BIG-IP versions 13.0.0 - 13.1.5
- BIG-IP versions 14.0.0 - 14.1.5
- BIG-IP versions 15.0.0 - 15.1.10
- BIG-IP versions 16.0.0 - 16.1.6
- BIG-IP versions 17.0.0 - 17.1.3
- BIG-IP versions 17.5.0 - 17.5.1
- BIG-IP versions 21.0.0
- BIG-IP Next CNF versions 1.1.0 - 1.2.1
- BIG-IP Next SPK versions 1.5.0 - 1.9.1
- BIG-IQ Centralized Management versions 5.0.0 - 5.1.0
- BIG-IQ Centralized Management versions 6.0.0 - 6.1.0
- BIG-IQ Centralized Management versions 7.0.0 - 7.1.0
- BIG-IQ Centralized Management versions 8.0.0 - 8.4.0
- Enterprise Manager versions 3.1.1
- F5OS versions 1.0.0 - 1.2.2
- F5OS-A versions 1.3.0 - 1.3.2
- F5OS-A versions 1.4.0
- F5OS-A versions 1.5.0 - 1.5.3
- F5OS-A versions 1.8.0
- F5OS-C versions 1.5.0 - 1.5.1
- F5OS-C versions 1.6.0 - 1.6.2
- F5OS-C versions 1.8.0 - 1.8.1
- Traffix SDC versions 4.0.5 - 4.4.0
- Traffix SDC versions 5.0.0 - 5.2.0
For detailed information of the affected systems, please refer to the corresponding security advisory at vendor's website.
Impact:
Successful exploitation of the vulnerabilities could lead to denial of service, security restriction bypass or tampering on an affected system.
Recommendation:
Software updates for affected systems are now available. System administrators of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk. It is recommended to consult the product vendors for the fixes and assistance.
More Information:
- https://my.f5.com/manage/s/article/K00994461
- https://my.f5.com/manage/s/article/K000135831
- https://my.f5.com/manage/s/article/K000148495
- https://my.f5.com/manage/s/article/K000153074
- https://my.f5.com/manage/s/article/K000152614
- https://my.f5.com/manage/s/article/K11542555
- https://my.f5.com/manage/s/article/K000138682
- https://my.f5.com/manage/s/article/K32380005
- https://my.f5.com/manage/s/article/K78131906
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1301
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18282
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17507
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25647
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1667
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2283
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32067
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42516
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48976