Description:
F5 has published security advisories to address multiple vulnerabilities in F5 Products. The details about the vulnerabilities can be found at the following website:
https://my.f5.com/manage/s/article/K000159076
https://my.f5.com/manage/s/article/K000159824
https://my.f5.com/manage/s/article/K10812540
https://my.f5.com/manage/s/article/K16729408
https://my.f5.com/manage/s/article/K19559038
https://my.f5.com/manage/s/article/K21054458
https://my.f5.com/manage/s/article/K48073202
https://my.f5.com/manage/s/article/K49419538
https://my.f5.com/manage/s/article/K50310001
https://my.f5.com/manage/s/article/K52379673
https://my.f5.com/manage/s/article/K53225395
https://my.f5.com/manage/s/article/K54724312
https://my.f5.com/manage/s/article/K57542514
https://my.f5.com/manage/s/article/K61186963
https://my.f5.com/manage/s/article/K64119434
https://my.f5.com/manage/s/article/K67090077
https://my.f5.com/manage/s/article/K68652018
https://my.f5.com/manage/s/article/K77326807
https://my.f5.com/manage/s/article/K78284681
Affected Systems:
APM Clients versions 7.1.5 - 7.1.9, 7.2.1
BIG-IP (all modules) versions 11.6.1 - 11.6.5, 12.1.0 - 12.1.6, 13.1.0 - 13.1.5, 14.1.0 - 14.1.5, 15.1.0 - 15.1.10, 16.0.0 - 16.1.6, 17.0.0 - 17.1.3, 17.5.0 - 17.5.1, 21.0.0
BIG-IP Advanced WAF/ASM versions 17.1.0 - 17.1.2
BIG-IQ Centralized Management versions 5.2.0 - 5.4.0, 6.0.0 - 6.1.0, 7.0.0 - 7.1.0, 8.0.0 - 8.4.0
Enterprise Manager versions 3.1.1
F5 iWorkflow versions 2.3.0
F5OS versions 1.0.0 - 1.1.4
F5OS-A versions 1.0.0 - 1.0.1, 1.1.0 - 1.1.1, 1.2.0, 1.3.0 - 1.3.2, 1.5.0 - 1.5.4, 1.7.0, 1.8.0 - 1.8.3
F5OS-C versions 1.1.0 - 1.1.4, 1.2.0 - 1.2.2, 1.3.0 - 1.3.2, 1.5.0 - 1.5.1, 1.6.0 - 1.6.4, 1.8.0 - 1.8.2
NGINX Gateway Fabric versions 1.2.0 - 1.6.2, 2.0.0 - 2.4.0
NGINX Ingress Controller versions 3.4.0 - 3.7.2, 4.0.0 - 4.0.1, 5.0.0 - 5.3.2
NGINX Instance Manager versions 2.15.1 - 2.21.0
NGINX Open Source versions 1.3.0 - 1.29.4
NGINX Plus versions R32 - R36 P1
Traffix SDC versions 5.0.0 - 5.1.0, 5.2.0
Impact:
Successful exploitation of the vulnerabilities could lead to remote code execution, denial of service, elevation of privilege, information disclosure, security restriction bypass or tampering on an affected system.
Recommendation:
Software updates for affected systems are now available. System administrators of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk. It is recommended to consult the product vendors for the fixes and assistance.
More Information:
- https://my.f5.com/manage/s/article/K000159076
- https://my.f5.com/manage/s/article/K000159824
- https://my.f5.com/manage/s/article/K10812540
- https://my.f5.com/manage/s/article/K16729408
- https://my.f5.com/manage/s/article/K19559038
- https://my.f5.com/manage/s/article/K21054458
- https://my.f5.com/manage/s/article/K48073202
- https://my.f5.com/manage/s/article/K49419538
- https://my.f5.com/manage/s/article/K50310001
- https://my.f5.com/manage/s/article/K52379673
- https://my.f5.com/manage/s/article/K53225395
- https://my.f5.com/manage/s/article/K54724312
- https://my.f5.com/manage/s/article/K57542514
- https://my.f5.com/manage/s/article/K61186963
- https://my.f5.com/manage/s/article/K64119434
- https://my.f5.com/manage/s/article/K67090077
- https://my.f5.com/manage/s/article/K68652018
- https://my.f5.com/manage/s/article/K77326807
- https://my.f5.com/manage/s/article/K78284681
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4658
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7656
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18551
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9636
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10160
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18197
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20907
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12049
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3672
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22931
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22974
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25219
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22720
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34851
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1642