F5 Networks BIG-IP : BIG-IP Advanced WAF/ASM, BIG-IP Next WAF, and NGINX App Protect WAF attack signature check failure (K000138898)

high Nessus Plugin ID 197193

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

The version of F5 Networks BIG-IP installed on the remote host is prior to 15.1.10.4 / 16.1.4.3 / 17.1.1.3. It is, therefore, affected by a vulnerability as referenced in the K000138898 advisory.

BIG-IP Advanced WAF/ASM, BIG-IP Next WAF, or NGINX App Protect WAF may fail to match an attack signature.This issue occurs when all of the following conditions are met:The affected security policy has a large number of attack signatures enabled (for example, all or most F5 provided signatures).A number of custom attack signatures is created and enabled on the affected security policy.

Tenable has extracted the preceding description block directly from the F5 Networks BIG-IP security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to one of the non-vulnerable versions listed in the F5 Solution K000138898.

See Also

https://my.f5.com/manage/s/article/K000138898

Plugin Details

Severity: High

ID: 197193

File Name: f5_bigip_SOL000138898.nasl

Version: 1.1

Type: local

Published: 5/16/2024

Updated: 5/27/2024

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Vulnerability Information

CPE: cpe:/h:f5:big-ip, cpe:/a:f5:big-ip_application_security_manager

Required KB Items: Host/local_checks_enabled, Settings/ParanoidReport, Host/BIG-IP/hotfix, Host/BIG-IP/modules, Host/BIG-IP/version

Exploit Ease: No known exploits are available

Patch Publication Date: 5/8/2024

Vulnerability Publication Date: 5/8/2024