Description
On versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2, 14.1.x before 14.1.3.1, 13.1.x before 13.1.3.5, and 12.1.x before 12.1.5.3, when the BIG-IP ASM/Advanced WAF system processes WebSocket requests with JSON payloads using the default JSON Content Profile in the ASM Security Policy, the BIG-IP ASM bd process may produce a core file. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-10128 | On versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2, 14.1.x before 14.1.3.1, 13.1.x before 13.1.3.5, and 12.1.x before 12.1.5.3, when the BIG-IP ASM/Advanced WAF system processes WebSocket requests with JSON payloads using the default JSON Content Profile in the ASM Security Policy, the BIG-IP ASM bd process may produce a core file. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
References
| Link | Providers |
|---|---|
| https://support.f5.com/csp/article/K18570111 |
|
History
No history.
Status: PUBLISHED
Assigner: f5
Published:
Updated: 2024-08-03T18:58:26.361Z
Reserved: 2021-01-06T00:00:00.000Z
Link: CVE-2021-23010
No data.
Status : Modified
Published: 2021-05-10T15:15:07.397
Modified: 2024-11-21T05:51:08.720
Link: CVE-2021-23010
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD