F5 Product Development has assigned IDs 1033837, 1051561, and 1052837 (BIG-IP) to this vulnerability. This issue has been classified as CWE-306: Missing Authentication for Critical Function.
To determine if your product and version have been evaluated for this vulnerability, refer to the Applies to (see versions) box. To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases, point releases, or hotfixes that address the vulnerability, refer to the following table. For more information about security advisory versioning, refer to K51812227: Understanding security advisory versioning.
Note: After a fix is introduced for a given minor branch, that fix applies to all subsequent maintenance and point releases for that branch, and no additional fixes for that branch will be listed in the table. For example, when a fix is introduced in 18.104.22.168, the fix also applies to 22.214.171.124, and all later 14.1.x releases (14.1.3.x., 14.1.4.x). For more information, refer to K51812227: Understanding security advisory versioning. Additionally, software versions preceding those listed in the Applies to (see versions) box of this article have reached the End of Technical Support (EoTS) phase of their lifecycle and are no longer evaluated for security issues. For more information, refer to the Security hotfixes section of K4602: Overview of the F5 security vulnerability response policy.
|Product||Branch||Versions known to be vulnerable1||Fixes introduced in3||Severity||CVSSv3 score2||Vulnerable component or feature|
|BIG-IP (all modules)||17.x||None||17.0.0||Critical||9.8||iControl REST|
|16.x||16.1.0 - 16.1.2||126.96.36.199|
|15.x||15.1.0 - 15.1.5||188.8.131.52|
|14.x||14.1.0 - 14.1.4||184.108.40.206|
|13.x||13.1.0 - 13.1.4||13.1.5|
|12.x||12.1.0 - 12.1.6||Will not fix|
|11.x||11.6.1 - 11.6.5||Will not fix|
|BIG-IQ Centralized Management||8.x||None||Not applicable||Not vulnerable||None||None|
|F5OS-A||1.x||None||Not applicable||Not vulnerable||None||None|
|F5OS-C||1.x||None||Not applicable||Not vulnerable||None||None|
|Traffix SDC||5.x||None||Not applicable||Not vulnerable||None||None|
1F5 evaluates only software versions that have not yet reached the End of Technical Support (EoTS) phase of their lifecycle.
2The CVSSv3 score link takes you to a resource outside of AskF5, and it is possible that the document may be removed without our knowledge.
3If your Public Cloud provider's marketplace does not have the Fixes introduced in images, you can upgrade your existing public cloud BIG-IP deployment via the traditional live install process. For information about upgrading or updating your BIG-IP deployment, refer to the BIG-IP update and upgrade guide. For cases where new images are required, you can create a custom image using the fixed version. For information about creating a custom image for Public Cloud, refer to K18908626: Creating Custom Images for Public Cloud.