On BIG-IP ASM 15.0.0-15.0.1, 14.1.0-14.1.2, 14.0.0-14.0.1, and 13.1.0-13.1.3.1, BIG-IQ 6.0.0 and 5.2.0-5.4.0, iWorkflow 2.3.0, and Enterprise Manager 3.1.1, an attacker with access to the device communication between the BIG-IP ASM Central Policy Builder and the BIG-IQ/Enterprise Manager/F5 iWorkflow will be able to set up the proxy the same way and intercept the traffic.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Big-ip_application_security_manager | F5 | 13.1.0 (including) | 13.1.3.1 (including) |
Big-ip_application_security_manager | F5 | 14.0.0 (including) | 14.0.1 (including) |
Big-ip_application_security_manager | F5 | 14.1.0 (including) | 14.1.2 (including) |
Big-ip_application_security_manager | F5 | 15.0.0 (including) | 15.0.1 (including) |
Big-iq_centralized_management | F5 | 5.2.0 (including) | 5.4.0 (including) |
Big-iq_centralized_management | F5 | 6.0.0 (including) | 6.0.0 (including) |
Enterprise_manager | F5 | 3.1.1 (including) | 3.1.1 (including) |
Iworkflow | F5 | 2.3.0 (including) | 2.3.0 (including) |