Our Qualys vulnerability scans are detecting numerous vulnerabilities on the self and floating IP addresses used by our F5 BIG-IP LTMs. Of the 25 vulnerabilities
16 due to OpenSSH CVEs (which require 10.0p2 to mitigate all 16).
2 due to BIND CVEs (which require 9.20 to mitigate)
4 due to certificate issues (which we can fix by using a trusted CA-issued cert and not self-signed)
3 due to crypto settings that are deprecated (which we can fix by disabling TLS 1.1, CBC ciphers, SHA1 in our key exchanges, key host algorithms, and MACs.
Anyone else have similar findings using your VMDR of choice (Qualys, Tennable, Rapid7). We are on 17.1.2 and noticed 17.5.0 only fixes five of the 25 (due to an OpenSSH upgrade).
F5 BIG-IP LTM vulnerabilities
Moderator: mike
-
- Posts: 1
- Joined: Tue May 06, 2025 2:08 am
-
- Posts: 358
- Joined: Thu Mar 29, 2018 4:19 pm
Re: F5 BIG-IP LTM vulnerabilities
you should check with F5 on that.