Last Modified: May 29, 2024
Affected Product(s):
BIG-IP Velos
Known Affected Versions:
15.1.0, 15.1.0.1, 15.1.0.2, 15.1.0.3, 15.1.0.4, 15.1.0.5, 15.1.1, 15.1.2, 15.1.2.1, 15.1.3, 15.1.3.1, 15.1.4, 15.1.4.1, 15.1.5, 15.1.5.1, 15.1.6, 15.1.6.1, 15.1.7
Fixed In:
17.1.0, 15.1.8
Opened: Jul 26, 2022 Severity: 3-Major
On hardware platforms, with the default-internal-rate-limit of a device DoS vector being set to a low number, there is no sampled attack message in the log, even when the attack is being detected.
No visibility of the attack after being detected.
- Setting the default-internal-rate-limit of the targeted device DoS vector to a low number. - Detect attack.
Use a higher number for the default-internal-rate-limit of the targeted device DoS vector.
The sampled attack log message is displayed even when a lower number is used for the default-internal-rate-limit value.