Bug ID 464572: Validation of IP/mask for SNMP allowed-addresses list.

Last Modified: Sep 13, 2023

Affected Product(s):
BIG-IP BIG-IQ, GTM, LTM, TMOS, vCMP(all modules)

Known Affected Versions:
11.2.1, 11.4.0, 11.4.1, 11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.5.4, 11.5.5, 11.5.6, 11.5.7, 11.5.8, 11.5.9, 11.5.10, 11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.6.3.1, 11.6.3.2, 11.6.3.3, 11.6.3.4, 11.6.4, 11.6.5, 11.6.5.1, 11.6.5.2, 11.6.5.3, 12.0.0, 12.0.0 HF1, 12.1.0 HF1, 12.0.0 HF2, 12.1.0 HF2, 12.0.0 HF3, 12.0.0 HF4, 12.1.1 HF1, 12.1.1 HF2, 12.1.2 HF1, 12.1.2 HF2, 12.1.0, 12.1.1, 12.1.2, 12.1.3, 12.1.3.1, 12.1.3.2, 12.1.3.3, 12.1.3.4, 12.1.3.5, 12.1.3.6, 12.1.3.7, 12.1.4, 12.1.4.1, 12.1.5, 12.1.5.1, 12.1.5.2, 12.1.5.3, 12.1.6

Fixed In:
13.0.0

Opened: May 28, 2014

Severity: 3-Major

Symptoms

The GUI option Client Allow List and the TMSH allowed-address property require IP address values. However, the system does not prevent entering a non-IP address value.

Impact

The CLI and GUI do not validate IP/mask for SNMP configurations within the allowed-addresses list.

Conditions

The issue occurs on both BIG-IQ and BIG-IP system, and is always applicable when configuring SNMP allowed-addresses.

Workaround

Double check IP/mask entries for the GUI option Client Allow List and the TMSH allowed-address property.

Fix Information

Address, network address and hostname validation is now performed.

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips