Bug ID 512001: Using REST API to Update ASM Attack Signatures Fails

Last Modified: Sep 13, 2023

Affected Product(s):
BIG-IP ASM(all modules)

Known Affected Versions:
11.5.1 HF1, 11.5.1 HF2, 11.5.1 HF3, 11.5.1 HF4, 11.5.1 HF5, 11.5.1 HF6, 11.5.1 HF7, 11.5.1 HF8, 11.5.1 HF9, 11.5.1 HF10, 11.5.1 HF11, 11.5.2 HF1, 11.5.3 HF1, 11.5.3 HF2, 11.5.4 HF1, 11.5.4 HF2, 11.5.4 HF3, 11.5.4 HF4, 12.1.0 HF1, 12.1.0 HF2, 12.1.1 HF1, 12.1.1 HF2, 12.1.2 HF1, 12.1.2 HF2

Fixed In:
12.0.0, 11.6.0 HF5

Opened: Mar 12, 2015

Severity: 3-Major

Symptoms

The Attack Signature Update task remains in "STARTED" status.

Impact

REST API cannot be used to trigger an immediate download of new Attack Signatures.

Conditions

ASM REST API is being used with the /mgmt/tm/asm/tasks/update-signatures endpoint.

Workaround

Use scheduled updates or GUI to update Attack Signatures.

Fix Information

REST Update Signatures Task now works correctly.

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips