Bug ID 577359: Invalid L4 packets might not match against AFM WhiteList properly

Last Modified: Jun 10, 2021

Bug Tracker

Affected Product:  See more info
BIG-IP AFM(all modules)

Known Affected Versions:
12.1.0, 12.1.0 HF1, 12.1.0 HF2, 12.1.1, 12.1.1 HF1, 12.1.1 HF2, 12.1.2, 12.1.2 HF1, 12.1.2 HF2, 12.1.3,,,,,,,, 12.1.4,, 12.1.5,,,, 12.1.6, 13.0.0, 13.0.0 HF1, 13.0.0 HF2, 13.0.0 HF3, 13.0.1, 13.1.0,,,,,,,,, 13.1.1,,,,, 13.1.3,,,,,,, 13.1.4,

Opened: Mar 02, 2016
Severity: 3-Major


If BIG-IP receives invalid L4 packets, they might not match against AFM whitelist properly and hence might detect an attack from a known whitelisted IP address.


The system could detect an attack, even though the packets are coming from a known whitelisted IP address. A false positive on a DoS attack could be triggered. There is no impact to the packet since if the packet is invalid it will be dropped anyway.


-- AFM DoS configured. -- DoS "rich" whitelist configured with src IP address. -- Sweep/Flood vector configured with pkt-type "all-pkts". -- The BIG-IP system receives invalid Layer 4 pkts (i.e., IPv6 packets that don't have the correct next-header) specified


Instead of AFM DoS "rich" Whitelist, use the DoS AFM Address-List Whitelist to whitelist src IP addresses.

Fix Information


Behavior Change