Last Modified: Nov 07, 2022
Affected Product:
See more info
BIG-IP ASM
Known Affected Versions:
13.1.0, 13.1.0.1, 13.1.0.2, 13.1.0.3, 13.1.0.4, 13.1.0.5, 13.1.0.6, 13.1.0.7, 13.1.0.8, 13.1.1, 13.1.1.2, 13.1.1.3, 13.1.1.4, 13.1.1.5, 13.1.3, 13.1.3.1, 14.0.0, 14.0.0.1, 14.0.0.2, 14.0.0.3, 14.0.0.4, 14.0.0.5, 14.0.1, 14.0.1.1, 14.1.0, 14.1.0.1, 14.1.0.2, 14.1.0.3, 14.1.0.5, 14.1.0.6, 14.1.2, 14.1.2.1, 14.1.2.2, 15.0.0, 15.0.1, 15.0.1.1, 15.0.1.2
Fixed In:
15.1.0, 15.0.1.3, 14.1.2.3, 13.1.3.2
Opened: Jun 30, 2019
Severity: 3-Major
Related Article:
K72252057
False positive ASM virus violations.
ASM reports a virus when the antivirus reply is timed out. False positive blocking or violation reporting.
Specific connection characteristics between ASM and the antivirus server may cause replies from the antivirus server to be missed by the ASM.
Configure the EnableASMByPass internal parameter setting to allow the antivirus server to not reply, so it does not issue a violation when it occurs: /usr/share/ts/bin/add_del_internal add EnableASMByPass 1 bigstart restart asm Note: When the internal parameter is enabled, ASM also bypasses huge HTTP requests (when they come on multiple connections) instead of resetting them.
False positive ASM virus violations no longer occur under these conditions.