Last Modified: Apr 28, 2025
                                            Affected Product(s):
                                            BIG-IP ASM
                                        
                                            Known Affected Versions:
                                            14.0.0, 14.0.0.1, 14.0.0.2, 14.0.0.3, 14.0.0.4, 14.0.0.5, 14.0.1, 14.0.1.1, 14.1.0, 14.1.0.1, 14.1.0.2, 14.1.0.3, 14.1.0.5, 14.1.0.6, 14.1.2, 14.1.2.1, 14.1.2.2, 14.1.2.3, 14.1.2.4, 14.1.2.5, 14.1.2.6, 14.1.2.7, 14.1.2.8, 14.1.3, 14.1.3.1, 14.1.4, 14.1.4.1, 15.0.0, 15.0.1, 15.0.1.1, 15.0.1.2, 15.0.1.3, 15.0.1.4, 15.1.0, 15.1.0.1, 15.1.0.2, 15.1.0.3, 15.1.0.4, 15.1.0.5, 15.1.1, 15.1.2, 15.1.2.1, 15.1.3, 16.0.0, 16.0.0.1, 16.0.1, 16.0.1.1
                                        
                                            Fixed In:
                                            16.1.0, 16.0.1.2, 15.1.3.1, 14.1.4.2, 13.1.4.1
                                        
                                Opened: Sep 10, 2020 Severity: 2-Critical Related Article: 
K30150004                                        
                                
                                    
When processing certain traffic, ASM attack signatures may not match as intended.
ASM attack signature does not match or trigger further processing.
- ASM enabled - Undisclosed attack signature variation
N/A
ASM now processes traffic as expected.