This security bulletin contains one medium risk vulnerability.
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to insecure input validation when processing serialized data in the Traffic Management User Interface (TMUI). A remote user can cause the Tomcat process to restart and perform unauthorized DNS requests and operations through undisclosed requests.Mitigation
Install updates from vendor's website.Vulnerable software versions
BIG-IP DNS: 13.1.0 - 16.1.2Fixed software versions
Q & A
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?