Forum Discussion
F5 LTM | IControl Resr
If this inquiry is in relation to the CVE, know that whether or not you're using iControl REST, it's by default accessible on the system on the management interface and self IPs if port 443 is allowed. If that's the case, 1) disable self IP access immediately if not patched, 2) protect/inspect/analyze for your internal management access, and 3) patch!!
- sshekha4May 11, 2022
Nimbostratus
Hi Jrahm,
Thanks for replying. Yeah its in relation with that only and i have upgraded all system to 15.1.5.1.
But for my knowledge i am intrested to know how i ll determine whether my F5s are using it or not.
- JRahmMay 11, 2022
Admin
Good deal on getting patched! You can check your logs to see if anyone is taking advantage of the REST interface:
- /var/log/restjavad-audit.0.log shows all authentications to the iControl REST service. This is an ordered list of every REST call.
- /var/log/restjavad.0.log contains information about connections to the iControl REST service, such as errors returned.
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com