<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Web Application Firewall — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/web-application-firewall/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 13 May 2026 16:21:54 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/web-application-firewall/feed.xml" rel="self" type="application/rss+xml"/><item><title>BIG-IP Advanced WAF/ASM Denial-of-Service Vulnerability (CVE-2026-40060)</title><link>https://feed.craftedsignal.io/briefs/2026-05-bigip-waf-dos/</link><pubDate>Wed, 13 May 2026 16:21:54 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-bigip-waf-dos/</guid><description>CVE-2026-40060 describes a vulnerability in F5 BIG-IP Advanced WAF and ASM security policies where undisclosed requests can cause the `bd` process to terminate, leading to a denial-of-service condition.</description><content:encoded><![CDATA[<p>CVE-2026-40060 is a denial-of-service vulnerability affecting F5 BIG-IP Advanced Web Application Firewall (WAF) and Application Security Manager (ASM) modules. When a BIG-IP virtual server is configured with an Advanced WAF or ASM security policy, specially crafted, undisclosed requests can trigger the termination of the <code>bd</code> process. This can lead to a denial-of-service condition, impacting the availability of web applications protected by the affected BIG-IP system. The vulnerability was reported to F5 Networks and assigned a CVSS v3.1 base score of 7.5 (High). Software versions that have reached End of Technical Support (EoTS) are not evaluated.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable BIG-IP system with an Advanced WAF or ASM security policy enabled on a virtual server.</li>
<li>The attacker crafts a series of undisclosed HTTP requests.</li>
<li>The attacker sends the malicious requests to the targeted virtual server.</li>
<li>The BIG-IP system processes the requests through the configured WAF/ASM security policy.</li>
<li>The crafted requests trigger a fault or unhandled exception within the <code>bd</code> process.</li>
<li>The <code>bd</code> process terminates unexpectedly as a result of the crafted malicious requests.</li>
<li>The termination of the <code>bd</code> process disrupts the normal operation of the BIG-IP system.</li>
<li>Web applications protected by the affected virtual server become unavailable, resulting in a denial-of-service condition.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40060 results in a denial-of-service (DoS) condition, rendering web applications protected by the vulnerable BIG-IP system unavailable. The impact is high in terms of availability, as legitimate users are unable to access the affected services. This can lead to business disruption, reputational damage, and potential financial losses for organizations relying on the affected BIG-IP systems. The specific number of victims and sectors targeted will vary depending on the prevalence of the vulnerable configuration.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Refer to F5&rsquo;s advisory K000160727 for detailed information and mitigation steps.</li>
<li>Apply the necessary updates or workarounds provided by F5 Networks to address CVE-2026-40060 on vulnerable BIG-IP Advanced WAF and ASM deployments.</li>
<li>Monitor web server logs for unusual traffic patterns or anomalies that may indicate exploitation attempts, and deploy the Sigma rule detecting <code>bd</code> process crashes to identify potential attacks.</li>
<li>Implement rate limiting and traffic filtering mechanisms to mitigate the impact of potential denial-of-service attacks.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>denial-of-service</category><category>web application firewall</category><category>F5</category><category>CVE-2026-40060</category></item></channel></rss>