GVM detected the default profile of BIG-IP as the vulnerabilities, but it is not recommended to modify

Hi team, have you had similar situation as below? Could you tell me the action which you have taken? It would be helpful for us.

GVM detected the default profile of BIG-IP as the vulnerabilities, but F5 recommend that we do not modify the default profiles.

This is the finding message of GVM.

4353 It was possible to detect the usage of the deprecated TLSv1.0 and/or TLSv1.1 protocol on this system.
443 It was possible to detect the usage of the deprecated TLSv1.0 and/or TLSv1.1 protocol on this system.

The article of BIG-IP software is below.

K14488: Working with profiles
https://my.f5.com/manage/s/article/K14488

Important: Due to a known issue, modifying a default profile may cause ConfigSync to fail.
F5 recommends that you do not modify default profiles.
For more information about this known issue, refer to K16237: Modifying a default profile may cause ConfigSync operations to fail.

Thank you!

Please contact the vendor (F5) support on how to mitigate this flaw.

Greenbone / the Greenbone Community has usually no detailed knowledge on specific products and the vendor of a product in question should be always the first contact point how to mitigate a specific flaw.

3 Likes