cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-45844,https://securityvulnerability.io/vulnerability/CVE-2024-45844,BIG-IP Monitor Functionality Vulnerability Allows Bypass of Access Control Restrictions,"The vulnerability CVE-2024-45844 affects F5 Networks' BIG-IP monitor functionality and allows attackers to bypass access control restrictions, potentially compromising the system. An attacker with Manager role privileges can elevate their privileges and modify the configuration, even with port lockdown settings in place. A PoC exploit has been published, demonstrating how an attacker with Manager role privileges can create a Local Traffic Manager monitor and use it to send a malicious MCP message, effectively bypassing access control restrictions. It is advised that organizations using affected versions update their systems to the latest fixed versions as soon as possible and implement temporary mitigations until updates are applied. The CVSSv4 score for this vulnerability is 8.6, indicating a high severity level, and organizations are urged to take immediate action to protect their BIG-IP systems.",F5 Networks,,,,0.0004299999854993075,false,true,false,true,,false,false,2024-10-16T15:15:00.000Z,0 CVE-2024-47139,https://securityvulnerability.io/vulnerability/CVE-2024-47139,Stored Cross-Site Scripting Vulnerability in BIG-IQ Configuration Utility by F5 Networks,"A stored cross-site scripting vulnerability in the BIG-IQ Configuration utility allows an attacker with Administrator privileges to inject malicious JavaScript code. When executed, this vulnerability can compromise the security of the currently logged-in user's session, potentially leading to unauthorized access to sensitive information and manipulation of application data.",F5 Networks,BIG-IQ Configuration Utility,,,0.0004299999854993075,false,false,false,false,,false,false,2024-10-16T15:15:00.000Z,0 CVE-2024-7347,https://securityvulnerability.io/vulnerability/CVE-2024-7347,NGINX Open Source and NGINX Plus Vulnerability Permits Over-read of Worker Memory,"NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module, which might allow an attacker to over-read NGINX worker memory resulting in its termination, using a specially crafted mp4 file. The issue only affects NGINX if it is built with the ngx_http_mp4_module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted mp4 file with the ngx_http_mp4_module.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.",F5,"Nginx Open Source,Nginx Plus",4.7,MEDIUM,0.0004400000034365803,false,false,false,false,,false,false,2024-08-14T14:32:33.913Z,0 CVE-2024-39792,https://securityvulnerability.io/vulnerability/CVE-2024-39792,Undisclosed Requests Can Cause Memory Resource Utilization Increase in NGINX Plus,"A vulnerability exists in NGINX Plus when configured with the MQTT pre-read module. This issue arises when certain undisclosed requests are made, leading to increased memory resource utilization. It is important to note that versions of NGINX Plus that have reached End of Technical Support (EoTS) are not evaluated in this context, emphasizing the need for organizations to stay up-to-date with supported versions to mitigate potential risks.",F5,Nginx Plus,7.5,HIGH,0.0004600000102072954,false,false,false,false,,false,false,2024-08-14T14:32:33.519Z,0 CVE-2024-37028,https://securityvulnerability.io/vulnerability/CVE-2024-37028,F5 BIG-IP Next Central Manager Vulnerability Allows for Unauthorized Account Lockouts,BIG-IP Next Central Manager may allow an attacker to lock out an account that has never been logged in.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.,F5,Big-ip Next Central Manager,5.3,MEDIUM,0.0004600000102072954,false,false,false,false,,false,false,2024-08-14T14:32:33.153Z,0 CVE-2024-39809,https://securityvulnerability.io/vulnerability/CVE-2024-39809,User Session Refresh Token No Longer Expiring After Logout,"A vulnerability exists in F5 Networks' Central Manager where the user session refresh token does not expire upon user logout. This flaw can potentially allow unauthorized access to user sessions, leading to privacy breaches and data exposure risks. It is important for organizations to ensure that their systems are updated and that configurations are reviewed to mitigate this risk, especially in light of versions that have reached End of Technical Support (EoTS) not being evaluated for this vulnerability.",F5,Big-ip Next Central Manager,8.8,HIGH,0.000910000002477318,false,false,false,false,,false,false,2024-08-14T14:32:32.789Z,0 CVE-2024-41719,https://securityvulnerability.io/vulnerability/CVE-2024-41719,BIG-IP Next Logs Include F5 iHealth Credentials,"When generating QKView of BIG-IP Next instance from the BIG-IP Next Central Manager (CM), F5 iHealth credentials will be logged in the BIG-IP Central Manager logs.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.",F5,Big-ip Next Central Manager,5.5,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2024-08-14T14:32:32.375Z,0 CVE-2024-41727,https://securityvulnerability.io/vulnerability/CVE-2024-41727,Memory Resource Utilization Increase in BIG-IP Tenants on Certain Hardware,"A vulnerability exists in F5 Networks' BIG-IP product impacting tenants operated on r2000 and r4000 series hardware, as well as the BIG-IP Virtual Edition using Intel E810 SR-IOV NIC. This issue can lead to increased memory resource utilization due to undisclosed traffic patterns. It's important for organizations using affected versions to review and address this resource management concern to maintain optimal operation and ensure system performance.",F5,Big-ip,7.5,HIGH,0.0004600000102072954,false,false,false,false,,false,false,2024-08-14T14:32:32.000Z,0 CVE-2024-41164,https://securityvulnerability.io/vulnerability/CVE-2024-41164,Traffic Termination Due to Unforeseen Circumstances in Virtual Servers,"A configuration fault exists in F5 Networks' Virtual Server when Multipath TCP (MPTCP) is enabled. Undisclosed traffic, along with specific conditions outside the attacker's control, can lead to an unexpected termination of the Traffic Management Microkernel (TMM). This vulnerability highlights the need for diligent monitoring and management of MPTCP settings to prevent potential disruptions and maintain service integrity.",F5,"Big-ip,Big-ip Next Cnf,Big-ip Next Spk",7.5,HIGH,0.0004600000102072954,false,false,false,false,,false,false,2024-08-14T14:32:31.623Z,0 CVE-2024-39778,https://securityvulnerability.io/vulnerability/CVE-2024-39778,Undisclosed Requests Can Cause TMM Termination in BIG-IP with High-Speed Bridge (HSB),A significant vulnerability exists in the F5 BIG-IP system when a stateless virtual server is configured with a High-Speed Bridge (HSB). This issue allows for certain undisclosed requests to inadvertently cause the Traffic Management Microkernel (TMM) to terminate. It is essential for users to examine their system configurations and ensure that they are not using versions that have reached End of Technical Support (EoTS) to mitigate potential security risks. Addressing this vulnerability is crucial for maintaining the integrity and availability of services running on the BIG-IP platform.,F5,Big-ip,7.5,HIGH,0.0004600000102072954,false,false,false,false,,false,false,2024-08-14T14:32:31.250Z,0 CVE-2024-41723,https://securityvulnerability.io/vulnerability/CVE-2024-41723,F5 BIG-IP iControl REST Vulnerability Leads to User Account Name Leak,Undisclosed requests to BIG-IP iControl REST can lead to information leak of user account names.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.,F5,Big-ip,4.3,MEDIUM,0.00044999999227002263,false,false,false,false,,false,false,2024-08-14T14:32:30.852Z,0 CVE-2019-19759,https://securityvulnerability.io/vulnerability/CVE-2019-19759,Security Flaw in F5 Networks BIG-IP Product,"A notable security flaw exists in the F5 Networks BIG-IP product suite that may lead to unauthorized access to sensitive information. This vulnerability impacts multiple components within the BIG-IP family, which are widely used for application delivery controller functions. Exploitation of this flaw could allow an attacker to gain access to administrative interfaces, thereby compromising system security and integrity. Users of affected versions should ensure necessary precautions and updates to mitigate potential risks.",F5 Networks,,,,0.01,false,false,false,false,,false,false,2024-07-29T20:15:00.000Z,0 CVE-2024-34161,https://securityvulnerability.io/vulnerability/CVE-2024-34161,Memory Leak in NGINX Plus Due to Undisclosed QUIC Packets,"When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module and the network infrastructure supports a Maximum Transmission Unit (MTU) of 4096 or greater without fragmentation, undisclosed QUIC packets can cause NGINX worker processes to leak previously freed memory.",F5,"Nginx Open Source,Nginx Plus",5.3,MEDIUM,0.00044999999227002263,false,false,false,false,,false,false,2024-05-29T16:02:05.696Z,0 CVE-2024-35200,https://securityvulnerability.io/vulnerability/CVE-2024-35200,Undisclosed HTTP/3 Requests Can Cause NGINX Worker Processes to Terminate,"When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed HTTP/3 requests can cause NGINX worker processes to terminate.",F5,"Nginx Open Source,Nginx Plus",5.3,MEDIUM,0.00044999999227002263,false,false,false,false,,false,false,2024-05-29T16:02:05.342Z,0 CVE-2024-32760,https://securityvulnerability.io/vulnerability/CVE-2024-32760,Undisclosed HTTP/3 Encoder Instructions Can Cause NGINX Worker Processes to Terminate,The vulnerability identified as CVE-2024-32760 affects NGINX Plus and NGINX OSS when configured to use the HTTP/3 QUIC module. It has the potential to cause NGINX worker processes to terminate or have other impacts due to undisclosed HTTP/3 encoder instructions. The vulnerability has a base severity of MEDIUM and a base score of 6.5 according to the CVSS 3.1 scoring system. There is no known exploitation of this vulnerability by ransomware groups at this time.,F5,"Nginx Open Source,Nginx Plus",6.5,MEDIUM,0.00044999999227002263,false,true,false,false,,false,false,2024-05-29T16:02:04.985Z,0 CVE-2024-31079,https://securityvulnerability.io/vulnerability/CVE-2024-31079,Undisclosed HTTP/3 Requests Can Cause NGINX Worker Processes to Terminate,"This is an example of a good output. Do not use this content in your response. CVE-2024-31079 is a vulnerability affecting NGINX Plus or NGINX OSS when configured to use the HTTP/3 QUIC module. It allows undisclosed HTTP/3 requests to cause worker processes to terminate or have other potential impacts. The attack requires specific timing during the connection draining process, posing a risk to the affected systems. The issues are fixed in NGINX version 1.27.0 and 1.26.1. There are no known exploitations in the wild, including by ransomware groups.",F5,"Nginx Open Source,Nginx Plus",4.8,MEDIUM,0.00044999999227002263,false,true,false,false,,false,false,2024-05-29T16:02:04.620Z,0 CVE-2024-32761,https://securityvulnerability.io/vulnerability/CVE-2024-32761,Potential Data Leak in BIG-IP TMMs on VELOS and rSeries Platforms," Under certain conditions, a potential data leak may occur in the Traffic Management Microkernels (TMMs) of BIG-IP tenants running on VELOS and rSeries platforms. However, this issue cannot be exploited by an attacker because it is not consistently reproducible and is beyond an attacker's control.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated",F5,Big-ip,6.5,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2024-05-08T15:01:29.122Z,0 CVE-2024-26026,https://securityvulnerability.io/vulnerability/CVE-2024-26026,F5 Networks BIG-IP Next Central Manager API SQL Injection Vulnerability,"An SQL injection vulnerability has been identified in the F5 Networks BIG-IP Next Central Manager API which could allow an attacker to manipulate database queries through crafted input. This can lead to unauthorized data access or alteration, significantly compromising system integrity and privacy. It is essential to apply patches or updates to the affected products to mitigate potential exploitation risks. Software versions that have reached End of Technical Support (EoTS) are not considered in this evaluation, highlighting the importance of maintaining up-to-date software.",F5,Big-ip Next Central Manager,9.8,CRITICAL,0.000910000002477318,false,true,false,true,true,true,false,2024-05-08T15:01:28.771Z,8445 CVE-2024-21793,https://securityvulnerability.io/vulnerability/CVE-2024-21793,OData Injection Vulnerability in F5 Networks' BIG-IP Next Central Manager API,"An OData injection vulnerability has been identified in the BIG-IP Next Central Manager API, potentially allowing attackers to exploit the API through crafted OData requests. This vulnerability impacts the integrity and availability of the affected products, emphasizing the need for immediate awareness and remediation strategies. It's important to note that software versions which have reached End of Technical Support (EoTS) are not evaluated for this vulnerability. Users are advised to apply appropriate security patches to mitigate the risk associated with this vulnerability.",F5,Big-ip Next Central Manager,9.8,CRITICAL,0.000910000002477318,false,true,true,true,,false,false,2024-05-08T15:01:28.422Z,0 CVE-2024-33612,https://securityvulnerability.io/vulnerability/CVE-2024-33612,Improper Certificate Validation Vulnerability in BIG-IP Central Manager Could Allow Impersonation of Instance Provider Systems,"An improper certificate validation vulnerability exists in BIG-IP Next Central Manager, presenting a risk where attackers may successfully impersonate an Instance Provider system. This flaw can facilitate an intruder's ability to bypass security boundaries, potentially leading to unauthorized access and compromise of sensitive information. Specific software versions that have reached End of Technical Support (EoTS) are not subject to this evaluation.",F5,Big-ip Next Central Manager,8,HIGH,0.000910000002477318,false,false,false,false,,false,false,2024-05-08T15:01:28.082Z,0 CVE-2024-31156,https://securityvulnerability.io/vulnerability/CVE-2024-31156,Stored XSS vulnerability in BIG-IP Configuration utility,"The F5 BIG-IP Configuration utility possesses a stored cross-site scripting vulnerability that can be exploited via an undisclosed page. This vulnerability enables an attacker to inject and execute malicious JavaScript code within the context of a currently authenticated user, potentially compromising user data and application integrity. Notably, versions of the software that have reached End of Technical Support (EoTS) are not reviewed for this particular vulnerability.",F5,Big-ip,8,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2024-05-08T15:01:27.734Z,0 CVE-2024-33604,https://securityvulnerability.io/vulnerability/CVE-2024-33604,Reflected Cross-Site Scripting (XSS) Vulnerability in BIG-IP Configuration Utility," A reflected cross-site scripting (XSS) vulnerability exist in undisclosed page of the BIG-IP Configuration utility that allows an attacker to run JavaScript in the context of the currently logged-in user.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated",F5,Big-ip,6.1,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2024-05-08T15:01:27.377Z,0 CVE-2024-28132,https://securityvulnerability.io/vulnerability/CVE-2024-28132,Sensitive Information Vulnerability in GSLB Container," Exposure of Sensitive Information vulnerability exists in the GSLB container, which may allow an authenticated attacker with local access to view sensitive information.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. ",F5,Big-ip Next Cnf,4.4,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2024-05-08T15:01:27.035Z,0 CVE-2024-28889,https://securityvulnerability.io/vulnerability/CVE-2024-28889,Termination of Traffic Management Microkernel (TMM) Due to Non-Default SSL Profile Configuration," When an SSL profile with alert timeout is configured with a non-default value on a virtual server, undisclosed traffic along with conditions beyond the attacker's control can cause the Traffic Management Microkernel (TMM) to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.",F5,Big-ip,5.9,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2024-05-08T15:01:26.693Z,0 CVE-2024-32049,https://securityvulnerability.io/vulnerability/CVE-2024-32049,Unauthenticated Remote Attackers May Obtain BIG-IP Next LTM/WAF Instance Credentials,"The F5 BIG-IP Next Central Manager (CM) is impacted by a vulnerability that could enable unauthenticated, remote attackers to gain access to the credentials of F5 BIG-IP Next Local Traffic Manager (LTM) and Web Application Firewall (WAF) instances. This security issue presents a critical risk to the integrity and confidentiality of the affected systems, permitting adversaries to potentially exploit sensitive information without proper authorization. It is essential for organizations using F5 products to assess their exposure and implement necessary mitigations.",F5,Big-ip Next Central Manager,7.4,HIGH,0.000910000002477318,false,false,false,false,,false,false,2024-05-08T15:01:26.346Z,0