CISA Alerts of Ransomware Attacks Exploiting Critical Jenkins Vulnerability
August 20, 2024Multiple Intel Products Vulnerabilities
August 20, 2024CISA Alerts of Ransomware Attacks Exploiting Critical Jenkins Vulnerability
August 20, 2024Multiple Intel Products Vulnerabilities
August 20, 2024Severity
High
Analysis Summary
CVE-2024-41727 CVSS:7.5
F5 BIG-IP is vulnerable to a denial of service, caused by a flaw when running on r2000 and r4000 series hardware, or BIG-IP Virtual Edition (VEs) using Intel E810 SR-IOV NIC. By sending specially crafted network traffic, a remote attacker could exploit this vulnerability to cause an increase in memory resource utilization, and results in a denial of service condition.
CVE-2024-39809 CVSS:7.5
F5 BIG-IP Next Central Manager could allow a remote attacker to bypass security restrictions, caused by not expire user session refresh token after a user logs out. By sending a specially crafted request, an attacker could exploit this vulnerability to bypass authentication and gain access to the system.
CVE-2024-39778 CVSS:7.5
F5 BIG-IP is vulnerable to a denial of service, caused by a flaw when a stateless virtual server is configured. By sending a specially crafted request, a remote attacker could exploit this vulnerability to cause virtual servers to stop processing client connections and the Traffic Management Microkernel (TMM) to terminate.
CVE-2024-39792 CVSS:7.5
F5 NGINX Plus is vulnerable to a denial of service, caused by a flaw when configured to use the MQTT filter module. By sending a specially crafted request, a remote attacker could exploit this vulnerability to cause an increase in memory resource utilization, and results in a denial of service condition.
Impact
- Denial of Service
- Security Bypass
Indicators of Compromise
CVE
- CVE-2024-41727
- CVE-2024-39809
- CVE-2024-39778
- CVE-2024-39792
Affected Vendors
Affected Products
- F5 BIG-IP 15.1.0
- F5 BIG-IP 16.1.0
- F5 BIG-IP 17.1.0
- F5 BIG-IP 16.1.4
- F5 BIG-IP 15.1.10
- F5 NGINX Plus R30
- F5 BIG-IP Next Central Manager 20.1.0
- F5 NGINX Plus R32
Remediation
Refer to F5 Security Advisory for patch, upgrade or suggested workaround information.