Rewterz
CISA Alerts of Ransomware Attacks Exploiting Critical Jenkins Vulnerability
August 20, 2024
Rewterz
Multiple Intel Products Vulnerabilities
August 20, 2024

Multiple F5 BIG-IP Products Vulnerabilities

Severity

High

Analysis Summary

CVE-2024-41727 CVSS:7.5

F5 BIG-IP is vulnerable to a denial of service, caused by a flaw when running on r2000 and r4000 series hardware, or BIG-IP Virtual Edition (VEs) using Intel E810 SR-IOV NIC. By sending specially crafted network traffic, a remote attacker could exploit this vulnerability to cause an increase in memory resource utilization, and results in a denial of service condition.

CVE-2024-39809 CVSS:7.5

F5 BIG-IP Next Central Manager could allow a remote attacker to bypass security restrictions, caused by not expire user session refresh token after a user logs out. By sending a specially crafted request, an attacker could exploit this vulnerability to bypass authentication and gain access to the system.

CVE-2024-39778 CVSS:7.5

F5 BIG-IP is vulnerable to a denial of service, caused by a flaw when a stateless virtual server is configured. By sending a specially crafted request, a remote attacker could exploit this vulnerability to cause virtual servers to stop processing client connections and the Traffic Management Microkernel (TMM) to terminate.

CVE-2024-39792 CVSS:7.5

F5 NGINX Plus is vulnerable to a denial of service, caused by a flaw when configured to use the MQTT filter module. By sending a specially crafted request, a remote attacker could exploit this vulnerability to cause an increase in memory resource utilization, and results in a denial of service condition.

Impact

  • Denial of Service
  • Security Bypass

Indicators of Compromise

CVE

  • CVE-2024-41727
  • CVE-2024-39809
  • CVE-2024-39778
  • CVE-2024-39792

Affected Vendors

F5

Affected Products

  • F5 BIG-IP 15.1.0
  • F5 BIG-IP 16.1.0
  • F5 BIG-IP 17.1.0
  • F5 BIG-IP 16.1.4
  • F5 BIG-IP 15.1.10
  • F5 NGINX Plus R30
  • F5 BIG-IP Next Central Manager 20.1.0
  • F5 NGINX Plus R32

Remediation

Refer to F5 Security Advisory for patch, upgrade or suggested workaround information.

CVE-2024-41727

CVE-2024-39809

CVE-2024-39778

CVE-2024-39792