Description: This high-severity vulnerability in the BIG-IP system’s monitor functionality could enable authenticated users with Manager role privileges or higher to escalate their access and potentially compromise the system.
Impact: Affects the control plane, with no direct impact on the data plane.
Affected Versions: BIG-IP versions prior to 17.1.1.4, 16.1.5, and 15.1.10.5.
Remediation: Upgrade to the fixed versions as detailed in F5’s advisory.
Description: A DOM-based cross-site scripting (XSS) vulnerability in an undisclosed page of the BIG-IP Configuration Utility. This allows attackers to execute JavaScript within the user’s session context.
Impact: Could enable unauthorized actions within the active user session.
Affected Versions: Specific affected versions are listed in F5’s advisory.
Remediation: Apply updates provided by F5 to mitigate this issue.
3. CVE-2024-21793 & CVE-2024-26026: F5 Next Central Manager Vulnerabilities
Description: These vulnerabilities allow remote attackers to gain full administrative control of the device. Attackers could also create hidden accounts on F5 assets managed by the Next Central Manager.
Impact: Persistent unauthorized access to critical systems.
Remediation: Upgrade to software version 20.2.0 or higher as recommended by F5.
4. CVE-2024-39778: BIG-IP HSB Denial-of-Service
Description: A vulnerability in the BIG-IP Hardware Security Module (HSB) could allow remote unauthenticated attackers to cause a denial-of-service (DoS) on the system.
Impact: Disrupts services provided by the BIG-IP system.
Remediation: Follow mitigation steps outlined in F5’s advisory.
Mitigation Recommendations
Apply Patches Immediately: Ensure all affected F5 products are updated with the latest patches provided by the vendor.
Restrict Access: Limit access to F5 management interfaces to trusted networks or devices.
Monitor Systems Continuously: Implement continuous monitoring to detect unauthorized access or unusual activity.
Review Security Advisories: Regularly consult F5’s official security advisories to stay informed about vulnerabilities and remediation measures.