CVE-2024-22389

Severity
7.2HIGH
EPSS
0.2%
top 53.13%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 14

Description

When BIG-IP is deployed in high availability (HA) and an iControl REST API token is updated, the change does not sync to the peer device. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 1.2 | Impact: 5.9

Affected Packages13 packages

CVEListV5f5/big-ip17.1.017.1.1+2
NVDf5/big-ip_analytics15.1.015.1.9+2
NVDf5/big-ip_link_controller15.1.015.1.9+2
NVDf5/big-ip_domain_name_system15.1.015.1.9+2
NVDf5/big-ip_access_policy_manager15.1.015.1.9+2

🔴Vulnerability Details

2
GHSA
GHSA-r9rj-jc5h-jcwh: When BIG-IP is deployed in high availability (HA) and an iControl REST API token is updated, the change does not sync to the peer device2024-02-14
CVEList
BIG-IP iControl REST API Vulnerability2024-02-14

📋Vendor Advisories

1
F5
CVE-2024-22389: When BIG-IP is deployed in high availability (HA) and an iControl REST API token is updated, the change does not sync...2024-02-14
CVE-2024-22389 (HIGH CVSS 7.2) | When BIG-IP is deployed in high ava | cvebase.io