CVE-2024-23982Stack-based Buffer Overflow in F5 Big-ip Policy Enforcement Manager

Severity
7.5HIGHNVD
EPSS
0.3%
top 45.98%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 14

Description

When a BIG-IP PEM classification profile is configured on a UDP virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. This issue affects classification engines using signatures released between 09-08-2022 and 02-16-2023. See the table in the F5 Security Advisory for a complete list of affected classification signature files. NOTE: Software versions which have reached End of Technical Support (EoTS) are not evaluated

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages1 packages

NVDf5/big-ip_policy_enforcement_manager15.1.015.1.10+2

🔴Vulnerability Details

2
GHSA
GHSA-wrfg-qw24-93h8: When a BIG-IP PEM classification profile is configured on a UDP virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM2024-02-14
CVEList
BIG-IP PEM vulnerability2024-02-14

📋Vendor Advisories

1
F5
CVE-2024-23982: When a BIG-IP PEM classification profile is configured on a UDP virtual server, undisclosed requests can cause the Tr...2024-02-14
CVE-2024-23982 — Stack-based Buffer Overflow in F5 | cvebase