// For flags

CVE-2024-23805

F5 Application Visibility and Reporting module and BIG-IP Advanced WAF/ASM vulnerability

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. For the Application Visibility and Reporting module, this may occur when the HTTP Analytics profile with URLs enabled under Collected Entities is configured on a virtual server and the DB variables avr.IncludeServerInURI or avr.CollectOnlyHostnameFromURI are enabled. For BIG-IP Advanced WAF and ASM, this may occur when either a DoS or Bot Defense profile is configured on a virtual server and the DB variables avr.IncludeServerInURI or avr.CollectOnlyHostnameFromURI are enabled.

Note: The DB variables avr.IncludeServerInURI and avr.CollectOnlyHostnameFromURI are not enabled by default. For more information about the HTTP Analytics profile and the Collect URLs setting, refer to K30875743: Create a new Analytics profile and attach it to your virtual servers https://my.f5.com/manage/s/article/K30875743 .






Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated

Las solicitudes no divulgadas pueden provocar la finalización del Microkernel de gestión de tráfico (TMM). Para el módulo de informes y visibilidad de aplicaciones, esto puede ocurrir cuando el perfil de análisis HTTP con URL habilitadas en Entidades recopiladas está configurado en un servidor virtual y las variables de base de datos avr.IncludeServerInURI o avr.CollectOnlyHostnameFromURI están habilitadas. Para BIG-IP Advanced WAF y ASM, esto puede ocurrir cuando se configura un perfil DoS o Bot Defense en un servidor virtual y las variables de base de datos avr.IncludeServerInURI o avr.CollectOnlyHostnameFromURI están habilitadas. Nota: Las variables de base de datos avr.IncludeServerInURI y avr.CollectOnlyHostnameFromURI no están habilitadas de forma predeterminada. Para obtener más información sobre el perfil HTTP Analytics y la configuración Recopilar URL, consulte K30875743: Cree un nuevo perfil de Analytics y adjúntelo a sus servidores virtuales https://my.f5.com/manage/s/article/K30875743. Nota: Las versiones de software que han llegado al final del soporte técnico (EoTS) no se evalúan

*Credits: F5
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2024-02-01 CVE Reserved
  • 2024-02-14 CVE Published
  • 2024-02-15 EPSS Updated
  • 2024-08-01 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-131: Incorrect Calculation of Buffer Size
CAPEC
References (1)
URL Tag Source
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
F5
Search vendor "F5"
BIG-IP
Search vendor "F5" for product "BIG-IP"
>= 17.1.0 < 17.1.1
Search vendor "F5" for product "BIG-IP" and version " >= 17.1.0 < 17.1.1"
en
Affected
F5
Search vendor "F5"
BIG-IP
Search vendor "F5" for product "BIG-IP"
>= 16.1.0 < 16.1.4
Search vendor "F5" for product "BIG-IP" and version " >= 16.1.0 < 16.1.4"
en
Affected
F5
Search vendor "F5"
BIG-IP
Search vendor "F5" for product "BIG-IP"
>= 15.1.0 < 15.1.10
Search vendor "F5" for product "BIG-IP" and version " >= 15.1.0 < 15.1.10"
en
Affected