CVE-2024-32761

Under certain conditions, a potential data leak may occur in the Traffic Management Microkernels (TMMs) of BIG-IP tenants running on VELOS and rSeries platforms. However, this issue cannot be exploited by an attacker because it is not consistently reproducible and is beyond an attacker's control. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.5 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H
f5CNA
6.5 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H
CISA-ADPADP
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 49%
VendorProductVersion
f5big-ip_access_policy_manager
15.1.0 ≤
𝑥
< 15.1.10
f5big-ip_advanced_firewall_manager
15.1.0 ≤
𝑥
< 15.1.10
f5big-ip_advanced_web_application_firewall
15.1.0 ≤
𝑥
< 15.1.10
f5big-ip_analytics
15.1.0 ≤
𝑥
< 15.1.10
f5big-ip_application_acceleration_manager
15.1.0 ≤
𝑥
< 15.1.10
f5big-ip_application_security_manager
15.1.0 ≤
𝑥
< 15.1.10
f5big-ip_application_visibility_and_reporting
15.1.0 ≤
𝑥
< 15.1.10
f5big-ip_automation_toolchain
15.1.0 ≤
𝑥
< 15.1.10
f5big-ip_carrier-grade_nat
15.1.0 ≤
𝑥
< 15.1.10
f5big-ip_container_ingress_services
15.1.0 ≤
𝑥
< 15.1.10
f5big-ip_ddos_hybrid_defender
15.1.0 ≤
𝑥
< 15.1.10
f5big-ip_domain_name_system
15.1.0 ≤
𝑥
< 15.1.10
f5big-ip_edge_gateway
15.1.0 ≤
𝑥
< 15.1.10
f5big-ip_fraud_protection_service
15.1.0 ≤
𝑥
< 15.1.10
f5big-ip_global_traffic_manager
15.1.0 ≤
𝑥
< 15.1.10
f5big-ip_link_controller
15.1.0 ≤
𝑥
< 15.1.10
f5big-ip_local_traffic_manager
15.1.0 ≤
𝑥
< 15.1.10
f5big-ip_policy_enforcement_manager
15.1.0 ≤
𝑥
< 15.1.10
f5big-ip_ssl_orchestrator
15.1.0 ≤
𝑥
< 15.1.10
f5big-ip_webaccelerator
15.1.0 ≤
𝑥
< 15.1.10
f5big-ip_websafe
15.1.0 ≤
𝑥
< 15.1.10
𝑥
= Vulnerable software versions