CVE-2024-32761
08.05.2024, 15:15
Under certain conditions, a potential data leak may occur in the Traffic Management Microkernels (TMMs) of BIG-IP tenants running on VELOS and rSeries platforms. However, this issue cannot be exploited by an attacker because it is not consistently reproducible and is beyond an attacker's control. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluatedEnginsight
| Vendor | Product | Version |
|---|---|---|
| f5 | big-ip_access_policy_manager | 15.1.0 ≤ 𝑥 < 15.1.10 |
| f5 | big-ip_advanced_firewall_manager | 15.1.0 ≤ 𝑥 < 15.1.10 |
| f5 | big-ip_advanced_web_application_firewall | 15.1.0 ≤ 𝑥 < 15.1.10 |
| f5 | big-ip_analytics | 15.1.0 ≤ 𝑥 < 15.1.10 |
| f5 | big-ip_application_acceleration_manager | 15.1.0 ≤ 𝑥 < 15.1.10 |
| f5 | big-ip_application_security_manager | 15.1.0 ≤ 𝑥 < 15.1.10 |
| f5 | big-ip_application_visibility_and_reporting | 15.1.0 ≤ 𝑥 < 15.1.10 |
| f5 | big-ip_automation_toolchain | 15.1.0 ≤ 𝑥 < 15.1.10 |
| f5 | big-ip_carrier-grade_nat | 15.1.0 ≤ 𝑥 < 15.1.10 |
| f5 | big-ip_container_ingress_services | 15.1.0 ≤ 𝑥 < 15.1.10 |
| f5 | big-ip_ddos_hybrid_defender | 15.1.0 ≤ 𝑥 < 15.1.10 |
| f5 | big-ip_domain_name_system | 15.1.0 ≤ 𝑥 < 15.1.10 |
| f5 | big-ip_edge_gateway | 15.1.0 ≤ 𝑥 < 15.1.10 |
| f5 | big-ip_fraud_protection_service | 15.1.0 ≤ 𝑥 < 15.1.10 |
| f5 | big-ip_global_traffic_manager | 15.1.0 ≤ 𝑥 < 15.1.10 |
| f5 | big-ip_link_controller | 15.1.0 ≤ 𝑥 < 15.1.10 |
| f5 | big-ip_local_traffic_manager | 15.1.0 ≤ 𝑥 < 15.1.10 |
| f5 | big-ip_policy_enforcement_manager | 15.1.0 ≤ 𝑥 < 15.1.10 |
| f5 | big-ip_ssl_orchestrator | 15.1.0 ≤ 𝑥 < 15.1.10 |
| f5 | big-ip_webaccelerator | 15.1.0 ≤ 𝑥 < 15.1.10 |
| f5 | big-ip_websafe | 15.1.0 ≤ 𝑥 < 15.1.10 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration