Description

F5 has released its October 2024 quarterly security notification, addressing two critical vulnerabilities in its BIG-IP and BIG-IQ enterprise products. The first vulnerability, tracked as CVE-2024-45844, is a high-severity security defect that affects the monitor functionality of BIG-IP appliances. If exploited, this bug could allow authenticated attackers to elevate their privileges and make unauthorized configuration changes, potentially compromising the entire system. F5 has resolved this issue in BIG-IP versions 17.1.1.4, 16.1.5, and 15.1.10.5, and advises organizations to restrict access to the BIG-IP configuration utility and command line through SSH to only trusted networks or devices. However, the company notes that the only effective mitigation is to remove access for users who are not completely trusted, as the attack can be conducted by legitimate, authenticated users. The second vulnerability, tracked as CVE-2024-47139, is a stored cross-site scripting (XSS) bug in an undisclosed page of the BIG-IQ user interface. If exploited, this flaw could allow an attacker with administrator privileges to run JavaScript as the currently logged-in user, potentially compromising the system. F5 has addressed this issue with the release of BIG-IQ centralized management versions 8.2.0.1 and 8.3.0, and after using the BIG-IQ user interface, it's recommended to log out and close your web browser. For added security, use a separate browser for managing the BIG-IQ user interface. Fortunately, F5 has not reported any instances of these vulnerabilities being exploited in the wild.