CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-45844

Medium Severity
SVRS
36/100

CVSSv3
NA/10

EPSS
0.00139/1

CVE-2024-45844 affects BIG-IP systems, potentially allowing unauthorized access. This vulnerability lets attackers bypass access control restrictions, even with port lockdown enabled, due to a flaw in the monitor functionality. Despite a CVSS score of 0, SOCRadar's Vulnerability Risk Score (SVRS) is 36, indicating some level of concern. While not critical (SVRS above 80), this vulnerability should be monitored because any bypass of access controls can lead to significant security breaches. The vulnerability, categorized as CWE-306 (Missing Authentication for Critical Function), makes it possible for attackers to potentially gain unauthorized access to sensitive data or systems. Immediate patching is not required based on the SVRS, but organizations using vulnerable BIG-IP systems should investigate further and implement mitigations if necessary.

In The Wild
2024-10-16

2024-10-16
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-45844 is a vulnerability in BIG-IP monitor functionality that could allow an attacker to bypass access control restrictions, regardless of the port lockdown settings. This vulnerability is rated as 7.2 on the CVSS scale, indicating a high severity. However, the SOCRadar Vulnerability Risk Score (SVRS) for this CVE is 0, indicating that it is not currently considered a critical threat.

Key Insights

  • This vulnerability could allow an attacker to gain unauthorized access to a BIG-IP system, potentially leading to data theft, system compromise, or other malicious activity.
  • The vulnerability is not currently being actively exploited in the wild, but it is possible that it could be exploited in the future.
  • The Cybersecurity and Infrastructure Security Agency (CISA) has not issued a warning about this vulnerability.

Mitigation Strategies

  • Update to the latest version of BIG-IP software.
  • Implement strong access control measures, such as firewalls and intrusion detection systems.
  • Monitor your systems for suspicious activity and take appropriate action if necessary.

Additional Information

If you have any additional questions about this incident, you can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

Tageszusammenfassung - 16.10.2024
CERT.at2024-12-02
Tageszusammenfassung - 16.10.2024 | End-of-Day report Timeframe: Dienstag 15-10-2024 18:00 - Mittwoch 16-10-2024 18:00 Handler: Michael Schlagenhaufer Co-Handler: n/a News ASEC and NCSC Release Joint Report on Microsoft Zero-Day Browser Vulnerability (CVE-2024-38178) AhnLab SEcurity intelligence Center (ASEC) and the National Cyber Security Center (NCSC) have discovered a new zero-day vulnerability in the Microsoft Internet Explorer (IE) browser and have conducted a detailed analysis on attacks that exploit this vulnerability. This post shares
cert.at
rss
forum
news
F5 fixed a high-severity elevation of privilege vulnerability in BIG-IP
Pierluigi Paganini2024-10-20
F5 fixed a high-severity elevation of privilege vulnerability in BIG-IP | Technology firm F5 patches a high-severity elevation of privilege vulnerability in BIG-IP and a medium-severity flaw in BIG-IQ. F5 addressed two vulnerabilities in BIG-IP and BIG-IQ enterprise products, respectively tracked as CVE-2024-45844 and CVE-2024-47139. An authenticated attacker, with Manager role privileges or higher, could exploit the vulnerability CVE-2024-45844 to elevate privileges and compromise the BIG-IP [&#8230;] <
securityaffairs.co
rss
forum
news
PoC Exploit Released for BIG-IP Privilege Escalation Vulnerability
Guru Baran2024-10-18
PoC Exploit Released for BIG-IP Privilege Escalation Vulnerability | A critical vulnerability in F5 BIG-IP, a popular network traffic management and security solution tracked as CVE-2024-45844, allows authenticated attackers to bypass access control restrictions and potentially compromise the system. According to the security advisory issued by F5, the vulnerability exists within the BIG-IP monitor functionality. An attacker with at least Manager role privileges can [&#8230;] The post PoC Exploit Released for BIG-IP Privilege Escalation Vulnerability</a
cybersecuritynews.com
rss
forum
news
CVE-2024-45844: Privilege escalation in F5 BIG-IP
/u/AlmondOffSec2024-10-17
CVE-2024-45844: Privilege escalation in F5 BIG-IP | &#32; submitted by &#32; /u/AlmondOffSec [link] &#32; [comments]&#32; submitted by &#32; /u/AlmondOffSec [link] &#32; <span
reddit.com
rss
forum
news
CVE-2024-45844 | F5 BIG-IP up to 15.1.10.4/16.1.4/17.1.1.3 Monitor missing authentication (K000140061 / Nessus ID 209162)
vuldb.com2024-10-17
CVE-2024-45844 | F5 BIG-IP up to 15.1.10.4/16.1.4/17.1.1.3 Monitor missing authentication (K000140061 / Nessus ID 209162) | A vulnerability was found in F5 BIG-IP up to 15.1.10.4/16.1.4/17.1.1.3. It has been declared as critical. This vulnerability affects unknown code of the component Monitor. The manipulation leads to missing authentication. This vulnerability was named CVE-2024-45844. The attack can be initiated remotely. There
cve-2024-45844
ipv4s
ipv4_cidrs
domains

Social Media

PoC Exploit Released for BIG-IP Privilege Escalation Vulnerability A critical vulnerability in F5 BIG-IP, a popular network traffic management and security solution tracked as CVE-2024-45844, allows authenticated attackers to bypass access control rest... https://t.co/8bSKNx2qqd
0
0
0
CVE-2024-45844 : Privilege escalation vulnerability in BIG-IP https://t.co/LhE8FRHzIU https://t.co/zfUcKg9NI0
0
0
1
Updates released for BIG-IP address a high-severity security defect tracked as CVE-2024-45844. Affecting the appliance’s monitor functionality, the bug could allow authenticated attackers to elevate their privileges and make configuration changes. https://t.co/FRM5EThj8R
0
0
0

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://my.f5.com/manage/s/article/K000140061

CWE Details

CWE IDCWE NameDescription
CWE-306Missing Authentication for Critical FunctionThe software does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence