F5 Networks BIG-IP Next Central Manager API SQL Injection Vulnerability
CVE-2024-26026

9.8CRITICAL

Key Information:

Vendor
F5
Vendor
CVE Published:
8 May 2024

Badges

πŸ“ˆ TrendedπŸ“ˆ Score: 8,450πŸ‘Ύ Exploit Exists🟑 Public PoCπŸ“° News Worthy

What is CVE-2024-26026?

CVE-2024-26026 is a significant vulnerability identified in the F5 Networks BIG-IP Next Central Manager API. This product serves as a centralized management solution for BIG-IP devices, enabling organizations to manage application delivery and security efficiently. The identified SQL injection vulnerability may allow attackers to manipulate database queries, potentially compromising sensitive information and impairing the integrity of the system. Organizations relying on this software should be aware of the risks associated with this vulnerability, as it could lead to unauthorized access and various negative outcomes for their operational security.

Technical Details

The vulnerability arises from an SQL injection flaw within the BIG-IP Next Central Manager API. This issue allows attackers to send specially crafted requests that could manipulate the underlying SQL queries executed by the application. By exploiting this vulnerability, an attacker could gain access to the database, potentially triggering unauthorized actions or revealing sensitive information stored within it. The risk level is particularly heightened for versions of the software that have not reached End of Technical Support (EoTS).

Impact of the Vulnerability

  1. Data Breach Risk: The SQL injection flaw could enable attackers to access sensitive data stored within the affected systems, facilitating data breaches that can compromise customer information and business-critical assets.

  2. System Integrity Compromise: Exploitation of this vulnerability may allow malicious actors to perform unauthorized actions, undermining the integrity of the applications managed through the BIG-IP platform, leading to further security vulnerabilities.

  3. Operational Disruption: The potential for exploitation could result in service disruptions or downtime, negatively affecting business operations and leading to reputational damage for organizations utilizing affected versions of the software.

Affected Version(s)

BIG-IP Next Central Manager 20.0.1 < 20.2.0

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

New F5 Next-Gen Manager Flaw Let Attackers Take Full Admin Control

F5 Big IP has been discovered with two critical vulnerabilities that could potentially allow a threat actor to take full administrative

8 months ago

CVE-2024-21793, CVE-2024-26026: Proof of Concept Available for F5 BIG-IP Next Central Manager Vulnerabilities

Researchers disclose multiple vulnerabilities in F5 BIG-IP Next Central Manager and provide proof-of-concept exploit code, which could lead to exposure of hashed passwords.

8 months ago

CVE-2024-21793 and CVE-2024-26026 Detection: Exploitation of Critical F5 Central Manager Vulnerabilities Can Lead to Full System Compromise - SOC Prime

Detect CVE-2024-21793 and CVE-2024-26026 exploitation attempts, critical flaws in F5 Next Central Manager, with relevant Sigma rules from SOC Prime.

8 months ago

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • πŸ“ˆ

    Vulnerability started trending

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • πŸ“°

    First article discovered by SOC Prime

  • Vulnerability published

  • Vulnerability Reserved

Credit

F5 acknowledges Vladyslav Babkin of Eclypsium for bringing this issue to our attention and following the highest standards of coordinated disclosure.
.