F5 Networks BIG-IP Next Central Manager API SQL Injection Vulnerability

CVE-2024-26026
7.5HIGH

Key Information

Vendor
F5
Status
Big-ip Next Central Manager
Vendor
CVE Published:
8 May 2024

Badges

😄 Trended👾 Exploit Exists🔴 Public PoC📰 News Worthy

Summary

CVE-2024-26026 is an SQL injection vulnerability in the F5 Networks BIG-IP Next Central Manager API, which could lead to the exposure of sensitive information, including password hashes and administrator password hash. F5 has released a patch to address this vulnerability in the affected versions. The researchers at Eclypsium have also shared public proof-of-concept exploit code for this vulnerability and disclosed that there are other vulnerabilities in the BIG-IP Next Central Manager that have not been assigned CVEs. While there are no known exploitations by ransomware groups, there is a historical pattern of F5 vulnerabilities being targeted by various attackers, so organizations are urged to upgrade to the fixed version as soon as possible or restrict management access to trusted users and devices as a mitigation measure. Additionally, a well-funded attacker could potentially crack password hashes due to the inadequate cost factor in the hashed passwords, making it crucial for organizations to address this vulnerability promptly.

Affected Version(s)

BIG-IP Next Central Manager < 20.2.0

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability started trending.

  • First article discovered by SOC Prime

  • 👾

    Exploit exists.

  • Vulnerability published.

  • Vulnerability Reserved.

Collectors

NVD DatabaseMitre Database1 Proof of Concept(s)2 News Article(s)

Credit

F5 acknowledges Vladyslav Babkin of Eclypsium for bringing this issue to our attention and following the highest standards of coordinated disclosure.
.