First published: Wed May 08 2024(Updated: )
An origin validation vulnerability exists in BIG-IP APM browser network access VPN client for Windows, macOS and Linux which may allow an attacker to bypass F5 endpoint inspection. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP (APM) | =17.1.0 | 17.1.1 |
F5 BIG-IP (APM) | >=16.1.0<=16.1.4 | 16.1.4.2 |
F5 BIG-IP (APM) | >=15.1.0<=15.1.10 | 15.1.10.3 |
F5 APM Clients | >=7.2.3<=7.2.4 | 7.2.4.43 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-28883 is classified as a high severity vulnerability due to its ability to potentially bypass endpoint inspection.
To fix CVE-2024-28883, upgrade to the fixed versions of the BIG-IP APM software as recommended by F5.
CVE-2024-28883 affects F5 BIG-IP APM on specified versions including 17.1.0, 16.1.0 to 16.1.4, and 15.1.0 to 15.1.10.
Yes, CVE-2024-28883 can be exploited remotely, allowing attackers to bypass endpoint inspection from various locations.
F5 currently recommends performing software upgrades to remediate CVE-2024-28883, rather than relying on workarounds.