First published: Wed May 08 2024(Updated: )
Under certain conditions, a potential data leak may occur in the Traffic Management Microkernels (TMMs) of BIG-IP tenants running on VELOS and rSeries platforms. However, this issue cannot be exploited by an attacker because it is not consistently reproducible and is beyond an attacker's control. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP and BIG-IQ Centralized Management | ||
F5 BIG-IP and BIG-IQ Centralized Management | >=15.1.0<=15.1.9 | 15.1.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-32761 is classified as a potential data leak vulnerability with low severity due to its inconsistent exploitability.
To mitigate CVE-2024-32761, ensure your F5 BIG-IP software is updated to a version beyond 15.1.10.
CVE-2024-32761 affects F5 BIG-IP versions from 15.1.0 to 15.1.9.
No, CVE-2024-32761 cannot be reliably exploited by an attacker as it is not consistently reproducible.
CVE-2024-32761 impacts BIG-IP tenants running on VELOS and rSeries platforms.