First published: Wed May 08 2024(Updated: )
An origin validation vulnerability exists in the BIG-IP APM browser network access VPN client, which may allow an attacker to bypass F5 endpoint inspection.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Access Policy Manager | =17.1.0 | 17.1.1 |
F5 BIG-IP Access Policy Manager | >=16.1.0<=16.1.4 | 16.1.4.2 |
F5 BIG-IP Access Policy Manager | >=15.1.0<=15.1.10 | 15.1.10.3 |
F5 Access Policy Manager | >=7.2.3<=7.2.4 | 7.2.4.43 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of F5-K000138744 is classified as high due to the potential for an attacker to bypass endpoint inspection.
To fix F5-K000138744, update to the appropriate patched version of BIG-IP APM or F5 APM Clients as specified by the remediation details.
The affected software versions for F5-K000138744 include certain versions of F5 BIG-IP (APM) and F5 APM Clients as specified in the advisory.
Yes, F5-K000138744 can potentially be exploited remotely since it involves the VPN client used in browser network access.
If exploited, F5-K000138744 may allow unauthorized access to sensitive network resources, compromising security.