First published: Mon May 20 2024(Updated: )
A Speculative Race Condition (SRC) vulnerability that impacts modern CPU architectures supporting speculative execution (related to Spectre V1) has been disclosed. An unauthenticated attacker can exploit this vulnerability to disclose arbitrary data from the CPU using race conditions to access the speculative executable code paths.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Next (LTM) | >=20.0.1<=20.1.0 | |
F5 BIG-IP Next Central Manager | >=20.0.1<=20.2.0 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=17.1.0<=17.1.1 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=16.1.0<=16.1.4 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=15.1.0<=15.1.10 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=8.1.0<=8.3.0 | |
F5 F5OS-A | =1.7.0>=1.5.1<=1.5.2 | |
F5 F5OS-C | >=1.6.0<=1.6.2 | |
F5 Traffix Systems Signaling Delivery Controller | =5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of F5-K000139682 is high due to its potential for serious data disclosure.
You can fix F5-K000139682 by applying the available security patches and updates provided by F5 for the affected products.
F5-K000139682 affects various versions of F5 BIG-IP Next, BIG-IP, BIG-IQ, and F5OS products.
F5-K000139682 is a Speculative Race Condition (SRC) vulnerability impacting modern CPU architectures.
Yes, F5-K000139682 can be exploited by unauthenticated attackers which increases its risk level.