Metrics
Affected Vendors & Products
Mon, 21 Oct 2024 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
ssvc
|
ssvc
|
Wed, 16 Oct 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
F5
F5 big-ip |
|
CPEs | cpe:2.3:a:f5:big-ip:15.1.0:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip:16.1.0:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip:17.1.0:*:*:*:*:*:*:* |
|
Vendors & Products |
F5
F5 big-ip |
|
Metrics |
ssvc
|
Wed, 16 Oct 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | BIG-IP monitor functionality may allow an attacker to bypass access control restrictions, regardless of the port lockdown settings. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | |
Title | BIG-IP monitors vulnerability | |
Weaknesses | CWE-306 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: f5
Published:
Updated: 2024-10-21T13:14:15.515Z
Reserved: 2024-10-02T21:35:52.798Z
Link: CVE-2024-45844

Updated: 2024-10-16T14:31:24.377Z

Status : Awaiting Analysis
Published: 2024-10-16T15:15:16.183
Modified: 2024-11-21T09:38:10.080
Link: CVE-2024-45844

No data.