Local denial of service in F5OS Intel UEFI firmware



Risk Low
Patch available NO
Number of vulnerabilities 1
CVE-ID CVE-2024-21781
CWE-ID CWE-20
Exploitation vector Local
Public exploit N/A
Vulnerable software
F5OS
Operating systems & Components / Operating system

Vendor F5 Networks

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Input validation error

EUVDB-ID: #VU97438

Risk: Low

CVSSv4.0: 1.8 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-21781

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient input validation in UEFI firmware. A local privileged user can gain access to sensitive information or perform a denial of service (DoS) attack.

Mitigation

This vulnerability affects the following platforms:

  • rSeries
    • All variants of r2000 & r4000 series appliances
    • All variants of r5000 & r10000 series appliances
  • VELOS BX520 blade

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

F5OS: 1.5.1 - 1.8.0

CPE2.3 External links

https://my.f5.com/manage/s/article/K000141509


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###