Race condition in F5OS Intel BIOS firmware



Risk Low
Patch available NO
Number of vulnerabilities 1
CVE-ID CVE-2024-23599
CWE-ID CWE-362
Exploitation vector Local
Public exploit N/A
Vulnerable software
F5OS
Operating systems & Components / Operating system

Vendor F5 Networks

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Race condition

EUVDB-ID: #VU97445

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-23599

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a race condition in Seamless Firmware Updates for some Intel reference platforms. A local user can exploit the race and perform a denial of service (DoS) attack.

Mitigation

This vulnerability affects the following platforms:

  • rSeries
    • All variants of r5000 & r10000 series appliances
  • VELOS BX520 blade

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

F5OS: 1.5.1 - 1.8.0

CPE2.3 External links

https://my.f5.com/manage/s/article/K000141500


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###