cve/2024/CVE-2024-45844.md

20 lines
972 B
Markdown
Raw Normal View History

2025-09-29 21:09:30 +02:00
### [CVE-2024-45844](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45844)
![](https://img.shields.io/static/v1?label=Product&message=BIG-IP&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=15.1.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=16.1.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=17.1.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-306%20Missing%20Authentication%20for%20Critical%20Function&color=brightgreen)
### Description
BIG-IP monitor functionality may allow an attacker to bypass access control restrictions, regardless of the port lockdown settings.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
### POC
#### Reference
- https://offsec.almond.consulting/privilege-escalation-f5-CVE-2024-45844.html
#### Github
No PoCs found on GitHub currently.