{ "id": "CVE-2024-28883", "sourceIdentifier": "f5sirt@f5.com", "published": "2024-05-08T15:15:09.380", "lastModified": "2024-05-08T17:05:24.083", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An origin validation vulnerability exists in \n\nBIG-IP APM browser network access VPN client \n\n\n\n for Windows, macOS and Linux which may allow an attacker to bypass F5 endpoint inspection. \n\n\nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated." }, { "lang": "es", "value": "Existe una vulnerabilidad de validaci\u00f3n de origen en el cliente VPN de acceso a la red del navegador BIG-IP APM para Windows, macOS y Linux que puede permitir a un atacante eludir la inspecci\u00f3n del endpoint F5. Nota: Las versiones de software que han llegado al final del soporte t\u00e9cnico (EoTS) no se eval\u00faan." } ], "metrics": { "cvssMetricV31": [ { "source": "f5sirt@f5.com", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.2, "impactScore": 5.2 } ] }, "weaknesses": [ { "source": "f5sirt@f5.com", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-346" } ] } ], "references": [ { "url": "https://my.f5.com/manage/s/article/K000138744", "source": "f5sirt@f5.com" } ] }