F5, a multi-cloud security and application delivery vendor, has recently patched two high-risk vulnerabilities in its BIG-IP Next Central Manager. Get the details below.
This system is crucial for managing BIG-IP Next load balancers and application security instances, whether they are deployed on-premises or in the cloud. The vulnerabilities identified are CVE-2024-26026 and CVE-2024-21793, both of which pose significant security risks as they can be exploited to gain full administrative control over affected devices:
Both vulnerabilities affect versions from 20.0.1 to 20.1.0 of the Next Central Manager, and F5 has addressed these issues in the updated version 20.2.0. To date, there is no evidence that these vulnerabilities have been exploited in the wild.
Nuspire is proactively applying patches as they are released, following the recommendations provided by vendors like F5. Additionally, Nuspire conducts proactive threat hunting to detect any signs of compromise within our clients’ environments. This approach helps in the early detection and mitigation of potential threats arising from such vulnerabilities.
For administrators and users of BIG-IP Next Central Manager, it is crucial to update your systems to the latest version, 20.2.0, to mitigate the risks associated with these vulnerabilities. If immediate updates are not feasible, it is recommended that access to the Next Central Manager be restricted to trusted users within a secure network. This can help in reducing the attack surface and protecting against potential exploits until updates can be applied.
In addition, vulnerability management and patching can help mitigate these risks and ensure your network remains secure.