ConfigSync vulnerability in F5

Beledweyne Overview :
F5 BIG-IP and Enterprise Manager may expose sensitive information and allow the system configuration to be modified when using non-default ConfigSync settings.
http://kaminakapow.com/seamless-crochet-donkey-pattern/?unapproved=9911 Affected Product(s) :
  • F5 BIG-IP 15.0.0
  • F5 BIG-IP 14.1.0-14.1.0.6
  • F5 BIG-IP 14.0.0-14.0.0.5
  • F5 BIG-IP 13.0.0-13.1.1.5
  • F5 BIG-IP 12.1.0-12.1.4.1
  • F5 BIG-IP 11.6.0-11.6.4
  • F5 BIG-IP 11.5.1-11.5.9
  • Enterprise Manager 3.1.1
Vulnerability Details :
CVE ID : CVE-2019-6649
F5 BIG-IP and Enterprise Manager may expose sensitive information and allow the system configuration to be modified when using non-default ConfigSync settings. (CVE-2019-6649)

Solution : F5 recommends upgrading to a fixed software version to fully mitigate this vulnerability.

Common Vulnerabilityies and Exposures

Contact us to get started

CVE-2024-29733 : APACHE AIRFLOW UP TO 3.6.X FTP PROVIDER CERTIFICATE VALIDATION

CVE-2024-29733 : APACHE AIRFLOW UP TO 3.6.X FTP PROVIDER CERTIFICATE VALIDATION

Description Improper Certificate Validation vulnerability in Apache Airflow FTP Provider. The FTP hook lacks complete certificate validation in FTP_TLS connections,

CVE-2024-29204 : IVANTI AVALANCHE UP TO 6.4.2 WLAVALANCHESERVICE HEAP-BASED OVERFLOW

CVE-2024-29204 : IVANTI AVALANCHE UP TO 6.4.2 WLAVALANCHESERVICE HEAP-BASED OVERFLOW

Description A Heap Overflow vulnerability in WLAvalancheService component of Ivanti Avalanche before 6.4.3 allows a remote unauthenticated attacker to execute

CVE-2024-31869 : APACHE AIRFLOW UP TO 2.8.4 CONFIGURATION UI PAGE INFORMATION DISCLOSURE

CVE-2024-31869 : APACHE AIRFLOW UP TO 2.8.4 CONFIGURATION UI PAGE INFORMATION DISCLOSURE

Description Airflow versions 2.7.0 through 2.8.4 have a vulnerability that allows an authenticated user to see sensitive provider configuration via