CVE Vulnerabilities

CVE-2024-22389

Insufficient Session Expiration

Published: Feb 14, 2024 | Modified: Jan 23, 2025
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

When BIG-IP is deployed in high availability (HA) and an iControl REST API token is updated, the change does not sync to the peer device.

Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated

Weakness

According to WASC, “Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization.”

Affected Software

Name Vendor Start Version End Version
Big-ip_access_policy_manager F5 15.1.0 (including) 15.1.9 (excluding)
Big-ip_access_policy_manager F5 16.1.0 (including) 16.1.4 (excluding)
Big-ip_access_policy_manager F5 17.1.0 (including) 17.1.0 (including)

Potential Mitigations

References