CVE Vulnerabilities

CVE-2024-33608

Access of Uninitialized Pointer

Published: May 08, 2024 | Modified: Oct 21, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

When IPsec is configured on a virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.

Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Weakness

The product accesses or uses a pointer that has not been initialized.

Affected Software

Name Vendor Start Version End Version
Big-ip_access_policy_manager F5 17.1.0 (including) 17.1.0 (including)
Big-ip_advanced_firewall_manager F5 17.1.0 (including) 17.1.0 (including)
Big-ip_advanced_web_application_firewall F5 17.1.0 (including) 17.1.0 (including)
Big-ip_analytics F5 17.1.0 (including) 17.1.0 (including)
Big-ip_application_acceleration_manager F5 17.1.0 (including) 17.1.0 (including)
Big-ip_application_security_manager F5 17.1.0 (including) 17.1.0 (including)
Big-ip_application_visibility_and_reporting F5 17.1.0 (including) 17.1.0 (including)
Big-ip_automation_toolchain F5 17.1.0 (including) 17.1.0 (including)
Big-ip_carrier-grade_nat F5 17.1.0 (including) 17.1.0 (including)
Big-ip_container_ingress_services F5 17.1.0 (including) 17.1.0 (including)
Big-ip_ddos_hybrid_defender F5 17.1.0 (including) 17.1.0 (including)
Big-ip_domain_name_system F5 17.1.0 (including) 17.1.0 (including)
Big-ip_edge_gateway F5 17.1.0 (including) 17.1.0 (including)
Big-ip_fraud_protection_service F5 17.1.0 (including) 17.1.0 (including)
Big-ip_global_traffic_manager F5 17.1.0 (including) 17.1.0 (including)
Big-ip_link_controller F5 17.1.0 (including) 17.1.0 (including)
Big-ip_local_traffic_manager F5 17.1.0 (including) 17.1.0 (including)
Big-ip_policy_enforcement_manager F5 17.1.0 (including) 17.1.0 (including)
Big-ip_ssl_orchestrator F5 17.1.0 (including) 17.1.0 (including)
Big-ip_webaccelerator F5 17.1.0 (including) 17.1.0 (including)
Big-ip_websafe F5 17.1.0 (including) 17.1.0 (including)

Extended Description

If the pointer contains an uninitialized value, then the value might not point to a valid memory location. This could cause the product to read from or write to unexpected memory locations, leading to a denial of service. If the uninitialized pointer is used as a function call, then arbitrary functions could be invoked. If an attacker can influence the portion of uninitialized memory that is contained in the pointer, this weakness could be leveraged to execute code or perform other attacks. Depending on memory layout, associated memory management behaviors, and product operation, the attacker might be able to influence the contents of the uninitialized pointer, thus gaining more fine-grained control of the memory location to be accessed.

References