Vulnerability Details : CVE-2023-24594
When an SSL profile is configured on a Virtual Server, undisclosed traffic can cause an increase in CPU or SSL accelerator resource utilization.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Products affected by CVE-2023-24594
- cpe:2.3:a:f5:big-ip_local_traffic_manager:16.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_local_traffic_manager:15.1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_local_traffic_manager:14.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_global_traffic_manager:16.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_global_traffic_manager:15.1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_global_traffic_manager:14.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_application_security_manager:16.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_application_security_manager:15.1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_application_security_manager:14.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_access_policy_manager:16.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_access_policy_manager:15.1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_webaccelerator:16.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_webaccelerator:15.1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_webaccelerator:14.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_edge_gateway:16.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_edge_gateway:15.1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_edge_gateway:14.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_link_controller:16.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_link_controller:15.1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_link_controller:14.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_analytics:16.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_analytics:15.1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_analytics:14.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_application_acceleration_manager:16.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_advanced_firewall_manager:16.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_policy_enforcement_manager:16.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_domain_name_system:16.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_domain_name_system:15.1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_domain_name_system:14.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_websafe:16.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_websafe:15.1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_websafe:14.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_fraud_protection_service:16.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_fraud_protection_service:15.1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_fraud_protection_service:14.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:16.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:15.1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:14.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:16.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:15.1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:14.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:16.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:15.1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:14.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_ssl_orchestrator:16.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_ssl_orchestrator:15.1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_ssl_orchestrator:14.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_carrier-grade_nat:16.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_carrier-grade_nat:15.1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_carrier-grade_nat:14.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:1.5.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-24594
0.14%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 35 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-24594
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
3.9
|
1.4
|
F5 Networks | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST | |
5.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
3.9
|
1.4
|
NIST |
CWE ids for CVE-2023-24594
-
The product does not properly control the allocation and maintenance of a limited resource.Assigned by:
- f5sirt@f5.com (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2023-24594
-
https://my.f5.com/manage/s/article/K000133132
BIG-IP TMM SSL vulnerability CVE-2023-24594Vendor Advisory
Jump to