Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 22, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 22, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 22, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 22, 2025

      How to open Control Center on your iPhone without swiping from top: 4 easier ways

      May 22, 2025

      How to try Veo 3, Google’s AI video generator that’s going viral on the internet

      May 22, 2025

      I just tested a smart cooler and can never go back to toting ice (and it’s $100 off)

      May 22, 2025

      This top-rated Dyson hair dryer is on sale for the lowest price yet on Amazon

      May 22, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Perficient is Shaping the Future of Salesforce Innovation

      May 22, 2025
      Recent

      Perficient is Shaping the Future of Salesforce Innovation

      May 22, 2025

      Opal – Optimizely’s AI-Powered Marketing Assistant

      May 22, 2025

      Content Compliance Without the Chaos: How Optimizely CMP Empowers Financial Services Marketers

      May 22, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Windows 11 24H2’s “no reboot” updates feature finally kicks off with KB5058497

      May 22, 2025
      Recent

      Windows 11 24H2’s “no reboot” updates feature finally kicks off with KB5058497

      May 22, 2025

      Windows 11 Notepad is turning into a full-fledged “AI writer” with Write feature

      May 22, 2025

      Microsoft Sora AI Bing Video Creator takes on Veo. It’s free on web, Android, iOS

      May 22, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Cybersecurity Alert: F5’s Next Central Manager Under Attack by Remote Exploits

    Cybersecurity Alert: F5’s Next Central Manager Under Attack by Remote Exploits

    May 9, 2024

    Security researchers have revealed new critical vulnerabilities in F5’s Next Central Manager, posing severe risks to organizational cybersecurity. These Next Central Manager vulnerabilities allowed attackers to exploit the Central Manager remotely, gaining full administrative control over the device. Subsequently, attackers could create unauthorized accounts on any F5 assets managed by the Central Manager, remaining undetected within the system.

    The vulnerabilities, collectively known as the “F5 Next Central Manager vulnerability,” were first identified by security researchers from Eclypsium. They disclosed their findings to F5, which subsequently assigned CVE identifiers CVE-2024-21793 and CVE-2024-26026 to the reported vulnerabilities.

    Understanding the Next Central Manager Vulnerabilities

    Source: Eclypsium

    F5 promptly responded to the Next Central Manager vulnerabilities in software version 20.2.0, urging organizations to upgrade to the latest version immediately to mitigate potential risks. However, it’s crucial to note that while five vulnerabilities were reported, CVEs were only assigned to two of them.

    The Next Central Manager serves as the centralized point of control for managing all tasks across the BIG-IP Next fleet. Despite F5’s efforts to enhance security with the Next generation of BIG-IP software, these vulnerabilities highlight the persistent challenges in safeguarding network and application infrastructure.

    The vulnerabilities enabled attackers to exploit various aspects of the Central Manager’s functionality. For instance, one vulnerability allowed attackers to inject malicious code into OData queries, potentially leading to the leakage of sensitive information, including administrative password hashes. Another vulnerability involved an SQL injection flaw, providing attackers with a means to bypass authentication measures.

    Technical Details and Responses to Next Central Manager Vulnerabilities

    Furthermore, an undocumented API vulnerability facilitated Server-Side Request Forgery (SSRF) attacks, enabling attackers to call API methods on any BIG-IP Next device. This allowed them to create unauthorized accounts on individual devices, evading detection by the Central Manager.

    Additionally, inadequate Bcrypt cost and a flaw allowing administrators to reset their passwords without prior knowledge posed further security risks. These weaknesses significantly lowered the barrier for attackers to compromise the system and maintain unauthorized access.

    The implications of these vulnerabilities were profound, as they could be exploited in various attack scenarios. Attackers could exploit the vulnerabilities to gain administrative control, manipulate account credentials, and create hidden accounts on managed devices, undermining the integrity and security of the entire network infrastructure.

    In response to these findings, security experts emphasized the importance of proactive security measures and vigilant monitoring of management interfaces. They advised organizations to enforce access control policies and adopt a zero-trust approach to mitigate the risks associated with such vulnerabilities.

    Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleInternational Baccalaureate Exam Hack Speculation Sparks Student Outrage
    Next Article Use Vue or React Components in a Livewire App with MingleJS

    Related Posts

    Development

    The Ampere Porting Advisor Tutorial

    May 22, 2025
    Development

    How to Build Scalable Web Apps with React JS

    May 22, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Dragon Age: The Veilguard pulled in 1.5 million players but still missed EA sales expectations by nearly half

    News & Updates

    “Swindler.” Elon Musk reportedly led an unsolicited bid to buy OpenAI for $97.4 billion, Sam Altman offers a withering response.

    News & Updates

    The Future of DeFi: Key Trends Driving the Next Wave of Financial Innovation

    Web Development

    Open Source GenAI powered chat based Data Engineering tool – Ask On Data

    Development
    Hostinger

    Highlights

    Multi Vulnerabilities Found in SonicWall SMA 100 Series Prompt Urgent Security Update

    May 8, 2025

    Multi Vulnerabilities Found in SonicWall SMA 100 Series Prompt Urgent Security Update

    SonicWall has released a security advisory detailing multiple vulnerabilities affecting its Secure Mobile Access (SMA) 100 series products. The advisory highlights three significant post-authenticatio …
    Read more

    Published Date:
    May 08, 2025 (1 hour, 56 minutes ago)

    Vulnerabilities has been mentioned in this article.

    CVE-2025-28121 – Code-Projects Online Exam Mastering System XSS Vulnerability

    April 21, 2025

    How to install Windows 11 the way you want (and sneak by Microsoft’s restrictions)

    July 29, 2024

    Vimal Mani on Managing Generative AI and Its Implementation Challenges in Cybersecurity

    August 2, 2024
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.