Critical Vulnerabilities in F5 Central Manager Enable Unauthorized Access and Device Takeover

Published:

spot_img

F5 Central Manager Vulnerabilities: Critical Flaws Discovered

A new report by security firm Eclypsium has revealed two critical vulnerabilities in F5 Next Central Manager that could potentially be exploited by threat actors to take control of devices and create hidden rogue administrator accounts. The flaws, labelled as CVE-2024-21793 and CVE-2024-26026, have a CVSS score of 7.5 each and impact Next Central Manager versions from 20.0.1 to 20.1.0. The vulnerabilities have been patched in version 20.2.0.

If exploited, these vulnerabilities could grant attackers full administrative control of the device, allowing them to create accounts on any F5 assets managed by the Central Manager. What is particularly concerning is that the created accounts would remain hidden from the Central Manager due to a server-side request forgery (SSRF) vulnerability, enabling attackers to maintain persistence even after the system has been patched.

In addition, Eclypsium also identified two more weaknesses that could facilitate brute-force attacks against admin passwords and enable password resets without knowledge of the previous password. This could potentially allow attackers to block legitimate access to the device from any account.

While there are currently no reports of active exploitation in the wild, users are strongly advised to update their instances to the latest version to safeguard against potential threats. As cyberattacks targeting networking and application infrastructure continue to rise, it is crucial for organizations to stay vigilant and prioritize security measures to prevent unauthorized access and maintain the integrity of their systems.

spot_img

Related articles

Recent articles

Jaipur Cyber Bust: Two Arrested for Shopping with Stolen Credit Cards

Jaipur Police Unveil Major Cyber Fraud Operation The Jaipur Police have successfully dismantled a complex cyber fraud operation that exploited mobile devices through malicious links....

RondoDox Botnet Targets Critical React2Shell Vulnerability to Take Over IoT Devices and Web Servers

Jan 01, 2026Ravie LakshmananNetwork Security / Vulnerability Ongoing Campaign Targets IoT Devices via RondoDox Botnet Cybersecurity experts have unveiled new details surrounding a prolonged attack campaign...

Emirates 2025: 55.6 Million Passengers, New Aircraft, Starlink Launch, and 180,500 Flights Expected

Emirates Airlines: A Year of Growth and Innovation in 2025 Emirates Airlines, a prominent name in the global aviation industry, experienced remarkable growth in 2025....

ITR Not Processed by December 31, 2025? Key Risks and Essential Steps for Taxpayers

With December 31, 2025, fast approaching, countless taxpayers across India are keenly watching the status of their Income Tax Returns (ITRs) for the ongoing...