{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-26026","assignerOrgId":"9dacffd4-cb11-413f-8451-fbbfd4ddc0ab","state":"PUBLISHED","assignerShortName":"f5","dateReserved":"2024-04-24T21:34:51.145Z","datePublished":"2024-05-08T15:01:28.771Z","dateUpdated":"2025-09-18T19:53:02.145Z"},"containers":{"cna":{"providerMetadata":{"orgId":"9dacffd4-cb11-413f-8451-fbbfd4ddc0ab","shortName":"f5","dateUpdated":"2025-09-18T19:53:02.145Z"},"title":"BIG-IP Central Manager SQL Injection","datePublic":"2024-05-08T14:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-89","description":"CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')","type":"CWE"}]}],"affected":[{"vendor":"F5","product":"BIG-IP Next Central Manager","versions":[{"status":"affected","version":"20.0.1","lessThan":"20.2.0","versionType":"custom"}],"defaultStatus":"unknown"}],"descriptions":[{"lang":"en","value":"An SQL injection vulnerability exists in the BIG-IP Next Central Manager API (URI).  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated","supportingMedia":[{"type":"text/html","base64":false,"value":"<span style=\"background-color: rgb(255, 255, 255);\">An SQL injection vulnerability exists in the BIG-IP Next Central Manager API (URI).&nbsp; Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated\n\n</span>"}]}],"references":[{"url":"https://my.f5.com/manage/s/article/K000138733","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseSeverity":"HIGH","baseScore":7.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}}],"credits":[{"lang":"en","value":"F5 acknowledges Vladyslav Babkin of Eclypsium for bringing this issue to our attention and following the highest standards of coordinated disclosure.","type":"reporter"}],"source":{"discovery":"EXTERNAL"},"x_generator":{"engine":"F5 SIRTBot v1.0"}},"adp":[{"title":"CISA ADP Vulnrichment","metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-26026","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-05-08T16:30:53.526368Z"}}}],"affected":[{"cpes":["cpe:2.3:a:f5:big-ip_next_central_manager:20.0.1:*:*:*:*:*:*:*"],"vendor":"f5","product":"big-ip_next_central_manager","versions":[{"status":"affected","version":"20.0.1","lessThan":"20.2.0","versionType":"custom"}],"defaultStatus":"unknown"}],"providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-04T17:49:06.557Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T23:59:31.336Z"},"title":"CVE Program Container","references":[{"tags":["vendor-advisory","x_transferred"],"url":"https://my.f5.com/manage/s/article/K000138733"}]}]}}