On May 8, 2024, F5 released a comprehensive security advisory detailing multiple vulnerabilities across their product line. This quarterly notification highlights several high and medium Common Vulnerabilities and Exposures (CVEs) that could potentially impact a wide range of F5 devices. These include critical issues such as the BIG-IP Configuration utility XSS vulnerability (CVE-2024-31156), which affects various versions from 15.1.0 to 17.1.1, and the BIG-IP Next Central Manager OData Injection vulnerability (CVE-2024-21793). Users are urged to upgrade to the latest versions immediately to ensure their systems are protected.
The advisory lists several high-severity CVEs, including SQL Injection vulnerabilities and IPsec issues, which could allow attackers to execute unauthorized actions on affected systems. Specific products impacted include BIG-IP, BIG-IP Next Central Manager, and BIG-IP Advanced Firewall Manager (AFM). Each vulnerability is accompanied by its respective CVSS score, affected versions, and the fixed versions where patches have been introduced. For instance, the TMM vulnerability (CVE-2024-25560) affecting BIG-IP AFM has been addressed in versions 17.1.1 and 16.1.4.
Additionally, the notification covers medium-severity CVEs like the BIG-IP Next Central Manager vulnerability (CVE-2024-33612) and a BIG-IP TMM tenant issue on VELOS and rSeries platforms (CVE-2024-32761). These vulnerabilities, while not as critical, still pose significant risks and require prompt attention. F5 advises that users should also be aware of security exposures such as the failure to block HTTP Request Smuggling attacks, which have been mitigated in the latest updates.
For users unable to immediately apply the patches, F5 recommends various workarounds to mitigate the risks. Ensuring that software versions are current and implementing security best practices are essential steps in safeguarding against these vulnerabilities. Staying informed through these quarterly notifications and acting swiftly on the provided advisories can significantly enhance the security posture of F5 deployments.
Reference: