CVE-2023-24461

7.4 HIGH

📋 TL;DR

CVE-2023-24461 is an improper certificate validation vulnerability in F5 BIG-IP Edge Client for Windows and macOS that allows attackers to impersonate legitimate BIG-IP APM systems. This could enable man-in-the-middle attacks against VPN connections. Organizations using BIG-IP Edge Client for remote access are affected.

💻 Affected Systems

Products:
  • F5 BIG-IP Edge Client
Versions: Versions prior to 7.2.3.2
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects BIG-IP Edge Client, not the BIG-IP APM system itself. End-of-Technical-Support versions not evaluated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could intercept and manipulate all VPN traffic, steal credentials, access internal resources, and maintain persistent access to corporate networks.

🟠

Likely Case

Attackers on the same network could intercept VPN traffic, potentially capturing sensitive data and credentials from remote workers.

🟢

If Mitigated

With proper network segmentation and monitoring, impact would be limited to potential credential exposure on compromised endpoints.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires attacker to be in a position to intercept network traffic (same network or compromised infrastructure).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.2.3.2 and later

Vendor Advisory: https://my.f5.com/manage/s/article/K000132539

Restart Required: Yes

Instructions:

1. Download BIG-IP Edge Client version 7.2.3.2 or later from F5 Downloads. 2. Uninstall previous version. 3. Install updated version. 4. Restart system.

🔧 Temporary Workarounds

Network Segmentation

all

Segment VPN traffic to limit potential exposure if certificate validation fails

Certificate Pinning

all

Implement certificate pinning at network perimeter to detect certificate anomalies

🧯 If You Can't Patch

  • Restrict VPN access to essential personnel only
  • Implement additional authentication factors for VPN connections

🔍 How to Verify

Check if Vulnerable:

Check Edge Client version in application settings or About dialog. Versions below 7.2.3.2 are vulnerable.

Check Version:

On Windows: Check 'About' in Edge Client menu. On macOS: Click Edge Client menu > About Edge Client.

Verify Fix Applied:

Verify Edge Client version is 7.2.3.2 or higher after update.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed certificate validations
  • Unexpected certificate changes in VPN connections

Network Indicators:

  • Unusual certificate authorities in VPN handshakes
  • MITM detection alerts

SIEM Query:

source="edge-client" AND (event="certificate_validation_failed" OR event="untrusted_certificate")

🔗 References

📤 Share & Export