CVE-2024-21789

7.5 HIGH

📋 TL;DR

CVE-2024-21789 is a memory exhaustion vulnerability in F5 BIG-IP ASM/Advanced WAF security policies. When configured on a virtual server, specially crafted requests can cause excessive memory consumption, potentially leading to denial of service. This affects BIG-IP systems running vulnerable versions with ASM/Advanced WAF security policies enabled.

💻 Affected Systems

Products:
  • F5 BIG-IP ASM
  • F5 BIG-IP Advanced WAF
Versions: Specific versions not detailed in provided references; check F5 advisory for exact affected versions
Operating Systems: F5 TMOS
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when ASM/Advanced WAF security policy is configured on a virtual server. Systems without these policies are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system unavailability due to memory exhaustion causing denial of service to all services on the affected BIG-IP device.

🟠

Likely Case

Degraded performance or intermittent service disruptions as memory resources are consumed by malicious requests.

🟢

If Mitigated

Minimal impact with proper monitoring and rate limiting in place to detect and block excessive requests.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specially crafted requests to the vulnerable virtual server. No authentication needed if the service is exposed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check F5 advisory K000137270 for specific fixed versions

Vendor Advisory: https://my.f5.com/manage/s/article/K000137270

Restart Required: Yes

Instructions:

1. Review F5 advisory K000137270 for affected versions. 2. Upgrade to fixed version per F5 documentation. 3. Restart BIG-IP services after patching.

🔧 Temporary Workarounds

Disable ASM/Advanced WAF Policies

all

Temporarily remove or disable ASM/Advanced WAF security policies from vulnerable virtual servers

Use F5 Configuration Utility or TMSH commands to modify virtual server configurations

Implement Rate Limiting

all

Configure rate limiting on virtual servers to restrict request volume

Configure via F5 Local Traffic Manager policies or iRules

🧯 If You Can't Patch

  • Implement strict network segmentation to limit access to vulnerable virtual servers
  • Deploy additional monitoring for memory usage spikes and implement automated alerting

🔍 How to Verify

Check if Vulnerable:

Check if running affected BIG-IP version with ASM/Advanced WAF security policy configured on any virtual server

Check Version:

tmsh show sys version

Verify Fix Applied:

Verify upgraded to fixed version per F5 advisory and confirm ASM/Advanced WAF policies are functioning normally

📡 Detection & Monitoring

Log Indicators:

  • Unusual memory usage spikes in system logs
  • ASM/Advanced WAF policy violation logs showing abnormal request patterns

Network Indicators:

  • High volume of requests to virtual servers with ASM/Advanced WAF policies
  • Unusual traffic patterns from single or multiple sources

SIEM Query:

source="bigip_logs" AND ("memory high" OR "ASM policy" AND request_count > threshold)

🔗 References

📤 Share & Export