CVE-2024-28132

4.4 MEDIUM

📋 TL;DR

This CVE describes an information disclosure vulnerability in F5's GSLB container where authenticated local attackers can access sensitive information. It affects supported F5 software versions, excluding those that have reached End of Technical Support. The vulnerability requires local access and authentication to exploit.

💻 Affected Systems

Products:
  • F5 BIG-IP GSLB container
Versions: Specific affected versions not provided in description; refer to F5 advisory K000138913
Operating Systems: Linux-based container environment
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects software versions that are still under technical support; EoTS versions are not evaluated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker with local access could exfiltrate sensitive configuration data, credentials, or other proprietary information from the GSLB container, potentially enabling further attacks.

🟠

Likely Case

An authenticated insider or compromised account with local access could view sensitive system information that should be restricted, leading to information disclosure.

🟢

If Mitigated

With proper access controls and network segmentation, the impact is limited to authorized users who already have legitimate access to the system.

🌐 Internet-Facing: LOW - The vulnerability requires local access and authentication, making direct internet exploitation unlikely.
🏢 Internal Only: MEDIUM - Internal attackers with valid credentials and local access could exploit this vulnerability to access sensitive information.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Requires authenticated local access but no special technical skills beyond basic system access.

Exploitation requires both authentication and local access to the affected container.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to F5 advisory K000138913 for specific fixed versions

Vendor Advisory: https://my.f5.com/manage/s/article/K000138913

Restart Required: Yes

Instructions:

1. Review F5 advisory K000138913 for affected versions. 2. Apply the recommended patch/update from F5. 3. Restart the GSLB container/service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Restrict Local Access

all

Limit local access to the GSLB container to only authorized administrative users

Implement strict access controls and least privilege principles for container access

Network Segmentation

all

Isolate the GSLB container from unnecessary network access

Configure firewall rules to restrict access to GSLB container management interfaces

🧯 If You Can't Patch

  • Implement strict access controls to limit who can authenticate to the GSLB container
  • Monitor and audit all access to the GSLB container for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check your F5 BIG-IP version against the affected versions listed in advisory K000138913

Check Version:

tmsh show sys version (on F5 BIG-IP)

Verify Fix Applied:

Verify the installed version is updated to a version not listed as vulnerable in the F5 advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts to GSLB container
  • Access to sensitive information paths by non-admin users
  • Multiple failed access attempts followed by successful access

Network Indicators:

  • Unexpected data exfiltration from GSLB container
  • Unusual connection patterns to container management interfaces

SIEM Query:

source="f5_bigip" AND (event_type="authentication" OR event_type="access_control") AND (user NOT IN authorized_admin_list OR resource="sensitive_gslb_data")

🔗 References

📤 Share & Export