CVE-2024-31156

8.0 HIGH

📋 TL;DR

This stored XSS vulnerability in the BIG-IP Configuration utility allows attackers to inject malicious JavaScript that executes when legitimate users view the compromised page. This affects BIG-IP systems running supported software versions, potentially enabling session hijacking, credential theft, or configuration changes.

💻 Affected Systems

Products:
  • F5 BIG-IP
Versions: Specific versions not disclosed in public description; check F5 advisory for affected versions
Operating Systems: F5 TMOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects supported software versions (not EoTS). Requires authenticated access to Configuration utility.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains administrative control of BIG-IP system, modifies network configurations, intercepts all traffic, or deploys persistent backdoors across the network infrastructure.

🟠

Likely Case

Attacker steals administrator session cookies, gains unauthorized access to the Configuration utility, and modifies load balancing rules or SSL/TLS settings.

🟢

If Mitigated

Attack limited to isolated administrative interface with no lateral movement due to network segmentation and strict access controls.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires attacker to have authenticated access to Configuration utility or compromise legitimate user credentials first.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check F5 advisory K000138636 for specific fixed versions

Vendor Advisory: https://my.f5.com/manage/s/article/K000138636

Restart Required: Yes

Instructions:

1. Log into F5 Support site 2. Download appropriate fixed version for your BIG-IP model 3. Backup configuration 4. Install update via Configuration utility or CLI 5. Reboot system as required

🔧 Temporary Workarounds

Restrict Configuration Utility Access

all

Limit access to BIG-IP Configuration utility to trusted IP addresses only

Configure firewall rules to restrict access to BIG-IP management IP/ports

Implement WAF Protection

all

Deploy web application firewall with XSS protection rules

Configure ASM policy with XSS attack signatures enabled

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate BIG-IP management interfaces
  • Enforce multi-factor authentication for all BIG-IP administrative accounts

🔍 How to Verify

Check if Vulnerable:

Check BIG-IP version against affected versions in F5 advisory K000138636

Check Version:

tmsh show sys version

Verify Fix Applied:

Verify installed version matches or exceeds fixed version from F5 advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript payloads in Configuration utility access logs
  • Multiple failed login attempts followed by successful login

Network Indicators:

  • Unexpected connections to BIG-IP management interface from unusual IPs
  • Suspicious outbound connections from BIG-IP system

SIEM Query:

source="bigip_logs" AND ("script" OR "javascript" OR "<script") AND uri="*Configuration*"

🔗 References

📤 Share & Export