CVE-2024-32761

6.5 MEDIUM

πŸ“‹ TL;DR

This CVE describes a data leak vulnerability in F5 BIG-IP Traffic Management Microkernels (TMMs) running on VELOS and rSeries platforms. Under certain conditions, it may leak up to 64 bytes of non-contiguous randomized data, and in rare cases could cause TMM restarts affecting availability. Only BIG-IP tenants on VELOS and rSeries platforms running supported software versions are affected.

πŸ’» Affected Systems

Products:
  • F5 BIG-IP Traffic Management Microkernels (TMMs)
Versions: Supported versions on VELOS and rSeries platforms (versions that have not reached End of Technical Support)
Operating Systems: F5 TMOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects BIG-IP tenants running on VELOS and rSeries platforms; software versions that have reached End of Technical Support (EoTS) are not evaluated

⚠️ Risk & Real-World Impact

πŸ”΄

Worst Case

TMM restart causing service disruption and potential data leakage of sensitive information from memory

🟠

Likely Case

Minor data leakage of random memory bytes with minimal security impact

🟒

If Mitigated

No impact if proper network segmentation and access controls prevent exploitation

🌐 Internet-Facing: MEDIUM - While exploitation is random and not deliberate, internet-facing systems could leak data to attackers
🏒 Internal Only: LOW - Internal systems have reduced exposure, but data leakage could still occur within trusted networks

🎯 Exploit Status

Public PoC: βœ… No
Weaponized: NO
Unauthenticated Exploit: βœ… No
Complexity: HIGH

The vulnerability occurs randomly and cannot be deliberately triggered according to the description

πŸ› οΈ Fix & Mitigation

βœ… Official Fix

Patch Version: Check F5 advisory K000139217 for specific fixed versions

Vendor Advisory: https://my.f5.com/manage/s/article/K000139217

Restart Required: Yes

Instructions:

1. Review F5 advisory K000139217 for affected versions. 2. Upgrade to patched versions as specified in the advisory. 3. Restart TMM services after patching.

πŸ”§ Temporary Workarounds

Network segmentation and access controls

all

Implement strict network segmentation and access controls to limit exposure of affected systems

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected systems
  • Monitor for TMM restarts and unusual memory access patterns

πŸ” How to Verify

Check if Vulnerable:

Check BIG-IP version and platform type against F5 advisory K000139217

Check Version:

tmsh show sys version

Verify Fix Applied:

Verify BIG-IP version is updated to patched version specified in F5 advisory

πŸ“‘ Detection & Monitoring

Log Indicators:

  • Unexpected TMM restarts
  • Memory access errors in system logs

Network Indicators:

  • Unusual traffic patterns to/from TMM services

SIEM Query:

Search for 'TMM restart' or 'memory leak' events in BIG-IP logs

πŸ”— References

πŸ“€ Share & Export