CVE-2024-33608

7.5 HIGH

📋 TL;DR

This vulnerability in F5 BIG-IP systems allows remote attackers to cause a denial of service by sending specific traffic to IPsec-configured virtual servers, triggering termination of the Traffic Management Microkernel (TMM). This affects organizations using F5 BIG-IP devices with IPsec VPN configurations.

💻 Affected Systems

Products:
  • F5 BIG-IP
Versions: Affected versions not specified in provided references; check F5 advisory for specific versions
Operating Systems: F5 TMOS
Default Config Vulnerable: ✅ No
Notes: Only affects systems with IPsec configured on virtual servers. Standard configurations without IPsec are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption as TMM termination causes all traffic processing to stop, requiring manual intervention to restart services.

🟠

Likely Case

Intermittent service outages affecting IPsec VPN connections and potentially other traffic processed by the affected TMM instance.

🟢

If Mitigated

Limited impact to specific virtual servers if proper network segmentation and monitoring are in place.

🌐 Internet-Facing: HIGH - IPsec VPN endpoints are typically internet-facing and directly exposed to attack traffic.
🏢 Internal Only: MEDIUM - Internal IPsec connections could be exploited by compromised internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specific traffic to IPsec endpoints but no authentication is needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check F5 advisory K000138728 for specific fixed versions

Vendor Advisory: https://my.f5.com/manage/s/article/K000138728

Restart Required: Yes

Instructions:

1. Review F5 advisory K000138728 for affected versions. 2. Upgrade to patched version. 3. Restart TMM services after patching.

🔧 Temporary Workarounds

Disable IPsec on vulnerable virtual servers

all

Temporarily remove IPsec configuration from virtual servers until patching can be completed

tmsh modify ltm virtual <virtual_server_name> ipsec none

Implement network controls

all

Restrict access to IPsec endpoints using firewall rules or network segmentation

🧯 If You Can't Patch

  • Implement strict network access controls to limit which systems can communicate with IPsec endpoints
  • Monitor TMM process health and implement automated restart procedures for service recovery

🔍 How to Verify

Check if Vulnerable:

Check if IPsec is configured on any virtual servers using: tmsh list ltm virtual one-line | grep ipsec

Check Version:

tmsh show sys version

Verify Fix Applied:

Verify installed version matches patched version from F5 advisory and confirm IPsec functionality

📡 Detection & Monitoring

Log Indicators:

  • TMM process termination events in /var/log/ltm
  • Unexpected service restarts in system logs

Network Indicators:

  • Sudden loss of IPsec connectivity
  • Increased traffic to IPsec endpoints followed by service disruption

SIEM Query:

source="*/var/log/ltm*" AND "TMM terminated" OR "TMM restart"

🔗 References

📤 Share & Export