CVE-2024-39778

7.5 HIGH

📋 TL;DR

This vulnerability affects F5 BIG-IP systems with stateless virtual servers configured on High-Speed Bridge (HSB). Undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate, leading to denial of service. Organizations running affected BIG-IP versions with HSB configurations are impacted.

💻 Affected Systems

Products:
  • F5 BIG-IP
Versions: Affected versions: 17.1.0-17.1.1, 16.1.0-16.1.5, 15.1.0-15.1.11, 14.1.0-14.1.6, 13.1.0-13.1.6
Operating Systems: F5 TMOS
Default Config Vulnerable: ✅ No
Notes: Only affects configurations with stateless virtual servers on High-Speed Bridge (HSB). Software versions that have reached End of Technical Support (EoTS) are not evaluated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete denial of service for all traffic passing through the BIG-IP system, requiring manual intervention to restart TMM or the entire system.

🟠

Likely Case

Service disruption affecting traffic through the vulnerable virtual server, potentially causing downtime for applications.

🟢

If Mitigated

Limited impact if proper network segmentation and monitoring are in place, with quick detection and recovery procedures.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The advisory mentions 'undisclosed requests' that can trigger the vulnerability, suggesting specific malformed traffic is required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in: 17.1.1.1, 16.1.5.1, 15.1.11.1, 14.1.6.1, 13.1.6.1

Vendor Advisory: https://my.f5.com/manage/s/article/K05710614

Restart Required: Yes

Instructions:

1. Download the appropriate fixed version from F5 Downloads. 2. Follow F5's upgrade procedures for your specific BIG-IP version. 3. Apply the update and restart the system as required.

🔧 Temporary Workarounds

Disable HSB Configuration

all

Remove or reconfigure stateless virtual servers from High-Speed Bridge configurations.

tmsh modify ltm virtual <virtual_server_name> vlans disabled

🧯 If You Can't Patch

  • Implement network controls to restrict access to the vulnerable virtual servers.
  • Monitor TMM process health and implement automated alerting for TMM termination events.

🔍 How to Verify

Check if Vulnerable:

Check BIG-IP version and verify if stateless virtual servers are configured on HSB using: tmsh list ltm virtual

Check Version:

tmsh show sys version

Verify Fix Applied:

Verify the installed version matches or exceeds the fixed versions listed in the advisory.

📡 Detection & Monitoring

Log Indicators:

  • TMM process termination events in /var/log/ltm
  • High availability failover events

Network Indicators:

  • Unusual traffic patterns to HSB-configured virtual servers
  • Service disruption alerts

SIEM Query:

source="/var/log/ltm" "TMM terminated" OR "TMM restart"

🔗 References

📤 Share & Export