CVE-2024-41719

4.2 MEDIUM

📋 TL;DR

This vulnerability exposes F5 iHealth credentials in BIG-IP Central Manager logs when generating QKView diagnostic files from BIG-IP Next instances. This affects organizations using BIG-IP Next Central Manager to manage BIG-IP Next instances. The credentials could be accessed by anyone with access to the Central Manager logs.

💻 Affected Systems

Products:
  • F5 BIG-IP Next Central Manager
Versions: All versions prior to the fix (specific fixed version not provided in reference)
Operating Systems: Not specified - F5 appliance/software
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects BIG-IP Next instances managed through Central Manager when generating QKView files. Software versions at End of Technical Support (EoTS) are not evaluated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers with access to Central Manager logs could obtain iHealth credentials, potentially gaining unauthorized access to F5's iHealth diagnostic service and sensitive system information.

🟠

Likely Case

Internal administrators or users with log access could inadvertently view or capture iHealth credentials, potentially leading to credential misuse or accidental exposure.

🟢

If Mitigated

With proper log access controls and monitoring, the exposed credentials would only be accessible to authorized personnel, minimizing misuse risk.

🌐 Internet-Facing: LOW - The vulnerability requires access to Central Manager logs, which are typically not internet-facing.
🏢 Internal Only: MEDIUM - Internal users with log access could exploit this, but requires specific administrative access to Central Manager.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Requires access to Central Manager logs where credentials are exposed.

Exploitation requires access to Central Manager logs, which typically requires administrative or privileged access to the system.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in provided reference - check F5 advisory for specific fixed versions

Vendor Advisory: https://my.f5.com/manage/s/article/K000140006

Restart Required: Yes

Instructions:

1. Review F5 advisory K000140006 for specific fixed versions
2. Upgrade BIG-IP Next Central Manager to patched version
3. Restart Central Manager services as required

🔧 Temporary Workarounds

Disable QKView Generation

all

Prevent generation of QKView diagnostic files from Central Manager to avoid credential logging

No specific commands - configure through Central Manager UI/API to disable QKView generation

Restrict Log Access

linux

Implement strict access controls on Central Manager log files and directories

chmod 600 /var/log/f5/*
setfacl -m u:admin:r /var/log/f5/*

🧯 If You Can't Patch

  • Implement strict access controls on Central Manager log files and directories
  • Disable QKView generation functionality in Central Manager
  • Monitor Central Manager logs for unauthorized access attempts
  • Rotate iHealth credentials regularly

🔍 How to Verify

Check if Vulnerable:

Check if BIG-IP Next Central Manager is generating QKView files and review logs for iHealth credential exposure

Check Version:

Check Central Manager version through web UI or CLI: 'f5-central-manager --version' or similar

Verify Fix Applied:

After patching, generate QKView and verify iHealth credentials are no longer present in Central Manager logs

📡 Detection & Monitoring

Log Indicators:

  • iHealth credentials appearing in Central Manager logs
  • QKView generation events in Central Manager logs
  • Unauthorized access attempts to log files

Network Indicators:

  • Unusual outbound connections to F5 iHealth services

SIEM Query:

source="bigip-central-manager" AND ("iHealth" OR "credentials" OR "QKView")

🔗 References

📤 Share & Export