CVE-2025-24312

7.5 HIGH

📋 TL;DR

This vulnerability in BIG-IP AFM with IPS module enabled allows undisclosed traffic to cause excessive CPU utilization, potentially leading to denial of service. It affects F5 BIG-IP systems with AFM provisioned and IPS module enabled. Only supported software versions are affected.

💻 Affected Systems

Products:
  • F5 BIG-IP Advanced Firewall Manager (AFM)
Versions: Supported versions with AFM provisioned and IPS module enabled
Operating Systems: F5 TMOS
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when AFM is provisioned with IPS module enabled AND protocol inspection profile is configured on virtual server, firewall rule, or policy.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system unavailability due to CPU exhaustion, causing denial of service for all traffic through affected virtual servers.

🟠

Likely Case

Degraded performance and intermittent service disruptions as CPU resources are consumed by malicious traffic.

🟢

If Mitigated

Minimal impact with proper traffic filtering and monitoring in place to detect and block exploitation attempts.

🌐 Internet-Facing: HIGH - Internet-facing virtual servers with IPS inspection are directly exposed to potential exploitation.
🏢 Internal Only: MEDIUM - Internal systems are still vulnerable but require attacker access to internal network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires sending specific undisclosed traffic patterns to trigger CPU utilization. No authentication required to send traffic to affected services.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check F5 advisory K000141380 for specific fixed versions

Vendor Advisory: https://my.f5.com/manage/s/article/K000141380

Restart Required: No

Instructions:

1. Review F5 advisory K000141380 for affected versions. 2. Upgrade to fixed version per F5 documentation. 3. Verify IPS functionality post-upgrade.

🔧 Temporary Workarounds

Disable protocol inspection profiles

all

Remove protocol inspection profiles from virtual servers, firewall rules, and policies to mitigate vulnerability

tmsh modify ltm virtual <virtual_server_name> profiles delete { <inspection_profile_name> }

Temporarily disable IPS module

all

Disable IPS module in AFM configuration if protocol inspection is not required

tmsh modify security firewall dos-device-config dos-device-config <config_name> ips disabled

🧯 If You Can't Patch

  • Implement strict network ACLs to limit traffic to affected virtual servers
  • Deploy rate limiting and traffic shaping to prevent CPU exhaustion

🔍 How to Verify

Check if Vulnerable:

Check if AFM is provisioned with IPS enabled and protocol inspection profiles are configured: tmsh list security firewall dos-device-config | grep -A5 ips

Check Version:

tmsh show sys version

Verify Fix Applied:

Verify version is patched: tmsh show sys version | grep -i version, and confirm no abnormal CPU spikes during traffic

📡 Detection & Monitoring

Log Indicators:

  • High CPU utilization alerts in system logs
  • IPS module restart events
  • Virtual server performance degradation logs

Network Indicators:

  • Unusual traffic patterns to virtual servers with IPS inspection
  • Increased latency through affected services

SIEM Query:

source="bigip*" ("CPU utilization" > 90% OR "ips" AND "restart")

🔗 References

📤 Share & Export