CVE-2025-24319

6.5 MEDIUM

📋 TL;DR

This vulnerability allows attackers to send specific API requests to BIG-IP Next Central Manager that cause its Kubernetes service to crash, resulting in denial of service. This affects organizations running vulnerable versions of BIG-IP Next Central Manager for managing their F5 infrastructure.

💻 Affected Systems

Products:
  • F5 BIG-IP Next Central Manager
Versions: Versions prior to 20.2.0
Operating Systems: Linux (containerized Kubernetes environment)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects BIG-IP Next Central Manager, not BIG-IP Next instances themselves. Requires Central Manager to be running.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete disruption of BIG-IP Next Central Manager functionality, preventing management of BIG-IP Next instances and potentially cascading to affect managed services.

🟠

Likely Case

Temporary service interruption requiring manual restart of the Central Manager Kubernetes service, causing management downtime.

🟢

If Mitigated

Limited impact with proper network segmentation and API access controls preventing unauthorized requests.

🌐 Internet-Facing: HIGH if Central Manager API is exposed to internet, as unauthenticated requests can trigger the crash.
🏢 Internal Only: MEDIUM as internal attackers or compromised systems could still exploit this to disrupt management operations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Undisclosed API requests trigger the crash, suggesting simple HTTP requests could cause the issue. No authentication bypass mentioned.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 20.2.0 and later

Vendor Advisory: https://my.f5.com/manage/s/article/K000148412

Restart Required: Yes

Instructions:

1. Backup Central Manager configuration. 2. Upgrade to BIG-IP Next Central Manager 20.2.0 or later. 3. Verify service functionality post-upgrade.

🔧 Temporary Workarounds

Restrict API Access

all

Limit network access to Central Manager API endpoints to trusted management networks only

Configure firewall rules to restrict access to Central Manager API ports (typically 443)

API Rate Limiting

all

Implement rate limiting on API requests to prevent rapid exploitation attempts

Configure API gateway or load balancer to limit request rates to Central Manager

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Central Manager from untrusted networks
  • Monitor Central Manager service health and implement automated restart procedures for service recovery

🔍 How to Verify

Check if Vulnerable:

Check Central Manager version via web UI or API. Versions below 20.2.0 are vulnerable.

Check Version:

curl -k https://<central-manager-ip>/api/v1/system/version

Verify Fix Applied:

After upgrade to 20.2.0+, verify Central Manager Kubernetes service remains stable under normal API usage.

📡 Detection & Monitoring

Log Indicators:

  • Kubernetes service termination logs
  • Central Manager API error logs showing unexpected requests
  • Service restart events in system logs

Network Indicators:

  • Unusual API request patterns to Central Manager endpoints
  • Sudden drop in Central Manager API responses

SIEM Query:

source="central-manager-logs" AND ("service terminated" OR "kubelet restart" OR "pod crash")

🔗 References

📤 Share & Export