CVE-2025-24320

8.0 HIGH

📋 TL;DR

A stored XSS vulnerability in BIG-IP Configuration utility allows attackers to execute JavaScript in the context of logged-in users. This affects BIG-IP systems running vulnerable versions. The vulnerability results from an incomplete fix for CVE-2024-31156.

💻 Affected Systems

Products:
  • F5 BIG-IP
Versions: Specific versions not disclosed in CVE; check F5 advisory K000140578
Operating Systems: F5 TMOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects BIG-IP Configuration utility; versions with End of Technical Support are not evaluated

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, hijack sessions, deploy malware, or gain full administrative control of the BIG-IP system.

🟠

Likely Case

Attackers would steal session cookies or credentials to gain unauthorized access to the BIG-IP management interface.

🟢

If Mitigated

With proper network segmentation and access controls, impact would be limited to the management interface only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires attacker to have access to inject malicious payload into the Configuration utility

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check F5 advisory K000140578 for specific fixed versions

Vendor Advisory: https://my.f5.com/manage/s/article/K000140578

Restart Required: No

Instructions:

1. Review F5 advisory K000140578 2. Identify affected BIG-IP versions 3. Apply recommended F5 patches 4. Verify patch installation

🔧 Temporary Workarounds

Restrict Configuration Utility Access

all

Limit access to BIG-IP Configuration utility to trusted IP addresses only

Configure firewall rules to restrict access to BIG-IP management interface

Implement Content Security Policy

all

Add CSP headers to prevent XSS execution

Add 'Content-Security-Policy' header to web server configuration

🧯 If You Can't Patch

  • Isolate BIG-IP management interface from untrusted networks
  • Implement strict input validation and output encoding for Configuration utility

🔍 How to Verify

Check if Vulnerable:

Check BIG-IP version against F5 advisory K000140578

Check Version:

tmsh show sys version

Verify Fix Applied:

Verify BIG-IP version is updated to patched version listed in advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript payloads in Configuration utility logs
  • Multiple failed login attempts followed by successful login

Network Indicators:

  • Unexpected JavaScript in HTTP requests to Configuration utility
  • Suspicious outbound connections from BIG-IP management interface

SIEM Query:

source="bigip_logs" AND ("script" OR "javascript" OR "onload=" OR "onerror=")

🔗 References

📤 Share & Export