F5 warns of a critical BIG-IP RCE error that allows device takeover

0
351

[ad_1]

F5 has issued a security advisory about a flaw that may allow unauthenticated attackers with network access to execute arbitrary system commands, perform file actions, and disable services on BIG-IP.

The vulnerability is tracked as CVE-2022-1388 and has a CVSS v3 severity rating of 9.8, categorized as critical. Their exploitation can potentially lead to a complete takeover of the system.

According to the F5 security advisory, the flaw is in the iControl REST component and allows a malicious actor to send undisclosed requests to bypass iControl REST authentication on BIG-IP.

Due to the severity of the vulnerability and the widespread deployment of BIG-IP products in critical environments, CISA (Cybersecurity and Infrastructure Security Agency) has also issued an alert today.

The full list of affected products is shown below:

  • BIG-IP versions 16.1.0 to 16.1.2
  • BIG-IP versions 15.1.0 to 15.1.5
  • BIG-IP versions 14.1.0 to 14.1.4
  • BIG-IP versions 13.1.0 to 13.1.4
  • BIG-IP versions 12.1.0 to 12.1.6
  • BIG-IP versions 11.6.1 to 11.6.5

F5 has introduced fixes in v17.0.0, v16.1.2.2, v15.1.5.1, v14.1.4.6, and v13.1.5. The 12.x and 11.x branches will not receive a fix patch.

Additionally, the advisory clarifies that BIG-IQ Centralized Management, F5OS-A, F5OS-C, and Traffic SDC are not affected by CVE-2022-1388.

Table of affected products and corrected versions
Affected Products and Fixed Versions (F5)

F5 has provided the following three effective mitigations that can be used temporarily for those who are unable to apply security updates immediately.

Block all access to your BIG-IP system’s iControl REST interface through your own IP addresses, restrict access to only trusted users and devices through the management interface, or modify the BIG-IP httpd configuration.

F5 provided full details on how to do this in the advisory, but some methods, such as blocking access entirely, can impact services, including disrupting high availability (HA) configurations. As such, applying security updates is still the recommended way to go, if possible.

Finally, F5 has released a more generic advisory to cover an additional set of 17 high-severity vulnerabilities discovered and fixed in BIG-IP, so be sure to check that out as well.

16,000+ exposed BIG-IP devices

With F5 BIG-IP devices commonly used in the enterprise, this vulnerability presents a significant risk in allowing threat actors to gain initial access to corporate networks.

To make matters worse, instead of the company adequately protecting BIG-IP devices, security researcher Nate Warfield has seen the number of publicly exposed devices rise significantly since 2020.