Tech company F5 has warned customers about a critical authentication bypass vulnerability impacting its BIG-IP product line that could result in unauthenticated remote code execution.
F5 provides services focused on security, reliability, and performance. BIG-IP is a collection of hardware platforms and software solutions that provides a wide range of services, including load balancing, web application firewall, access control, and DDoS protection.
Two security researchers found a critical vulnerability in the configuration utility of several versions of BIG-IP:
- 17.1.0 (Fixed in 22.214.171.124 + Hotfix-BIGIP-126.96.36.199.0.75.4-ENG)
- 16.1.0 – 16.1.4 (Fixed in 188.8.131.52 + Hotfix-BIGIP-184.108.40.206.0.50.5-ENG)
- 15.1.0 – 15.1.10 (Fixed in 220.127.116.11 + Hotfix-BIGIP-18.104.22.168.0.44.2-ENG)
- 14.1.0 – 14.1.5 (Fixed in 22.214.171.124 + Hotfix-BIGIP-126.96.36.199.0.10.6-ENG)
- 13.1.0 – 13.1.5 (Fixed in 188.8.131.52 + Hotfix-BIGIP-184.108.40.206.0.20.2-ENG)
In a post, F5 said:
“This vulnerability may allow an unauthenticated attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands.”
F5 also said customers can also use iHealth to check if they are vulnerable.
The Common Vulnerabilities and Exposures (CVE) database lists publicly disclosed computer security flaws. This CVEs is listed as:
CVE-2023-46747 (CVSS score 9.8 out of 10): Undisclosed requests may bypass configuration utility authentication, allowing an attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
BIG-IP defines a self IP address as an IP address on the BIG-IP system that you associate with a virtual local area network (VLAN), to access hosts in that VLAN. A customer normally assigns self IP addresses to a VLAN when they initially run the Setup utility on a BIG-IP system.
An authentication bypass happens when someone claims to have a given identity, but the software does not prove or insufficiently proves that the claim is correct.
Remote code execution (RCE) is when an attacker accesses a target computing device and makes changes remotely, no matter where the device is located.
In general you can say that if the BIG-IP Traffic Management User Interface is exposed to the internet, then the system in question is impacted. It’s estimated that there are over 6,000 external-facing instances of the application.
The researchers say exploitation of the vulnerability could lead to a total compromise of the F5 system by executing arbitrary commands as root on the target system.
“A seemingly low impact request smuggling bug can become a serious issue when two different services offload authentication responsibilities onto each other.”
If you are running a vulnerable version, F5 has a list of updates here.
If you can’t install a fixed version for any reason, then F5 advises you can block Configuration utility access through self IP addresses or block Configuration utility access through the management interface.
We don’t just report on vulnerabilities—we identify them, and prioritize action.
Cybersecurity risks should never spread beyond a headline. Keep vulnerabilities in tow by using Malwarebytes Vulnerability and Patch Management.