F5 Released Hotfixes for BIG-IP and iControl REST Vulnerabilities

F5 Released Hotfixes for BIG-IP and iControl REST Vulnerabilities

The vulnerability CVE-2022-41622 makes BIG-IP and BIG-IQ vulnerable to unauthenticated remote code execution (RCE) via cross-site request forgery due to Big-IP’s SOAP API lacking CSRF protection and other protective measures.

CVE-2022-41622 and CVE-2022-41800 Vulnerabilities

An attacker may trick users who have at least resource administrator role privilege and are authenticated through basic authentication in iControl SOAP into performing critical actions. An attacker can exploit this vulnerability only through the control plane, not through the data plane. If exploited, the vulnerability can compromise the complete system.

According to researcher Ron Bowes, SELinux bypasses are necessary for a few exploit paths. 

The second vulnerability, identified as CVE-2022-41800, could be exploited in appliance mode, allowing an authenticated remote attacker to execute arbitrary code in iControl REST

Which F5 Products are Vulnerable?

CVEVulnerabilityCVSS scoreAffected productsAffected versions
CVE-2022-41622K94221585: iControl SOAP Vulnerability8.8BIG-IP (all modules)17.0.0 
16.1.0 – 16.1.3 
15.1.0 – 15.1.8 
14.1.0 – 14.1.5 
13.1.0 – 13.1.5
BIG-IQ Centralized Management8.0.0 – 8.2.0 
7.1.0
CVE-2022-41800K13325942: Appliance mode iControl REST vulnerability8.7BIG-IP (all modules)17.0.0 
16.1.0 – 16.1.3 
15.1.0 – 15.1.8 
14.1.0 – 14.1.5 
13.1.0 – 13.1.5

Mitigation

Hotfixes are available. Users are recommended to keep checking AskF5, as fixes for these vulnerabilities will be released soon. 

About the Author:

FirstHackersNews- Identifies Security

Leave A Comment

Subscribe to our newsletter to receive security tips everday!