banner

Virtually 10 days after software safety firm F5 Networks released patches for crucial vulnerabilities in its BIG-IP and BIG-IQ merchandise, adversaries have begun opportunistically mass scanning and focusing on uncovered and unpatched networking gadgets to interrupt into enterprise networks.

Information of within the wild exploitation improvement comes on the heels of a proof-of-concept exploit code that surfaced on-line earlier this week by reverse-engineering the Java software program patch in BIG-IP. The mass scans are mentioned to have spiked since March 18.

The failings have an effect on BIG-IP variations 11.6 or 12.x and newer, with a crucial distant code execution (CVE-2021-22986) additionally impacting BIG-IQ variations 6.x and seven.x. CVE-2021-22986 (CVSS rating: 9.8) is notable for the truth that it is an unauthenticated, distant command execution vulnerability affecting the iControl REST interface, permitting an attacker to execute arbitrary system instructions, create or delete recordsdata, and disable providers with out the necessity for any authentication.

Profitable exploitation of those vulnerabilities may result in a full compromise of weak methods, together with the potential of distant code execution in addition to set off a buffer overflow, resulting in a denial of service (DoS) assault.

Whereas F5 mentioned it not conscious of any public exploitation of those points on March 10, researchers from NCC Group said they’ve now discovered proof of “full chain exploitation of F5 BIG-IP/BIG-IQ iControl REST API vulnerabilities CVE-2021-22986” within the wake of a number of exploitation makes an attempt towards its honeypot infrastructure.

Moreover, Palo Alto Networks’ Unit 42 risk intelligence crew said it discovered makes an attempt to use CVE-2021-22986 to put in a variant of the Mirai botnet. But it surely’s not instantly clear if these assaults had been profitable.

Given the recognition of BIG-IP/BIG-IQ in company and authorities networks, it ought to come as no shock that that is the second time in a 12 months F5 home equipment have grow to be a profitable goal for exploitation.

Final July, the corporate addressed an identical crucial flaw (CVE-2020-5902), following which it was abused by Iranian and Chinese language state-sponsored hacking teams, prompting the U.S. Cybersecurity and Infrastructure Safety Company (CISA) to concern an alert cautioning of a “broad scanning exercise for the presence of this vulnerability throughout federal departments and businesses.”

“The underside line is that [the flaws] have an effect on all BIG-IP and BIG-IQ clients and cases — we urge all clients to replace their BIG-IP and BIG-IQ deployments to the mounted variations as quickly as doable,” F5 Senior Vice President Kara Sprague noted final week.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.