Colin Mc Hugo

0 %
Colin Mc Hugo
Security Engineer Manager & CEO at Quantum Infinite Solutions Group Ltd.

High Severity Vulnerabilities Reported in F5 BIG-IP and BIG-IQ Devices

November 17, 2022
F5 BIG-IP and BIG-IQ Devices

Several protection susceptabilities have actually been divulged in F5 BIG-IP as well as BIG-IQ tools that, if efficiently made use of, to totally endanger impacted systems.

Cybersecurity company Rapid7 claimed the flaws might be abused to remote accessibility to the tools as well as beat protection restraints. The concerns effect BIG-IP variations 13.x, 14.x, 15.x, 16.x, as well as 17.x, as well as BIG-IQ Centralized Monitoring variations 7.x as well as 8.x.

Both high-severity concerns, which were reported to F5 on August 18, 2022, are as complies with –

  • CVE-2022-41622 (CVSS rating: 8.8) – A cross-site demand imitation (CSRF) susceptability via iControl SOAP, bring about unauthenticated remote code implementation.
  • CVE-2022-41800 (CVSS rating: 8.7) – An iControl remainder susceptability that might permit a verified customer with a Manager function to bypass Appliance mode constraints.

” By efficiently making use of the most awful of the susceptabilities (CVE-2022-41622), an assailant might obtain consistent origin accessibility to the gadget’s monitoring user interface (also if the monitoring user interface is not internet-facing),” Rapid7 scientist Ron Bowes said.

Nonetheless, it deserves keeping in mind that such a make use of calls for a manager with an energetic session to go to an aggressive internet site.

Additionally determined were three different instances of protection bypass, which F5 claimed can not be made use of without initial splitting existing protection obstacles via a formerly undocumented device.

Must such a circumstance occur, an opponent with Advanced Covering (bash) accessibility to the home appliance might weaponize these weak points to perform approximate system regulates, develop or remove data, or disable solutions.

While F5 has actually made no reference of any one of the susceptabilities being made use of in assaults, it’s advised that customers use the required spots as and also when they appear to reduce possible threats.

Posted in SecurityTags:
Write a comment