0 %

Researchers Develop RCE Exploit for the Latest F5 BIG-IP Vulnerability

May 9, 2022
BIG-IP Exploit

Days after F5 launched spots for a vital remote code implementation susceptability influencing its BIG-IP family members of items, safety scientists are cautioning that they had the ability to develop a make use of for the imperfection.

Tracked CVE-2022-1388 (CVSS rating: 9.8), the problem connects to an iControl remainder verification bypass that, if efficiently manipulated, can bring about remote code implementation, enabling an enemy to obtain preliminary gain access to and also take control of a damaged system.

This can vary anywhere from releasing cryptocurrency miners to releasing internet coverings for follow-on strikes, such as details burglary and also ransomware.

” We have actually replicated the fresh CVE-2022-1388 in F5’s BIG-IP,” cybersecurity business Favorable Technologies said in a tweet on Friday. “Spot ASAP!”

The crucial safety susceptability influences the complying with variations of BIG-IP items –

  • 16.1.0 – 16.1.2
  • 15.1.0 – 15.1.5
  • 14.1.0 – 14.1.4
  • 13.1.0 – 13.1.4
  • 12.1.0 – 12.1.6
  • 11.6.1 – 11.6.5

Solutions are readily available in variations 17.0.0, 16.1.2.2, 15.1.5.1, 14.1.4.6, and also 13.1.5. Firmware variations 11.x and also 12.x will certainly not obtain safety updates and also individuals relying upon those variations need to take into consideration updating to a more recent variation or use the workarounds –

  • Block iControl remainder gain access to with the self IP address
  • Block iControl remainder gain access to with the administration user interface, and also
  • Change the BIG-IP httpd setup

Last month, cybersecurity authorities from Australia, Canada, New Zealand, the U.K., and also the united state collectively advised that “hazard stars strongly targeted recently revealed crucial software program susceptabilities versus wide target collections, consisting of public and also economic sector companies worldwide.”

With the F5 BIG-IP problem discovered insignificant to manipulate, destructive hacking teams are anticipated to do the same, making it crucial that damaged companies use the spots.

Posted in SecurityTags:
Write a comment