Security News > 2022 > May > F5 Warns of a New Critical BIG-IP Remote Code Execution Vulnerability

Cloud security and application delivery network provider F5 on Wednesday released patches to contain 43 bugs spanning its products.
"This vulnerability may allow an unauthenticated attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands, create or delete files, or disable services," F5 said in an advisory.
Block iControl REST access through the self IP address.
Block iControl REST access through the management interface.
With F5 appliances widely deployed in enterprise networks, it's imperative that organizations move quickly to apply the patches to prevent threat actors from exploiting the attack vector for initial access.
The security fixes come as the U.S. Cybersecurity and Infrastructure Security Agency added five new flaws to its Known Exploited Vulnerabilities Catalog based on evidence of active exploitation -.
News URL
https://thehackernews.com/2022/05/f5-warns-of-new-critical-big-ip-remote.html
Related news
- Elastic Releases Urgent Fix for Critical Kibana Vulnerability Enabling Remote Code Execution (source)
- New Critical AMI BMC Vulnerability Enables Remote Server Takeover and Bricking (source)
- New “whoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution (source)
- Critical flaws in Mongoose library expose MongoDB to data thieves, code execution (source)
- Moxa Issues Fix for Critical Authentication Bypass Vulnerability in PT Switches (source)
- Critical PHP RCE vulnerability mass exploited in new attacks (source)
- IBM scores perfect 10 ... vulnerability in mission-critical OS AIX (source)
- Critical Veeam Backup & Replication RCE vulnerability fixed, patch ASAP! (CVE-2025-23120) (source)
- WordPress security plugin WP Ghost vulnerable to remote code execution bug (source)
- Infoseccers criticize Veeam over critical RCE vulnerability and a failing blacklist (source)