Security News > 2022 > May > Hackers exploiting critical F5 BIG-IP bug, public exploits released

Hackers exploiting critical F5 BIG-IP bug, public exploits released
2022-05-09 15:20

Threat actors have started massively exploiting the critical vulnerability tracked as CVE-2022-1388, which affects multiple versions of all F5 BIG-IP modules, to drop malicious payloads.

F5 last week released patches for the security issue, which affects the BIG-IP iControl REST authentication component.

The company warned that the vulnerability enables an unauthenticated attacker on the BIG-IP system to run "Arbitrary system commands, create or delete files, or disable services."

Yesterday, multiple security researchers announced that they had created working exploits and warned administrators to install the latest updates immediately.

Today, the bubble burst and exploits became available publicly since the attacks require just two commands and some headers sent to an unpatched 'bash' endpoint exposed to the internet.

To help BIG-IP administrators, researchers at Randori attack surface management company published bash code that determines if CVE-2022-1388 is exploitable on their instances or not.


News URL

https://www.bleepingcomputer.com/news/security/hackers-exploiting-critical-f5-big-ip-bug-public-exploits-released/

Related Vulnerability

DATE CVE VULNERABILITY TITLE RISK
2022-05-05 CVE-2022-1388 Missing Authentication for Critical Function vulnerability in F5 products
On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all 12.1.x and 11.6.x versions, undisclosed requests may bypass iControl REST authentication.
network
low complexity
f5 CWE-306
critical
9.8

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
F5 143 6 276 404 64 750