Critical F5 BIG-IP bug​

Multiple vulnerabilities have been found in the F5’s BIG-IP network software  (BIG-IP iControl REST) authentication. Disclosed last week, the bug affects multiple versions of the network management software, which is being tracked as CVE-2022-1388.​

Patch ASAP! 

​Although CVE-2022-1388 is a proof-of-concept (PoC), there is still a high chance that this vulnerability could expose thousands of users to a remote takeover of their systems, whereby a threat actor could potentially execute commands on a vulnerable device and gain access using elevated privileges. ​

Mitigations

F5 have already released security firmware updates for the following: ​

  • ​BIG-IP versions 16.1.0 to 16.1.2 (Patch released)​
  • BIG-IP versions 15.1.0 to 15.1.5 (Patch released)​
  • BIG-IP versions 14.1.0 to 14.1.4 (Patch released)​
  • BIG-IP versions 13.1.0 to 13.1.4 (Patch released)​
  • BIG-IP versions 12.1.0 to 12.1.6 (End of Support)​
  • BIG-IP versions 11.6.1 to 11.6.5 (End of Support)​

Organisations running firmware versions 11.x and 12.x will not receive security updates and should upgrade to a newer version as soon as possible.​

If you cannot upgrade straight away, please follow the following steps:​

  1. BIG-IP iControl REST vulnerability CVE-2022-1388 (f5.com)
  2. BIG-IP iControl REST vulnerability CVE-2022-1388 (f5.com)
  3. BIG-IP iControl REST vulnerability CVE-2022-1388 (f5.com)

 ​Sources ​