CVE-2022-1388

critical

Description

On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all 12.1.x and 11.6.x versions, undisclosed requests may bypass iControl REST authentication. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated

From the Tenable Blog

CVE-2022-1388: Authentication Bypass in F5 BIG-IP
CVE-2022-1388: Authentication Bypass in F5 BIG-IP

Published: 2022-05-05

CVE-2022-1388: Authentication Bypass in F5 BIG-IP F5 patched an authentication bypass in its BIG-IP product family that could lead to arbitrary command execution. This vulnerability is actively being exploited. Update May 10: The Identifying Affected Systems section now reflects the availability of a remote check. The Background section has also been updated based on active exploitation. View Change Log

References

https://www.tenable.com/blog/aa24-241a-joint-cybersecurity-advisory-on-iran-based-cyber-actors-targeting-us-organizations

https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-241a

https://www.tenable.com/blog/cve-2024-21793-cve-2024-26026-proof-of-concept-available-for-f5-big-ip-next-central-manager

https://www.tenable.com/blog/aa23-215a-2022s-top-routinely-exploited-vulnerabilities

https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-215a

https://www.tenable.com/cyber-exposure/tenable-2022-threat-landscape-report

https://www.tenable.com/blog/cisa-top-20-cves-exploited-peoples-republic-of-china-state-sponsored-actors-aa22-279a

https://support.f5.com/csp/article/K23605346

https://www.tenable.com/blog/cve-2022-1388-authentication-bypass-in-f5-big-ip

https://www.secpod.com/blog/critical-f5-big-ip-remote-code-execution-vulnerability-patch-now/

http://packetstormsecurity.com/files/167150/F5-BIG-IP-iControl-Remote-Code-Execution.html

http://packetstormsecurity.com/files/167118/F5-BIG-IP-16.0.x-Remote-Code-Execution.html

http://packetstormsecurity.com/files/167007/F5-BIG-IP-Remote-Code-Execution.html

Details

Source: Mitre, NVD

Published: 2022-05-05

Updated: 2023-11-02

Risk Information

CVSS v2

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Severity: High

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical