Site icon API Security Blog

High Severity Vulnerabilities Reported in F5 BIG-IP and BIG-IQ Devices

[![F5 BIG-IP and BIG-IQ Devices](https://thehackernews.com/new-images/img/b/R29vZ2xl/AVvXsEirxx9Y9QPuT5YjS4qVUHPX6HrTMxaZvdzQAGYAGa4c3ZmQ0d9frPiE2XxlWHjKea_UmoQ_QM5xRb18kEv7DcTQfztfQ2ifqniNVN8lPEwA-zA3BrWjAfRP7OzkqlIWxyFYdhKsh0LPZ6poG9X8NYV7IltViMModBVtUZLm8-RS7HZm_Bi7kJ_oR86t/s728-e1000/f5.jpg)]()

Multiple security vulnerabilities have been disclosed in F5 BIG-IP and BIG-IQ devices that, if successfully exploited, to completely compromise affected systems.

Cybersecurity firm Rapid7 said the [flaws]() could be abused to remote access to the devices and defeat security constraints.

The two high-severity issues, which were reported to F5 on August 18, 2022, are as follows –

* **CVE-2022-41622** (CVSS score: 8.8) – A cross-site request forgery ([CSRF]()) vulnerability through iControl SOAP, leading to unauthenticated remote code execution.
* **CVE-2022-41800** (CVSS score: 8.7) – An iControl REST vulnerability that could allow an authenticated user with an Administrator role to bypass [Appliance mode]() restrictions.

“By successfully exploiting the worst of the vulnerabilities (CVE-2022-41622), an attacker could gain persistent root access to the device’s management interface (even if the management interface is not internet-facing),” Rapid7 researcher Ron Bowes [said]().

However, it’s worth noting that such an exploit requires an administrator with an active session to visit a hostile website.

Also identified were [three different instances]() of security bypass, which F5 said cannot be exploited without first breaking existing security barriers through a previously undocumented mechanism.

Should such a scenario arise, an adversary with Advanced Shell ([bash]()) access to the appliance could weaponize these weaknesses to execute arbitrary system commands, create or delete files, or disable services.

While F5 has made no mention of any of the vulnerabilities being exploited in attacks, it’s recommended that users apply the necessary patches to mitigate potential risks.

Found this article interesting? Follow THN on [Facebook](), [Twitter __]() and [LinkedIn]() to read more exclusive content we post.Read More

Exit mobile version