Article Details
Scrape Timestamp (UTC): 2023-10-27 15:13:03.951
Original Article Text
Click to Toggle View
F5 fixes BIG-IP auth bypass allowing remote code execution attacks. A critical vulnerability in the F5 BIG-IP configuration utility, tracked as CVE-2023-46747, allows an attacker with remote access to the configuration utility to perform unauthenticated remote code execution. The flaw has received a CVSS v3.1 score of 9.8, rating it "critical," as it can be exploited without authentication in low-complexity attacks. "This vulnerability may allow an unauthenticated attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands," reads F5's security bulletin. Threat actors can only exploit devices that have the Traffic Management User Interface (TMUI) exposed to the internet and do not affect the data plane. However, as the TMUI is commonly exposed internally, a threat actor who has already compromised a network could exploit the flaw. The affected BIG-IP versions are the following: It is clarified that CVE-2023-46747 does not impact the BIG-IP Next, BIG-IQ Centralized Management, F5 Distributed Cloud Services, F5OS, NGINX, and Traffix SDC products. Unsupported product versions that have reached EoL (end of life) have not been evaluated against CVE-2023-46747, so they may or may not be vulnerable. Due to the risks involved in using those versions, the recommendation is to upgrade to a supported version as soon as possible. Disclosure and fixing The issue was discovered by Praetorian Security researchers Thomas Hendrickson and Michael Weber, who reported it to the vendor on October 5, 2023. Praetorian shared technical details on CVE-2023-46747, with the researchers promising to disclose the full exploitation details once system patching has picked up. F5 confirmed that it had reproduced the vulnerability on October 12 and published the security update along with the advisory on October 26, 2023. The recommended update versions that address the vulnerability are: F5 has also provided a script in the advisory to help administrators unable to apply the available security update to mitigate the problem. It should be noted that the script is only suitable for BIG-IP versions 14.1.0 and later. Also, caution is advised to those with a FIPS 140-2 Compliant Mode license, as the mitigation script can cause FIPS integrity check failures. To apply the mitigation using the F5-provided script, follow the below steps: VIPRION, vCMP guests on VIPRION, and BIG-IP tenants on VELOS must run the script individually on each blade. If a management IP address hasn't been assigned on each blade, you may connect to the serial console to run it. As F5 BIG-IP devices are used by governments, Fortune 500 firms, banks, service providers, and major consumer brands, it is strongly advised to apply any available fixes or mitigations to prevent the exploitation of these devices. Praetorian also warns that the Traffic Management User Interface should never be exposed to the internet in the first place. Unfortunately, as shown in the past, the F5 BIG-IP TMUI has been exposed in the past, allowing attackers to exploit vulnerabilities to wipe devices and gain initial access to networks.
Daily Brief Summary
A critical vulnerability, designated CVE-2023-46747, was discovered in the F5 BIG-IP configuration utility that allowed attackers to perform unauthenticated remote code execution.
The vulnerability was rated as "critical," scoring 9.8 on CVSS v3.1, and described as a low-complexity attack exploit.
The flaw is exploitable if the Traffic Management User Interface (TMUI) is exposed to the internet, commonly seen in cases of internal exposure.
Unsupported product versions that reached their end of life have yet been evaluated against the vulnerability.
Praetorian Security researchers reported the vulnerability to F5 on October 5, 2023, which the company confirmed on October 12 and published a security update on October 26, 2023.
F5 emphasized the critical need to apply available fixes, given that F5 BIG-IP devices are widely used by governments, Fortune 500 firms, banks, and service providers.
Praetorian also warned against exposing the TMUI to the internet, a practice they deem as risky and unsafe.