Latest Updated: 08/05/2022 at 8:17 UTC
Vulnerability Replicated by PT (Russian cyber company)
Uptick in activity:
Scanner for the API (not the vuln)
- GitHub - MrCl0wnLab/Nuclei-Template-CVE-2022-1388-BIG-IP-iControl-REST-Exposed: This vulnerability may allow an unauthenticated attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands, create or delete files, or disable services. There is no data plane exposure; this is a control plane issue only.
- CVE-2022-1388-checker/CVE-2022-1388.sh at main · jheeree/CVE-2022-1388-checker · GitHub
F5 have published an advisory on an pretty serious issue (CVSSv3 9.8 score) in the iControl REST component in their BIG-IP load balancers:
Key fragment:
Impact
This vulnerability may allow an unauthenticated attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands, create or delete files, or disable services. There is no data plane exposure; this is a control plane issue only.
While untrusted randos probably shouldn’t have access to your control/management network/vlan, it’d be best to install the patch sooner rather than later. If you can’t patch, then the link contains mitigation instructions.