Service Notices

All Notices > Security Notices > F5 BIG-IP Remote Code Execution Vulnerability (CVE-2022-1388)

F5 BIG-IP Remote Code Execution Vulnerability (CVE-2022-1388)

May 07, 2022 GMT+08:00

I. Overview

Recently, F5 published a security advisory on its official website, disclosing a remote code execution vulnerability (CVE-2022-1388) in F5 BIG-IP. The vulnerability is in the iControl REST component. An attacker may send requests to bypass the iControl REST authentication of F5 BIG-IP, then arbitrarily execute commands, create or delete files, or disable services.

The BIG-IP Local Traffic Manager (LTM) is an excellent application traffic management system. If you are an F5 BIG-IP user, check your versions and implement timely security hardening.

Reference:

https://support.f5.com/csp/article/K23605346

II. Severity

Severity: important

(Severity: low, moderate, important, and critical)

III. Affected Products

Affected versions:

BIG-IP 16.x: 16.1.0 - 16.1.2

BIG-IP 15.x: 15.1.0 - 15.1.5

BIG-IP 14.x: 14.1.0 - 14.1.4

BIG-IP 13.x: 13.1.0 - 13.1.4

BIG-IP 12.x: 12.1.0 - 12.1.6

BIG-IP 11.x: 11.6.1 - 11.6.5

Secure versions:

BIG-IP 17.x: 17.0.0

BIG-IP 16.x: 16.1.2.2

BIG-IP 15.x: 15.1.5.1

BIG-IP 14.x: 14.1.4.6

BIG-IP 13.x: 13.1.5

IV. Vulnerability Handling

Secure versions have been officially released. Upgrade to secure versions.

If the upgrade cannot be performed in a timely manner, you can refer to the workarounds provided in the advisory to avoid risks.

https://support.f5.com/csp/article/K23605346

Note: Before fixing vulnerabilities, back up your files and conduct a thorough test.