Thursday, April 3, 2025
HomeCVE/vulnerabilityF5 BIG-IP Flaw Let Hackers Execute Arbitrary System Commands

F5 BIG-IP Flaw Let Hackers Execute Arbitrary System Commands

Published on

SIEM as a Service

Follow Us on Google News

F5 Networks have addressed critical vulnerabilities in its BIG-IP networking device. The vulnerability tracked as CVE-2021-23031 is a privilege escalation issue on BIG-IP Advanced Web Application Firewall (WAF) and Application Security Manager (ASM) Traffic Management User Interface (TMUI).

BIG-IP Flaw

According to the security advisory, when this vulnerability is exploited, an authenticated attacker with access to the Configuration utility can execute arbitrary system commands, create or delete files, and/or disable services.

Similarly, this flaw may result in complete system compromise. BIG-IP systems have the option of running in Appliance mode.

This appliance mode is designed to meet the needs of customers in, particularly sensitive sectors by limiting the BIG-IP system administrative access to match that of a typical network appliance and not a multi-user UNIX device.

The flaw has a severity score of 8.8, nevertheless, the security advisory says, for customers using the Appliance Mode, applies some technical restrictions, the severity score raises to 9.9 out of 10.

Also, only a limited number of customers are impacted by the issue in a critical mode.

“The limited number of customers using Appliance mode have Scope: Changed, which raises the CVSSv3 score to 9.9”, reads the security advisory.

ProductBranchVersions known to be vulnerable1Fixes introduced inSeverityCVSSv3 score2Vulnerable component or feature
BIG-IP (Advanced WAF and ASM)16.x16.0.0 – 16.0.116.1.0
16.0.1.2

High — Critical – Appliance mode only3

8.89.93
TMUI/Configuration utility
15.x15.1.0 – 15.1.215.1.3
14.x14.1.0 – 14.1.414.1.4.1
13.x13.1.0 – 13.1.313.1.4
12.x12.1.0 – 12.1.512.1.6
11.x11.6.1 – 11.6.511.6.5.3
BIG-IP (all other modules)16.xNoneNot applicableNot vulnerableNoneNone
15.xNoneNot applicable
14.xNoneNot applicable
13.xNoneNot applicable
12.xNoneNot applicable
11.xNoneNot applicable
BIG-IQ Centralized Management8.xNoneNot applicableNot vulnerable4NoneNone
7.xNoneNot applicable
6.xNoneNot applicable
F5OS1.xNoneNot applicableNot vulnerableNoneNone
Traffix SDC5.xNoneNot applicableNot vulnerableNoneNone

 List of Issues Addressed by F5

F5 mentions that users can eliminate this vulnerability by installing a version listed in the Fixes column.

F5 addressed 30 high-severity vulnerabilities in multiple products, which include authenticated remote command execution flaws, cross-site scripting (XSS) issues, request forgery issues, insufficient permission, and denial-of-service flaws.

Mitigation

F5 states that the only mitigation is to remove access for users who are not completely trusted since this attack is conducted by legitimate and authenticated users.

  • Block Configuration utility access through self IP addresses.
  • Block Configuration utility access through the management interface These mitigations restrict access to the Configuration utility to only trusted networks or devices, thereby limiting the attack surface.
Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

AI-Powered Gray Bots Target Web Applications with Over 17,000 Requests Per Hours

Web applications are facing a growing challenge from "gray bots," a category of automated...

New Web Skimming Attack Exploits Legacy Stripe API to Validate Stolen Card Data

A sophisticated web-skimming campaign has been discovered, leveraging a deprecated Stripe API to validate...

Hackers Exploit Apache Tomcat Flaw to Hijack Servers and Steal SSH Credentials

A newly discovered attack campaign has exposed vulnerabilities in Apache Tomcat servers, allowing hackers...

Hackers Actively Scanning for Juniper Smart Routers Using Default Passwords

Recent cybersecurity findings reveal an alarming increase in malicious activity targeting Juniper's Session Smart...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

AI-Powered Gray Bots Target Web Applications with Over 17,000 Requests Per Hours

Web applications are facing a growing challenge from "gray bots," a category of automated...

New Web Skimming Attack Exploits Legacy Stripe API to Validate Stolen Card Data

A sophisticated web-skimming campaign has been discovered, leveraging a deprecated Stripe API to validate...

Hackers Exploit Apache Tomcat Flaw to Hijack Servers and Steal SSH Credentials

A newly discovered attack campaign has exposed vulnerabilities in Apache Tomcat servers, allowing hackers...