Lucene search

K
f5F5F5:K000137522
HistoryFeb 14, 2024 - 12:00 a.m.

K000137522 : BIG-IP iControl REST vulnerability CVE-2024-22093

2024-02-1400:00:00
my.f5.com
17
big-ip
icontrol rest
vulnerability
appliance mode
command injection
administrator privileges
network access
security boundary
bash commands
control plane
vcmp
guest instances

AI Score

8.1

Confidence

High

EPSS

0

Percentile

9.0%

Security Advisory Description

When running in Appliance mode, an authenticated remote command injection vulnerability exists in an undisclosed iControl REST endpoint on multi-bladed systems. A successful exploit can allow the attacker to cross a security boundary. (CVE-2024-22093)

Impact

This vulnerability affects only BIG-IP systems running in Appliance mode.

An authenticated attacker with administrator or resource administrator role privileges and network access to the affected iControl REST endpoint through the BIG-IP management port or self IP addresses can execute arbitrary system commands and create or delete files. The vulnerability allows the bypass of Appliance mode security on BIG-IP systems by allowing the authenticated attacker to execute arbitrary Advanced Shell (bash) commands. There is no data plane exposure; this is a control plane issue only.

Appliance mode is enforced by a specific license or may be enabled or disabled for individual Virtual Clustered Multiprocessing (vCMP) guest instances. For more information about Appliance mode, refer to K12815: Overview of Appliance mode.

AI Score

8.1

Confidence

High

EPSS

0

Percentile

9.0%

Related for F5:K000137522