Lucene search

K
f5F5F5:K56142644
HistoryMar 10, 2021 - 12:00 a.m.

K56142644 : Appliance mode Advanced WAF/ASM TMUI authenticated remote command execution vulnerability CVE-2021-22989

2021-03-1000:00:00
my.f5.com
36
appliance mode
advanced waf
asm
tmui
remote command execution
vulnerability
cve-2021-22989
privileged users
big-ip management
system compromise
appliance mode breakout
security compromise.

AI Score

8

Confidence

Low

EPSS

0.002

Percentile

52.5%

Security Advisory Description

When running in Appliance mode with Advanced WAF or ASM provisioned, the Traffic Management User Interface (TMUI), also referred to as the Configuration utility, has an authenticated remote command execution vulnerability in undisclosed pages. (CVE-2021-22989)

Note: For systems not running in Appliance mode, refer to K45056101 Advanced WAF/ASM TMUI authenticated remote command execution vulnerability CVE-2021-22990.

Impact

This vulnerability allows highly privileged authenticated users with the roles Administrator, Resource Administrator, or Application Security Administrator with network access to the Configuration utility, through the BIG-IP management port or self IP addresses, to execute arbitrary system commands, create or delete files, or disable services. This vulnerability can only be exploited through the control plane and cannot be exploited through the data plane. Exploitation can lead to complete system compromise and breakout of Appliance mode. Appliance mode is enforced by a specific license or may be enabled or disabled for individual vCMP guest instances. For information on Appliance mode, refer to K12815: Overview of Appliance mode.

Note: If you believe your system may have been compromised, refer to K11438344: Considerations and guidance when you suspect a security compromise on a BIG-IP system.

AI Score

8

Confidence

Low

EPSS

0.002

Percentile

52.5%