Lucene search

K
f5F5F5:K74151369
HistoryApr 28, 2021 - 12:00 a.m.

K74151369 : Appliance Mode authenticated iControl REST vulnerability CVE-2021-23015

2021-04-2800:00:00
my.f5.com
51

8.7 High

AI Score

Confidence

High

0.974 High

EPSS

Percentile

99.9%

Security Advisory Description

When running in Appliance Mode, an authenticated user assigned the ‘Administrator’ role may be able to bypass Appliance Mode restrictions utilizing undisclosed iControl REST endpoints. (CVE-2021-23015)

Note: This vulnerability is unrelated to the vulnerability described in the following article: K03009991: iControl REST unauthenticated remote command execution vulnerability CVE-2021-22986.

Impact

In Appliance Mode, an authenticated user with valid user credentials assigned the Administrator role may be able to bypass appliance mode restrictions and run arbitrary commands. This is a control plane issue; there is no data plane exposure. Appliance Mode is enforced by a specific license or may be enabled or disabled for individual Virtual Clustered Multiprocessing (vCMP) guest instances. For information on Appliance mode, refer to: K12815: Overview of Appliance mode.

Note: If you believe your system may have been compromised, refer to K11438344: Considerations and guidance when you suspect a security compromise on a BIG-IP system.