Lucene search

K
f5F5F5:K000137522
HistoryFeb 14, 2024 - 12:00 a.m.

K000137522 : BIG-IP iControl REST vulnerability CVE-2024-22093

2024-02-1400:00:00
my.f5.com
14
big-ip
icontrol rest
vulnerability
appliance mode
command injection
administrator privileges
network access
security boundary
bash commands
control plane
vcmp
guest instances

8.1 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Security Advisory Description

When running in Appliance mode, an authenticated remote command injection vulnerability exists in an undisclosed iControl REST endpoint on multi-bladed systems. A successful exploit can allow the attacker to cross a security boundary. (CVE-2024-22093)

Impact

This vulnerability affects only BIG-IP systems running in Appliance mode.

An authenticated attacker with administrator or resource administrator role privileges and network access to the affected iControl REST endpoint through the BIG-IP management port or self IP addresses can execute arbitrary system commands and create or delete files. The vulnerability allows the bypass of Appliance mode security on BIG-IP systems by allowing the authenticated attacker to execute arbitrary Advanced Shell (bash) commands. There is no data plane exposure; this is a control plane issue only.

Appliance mode is enforced by a specific license or may be enabled or disabled for individual Virtual Clustered Multiprocessing (vCMP) guest instances. For more information about Appliance mode, refer to K12815: Overview of Appliance mode.

8.1 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for F5:K000137522