Lucene search

K
threatpostThreatpostTHREATPOST:547711F4B3BD7FF6F94D605387B3DD50
HistoryMay 10, 2022 - 12:35 p.m.

Hackers Actively Exploit F5 BIG-IP Bug

2022-05-1012:35:15
threatpost.com
124

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

Threat actors have started exploiting a critical bug in the application service provider F5’s BIG-IP modules after a working exploit of the vulnerability was publicly made available.

The critical vulnerability, tracked as CVE-2020-1388, allows unauthenticated attackers to launch “arbitrary system commands, create or delete files, or disable services” on its BIG-IP systems.

Those patches and mitigation methods, released by F5, mitigate vulnerable BIG-IP iControl modules tied to the representational state transfer (REST) authentication component. If left unpatched, a hacker can exploit weaknesses to execute commands with root system privileges.

“This issue allows attackers with access to the management interface to basically pretend to be an administrator due to a flaw in how the authentication is implemented,” said Aaron Portnoy, director of research and development, Randori.

“Once you are an admin, you can interact with all the endpoints the application provides, including execute code” Portnoy added.

A shodan query shared by security researcher Jacob Baines revealed thousands of exposed BIG-IP systems on the internet, which an attacker can leverage to exploit remotely.

Actively Exploited

In the past 24 hours, security researchers announced that they had created the working exploit of the vulnerability, and images related to proof-of-exploit code for CVE-2020-1388 started flooding Twitter.

The exploits are publicly available, and security researchers show how hackers can use the exploit by sending just two commands and some headers to target and access an F5 application endpoint named “bash” which is exposed to the internet.

The function of this endpoint is to provide an interface for running user-supplied input as a bash command with root privileges.

Germán Fernández, a security researcher at Cronup, revealed that hackers are dropping PHP webshells to “/tmp/f5.sh” and installing them to “/usr/local/www/xui/common/css/”. Attacks show the threat actors using the addresses 216[.]162.206[.]213 and 209[.]127.252[.]207 for dropping the payload. The payload is executed and removed from the system after installation.

The exploit can also work when no password is supplied, as disclosed by Will Dormann, vulnerability analyst at the CERT/CC.

Some of the exploitation attempts did not target the management interface as observed by Kevin Beaumont, he added that “If you configured F5 box as a load balancer and firewall via self IP it is also vulnerable so this may get messy.”

The easiness of the exploit and the common term for the vulnerable endpoint ‘bash’ which is a popular Linux shell raises suspicion among security researchers as they believe it did not end up in the product by mistake.

“The CVE-2022-1388 vulnerability is surely an honest mistake by an F5 developer, right?” added researcher Will Doorman.

“I’m not entirely unconvinced that this code wasn’t planted by a developer performing corporate espionage for an incident response firm as some sort of revenue guarantee scheme,” said Jake Williams, a vulnerability analyst at the CERT/CC in a tweet.

Apply Patches Immediately

Administrators are advised to strictly follow the guidelines and install the available patches immediately, as well as remove access to the management interface over the public internet.

The detailed advisory is released by F5 with all the patches and mitigations, the researcher at Randori attack surface management released the Bash code that helps to determine whether an instance is exploitable to CVE-2020-1388 or not.

Reported By: Sagar Tiwari, an independent security researcher and technical writer.

References

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P