On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all 12.1.x and 11.6.x versions, undisclosed requests may bypass iControl REST authentication. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
Published: 2022-05-05
CVE-2022-1388: Authentication Bypass in F5 BIG-IP F5 patched an authentication bypass in its BIG-IP product family that could lead to arbitrary command execution. This vulnerability is actively being exploited. Update May 10: The Identifying Affected Systems section now reflects the availability of a remote check. The Background section has also been updated based on active exploitation. View Change Log
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-241a
https://www.tenable.com/blog/aa23-215a-2022s-top-routinely-exploited-vulnerabilities
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-215a
https://www.tenable.com/cyber-exposure/tenable-2022-threat-landscape-report
https://support.f5.com/csp/article/K23605346
https://www.tenable.com/blog/cve-2022-1388-authentication-bypass-in-f5-big-ip
https://www.secpod.com/blog/critical-f5-big-ip-remote-code-execution-vulnerability-patch-now/
http://packetstormsecurity.com/files/167150/F5-BIG-IP-iControl-Remote-Code-Execution.html
http://packetstormsecurity.com/files/167118/F5-BIG-IP-16.0.x-Remote-Code-Execution.html
http://packetstormsecurity.com/files/167007/F5-BIG-IP-Remote-Code-Execution.html