{"id":23277,"date":"2023-10-31T06:10:14","date_gmt":"2023-10-31T14:10:14","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/10\/31\/news-17007\/"},"modified":"2023-10-31T06:10:14","modified_gmt":"2023-10-31T14:10:14","slug":"news-17007","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2023\/10\/31\/news-17007\/","title":{"rendered":"Patch now! BIG-IP Configuration utility is vulnerable for an authentication bypass"},"content":{"rendered":"\n<p>Tech company F5 has warned customers about a critical authentication bypass vulnerability impacting its BIG-IP product line that could result in unauthenticated remote code execution.<\/p>\n<p>F5 provides services focused on security, reliability, and performance. BIG-IP is a collection of hardware platforms and software solutions that provides a wide range of services, including load balancing, web application firewall, access control, and DDoS protection.<\/p>\n<p><a href=\"https:\/\/www.praetorian.com\/blog\/refresh-compromising-f5-big-ip-with-request-smuggling-cve-2023-46747\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Two security researchers<\/a> found a critical vulnerability in the configuration utility of several versions of BIG-IP:<\/p>\n<ul>\n<li>17.1.0 (Fixed in 17.1.0.3 + Hotfix-BIGIP-17.1.0.3.0.75.4-ENG)<\/li>\n<li>16.1.0 &#8211; 16.1.4 (Fixed in 16.1.4.1 + Hotfix-BIGIP-16.1.4.1.0.50.5-ENG)<\/li>\n<li>15.1.0 &#8211; 15.1.10 (Fixed in 15.1.10.2 + Hotfix-BIGIP-15.1.10.2.0.44.2-ENG)<\/li>\n<li>14.1.0 &#8211; 14.1.5 (Fixed in 14.1.5.6 + Hotfix-BIGIP-14.1.5.6.0.10.6-ENG)<\/li>\n<li>13.1.0 &#8211; 13.1.5 (Fixed in 13.1.5.1 + Hotfix-BIGIP-13.1.5.1.0.20.2-ENG)<\/li>\n<\/ul>\n<p>In a post, <a href=\"https:\/\/my.f5.com\/manage\/s\/article\/K000137353\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">F5 said<\/a>:<\/p>\n<blockquote class=\"wp-block-quote\">\n<p>&#8220;This vulnerability may allow an unauthenticated attacker with network access to the BIG-IP system through the management port and\/or self IP addresses to execute arbitrary system commands.&#8221;<\/p>\n<\/blockquote>\n<p>F5 also said customers can also use&nbsp;<a href=\"https:\/\/my.f5.com\/manage\/s\/article\/K27404821\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">iHealth<\/a>&nbsp;to check if they are vulnerable.<\/p>\n<p>The Common Vulnerabilities and Exposures (CVE) database lists publicly disclosed computer security flaws. This CVEs is listed as:<\/p>\n<p><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2023-46747\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2023-46747<\/a> (<a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2020\/05\/how-cvss-works-characterizing-and-scoring-vulnerabilities\">CVSS<\/a> score 9.8 out of 10): Undisclosed requests may bypass configuration utility authentication, allowing an attacker with network access to the BIG-IP system through the management port and\/or self IP addresses to execute arbitrary system commands.&nbsp; Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.<\/p>\n<p>BIG-IP defines a self IP address as an IP address on the BIG-IP system that you associate with a virtual local area network (VLAN), to access hosts in that VLAN. A&nbsp; customer normally assigns self IP addresses to a VLAN when they initially run the Setup utility on a BIG-IP system.<\/p>\n<p>An authentication bypass happens when someone claims to have a given identity, but the software does not prove or insufficiently proves that the claim is correct.<\/p>\n<p>Remote code execution (RCE) is when an attacker accesses a target computing device and makes changes remotely, no matter where the device is located.<\/p>\n<p>In general you can say that if the BIG-IP Traffic Management User Interface is exposed to the internet, then the system in question is impacted. It&#8217;s estimated that there are over 6,000 external-facing instances of the application.<\/p>\n<p>The researchers say exploitation of the vulnerability could lead to a total compromise of the F5 system by executing arbitrary commands as root on the target system.<\/p>\n<blockquote class=\"wp-block-quote\">\n<p>&#8220;A seemingly low impact request smuggling bug can become a serious issue when two different services offload authentication responsibilities onto each other.&#8221;<\/p>\n<\/blockquote>\n<h3 class=\"wp-block-heading\" id=\"h-actions\">Actions<\/h3>\n<p>If you are running a vulnerable version, <a href=\"https:\/\/my.f5.com\/manage\/s\/article\/K000137353\">F5 has a list of updates here<\/a>.<\/p>\n<p>If you can&#8217;t install a fixed version for any reason, then F5 advises you can <a href=\"https:\/\/my.f5.com\/manage\/s\/article\/K000137353#selfip\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">block Configuration utility access through self IP addresses<\/a> or <a href=\"https:\/\/my.f5.com\/manage\/s\/article\/K000137353#mgmt\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">block Configuration utility access through the management interface<\/a>.<\/p>\n<hr \/>\n<p><strong>We don\u2019t just report on vulnerabilities\u2014we identify them, and prioritize action.<\/strong><\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Keep vulnerabilities in tow by using&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/business\/vulnerability-patch-management\">Malwarebytes Vulnerability and Patch Management<\/a>.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/exploits-and-vulnerabilities\/2023\/10\/patch-now-big-ip-configuration-utility-is-vulnerable-for-an-authentication-bypass\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> F5 has warned customers about a critical vulnerability impacting BIG-IP that could result in unauthenticated remote code execution. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[30429,30430,22783,30431,32,10467],"class_list":["post-23277","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-authentication-bypass","tag-big-ip","tag-exploits-and-vulnerabilities","tag-f5","tag-news","tag-vulnerability"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23277","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23277"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23277\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23277"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23277"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23277"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}