Wednesday, March 29, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Hacking

High-Severity Remote Code Execution Bug in F5 Products

Researcher by Researcher
November 18, 2022
in Hacking
0
High-Severity Remote Code Execution Bug in F5 Products
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


Remote Code Execution Bug in F5

Experts from Rapid7 observed a customized CentOS installation operating on F5 BIG-IP and BIG-IQ devices found to have various vulnerabilities. 

While the other flaws are security bypass methods that F5 does not consider vulnerabilities, two of the vulnerabilities have been categorized as high-severity remote code execution vulnerabilities and given CVE IDs.

Vulnerabilities Discovered

The first high-severity flaw is tracked as (CVE-2022-41622) is an unauthenticated remote code execution via cross-site request forgery (CSRF) that impacts BIG-IP and BIG-IQ products.

In this case, even if a device’s management interface is not exposed to the internet, exploitation can still enable a remote, unauthenticated attacker to get root access.

“An attacker may trick users who have at least resource administrator role privilege and are authenticated through basic authentication in iControl SOAP into performing critical actions. An attacker can exploit this vulnerability only through the control plane, not through the data plane. If exploited, the vulnerability can compromise the complete system.” reads the advisory published by F5.

The report says exploitation requires the attacker to be familiar with the targeted network and to convince an administrator who is logged in to visit a malicious website that is designed to exploit.

This attack cannot be prevented if you have authenticated to iControl SOAP in the web browser with basic authentication. This authentication mechanism is uncommon and is different from using the login page for the Configuration utility.

F5 advises against using basic authentication for web browser authentication. Don’t enter credentials if a web browser authentication popup is on the web browser.

The second high-severity flaw, (CVE-2022-41800), enables an attacker with administrative rights to execute arbitrary shell commands via RPM specification files.

It resides in the Appliance mode iControl REST and is an authenticated remote code execution via RPM spec injection. An authenticated user with appropriate user credentials assigned to the Administrator role can bypass restrictions in Appliance mode.

“In Appliance mode, an authenticated user with valid user credentials assigned the Administrator role may be able to bypass Appliance mode restrictions. This is a control plane issue; there is no data plane exposure”, reads the advisory 

“Appliance mode is enforced by a specific license or may be enabled or disabled for individual Virtual Clustered Multiprocessing (vCMP) guest instances”.

In this case, F5 recommends temporary mitigations that reduce the threat surface by limiting access to iControl REST to only trustworthy networks or devices. 

In order to access a highly privileged administrative account, the attacker must possess the correct credentials. As a result, limiting access could still leave the device vulnerable to lateral movement from a hacked device within the trusted range or insider threat.

The following are the bypasses of security controls that F5 rejected because not exploitable, including two SELinux bypass techniques and a local privilege escalation via bad UNIX socket permissions.

Managed DDoS Attack Protection for Applications – Download Free Guide



Source link

Related articles

Samsung Galaxy Store Flaw Allows Remote Attacker to Run Code

Samsung Galaxy Store Flaw Allows Remote Attacker to Run Code

November 1, 2022
22-Yrs-Old SQLite Bug Let Hackers Perform DOS Attack

22-Yrs-Old SQLite Bug Let Hackers Perform DOS Attack

October 26, 2022
Tags: bugcodeexecutionHighSeverityProductsRemote
Share76Tweet47

Related Posts

Samsung Galaxy Store Flaw Allows Remote Attacker to Run Code

Samsung Galaxy Store Flaw Allows Remote Attacker to Run Code

November 1, 2022
0

A security flaw in the Galaxy Store allows attackers to trigger remote code execution on affected smartphones.  The now patched...

22-Yrs-Old SQLite Bug Let Hackers Perform DOS Attack

22-Yrs-Old SQLite Bug Let Hackers Perform DOS Attack

October 26, 2022
0

Trail of Bits researcher Andreas Kellas recently disclosed a 22-Years-Old SQLite bug which has been tracked as “CVE-2022-35737.” The SQLite...

Hackers Actively Exploiting Cisco AnyConnect Secure Flaw

Hackers Actively Exploiting Cisco AnyConnect Secure Flaw

October 26, 2022
0

Cisco issued a warning of active exploitation attempts targeting two security vulnerabilities in the Cisco AnyConnect Secure Mobility Client for...

Apache Commons “Text4Shell” Flaw Could Trigger Code Execution

Apache Commons “Text4Shell” Flaw Could Trigger Code Execution

October 21, 2022
0

Many people are concerned about an RCE flaw in the Apache Commons Text library. They believe that this RCE flaw...

Tips to Avoid a Home Security System Hack

Tips to Avoid a Home Security System Hack

October 16, 2022
0

When you are spending a huge chunk of your hard-earned money on buying a residential property for your loved ones...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
How to Secure Your GitHub Account With Two-Factor Authentication

How to Secure Your GitHub Account With Two-Factor Authentication

March 28, 2023
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 28/03

March 28, 2023
Microsoft: No-Interaction Outlook Zero Day Exploited Since Last April

Microsoft: No-Interaction Outlook Zero Day Exploited Since Last April

March 28, 2023
Samsung Unveils Ultra-Wideband Chipset

Samsung Unveils Ultra-Wideband Chipset

March 28, 2023

Recent Posts

How to Secure Your GitHub Account With Two-Factor Authentication

How to Secure Your GitHub Account With Two-Factor Authentication

March 28, 2023
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 28/03

March 28, 2023
Microsoft: No-Interaction Outlook Zero Day Exploited Since Last April

Microsoft: No-Interaction Outlook Zero Day Exploited Since Last April

March 28, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • LetsAskBinuBlogs
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cyber Cybersecurity Data Digital exploited financial Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches Payments platform Ransomware RoundUp security Software Stories TFT Threat Top vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved