Home > Cyber News > Critical F5 BIG-IP Flaw CVE-2022-1388 Is Exploited in the Wild
CYBER NEWS

Critical F5 BIG-IP Flaw CVE-2022-1388 Is Exploited in the Wild

Critical F5 BIG-IP Flaw CVE-2022-1388 Is Exploited in the Wild

CVE-2022-1388 is a critical remote code execution vulnerability that affects F5 BIG-IP multi-purpose networking devices and modules. There are now warnings about in-the-wild exploit attempts weaponizing the vulnerability, in addition to an available PoC (proof of concept) developed by security researchers.

Critical Vulnerability CVE-2022-1388: Exploits Now Available

According to F5’s advisory, the critical flaw could allow an unauthenticated attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands, create or delete files, or disable services.




According to the Dean of Research at the SANS Technology Institute, Dr. Johannes Ullrich, “the vulnerability is noteworthy as it does allow unauthenticated attackers to execute arbitrary system commands, create or delete files, or disable services. The attacker, in other words, gains complete control over the affected device.” A patch for the issue has already been created.

However, upon releasing the patch, F5 warned that the flaw could be exploited via the devices’ management port and/or self IP addresses. Administrators were urged to update their BIG-IP installations to a version delivering the fix (17.0.0, 16.1.2.2, 15.1.5.1, 14.1.4.6 or 13.1.5) or implement the available mitigations to protect affected products.

Security researcher Kevin Beaument tweeted that CVE-2022-1388 is being exploited in the wild. So, what to do, if affected? Dr. Johannes Ullrich advises to “make sure you are not exposing the admin interface. If you can’t manage that: Don’t try patching. Turn off the device instead. If the configuration interface is safe: Patch,” he said.

Milena Dimitrova

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

More Posts

Follow Me:
Twitter

1 Comment
  1. S4E

    Hi Milena, thanks for your valuable blog post.
    You can also check this vulnerability online using our tool: securityforeveryone.com/tools/f5-big-ip-icontrol-rest-auth-bypass-rce-cve-2022-1388

    Reply

Leave a Comment

Your email address will not be published. Required fields are marked *

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree