This F5 security flaw is one of the most dangerous ever seen

An image of security icons for a network encircling a digital blue earth.
(Image credit: Shutterstock) (Image credit: Shutterstock)

A super high-severity vulnerability, allowing threat actors to take full control of target endpoints, is being abused in the wild, researchers are saying.

The flaw is tracked as CVE-2022–1388 and carries a severity rating of 9.8/10. It is found in BIG-IP, a suite of both hardware and software, that can act as load balancers and firewalls.

These are the products of multi-cloud security and application delivery company, F5, arnd are used by 48 members of the Fortune 50 group of companies, with around 16,000 endpoints able to be discovered online. As these devices are used to manage web server traffic, they can often see decrypted contents of HTTPS-protected traffic, adding an extra level of threat.

Share your thoughts on Cybersecurity and get a free copy of the Hacker's Manual 2022end of this survey

Share your thoughts on Cybersecurity and get a free copy of the Hacker's Manual 2022. Help us find how businesses are preparing for the post-Covid world and the implications of these activities on their cybersecurity plans. Enter your email at the end of this survey to get the bookazine, worth $10.99/£10.99.

Threat of ransomware

The flaw in question revolves around the way admins confirm their identities when logging into iControl REST, a programming interface used to manage BIG-IP gear. In other words, people can pretend to be an admin, allowing them to run commands on different endpoints. 

Researchers are warning admins to patch up their systems immediately, as elevated privileges mean threat actors could install malware, or ransomware, on vulnerable devices. 

The flaw was discovered only last week, but the patch is already available for all firmware versions, starting with 13.1.0. Admins running older versions (11.x and 12.x) need to upgrade to a newer version, as soon as possible, as these versions have reached end of life and are not supported. 

For admins that are unable to patch their systems right now, F5 has suggested three workarounds, including blocking iControl REST access through the self IP address, blocking iControl REST access through the management interface, or modifying the BIG-IP httpd configuration. The guide for these workarounds can be found on these links (1,2,3).

Still, given the severity of the vulnerability, admins are encouraged to go for the patch, rather than workarounds, as soon as possible.

Via: ArsTechnica

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
Best free Linux firewalls
Fortinet warns a critical vulnerability in its systems could let attackers breach company networks
A VPN runs on a mobile phone placed on a laptop keyboard
SonicWall firewalls hit by worrying cyberattack
Best free Linux firewalls
SonicWall tells admins to patch worrying SSLVPN flaw immediately
Digital image of a lock.
Fortinet flags some worrying security bugs coming back from the dead
The best free firewall
Palo Alto Networks PAN-OS sees authentication bypass under attack from hackers
A person at a laptop with a cybersecure lock symbol floating above it.
Hackers are still using old Ivanti bugs to break into networks
Latest in Security
Data Breach
Thousands of healthcare records exposed online, including private patient information
China
Juniper patches security flaws which could have let hackers take over your router
Representational image depecting cybersecurity protection
GitLab has patched a host of worrying security issues
Ai tech, businessman show virtual graphic Global Internet connect Chatgpt Chat with AI, Artificial Intelligence.
AI agents can be hijacked to write and send phishing attacks
China
Volt Typhoon threat group had access to American utility networks for the best part of a year
Abstract image of cyber security in action.
MassJacker malware targets those looking for pirated software
Latest in News
Google Pixel 8a in aloe green showing
Google Pixel 9a benchmark link teases the performance of the upcoming mid-ranger
Quordle on a smartphone held in a hand
Quordle hints and answers for Monday, March 17 (game #1148)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Monday, March 17 (game #379)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Monday, March 17 (game #645)
Apple iPhone 16 Pro HANDS ON
Leaked iPhone 17 dummy units may have given us our best look yet at all four models
A super close up image of the Google Gemini app in the Play Store
It's official: Google Assistant will be retired for phones this year, with Gemini taking over