Critical F5 BIG-IP Bug Under Active Attacks After PoC Exploit Posted Online

Nearly 10 days soon after software stability business F5 Networks introduced patches for essential vulnerabilities in its Significant-IP and Massive-IQ merchandise, adversaries have started opportunistically mass scanning and focusing on exposed and unpatched networking products to split into organization networks.

Information of in the wild exploitation development arrives on the heels of a evidence-of-thought exploit code that surfaced on the net earlier this week by reverse-engineering the Java software patch in Major-IP. The mass scans are claimed to have spiked because March 18.

The flaws influence Large-IP variations 11.6 or 12.x and newer, with a significant remote code execution (CVE-2021-22986) also impacting Significant-IQ versions 6.x and 7.x. CVE-2021-22986 (CVSS rating: 9.8) is notable for the fact that it really is an unauthenticated, remote command execution vulnerability influencing the iControl Relaxation interface, allowing an attacker to execute arbitrary technique commands, build or delete information, and disable providers with no the require for any authentication.

Productive exploitation of these vulnerabilities could lead to a complete compromise of susceptible methods, including the likelihood of distant code execution as properly as induce a buffer overflow, leading to a denial of assistance (DoS) assault.

Whilst F5 explained it not informed of any public exploitation of these issues on March 10, scientists from NCC Team said they have now located evidence of “complete chain exploitation of F5 Large-IP/Major-IQ iControl Rest API vulnerabilities CVE-2021-22986” in the wake of a number of exploitation attempts from its honeypot infrastructure.

Also, Palo Alto Networks’ Device 42 danger intelligence team mentioned it discovered attempts to exploit CVE-2021-22986 to put in a variant of the Mirai botnet. But it can be not promptly very clear if those people attacks were successful.

Given the acceptance of Large-IP/Big-IQ in corporate and governing administration networks, it should occur as no surprise that this is the 2nd time in a year F5 appliances have become a worthwhile focus on for exploitation.

Final July, the business tackled a similar critical flaw (CVE-2020-5902), adhering to which it was abused by Iranian and Chinese condition-sponsored hacking groups, prompting the U.S. Cybersecurity and Infrastructure Protection Agency (CISA) to issue an inform cautioning of a “wide scanning exercise for the existence of this vulnerability throughout federal departments and agencies.”

“The base line is that [the flaws] impact all Huge-IP and Significant-IQ buyers and situations — we urge all customers to update their Huge-IP and Huge-IQ deployments to the mounted variations as quickly as possible,” F5 Senior Vice President Kara Sprague mentioned very last week.

Fibo Quantum