On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all 12.1.x and 11.6.x versions, undisclosed requests may bypass iControl REST authentication. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Link | Tags |
---|---|
https://support.f5.com/csp/article/K23605346 | mitigation vendor advisory |
http://packetstormsecurity.com/files/167007/F5-BIG-IP-Remote-Code-Execution.html | exploit vdb entry third party advisory |
http://packetstormsecurity.com/files/167118/F5-BIG-IP-16.0.x-Remote-Code-Execution.html | exploit vdb entry third party advisory |
http://packetstormsecurity.com/files/167150/F5-BIG-IP-iControl-Remote-Code-Execution.html | exploit vdb entry third party advisory |
https://www.secpod.com/blog/critical-f5-big-ip-remote-code-execution-vulnerability-patch-now/ | exploit third party advisory mitigation |