A week after F5 announced it had patched critical vulnerabilities, proof-of-concept code for exploits has appeared and has been spotted in the wild. Users of BIG-IP and BIG-IQ products are urged to patch ASAP.
In early March, security and networking solution provider F5 released an advisory for its BIG-IP and BIG-IQ products, addressing critical vulnerabilities in the REST interface of the iControl management console that could lead to authentication bypass and remote code execution exploitation.
The following week several instances of proof-of-concept code were posted online and some variants posted to Twitter appear to not even require SSRF exploitation for initial access.
Starting this week and especially in the last 24 hours, adversaries have begun opportunistically mass scanning and targeting exposed and unpatched networking devices to break into enterprise networks. The mass scans have spiked since the release of the POCs online this week.
The vulnerabilities were given the following CVE numbers:
CVE-2021-22986 is the most critical, based in the iControl REST interface which has an unauthenticated remote command execution vulnerability.
Palo Alto noted some attempts to use this vulnerability to install Mirai malware on compromised hosts.
The four critical flaws affect BIG-IP versions 11.6 or 12.x and newer.
The most critical pre-auth remote code execution (CVE-2021-22986) also affects BIG-IQ versions 6.x and 7.x.
The most critical vulnerability allows for unauthenticated attackers with network access to the iControl REST interface, through the BIG-IP management interface and self IP addresses, to execute arbitrary system commands, create or delete files, or disable services.
This vulnerability can only be exploited through the control plane and cannot be exploited through the data plane. Exploitation can lead to complete system compromise. The BIG-IP system in Appliance mode is also vulnerable.
Exploitation can also trigger a buffer overflow, leading to a DoS attack.
The vulnerabilities have been addressed in the following updated product versions:
If you are using public cloud marketplaces (AWS, Azure, GCP, or Alibaba) to deploy BIG-IP Virtual Edition (VE), F5 recommends that you install the latest releases of BIG-IP versions listed in the “Fixes introduced in” column, subject to their availability on those marketplaces.
For more information, refer to the following articles:
A full public exploit has been released:
Full chain of exploitation from the following IPs has been observed:
Note: It is recommended to treat any POSTs to REST API as suspicious since there multiple PoCs of a variant posted to Twitter that don’t require SSRF exploits first.
Until it is possible to install a fixed version, you can use the following sections as temporary mitigations. These mitigations restrict access to iControl REST to only trusted networks or devices, thereby limiting the attack surface:
Block iControl REST access through the self IP address
Block iControl REST access through the management interface