PT-2023-6486 · F5 · F5 Big-Ip Local Traffic Manager +11

Published

2023-10-25

·

Updated

2025-11-18

·

CVE-2023-46747

CVSS v3.1
10
VectorAV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions F5 BIG-IP versions 13.1.5 through 17.1.0
Description F5 BIG-IP devices are affected by a critical vulnerability that allows attackers to bypass authentication and execute arbitrary system commands. This is due to undisclosed requests that can bypass the configuration utility authentication, granting access to the system through the management port and/or self IP addresses. The vulnerability has been actively exploited in the wild, with reports of initial access brokers leveraging it, and is associated with request smuggling techniques. The vulnerability is rated as critical with a CVSS score of 9.8. Exploitation has been observed in conjunction with other vulnerabilities, potentially leading to ransomware attacks. There have been reports of attackers rapidly switching IP addresses during exploitation attempts.
Recommendations Apply the latest available security hotfixes released by F5 for BIG-IP versions 13.1.5 through 17.1.0. Restrict internet access to the BIG-IP management interface. Consider temporarily disabling the vulnerable configuration utility until a patch can be applied.

Exploit

Fix

RCE

SQL injection

Authentication Bypass Using an Alternate Path or Channel

Missing Authentication

Weakness Enumeration

Related Identifiers

BDU:2023-07232
BDU:2023-07400
CVE-2023-46747

Affected Products

F5 Big-Ip
F5 Big-Ip Access Policy Manager
F5 Big-Ip Advanced Firewall Manager
F5 Big-Ip Analytics
F5 Big-Ip Application Acceleration Manager
F5 Big-Ip Application Security Manager
F5 Big-Ip Domain Name System
F5 Big-Ip Fraud Protection Service
F5 Big-Ip Hybrid Defender
F5 Big-Ip Link Controller
F5 Big-Ip Local Traffic Manager
F5 Big-Ip Policy Enforcement Manager