PT-2023-6486 · F5 · F5 Big-Ip Fraud Protection Service+11
Published
2023-10-25
·
Updated
2026-03-28
·
CVE-2023-46747
CVSS v3.1
9.8
Critical
| AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
F5 BIG-IP versions 13.1.5 through 17.1.0
Description
F5 BIG-IP devices are affected by a critical vulnerability that allows an unauthenticated attacker with network access to the system through the management port and/or self IP addresses to execute arbitrary system commands. This is due to a flaw in the configuration utility that bypasses authentication measures. The vulnerability is actively exploited in the wild, with reports of initial access brokers leveraging it, and has been observed in conjunction with other malware, including ransomware. The vulnerability is related to request smuggling and the Apache JServ Protocol (AJP). Exploitation can lead to the creation of new administrative users with full permissions. The vulnerability has a CVSS score of 9.8.
Recommendations
Apply the applicable engineering hotfix for all affected versions.
Restrict internet access to the BIG-IP management interface.
Consider temporarily disabling the vulnerable configuration utility until a patch can be applied.
Exploit
Fix
RCE
Authentication Bypass Using an Alternate Path or Channel
SQL injection
Missing Authentication
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
F5 Big-Ip
F5 Big-Ip Access Policy Manager
F5 Big-Ip Advanced Firewall Manager
F5 Big-Ip Analytics
F5 Big-Ip Application Acceleration Manager
F5 Big-Ip Application Security Manager
F5 Big-Ip Domain Name System
F5 Big-Ip Fraud Protection Service
F5 Big-Ip Hybrid Defender
F5 Big-Ip Link Controller
F5 Big-Ip Local Traffic Manager
F5 Big-Ip Policy Enforcement Manager