PT-2023-6486 · F5 · F5 Big-Ip Fraud Protection Service +11

Published

2023-10-25

·

Updated

2025-08-15

·

CVE-2023-46747

CVSS v3.1
10
VectorAV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions F5 BIG-IP versions prior to 17.1.0 F5 BIG-IP Access Policy Manager versions prior to 17.1.0 F5 BIG-IP Advanced Firewall Manager versions prior to 17.1.0 F5 BIG-IP Analytics versions prior to 17.1.0 F5 BIG-IP Application Acceleration Manager versions prior to 17.1.0 F5 BIG-IP Application Security Manager versions prior to 17.1.0 F5 BIG-IP Domain Name System versions prior to 17.1.0 F5 BIG-IP Fraud Protection Service versions prior to 17.1.0 F5 BIG-IP Hybrid Defender versions prior to 17.1.0 F5 BIG-IP Link Controller versions prior to 17.1.0 F5 BIG-IP Local Traffic Manager versions prior to 17.1.0 F5 BIG-IP Policy Enforcement Manager versions prior to 17.1.0 F5 BIG-IP versions from 13.1.5 to 17.1.0
Description A critical vulnerability in the F5 BIG-IP configuration utility allows an attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands. The vulnerability is related to the configuration utility component and has been assigned a CVSS score of 9.8. It is possible for an attacker to bypass configuration utility authentication using undisclosed requests. The issue has been exploited in the wild, with reports of attackers using it to gain unauthorized access to systems.
Recommendations To resolve the issue for each affected version, apply the applicable Engineering Hotfix released by F5. For F5 BIG-IP versions prior to 17.1.0, install the hotfix to prevent exploitation. For F5 BIG-IP Access Policy Manager versions prior to 17.1.0, install the hotfix to prevent exploitation. For F5 BIG-IP Advanced Firewall Manager versions prior to 17.1.0, install the hotfix to prevent exploitation. For F5 BIG-IP Analytics versions prior to 17.1.0, install the hotfix to prevent exploitation. For F5 BIG-IP Application Acceleration Manager versions prior to 17.1.0, install the hotfix to prevent exploitation. For F5 BIG-IP Application Security Manager versions prior to 17.1.0, install the hotfix to prevent exploitation. For F5 BIG-IP Domain Name System versions prior to 17.1.0, install the hotfix to prevent exploitation. For F5 BIG-IP Fraud Protection Service versions prior to 17.1.0, install the hotfix to prevent exploitation. For F5 BIG-IP Hybrid Defender versions prior to 17.1.0, install the hotfix to prevent exploitation. For F5 BIG-IP Link Controller versions prior to 17.1.0, install the hotfix to prevent exploitation. For F5 BIG-IP Local Traffic Manager versions prior to 17.1.0, install the hotfix to prevent exploitation. For F5 BIG-IP Policy Enforcement Manager versions prior to 17.1.0, install the hotfix to prevent exploitation. For F5 BIG-IP versions from 13.1.5 to 17.1.0, install the hotfix to prevent exploitation. As a temporary workaround, consider restricting access to the management port and self IP addresses to minimize the risk of exploitation.

Exploit

Fix

RCE

Authentication Bypass Using an Alternate Path or Channel

Missing Authentication

SQL injection

Weakness Enumeration

Related Identifiers

BDU:2023-07232
BDU:2023-07400
CVE-2023-46747

Affected Products

F5 Big-Ip
F5 Big-Ip Access Policy Manager
F5 Big-Ip Advanced Firewall Manager
F5 Big-Ip Analytics
F5 Big-Ip Application Acceleration Manager
F5 Big-Ip Application Security Manager
F5 Big-Ip Domain Name System
F5 Big-Ip Fraud Protection Service
F5 Big-Ip Hybrid Defender
F5 Big-Ip Link Controller
F5 Big-Ip Local Traffic Manager
F5 Big-Ip Policy Enforcement Manager