MacMusic  |  PcMusic  |  440 Software  |  440 Forums  |  440TV  |  Zicos
big-ip
Search

Hackers Are Actively Exploiting BIG-IP Vulnerability With a 9.8 Severity Rating

Tuesday May 10, 2022. 02:02 AM , from Slashdot
An anonymous reader quotes a report from Ars Technica: Researchers are marveling at the scope and magnitude of a vulnerability that hackers are actively exploiting to take full control of network devices that run on some of the world's biggest and most sensitive networks. The vulnerability, which carries a 9.8 severity rating out of a possible 10, affects F5's BIG-IP, a line of appliances that organizations use as load balancers, firewalls, and for inspection and encryption of data passing into and out of networks. There are more than 16,000 instances of the gear discoverable online, and F5 says it's used by 48 of the Fortune 50. Given BIG-IP's proximity to network edges and their functions as devices that manage traffic for web servers, they often are in a position to see decrypted contents of HTTPS-protected traffic.

Last week, F5 disclosed and patched a BIG-IP vulnerability that hackers can exploit to execute commands that run with root system privileges. The threat stems from a faulty authentication implementation of the iControl REST, a set of web-based programming interfaces for configuring and managing (PDF) BIG-IP devices. 'This issue allows attackers with access to the management interface to basically pretend to be an administrator due to a flaw in how the authentication is implemented,' Aaron Portnoy, the director of research and development at security firm Randori, said in a direct message. 'Once you are an admin, you can interact with all the endpoints the application provides, including execute code.'

Images floating around Twitter in the past 24 hours show how hackers can use the exploit to access an F5 application endpoint named bash. Its function is to provide an interface for running user-supplied input as a bash command with root privileges. While many images show exploit code supplying a password to make commands run, exploits also work when no password is supplied. Elsewhere on Twitter, researchers shared exploit code and reported seeing in-the-wild exploits that dropped backdoor webshells that threat actors could use to maintain control over hacked BIG-IP devices even after they're patched. BIG-IP users can check exploitability via a one-line bash script that can be found here.

Read more of this story at Slashdot.
https://it.slashdot.org/story/22/05/09/225215/hackers-are-actively-exploiting-big-ip-vulnerability-w...
News copyright owned by their original publishers | Copyright © 2004 - 2024 Zicos / 440Network
Current Date
Apr, Tue 16 - 08:17 CEST