F5 BIG-IP iControl REST unauthenticated RCE

By
Manieendar Mohan
Published on
16 Jun 2021
Vulnerability

BIG-IP is a software and hardware family from F5 Networks that focus on application availability, access control, and security.BIG-IP is configured and managed using a Web services-enabled open API known as iControl. Using the BIG-IP management interface and self IP addresses, attackers can exploit the iControl REST interface that leads to remote code execution. Then the attacker has the ability to make random system calls, create and delete files, and turn off services. The control plane is the only way to exploit this vulnerability; the data plane is not vulnerable. The BIG-IP system in Appliance mode is also an entry point for an attacker. This may cause complete system compromise.

Mitigation / Precaution

  • In order to patch this vulnerability, please install the official patch F5 BIG-IP made available for supported, vulnerable instances.
  • As a temporary solution, restrict iControl REST access via the self IP address or the management interface.
Automated human-like penetration testing for your web apps & APIs
Teams using Beagle Security are set up in minutes, embrace release-based CI/CD security testing and save up to 65% with timely remediation of vulnerabilities. Sign up for a free account to see what it can do for you.

Written by
Manieendar Mohan
Manieendar Mohan
Cyber Security Lead Engineer
Experience the Beagle Security platform
Unlock one full penetration test and all Advanced plan features free for 10 days
Find surface-level website security issues in under a minute
Free website security assessment
Experience the power of automated penetration testing & contextual reporting.