F5 BIG-IP iControl REST unauthenticated RCE

By
Manieendar Mohan
Published on
16 Jun 2021
Vulnerability

BIG-IP is a software and hardware family from F5 Networks that focus on application availability, access control, and security.BIG-IP is configured and managed using a Web services-enabled open API known as iControl. Using the BIG-IP management interface and self IP addresses, attackers can exploit the iControl REST interface that leads to remote code execution. Then the attacker has the ability to make random system calls, create and delete files, and turn off services. The control plane is the only way to exploit this vulnerability; the data plane is not vulnerable. The BIG-IP system in Appliance mode is also an entry point for an attacker. This may cause complete system compromise.

Mitigation / Precaution

  • In order to patch this vulnerability, please install the official patch F5 BIG-IP made available for supported, vulnerable instances.
  • As a temporary solution, restrict iControl REST access via the self IP address or the management interface.
Automated human-like penetration testing for your web apps & APIs
Teams using Beagle Security are set up in minutes, embrace release-based CI/CD security testing and save up to 65% with timely remediation of vulnerabilities. Sign up for a free account to see what it can do for you.

Written by
Manieendar Mohan
Manieendar Mohan
Cyber Security Lead Engineer
Find website security issues in a flash
Improve your website's security posture with proactive vulnerability detection.
Free website security assessment