Exploits created for critical F5 BIG-IP flaw, install patch immediately
Reading Time: 2 Minutes
Security researchers are warning F5 BIG-IP admins to immediately install the latest security updates after creating exploits for a recently disclosed critical CVE-2022-1388 remote code execution vulnerability.
Last week, F5 disclosed a new critical remote code execution in BIG-IP networking devices tracked as CVE-2022-1388. This vulnerability affects the BIG-IP iControl REST authentication component and allows remote threat actors to bypass authentication and execute commands on the device with elevated privileges.
As F5 BIG-IP devices are commonly used in the enterprise, this vulnerability is a significant risk as it would allow threat actors to exploit the bug to gain initial access to networks and then spread laterally to other devices.
These types of attacks could be used to steal corporate data or deploy ransomware on all of the network’s devices.
Exploits easily created
This weekend, cybersecurity researchers from Horizon3 and Positive Technologies were both able to create exploits for the new F5 BIG-IP vulnerability. They warned that all admins should immediately update their devices as soon as possible due to the trivial nature of the exploit.
The new F5 RCE vulnerability, CVE-2022-1388, is trivial to exploit. We spent some time chasing unrelated diffs within the newest version, but @jameshorseman2 ultimately got first blood. We'll release a POC next week to give more time for orgs to patch.#f5 #CyberSecurity pic.twitter.com/O1SivUE4vA
— Horizon3 Attack Team (@Horizon3Attack) May 6, 2022
🔥 We have reproduced the fresh CVE-2022-1388 in F5's BIG-IP.
Successful exploitation could lead to RCE from an unauthenticated user.
Patch ASAP! pic.twitter.com/WjlWtTgSVz
— PT SWARM (@ptswarm) May 7, 2022
See Also: Attackers Use Event Logs to Hide Fileless Malware
Zach Hanley, Chief Attack Engineer at Horizon3, told BleepingComputer that it took them only two days to discover the exploit and expect threat actors to begin exploiting devices soon.
“Given that the mitigations released by F5 for CVE-2022-1388 were a very large hint at where to look when reversing the application, we expect that threat actors may have also discovered the root cause as well,” Hanley told BleepingComputer via email.
“It took the Horizon3.ai attack team of two security researchers two days to track down the root cause, so we fully expect by end of next week that this will be taken advantage of by threat actors.”
Hanley also warned that the impact of this exploit would be significant as it allows threat actors to gain root access to the devices, which hackers will use for initial access to the corporate networks.
“The saving grace here is that this vulnerability only affects the management side of the device, which should not be exposed to the internet,” continued Hanley.
However, Rapid7 researcher Jacob Baines tweeted that there are still 2,500 devices exposed to the Internet, making this a substantial risk to the enterprise.
Horizon3 says they will be publicly releasing their proof-of-concept exploit this week to push organizations to patch their devices.
See Also: OSINT Tool: MOSINT
See Also: Write up: Find hidden and encrypted secrets from any website
Source: bleepingcomputer.com
Source Link