Home Application Security F5’s BIP-IP Bug is actively exploited by hackers.

F5’s BIP-IP Bug is actively exploited by hackers.

by Sriram Parisa
F5’s BIP-IP Bug is actively exploited by hackers.

F5 BIG-IP is an application service provider having a vulnerability named CVE-2022-1388, it allows hackers to change arbitrary commands like creating and deleting files.

Last week, researchers identified the massive critical flaw in F5’s BIG-IP that has issued a warning.

F5 releases patches and mitigation methods that avoid the BIG-IP bug. A hacker can exploit weaknesses to execute commands with root system advantages if they avoid releasing patches.

F5 BIG-IP is an application service provider having a vulnerability named CVE-2022-1388, it allows hackers to change arbitrary commands like creating and deleting files. Last week, researchers identified the massive critical flaw in F5’s BIG-IP that has issued a warning.  F5 releases patches and mitigation methods that avoid the BIG-IP bug. A hacker can exploit weaknesses to execute commands with root system advantages if they avoid releasing patches. Aaron Portnoy, director of research and development, said that this bug allows attackers to access the management interface to pretend to be an administrator. He also added once you become an admin you can interact with all the endpoints of the application provides. Which also includes executing code.  Security researcher Jacob Baines shared a shodan query, which revealed thousands of exposed BIP-IP systems on the internet, that attackers can exploit remotely.  Since the exploits are publicly available, security researchers are aware of the public by showing how hackers can use exploit by sending simple commands to access the application endpoints.  It provides an interface for running user-supplied input as a bash command with root privileges. F5 BIG-IP has advised administrators to follow the guidelines and immediately install available security patches and also remove access to the management interface over the public internet.
F5’s BIP-IP Bug is actively exploited by hackers.

Aaron Portnoy, director of research and development, said that this bug allows attackers to access the management interface to pretend to be an administrator. He also added once you become an admin you can interact with all the endpoints of the application provides. Which also includes executing code.

Security researcher Jacob Baines shared a shodan query, which revealed thousands of exposed BIP-IP systems on the internet, that attackers can exploit remotely.

Since the exploits are publicly available, security researchers are aware of the public by showing how hackers can use exploit by sending simple commands to access the application endpoints.

It provides an interface for running user-supplied input as a bash command with root privileges.

F5 BIG-IP has advised administrators to follow the guidelines and immediately install available security patches and also remove access to the management interface over the public internet.

Related Posts

Leave a Comment

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
-
00:00
00:00
Update Required Flash plugin
-
00:00
00:00