-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2023.0638
          K000130415: iControl SOAP vulnerability CVE-2023-22374
                              6 February 2023

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           F5 BIG-IP (all modules)
Publisher:         F5 Networks
Operating System:  Network Appliance
Resolution:        Patch/Upgrade
CVE Names:         CVE-2023-22374  

Original Bulletin: 
   https://my.f5.com/manage/s/article/K000130415

Comment: CVSS (Max):  8.5 CVE-2023-22374 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H)
         CVSS Source: F5 Networks
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

- --------------------------BEGIN INCLUDED TEXT--------------------

K000130415: iControl SOAP vulnerability CVE-2023-22374

Published Date: Feb 1, 2023
Updated Date: Feb 1, 2023

Security Advisory Description

A format string vulnerability exists in iControl SOAP that allows an
authenticated attacker to crash the iControl SOAP CGI process or, potentially
execute arbitrary code. In appliance mode BIG-IP, a successful exploit of this
vulnerability can allow the attacker to cross a security boundary. (
CVE-2023-22374)

Impact

This vulnerability may allow an authenticated attacker with network access to
iControl SOAP through the BIG-IP management port and/or self IP addresses to
cause a denial-of-service (DoS) on the iControl SOAP CGI process or potentially
execute arbitrary system commands. To successfully exploit the command
execution attack vector, the attacker must gather knowledge about the
environment in which the vulnerable component exists. There is no data plane
exposure; this is a control plane issue only. Appliance mode is enforced by a
specific license or may be enabled or disabled for individual Virtual Clustered
Multiprocessing (vCMP) guest instances. For more information about Appliance
mode, refer to K12815: Overview of Appliance mode.

Security Advisory Status

F5 Product Development has assigned ID 1208001 (BIG-IP) to this vulnerability.
This issue has been classified as CWE-134: Use of Externally-Controlled Format
String.

To determine if your product and version have been evaluated for this
vulnerability, refer to the Evaluated products box. To determine if your
release is known to be vulnerable, the components or features that are affected
by the vulnerability, and for information about releases, point releases, or
hotfixes that address the vulnerability, refer to the following tables. You can
also use iHealth to diagnose a vulnerability for BIG-IP and BIG-IQ systems. For
more information about using iHealth, refer to K27404821: Using F5 iHealth to
diagnose vulnerabilities. For more information about security advisory
versioning, refer to K51812227: Understanding security advisory versioning.

In this section

  o BIG-IP and BIG-IQ
  o F5OS
  o NGINX
  o Other products

BIG-IP and BIG-IQ

Note: After a fix is introduced for a given minor branch, that fix applies to
all subsequent maintenance and point releases for that branch, and no
additional fixes for that branch will be listed in the table. For example, when
a fix is introduced in 14.1.2.3, the fix also applies to 14.1.2.4, and all
later 14.1.x releases (14.1.3.x., 14.1.4.x). For more information, refer to
K51812227: Understanding security advisory versioning.

     
+-----------+------+------------+----------+----------+-----------+-----------+
|           |      |Versions    |Fixes     |          |CVSSv3     |Vulnerable |
|Product    |Branch|known to be |introduced|Severity  |score^2    |component  |
|           |      |vulnerable^1|in        |          |           |or feature |
+-----------+------+------------+----------+----------+-----------+-----------+
|           |17.x  |17.0.0      |None^3    |          |           |           |
|           +------+------------+----------+          |           |           |
|           |16.x  |16.1.2.2 -  |None^3    |          |7.5 -      |           |
|           |      |16.1.3      |          |          |Standard   |           |
|           +------+------------+----------+          |deployment |           |
|BIG-IP (all|15.x  |15.1.5.1 -  |None^3    |High      |mode       |iControl   |
|modules)   |      |15.1.8      |          |          |           |SOAP       |
|           +------+------------+----------+          |8.5 -      |           |
|           |14.x  |14.1.4.6 -  |None^3    |          |Appliance  |           |
|           |      |14.1.5      |          |          |mode       |           |
|           +------+------------+----------+          |           |           |
|           |13.x  |13.1.5      |None^3    |          |           |           |
+-----------+------+------------+----------+----------+-----------+-----------+
|BIG-IP SPK |All   |None        |Not       |Not       |None       |None       |
|           |      |            |applicable|vulnerable|           |           |
+-----------+------+------------+----------+----------+-----------+-----------+
|BIG-IQ     |      |            |Not       |Not       |           |           |
|Centralized|All   |None        |applicable|vulnerable|None       |None       |
|Management |      |            |          |          |           |           |
+-----------+------+------------+----------+----------+-----------+-----------+

^1F5 evaluates only software versions that have not yet reached the End of
Technical Support (EoTS) phase of their lifecycle. For more information, refer
to the Security hotfixes section of K4602: Overview of the F5 security
vulnerability response policy.

^2The CVSSv3 score link takes you to a resource outside of MyF5, and it is
possible that the document may be removed without our knowledge.

^3F5 has fixed this issue in an engineering hotfix that is available for
supported versions of the BIG-IP system. Customers affected by this issue can
download the engineering hotfix for the latest supported versions of BIG-IP
from the F5 Downloads site. While F5 endeavors to release the most stable code
possible, engineering hotfixes do not undergo the extensive QA assessment of
scheduled software releases. F5 offers engineering hotfixes with no warranty or
guarantee of usability. For more information, refer to K55025573: Engineering
hotfix installation overview.

F5OS

     
+-------+------+----------------+----------+----------+-------+---------------+
|       |      |Versions known  |Fixes     |          |CVSSv3 |Vulnerable     |
|Product|Branch|to be vulnerable|introduced|Severity  |score^2|component or   |
|       |      |^1              |in        |          |       |feature        |
+-------+------+----------------+----------+----------+-------+---------------+
|F5OS-A |All   |None            |Not       |Not       |None   |None           |
|       |      |                |applicable|vulnerable|       |               |
+-------+------+----------------+----------+----------+-------+---------------+
|F5OS-C |All   |None            |Not       |Not       |None   |None           |
|       |      |                |applicable|vulnerable|       |               |
+-------+------+----------------+----------+----------+-------+---------------+

^1F5 evaluates only software versions that have not yet reached the End of
Technical Support (EoTS) phase of their lifecycle. For more information, refer
to the Security hotfixes section of K4602: Overview of the F5 security
vulnerability response policy.

^2The CVSSv3 score link takes you to a resource outside of MyF5, and it is
possible that the document may be removed without our knowledge.

NGINX

     
+---------+------+---------------+----------+----------+------+---------------+
|         |      |Versions known |Fixes     |          |CVSSv3|Vulnerable     |
|Product  |Branch|to be          |introduced|Severity  |score^|component or   |
|         |      |vulnerable^1   |in        |          |2     |feature        |
+---------+------+---------------+----------+----------+------+---------------+
|NGINX    |      |               |Not       |Not       |      |               |
|(all     |All   |None           |applicable|vulnerable|None  |None           |
|products)|      |               |          |          |      |               |
+---------+------+---------------+----------+----------+------+---------------+

^1F5 evaluates only software versions that have not yet reached the End of
Technical Support (EoTS) phase of their lifecycle. For more information, refer
to the Security hotfixes section of K4602: Overview of the F5 security
vulnerability response policy.

^2The CVSSv3 score link takes you to a resource outside of MyF5, and it is
possible that the document may be removed without our knowledge.

Other products

     
+-------+------+----------------+----------+----------+-------+---------------+
|       |      |Versions known  |Fixes     |          |CVSSv3 |Vulnerable     |
|Product|Branch|to be vulnerable|introduced|Severity  |score^2|component or   |
|       |      |^1              |in        |          |       |feature        |
+-------+------+----------------+----------+----------+-------+---------------+
|Traffix|All   |None            |Not       |Not       |None   |None           |
|SDC    |      |                |applicable|vulnerable|       |               |
+-------+------+----------------+----------+----------+-------+---------------+

^1F5 evaluates only software versions that have not yet reached the End of
Technical Support (EoTS) phase of their lifecycle. For more information, refer
to the Security hotfixes section of K4602: Overview of the F5 security
vulnerability response policy.

^2The CVSSv3 score link takes you to a resource outside of MyF5, and it is
possible that the document may be removed without our knowledge.

Security Advisory Recommended Actions

If you are running a version listed in the Versions known to be vulnerable
column, you can eliminate this vulnerability by installing a version listed in
the Fixes introduced in column. If the Fixes introduced in column does not list
a version for your branch, then no update candidate currently exists for that
branch and F5 recommends that you upgrade to a version with the fix (refer to
the tables).

If the Fixes introduced in column lists a version prior to the one you are
running, in the same branch, then your version should have the fix.

Mitigation

Important: Blocking iControl SOAP IP addresses will prevent adding new devices
to a device trust. For more information, refer to K05914557: Adding new device
to Device-Trust fails.

If you follow best practices in securing access to the management interface and
self IP addresses of BIG-IP systems, you help to minimize the attack surface.
Review the following articles for guidance:

For self IP addresses

  o K13092: Overview of securing access to the BIG-IP system
  o K17333: Overview of port lockdown behavior (12.x - 17.x)
  o K31003634: The Configuration utility of the Single-NIC BIG-IP Virtual
    Edition now defaults to TCP port 8443
  o K51358480: The single-NIC BIG-IP VE may erroneously revert to the default
    management httpd port after a configuration reload

For the management interface

  o K46122561: Restrict access to the management interface using network
    firewall rules
  o K69354049: Use iptables to restrict access to the BIG-IP management
    interface for Configuration utility and iControl REST services

For the BIG-IP system, restrict access to the system's iControl SOAP API to
only trusted users. If you are not using the iControl SOAP API, then you can
disable all access by setting the iControl SOAP API allowed list to an empty
list. To do so, perform the following procedure:

Impact of procedure: Blocking iControl SOAP IP addresses will prevent adding
new devices to a device trust. For more information, refer to K05914557: Adding
new device to Device-Trust fails.

 1. Log in to the TMOS Shell (tmsh) by entering the following command:

    tmsh

 2. Remove all IP addresses or ranges of IP addresses from the list of allowed
    addresses by entering the following command:

    modify /sys icontrol-soap allow replace-all-with { }

 3. Save the change by entering the following command:

    save /sys config

For more information about limiting access to trusted users, refer to K17459:
Restricting access to the iControl SOAP API by source IP address.

Acknowledgements

F5 acknowledges Ron Bowes of Rapid7 for bringing this issue to our attention
and following the highest standards of coordinated disclosure.

Related Content

  o K41942608: Overview of security advisory articles
  o K12201527: Overview of Quarterly Security Notifications
  o K51812227: Understanding security advisory versioning
  o K4602: Overview of the F5 security vulnerability response policy
  o K4918: Overview of the F5 critical issue hotfix policy
  o K8986: F5 product support policies
  o K9502: BIG-IP hotfix and point release matrix
  o K13123: Managing BIG-IP product hotfixes (11.x - 17.x)
  o K167: Downloading software and firmware from F5
  o K9970: Subscribing to email notifications regarding F5 products
  o K9957: RSS feed service interruption
  o K44525501: Overview of BIG-IP data plane and control plane

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=dLc5
-----END PGP SIGNATURE-----