Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2023.0638 K000130415: iControl SOAP vulnerability CVE-2023-22374 6 February 2023 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: F5 BIG-IP (all modules) Publisher: F5 Networks Operating System: Network Appliance Resolution: Patch/Upgrade CVE Names: CVE-2023-22374 Original Bulletin: https://my.f5.com/manage/s/article/K000130415 Comment: CVSS (Max): 8.5 CVE-2023-22374 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H) CVSS Source: F5 Networks Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- K000130415: iControl SOAP vulnerability CVE-2023-22374 Published Date: Feb 1, 2023 Updated Date: Feb 1, 2023 Security Advisory Description A format string vulnerability exists in iControl SOAP that allows an authenticated attacker to crash the iControl SOAP CGI process or, potentially execute arbitrary code. In appliance mode BIG-IP, a successful exploit of this vulnerability can allow the attacker to cross a security boundary. ( CVE-2023-22374) Impact This vulnerability may allow an authenticated attacker with network access to iControl SOAP through the BIG-IP management port and/or self IP addresses to cause a denial-of-service (DoS) on the iControl SOAP CGI process or potentially execute arbitrary system commands. To successfully exploit the command execution attack vector, the attacker must gather knowledge about the environment in which the vulnerable component exists. There is no data plane exposure; this is a control plane issue only. Appliance mode is enforced by a specific license or may be enabled or disabled for individual Virtual Clustered Multiprocessing (vCMP) guest instances. For more information about Appliance mode, refer to K12815: Overview of Appliance mode. Security Advisory Status F5 Product Development has assigned ID 1208001 (BIG-IP) to this vulnerability. This issue has been classified as CWE-134: Use of Externally-Controlled Format String. To determine if your product and version have been evaluated for this vulnerability, refer to the Evaluated products box. To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases, point releases, or hotfixes that address the vulnerability, refer to the following tables. You can also use iHealth to diagnose a vulnerability for BIG-IP and BIG-IQ systems. For more information about using iHealth, refer to K27404821: Using F5 iHealth to diagnose vulnerabilities. For more information about security advisory versioning, refer to K51812227: Understanding security advisory versioning. In this section o BIG-IP and BIG-IQ o F5OS o NGINX o Other products BIG-IP and BIG-IQ Note: After a fix is introduced for a given minor branch, that fix applies to all subsequent maintenance and point releases for that branch, and no additional fixes for that branch will be listed in the table. For example, when a fix is introduced in 14.1.2.3, the fix also applies to 14.1.2.4, and all later 14.1.x releases (14.1.3.x., 14.1.4.x). For more information, refer to K51812227: Understanding security advisory versioning. +-----------+------+------------+----------+----------+-----------+-----------+ | | |Versions |Fixes | |CVSSv3 |Vulnerable | |Product |Branch|known to be |introduced|Severity |score^2 |component | | | |vulnerable^1|in | | |or feature | +-----------+------+------------+----------+----------+-----------+-----------+ | |17.x |17.0.0 |None^3 | | | | | +------+------------+----------+ | | | | |16.x |16.1.2.2 - |None^3 | |7.5 - | | | | |16.1.3 | | |Standard | | | +------+------------+----------+ |deployment | | |BIG-IP (all|15.x |15.1.5.1 - |None^3 |High |mode |iControl | |modules) | |15.1.8 | | | |SOAP | | +------+------------+----------+ |8.5 - | | | |14.x |14.1.4.6 - |None^3 | |Appliance | | | | |14.1.5 | | |mode | | | +------+------------+----------+ | | | | |13.x |13.1.5 |None^3 | | | | +-----------+------+------------+----------+----------+-----------+-----------+ |BIG-IP SPK |All |None |Not |Not |None |None | | | | |applicable|vulnerable| | | +-----------+------+------------+----------+----------+-----------+-----------+ |BIG-IQ | | |Not |Not | | | |Centralized|All |None |applicable|vulnerable|None |None | |Management | | | | | | | +-----------+------+------------+----------+----------+-----------+-----------+ ^1F5 evaluates only software versions that have not yet reached the End of Technical Support (EoTS) phase of their lifecycle. For more information, refer to the Security hotfixes section of K4602: Overview of the F5 security vulnerability response policy. ^2The CVSSv3 score link takes you to a resource outside of MyF5, and it is possible that the document may be removed without our knowledge. ^3F5 has fixed this issue in an engineering hotfix that is available for supported versions of the BIG-IP system. Customers affected by this issue can download the engineering hotfix for the latest supported versions of BIG-IP from the F5 Downloads site. While F5 endeavors to release the most stable code possible, engineering hotfixes do not undergo the extensive QA assessment of scheduled software releases. F5 offers engineering hotfixes with no warranty or guarantee of usability. For more information, refer to K55025573: Engineering hotfix installation overview. F5OS +-------+------+----------------+----------+----------+-------+---------------+ | | |Versions known |Fixes | |CVSSv3 |Vulnerable | |Product|Branch|to be vulnerable|introduced|Severity |score^2|component or | | | |^1 |in | | |feature | +-------+------+----------------+----------+----------+-------+---------------+ |F5OS-A |All |None |Not |Not |None |None | | | | |applicable|vulnerable| | | +-------+------+----------------+----------+----------+-------+---------------+ |F5OS-C |All |None |Not |Not |None |None | | | | |applicable|vulnerable| | | +-------+------+----------------+----------+----------+-------+---------------+ ^1F5 evaluates only software versions that have not yet reached the End of Technical Support (EoTS) phase of their lifecycle. For more information, refer to the Security hotfixes section of K4602: Overview of the F5 security vulnerability response policy. ^2The CVSSv3 score link takes you to a resource outside of MyF5, and it is possible that the document may be removed without our knowledge. NGINX +---------+------+---------------+----------+----------+------+---------------+ | | |Versions known |Fixes | |CVSSv3|Vulnerable | |Product |Branch|to be |introduced|Severity |score^|component or | | | |vulnerable^1 |in | |2 |feature | +---------+------+---------------+----------+----------+------+---------------+ |NGINX | | |Not |Not | | | |(all |All |None |applicable|vulnerable|None |None | |products)| | | | | | | +---------+------+---------------+----------+----------+------+---------------+ ^1F5 evaluates only software versions that have not yet reached the End of Technical Support (EoTS) phase of their lifecycle. For more information, refer to the Security hotfixes section of K4602: Overview of the F5 security vulnerability response policy. ^2The CVSSv3 score link takes you to a resource outside of MyF5, and it is possible that the document may be removed without our knowledge. Other products +-------+------+----------------+----------+----------+-------+---------------+ | | |Versions known |Fixes | |CVSSv3 |Vulnerable | |Product|Branch|to be vulnerable|introduced|Severity |score^2|component or | | | |^1 |in | | |feature | +-------+------+----------------+----------+----------+-------+---------------+ |Traffix|All |None |Not |Not |None |None | |SDC | | |applicable|vulnerable| | | +-------+------+----------------+----------+----------+-------+---------------+ ^1F5 evaluates only software versions that have not yet reached the End of Technical Support (EoTS) phase of their lifecycle. For more information, refer to the Security hotfixes section of K4602: Overview of the F5 security vulnerability response policy. ^2The CVSSv3 score link takes you to a resource outside of MyF5, and it is possible that the document may be removed without our knowledge. Security Advisory Recommended Actions If you are running a version listed in the Versions known to be vulnerable column, you can eliminate this vulnerability by installing a version listed in the Fixes introduced in column. If the Fixes introduced in column does not list a version for your branch, then no update candidate currently exists for that branch and F5 recommends that you upgrade to a version with the fix (refer to the tables). If the Fixes introduced in column lists a version prior to the one you are running, in the same branch, then your version should have the fix. Mitigation Important: Blocking iControl SOAP IP addresses will prevent adding new devices to a device trust. For more information, refer to K05914557: Adding new device to Device-Trust fails. If you follow best practices in securing access to the management interface and self IP addresses of BIG-IP systems, you help to minimize the attack surface. Review the following articles for guidance: For self IP addresses o K13092: Overview of securing access to the BIG-IP system o K17333: Overview of port lockdown behavior (12.x - 17.x) o K31003634: The Configuration utility of the Single-NIC BIG-IP Virtual Edition now defaults to TCP port 8443 o K51358480: The single-NIC BIG-IP VE may erroneously revert to the default management httpd port after a configuration reload For the management interface o K46122561: Restrict access to the management interface using network firewall rules o K69354049: Use iptables to restrict access to the BIG-IP management interface for Configuration utility and iControl REST services For the BIG-IP system, restrict access to the system's iControl SOAP API to only trusted users. If you are not using the iControl SOAP API, then you can disable all access by setting the iControl SOAP API allowed list to an empty list. To do so, perform the following procedure: Impact of procedure: Blocking iControl SOAP IP addresses will prevent adding new devices to a device trust. For more information, refer to K05914557: Adding new device to Device-Trust fails. 1. Log in to the TMOS Shell (tmsh) by entering the following command: tmsh 2. Remove all IP addresses or ranges of IP addresses from the list of allowed addresses by entering the following command: modify /sys icontrol-soap allow replace-all-with { } 3. Save the change by entering the following command: save /sys config For more information about limiting access to trusted users, refer to K17459: Restricting access to the iControl SOAP API by source IP address. Acknowledgements F5 acknowledges Ron Bowes of Rapid7 for bringing this issue to our attention and following the highest standards of coordinated disclosure. Related Content o K41942608: Overview of security advisory articles o K12201527: Overview of Quarterly Security Notifications o K51812227: Understanding security advisory versioning o K4602: Overview of the F5 security vulnerability response policy o K4918: Overview of the F5 critical issue hotfix policy o K8986: F5 product support policies o K9502: BIG-IP hotfix and point release matrix o K13123: Managing BIG-IP product hotfixes (11.x - 17.x) o K167: Downloading software and firmware from F5 o K9970: Subscribing to email notifications regarding F5 products o K9957: RSS feed service interruption o K44525501: Overview of BIG-IP data plane and control plane - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBY+BOdckNZI30y1K9AQiPmw//bf+7kJ1KDQE0/prEeT1KdujNABENVW7W kQFr8SZRN6nEqDdEEY30djY1BheYDhpVtVjFt0sQpfeKYA9vBuKBg/u/wLsUVkFd Ehom3D7CWxlNpekvcALqdaj44xR7V4TfWWTOgd3nWziZHgmi96wPscOx94iTltCG 4SWqnIqr3OUvMXY/0gDViqE2LerwJUVyCrowldjPMRhtAukSXEb2nozv7GiL3+ku vT0e8RLsCGykCgif/JGR8p/KrS/BcWEGqIB+m6wCb5zVAHdqoHnOTs06YrsdcOw9 i1u3aTSxJO9/8uZngFWXln8DdDuNy2DFZmuGtVLWkGkTda8dqs1cZaQqeNwWXs6s pARicWTHU4UGkY8XOPJ4SQa8DBV0yEpCS6abG1hPY5/rIJkquqRGK+v7YnIPKhf1 ckZStVxiywiKY2o/54XXj2yx7KfP1GjCqxmaQ0T3lUa0Zcadnkkxx7eIwL93oW3W 2nDHEoA+WxEm7RrPJpsSEMmXaUS5IGcDKpN+bdvtivx7cUB86Qqm1rOsAPlKg6FR JvUFB1oa8rVA3uWg80jS3Qv7Wm8tI8YnC80InAY3Xl9iKnaHapeO2EwT1rBDxazn T8vf4La9B4nqVx1uD5/ZzvdDsOm/YrSlnYEv0Q5BTpClQzwB+dv+T09V7CSTkw2g VQlG5bIJ9Gc= =dLc5 -----END PGP SIGNATURE-----