-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2022.5996.2
           K94221585: iControl SOAP vulnerability CVE-2022-41622
                             21 November 2022

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           BIG-IP
                   BIG-IQ
Publisher:         F5 Networks
Operating System:  Network Appliance
Resolution:        Mitigation
CVE Names:         CVE-2022-41622  

Original Bulletin: 
   https://support.f5.com/csp/article/K94221585

Comment: CVSS (Max):  8.8 CVE-2022-41622 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
         CVSS Source: F5 Networks
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Revision History:  November 21 2022: Vendor added further information to the Recommended Actions
                   November 17 2022: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

K94221585: iControl SOAP vulnerability CVE-2022-41622

Original Publication Date: 17 Nov, 2022
Latest   Publication Date: 20 Nov, 2022

Security Advisory Description

BIG-IP and BIG-IQ are vulnerable to cross-site request forgery (CSRF) attacks
through iControl SOAP. (CVE-2022-41622)

Impact

An attacker may trick users who have at least resource administrator role
privilege and are authenticated through basic authentication in iControl SOAP
into performing critical actions. An attacker can exploit this vulnerability
only through the control plane, not through the data plane. If exploited, the
vulnerability can compromise the complete system.

Security Advisory Status

F5 Product Development has assigned ID 1143073 (BIG-IP) and 1143073-6 (BIG-IQ)
to this vulnerability. This issue has been classified as CWE-352: Cross-Site
Request Forgery (CSRF).

To determine if your product and version have been evaluated for this
vulnerability, refer to the Applies to (see versions) box. To determine if your
release is known to be vulnerable, the components or features that are affected
by the vulnerability, and for information about releases, point releases, or
hotfixes that address the vulnerability, refer to the following tables. You can
also use iHealth to diagnose a vulnerability for BIG-IP and BIG-IQ systems. For
more information about using iHealth, refer to K27404821: Using F5 iHealth to
diagnose vulnerabilities. For more information about security advisory
versioning, refer to K51812227: Understanding security advisory versioning.

In this section

  o BIG-IP and BIG-IQ
  o F5OS
  o NGINX
  o Other Products

BIG-IP and BIG-IQ

Note: After a fix is introduced for a given minor branch, that fix applies to
all subsequent maintenance and point releases for that branch, and no
additional fixes for that branch will be listed in the table. For example, when
a fix is introduced in 14.1.2.3, the fix also applies to 14.1.2.4, and all
later 14.1.x releases (14.1.3.x., 14.1.4.x). For more information, refer to
K51812227: Understanding security advisory versioning.

+------------+------+--------------+----------+----------+------+-------------+
|            |      |Versions known|Fixes     |          |CVSSv3|Vulnerable   |
|Product     |Branch|to be         |introduced|Severity  |score^|component or |
|            |      |vulnerable^1  |in        |          |2     |feature      |
+------------+------+--------------+----------+----------+------+-------------+
|            |17.x  |17.0.0        |None^3    |          |      |             |
|            +------+--------------+----------+          |      |             |
|            |16.x  |16.1.0 -      |None^3    |          |      |             |
|            |      |16.1.3        |          |          |      |             |
|            +------+--------------+----------+          |      |             |
|BIG-IP (all |15.x  |15.1.0 -      |None^3    |          |      |             |
|modules)    |      |15.1.8        |          |High      |8.8   |iControl SOAP|
|            +------+--------------+----------+          |      |             |
|            |14.x  |14.1.0 -      |None^3    |          |      |             |
|            |      |14.1.5        |          |          |      |             |
|            +------+--------------+----------+          |      |             |
|            |13.x  |13.1.0 -      |None^3    |          |      |             |
|            |      |13.1.5        |          |          |      |             |
+------------+------+--------------+----------+----------+------+-------------+
|BIG-IP SPK  |All   |None          |Not       |Not       |None  |None         |
|            |      |              |applicable|vulnerable|      |             |
+------------+------+--------------+----------+----------+------+-------------+
|BIG-IQ      |8.x   |8.0.0 - 8.2.0 |None      |          |      |             |
|Centralized +------+--------------+----------+High      |8.8   |iControl SOAP|
|Management  |7.x   |7.1.0         |None      |          |      |             |
+------------+------+--------------+----------+----------+------+-------------+

^1F5 evaluates only software versions that have not yet reached the End of
Technical Support (EoTS) phase of their lifecycle. For more information, refer
to the Security hotfixes section of K4602: Overview of the F5 security
vulnerability response policy.

^2The CVSSv3 score link takes you to a resource outside of AskF5, and it is
possible that the document may be removed without our knowledge.

^3F5 has fixed this issue in an engineering hotfix that is available for
supported versions of the BIG-IP system. Customers affected by this issue can
request a hotfix for the latest supported versions of BIG-IP from F5 Support.
To resolve this vulnerability, after installing the hotfix to one of the BIG-IP
releases listed in the previous table, you must also disable Basic
Authentication for iControl SOAP.

F5OS

+-------+------+----------------+----------+----------+-------+---------------+
|       |      |Versions known  |Fixes     |          |CVSSv3 |Vulnerable     |
|Product|Branch|to be vulnerable|introduced|Severity  |score^2|component or   |
|       |      |^1              |in        |          |       |feature        |
+-------+------+----------------+----------+----------+-------+---------------+
|F5OS-A |All   |None            |Not       |Not       |None   |None           |
|       |      |                |applicable|vulnerable|       |               |
+-------+------+----------------+----------+----------+-------+---------------+
|F5OS-C |All   |None            |Not       |Not       |None   |None           |
|       |      |                |applicable|vulnerable|       |               |
+-------+------+----------------+----------+----------+-------+---------------+

^1F5 evaluates only software versions that have not yet reached the End of
Technical Support (EoTS) phase of their lifecycle. For more information, refer
to the Security hotfixes section of K4602: Overview of the F5 security
vulnerability response policy.

^2The CVSSv3 score link takes you to a resource outside of AskF5, and it is
possible that the document may be removed without our knowledge.

NGINX

+---------+------+---------------+----------+----------+------+---------------+
|         |      |Versions known |Fixes     |          |CVSSv3|Vulnerable     |
|Product  |Branch|to be          |introduced|Severity  |score^|component or   |
|         |      |vulnerable^1   |in        |          |2     |feature        |
+---------+------+---------------+----------+----------+------+---------------+
|NGINX    |      |               |Not       |Not       |      |               |
|(all     |All   |None           |applicable|vulnerable|None  |None           |
|products)|      |               |          |          |      |               |
+---------+------+---------------+----------+----------+------+---------------+

^1F5 evaluates only software versions that have not yet reached the End of
Technical Support (EoTS) phase of their lifecycle. For more information, refer
to the Security hotfixes section of K4602: Overview of the F5 security
vulnerability response policy.

^2The CVSSv3 score link takes you to a resource outside of AskF5, and it is
possible that the document may be removed without our knowledge.

Other Products

+-------+------+----------------+----------+----------+-------+---------------+
|       |      |Versions known  |Fixes     |          |CVSSv3 |Vulnerable     |
|Product|Branch|to be vulnerable|introduced|Severity  |score^2|component or   |
|       |      |^1              |in        |          |       |feature        |
+-------+------+----------------+----------+----------+-------+---------------+
|Traffix|All   |None            |Not       |Not       |None   |None           |
|SDC    |      |                |applicable|vulnerable|       |               |
+-------+------+----------------+----------+----------+-------+---------------+

^1F5 evaluates only software versions that have not yet reached the End of
Technical Support (EoTS) phase of their lifecycle. For more information, refer
to the Security hotfixes section of K4602: Overview of the F5 security
vulnerability response policy.

^2The CVSSv3 score link takes you to a resource outside of AskF5, and it is
possible that the document may be removed without our knowledge.

Recommended Actions

If you are running a version listed in the Versions known to be vulnerable
column, you can eliminate this vulnerability by installing a version listed in
the Fixes introduced in column. If the Fixes introduced in column does not list
a version for your branch, then no update candidate currently exists for that
branch and F5 recommends that you upgrade to a version with the fix (refer to
the table).

If the Fixes introduced in column lists a version prior to the one you are
running, in the same branch, then your version should have the fix.

Important: Blocking iControl SOAP IP addresses and/or installing the HF and
disabling basic auth for iControl SOAP will impact adding new devices to a
device trust.
 

BIG-IP

To eliminate this vulnerability in the BIG-IP system, after installing a
version listed in the Fixes introduced in column, you must disable Basic
Authentication for iControl SOAP. To do so, perform the following procedure:

Impact of procedure: Performing the following procedure should not have a
negative impact on your system.

 1. Log in to the Traffic Management Shell (tmsh) by entering the following
    command:

    tmsh

 2. Disable Basic Authentication for iControl SOAP by entering the following
    command:

    modify sys db icontrol.basic_auth value disable

 3. Save the configuration by entering the following command:

    save sys config

    Note: Disabling db key icontrol.basic_auth will only disable basic auth for
    iControl SOAP. It will not disable basic auth functionality of iControl
    REST.

Mitigation

To mitigate this vulnerability, you can use a unique and isolated web browser
when managing the BIG-IP or BIG-IQ system.

This attack cannot be prevented if you have authenticated to iControl SOAP in
the web browser with basic authentication. This authentication mechanism is
uncommon and is different from using the login page for the Configuration
utility. F5 recommends that you do not authenticate with basic authentication
in the web browser. If an authentication window for basic authentication pops
up on the web browser, do not provide credentials.

If you follow best practices in securing access to the management interface and
self IP addresses of BIG-IP and BIG-IQ systems, you help to minimize the attack
surface. Review the following articles for guidance:

For Self IP addresses

  o K13092: Overview of securing access to the BIG-IP system
  o K17333: Overview of port lockdown behavior (12.x - 17.x)
  o K31003634: The Configuration utility of the Single-NIC BIG-IP Virtual
    Edition now defaults to TCP port 8443
  o K51358480: The single-NIC BIG-IP VE may erroneously revert to the default
    management httpd port after a configuration reload
  o K39403510: Managing the port lockdown configuration on the BIG-IQ system

For Management interface

  o K46122561: Restricting access to the management interface using network
    firewall rules
  o K69354049: Restricting access to the BIG-IP management interface for
    Configuration Utility and iControl REST services using iptables
  o K92748202: Restricting access to the BIG-IQ management interface using
    network firewall rules

Note: For BIG-IQ 7.x, secure the management interface by using an external
packet filtering device such as the BIG-IP Advanced Firewall Manager (AFM).

BIG-IP mitigation

For the BIG-IP system only, restrict access to the system's iControl SOAP API
to only trusted users. If you are not using the iControl SOAP API, then you can
disable all access by setting the iControl SOAP API allowed list to an empty
list. To do so, perform the following procedure:

 1. Log in to tmsh by entering the following command:

    tmsh

 2. Remove all IP addresses or range of IP addresses from the list of allowed
    addresses by entering the following command:

    modify /sys icontrol-soap allow replace-all-with { }

 3. Save the change by entering the following command:

    save /sys config
     

For more information about limiting access to trusted users, refer to K17459:
Restricting access to the iControl SOAP API by source IP address.

BIG-IQ mitigation

For the BIG-IQ system only, restrict the iControl SOAP access to localhost
(127.0.0.1) by changing the webd configuration. To do so, perform the following
procedure:

Impact of procedure: The BIG-IQ user interface may be momentarily disrupted
while the webd service restarts.

 1. Log in to the command line of the affected BIG-IQ system as the root user.
 2. Back up a copy of the webd configuration by entering the following command:

    cp -p /etc/webd/webd.conf /etc/webd/webd.conf.K94221585

 3. Have a text editor such as vi or nano available to edit the webd 
    configuration.
 4. There are two iControl FastCGI endpoint (location /iControl/
    iControlPortal.cgi) configurations; one is under the server configuration
    stanza listening for port 80, and the other is located under the server
    configuration stanza listening for port 443 and is enabled with SSL. The
    one under the port 80 server is already restricted to localhost (127.0.0.1)
    by default. Restrict the one under the SSL server. The starting of the SSL
    server configuration stanza should appear similar to the following example:

    server {
      listen [::]:443 ipv6only=on ssl;
      listen *:443 ssl;
    }

 5. Locate the iControl FastCGI endpoint configuration under this SSL server;
    it should appear similar to the following example:

    # iControl FastCGI endpoint
      location /iControl/iControlPortal.cgi {
      access_by_lua_file /usr/lib/webd/lua/icauth.lua;
      fastcgi_pass 127.0.0.1:8202;
      fastcgi_pass_header X-IControl-Session;
      fastcgi_pass_request_body on;
      fastcgi_param QUERY_STRING $query_string;
      fastcgi_param REQUEST_METHOD $request_method;
      fastcgi_param CONTENT_TYPE $content_type;
      fastcgi_param CONTENT_LENGTH $content_length;
      fastcgi_param SCRIPT_NAME '/iControl/iControlPortal.cgi';
    }

 6. Add the following two lines of configuration to this iControl FastCGI
    endpoint configuration:

    allow 127.0.0.1;
    deny all;

 7. After you add the two lines of configuration, the iControl FastCGI endpoint
    configuration should appear similar to the following example:

    # iControl FastCGI endpoint
      location /iControl/iControlPortal.cgi {
      allow 127.0.0.1;
      deny all;
      access_by_lua_file /usr/lib/webd/lua/icauth.lua;
      fastcgi_pass 127.0.0.1:8202;
      fastcgi_pass_header X-IControl-Session;
      fastcgi_pass_request_body on;
      fastcgi_param QUERY_STRING $query_string;
      fastcgi_param REQUEST_METHOD $request_method;
      fastcgi_param CONTENT_TYPE $content_type;
      fastcgi_param CONTENT_LENGTH $content_length;
      fastcgi_param SCRIPT_NAME '/iControl/iControlPortal.cgi';
    }

 8. Save the changes and exit the text editor.
 9. To effect the change, you must restart the webd service. To do so, enter
    the following command:

    tmsh restart /sys service webd

Acknowledgements

F5 acknowledges Ron Bowes of Rapid7 for bringing this issue to our attention
and following the highest standards of coordinated disclosure.

Supplemental Information

o K41942608: Overview of security advisory articles
  o K4602: Overview of the F5 security vulnerability response policy
  o K4918: Overview of the F5 critical issue hotfix policy
  o K8986: F5 product support policies
  o K9502: BIG-IP hotfix and point release matrix
  o K13123: Managing BIG-IP product hotfixes (11.x - 17.x)
  o K15106: Managing BIG-IQ product hotfixes
  o K15113: BIG-IQ hotfix and point release matrix
  o K167: Downloading software and firmware from F5
  o K9970: Subscribing to email notifications regarding F5 products
  o K9957: Creating a custom RSS feed to view new and updated documents
  o K44525501: Overview of BIG-IP data plane and control plane
  o K26814434: How to determine if a BIG-IP system is using iControl SOAP
  o K80291425: What is a Cross-site Request Forgery (CSRF) attack

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/

iQIVAwUBY3sOpMkNZI30y1K9AQgMMg//euUjZdyi5Nt1JdMSi7nz71o4jzhGXRrl
K1izIQOAbdvpBVY6+wjTBZO8OLQrwUOrfyi2KCv3+Cw9TswhdlYIb+5YXD4paMaG
I+kBNkpFrTtDuGDTThoudnVnKQNJv+4uKBjaMMdCIBtI2OHpnjcjeyRpGSBfdSNe
LqJVpfeHW/LaBfTzUocGc47OWnXgHS91ZFvyJRqSuHXr/rvbqEnOQX0cWF2PN5u0
6zJP2LxfVzCz3j2V2HS0oh5xKWLphpysQQUYuZNpn3d7o0rBkKK+e172d3cM2t0H
HRCQGd76KoZLzmSsJE+caS7NsrS+SbrTbZEtKiPvKNBYjnJ1RLshgMEOazKnQlHl
aB5/a2BR3/M2jnwZX0NxgIDNik/6EwOI+EjIwBIUbfMQ5pThkqkERiUBK6it7HzU
tz/DWY7XD/gO8NCRnYXV9/z3/c3P9zJznwEbqs9q3xzAge1yO28j7HQzK2zNoApW
kh/rrk+ij1c8irgq1RwCi5jeOEfWTs4m6pi9cT/OHVU8ue/lE1dRi2AuPdDOOb31
VNouPqMRQMYv7A+vJSuIBiv1Z4Ld1AOkHYwTGv8juDi+OcYOPQVoqU0WN5PtV4fe
dKRCJc0QhUr7j4Se6sYZexIP3WWHtHVhwSZmzQVfv+JdacWwDxS1QlWlxoV2YdNb
w2XcTyP32x0=
=HlTy
-----END PGP SIGNATURE-----