A vulnerability has been discovered in multiple F5 Big IP and Enterprise Manager products which could allow for remote code execution. F5 provides multiple security products, such as firewalls and web gateways.
Successful exploitation of this vulnerability could result in an attacker gaining root access to the affected devices. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
- F5 BIG-IP LTM 11.0.0-11.5.1
- F5 BIG-IP AAM 11.4.0 - 11.5.1
- F5 BIG-IP AFM 11.3.0 - 11.5.1
- F5 BIG-IP Analytics 11.0.0 - 11.5.1
- F5 BIG-IP APM 11.0.0 - 11.5.1
- F5 BIG-IP ASM 11.0.0 - 11.5.1
- F5 BIG-IP Edge Gateway 11.0.0 - 11.3.0
- F5 BIG-IP GTM 11.0.0 - 11.5.1
- F5 BIG-IP Link Controller 11.0.0 - 11.5.1
- F5 BIG-IP PEM 11.3.0 - 11.5.1
- F5 BIG-IP PSM 11.0.0 - 11.4.1
- F5 BIG-IP WebAccelerator 11.0.0 - 11.3.0
- F5 BIG-IP WOM 11.0.0 - 11.3.0
- F5 Enterprise Manager 3.0.0 - 3.1.1
A remote code execution vulnerability has been discovered in multiple F5 BIG-IP products which can allow remote unauthorized root access to affected devices. When configured in a high availability/failover mode, the devices suffer from an unauthenticated rsync access vulnerability. Rsync is program used to ensure that files and directories on two different systems are the same. The rsync daemon does not require authentication when communicating to a ConfigSync IP. An attacker could upload a specially crafted SSH key to the root folder directly and create a SSH session on the device.
Successful exploitation of this vulnerability could result in an attacker gaining root access to the affected devices. An attacker could install programs; view, change, or delete data; or create new accounts with full user rights.
We recommend the following actions be taken:
- Upgrade vulnerable F5 products immediately after appropriate testing.
- Set the ConfigSync self IP's port lockdown setting to not allow all and limit TCP port 873 access.
- Filter access to the affected device at the network boundary if global access isn't needed. Restricting access to only trusted computers and networks might greatly reduce the likelihood of a successful exploit.